jeudi 21 février 2013

L’entrepreneuriat des jeunes en milieu rural


Call for communication – Appel à communication               Deadline - Dernier délai : 31 mars 2013

 
Forum du Jeune Entrepreneur                 www.forumdujeuneentrepreneur.ma

16 – 17 mai 2013  -  Palais des Congrès - Marrakech

 Bonjour, Hello

 La Fondation du Jeune Entrepreneur lance un appel à communication pour intervenir dans le cadre du Programme scientifique du Forum du Jeune Entrepreneur. Les communications devraient s’inscrire dans la thématique : « L’entrepreneuriat des jeunes en milieu rural ».

Cet appel s’adresse à tout expert(e), professionnel(le), chercheur(euse), accompagnateur(trice), formateur(trice), coach, etc. qui, partant de son expérience avec les jeunes entrepreneurs, notamment ceux évoluant en milieu rural, souhaite traiter une des thématiques programmées, ou modérer une des activités proposées.

Il est possible aussi de proposer une thématique qui, bien que ne figurant pas dans le programme, s’inscrit dans le thème général. De même, il est possible de proposer une activité consacré à une méthodologie d’appui à l’entrepreneuriat des jeunes.

Le milieu rural est entendu dans une acception large. Par-delà le simple cadre d’activités agricoles ou d’élevage traditionnelles, il doit être appréhendé comme un environnement qui peut être de nature urbaine mais qui, par ses liens intimes avec l’arrière-pays rural, et/ou par la carence d’infrastructures et des services existants typiquement dans un milieu urbain, porte en son sein des freins à la concrétisation des initiatives des jeunes porteurs de projets.

Les propositions doivent parvenir à la Fondation du Jeune Entrepreneur sous forme d’une brève présentation et un intitulé du thème, accompagné du CV de l’intervenant à l’adresse : info@forumdujeuneentrepreneur.ma. Dernier délai : 31 mars 2013.

Le Programme provisoire peut être consulté ou téléchargé à partir du Forum du Jeune Entrepreneur.

Merci de diffuser cet appel parmi les personnes susceptibles d’être intéressées.

 

Young Entrepreneur Foundation launches a call for papers to intervene in the Scientific Program of the Young Entrepreneur Forum. Communications should fit into the general theme: "Youth entrepreneurship in rural areas"

This call is open to expert, professional, researcher, trainer, teacher, coach, etc., which from his or her experience with young entrepreneurs, particularly those operating in rural areas, wishes to handle one of the themes, or organize one the proposed activities.

It is also possible to suggest a topic that fits into the general theme of the Forum, as well as propose a workshop that deal with a methodology of youth entrepreneurship support.

Rural areas is understood in a broad sense. Beyond the simple framework of traditional farming or breeding, it should be seen as an environment that can be urban in nature but which, through its close ties with the rural hinterland, and / or the deficiency of infrastructure and services existing typically in an urban environment, carries within it brakes to the implementation of the youth initiatives.

The proposals should be submitted to the Young Entrepreneur Foundation as a brief introduction and the title of the theme, accompanied by the CV of the speaker, addressed to: info@forumdujeuneentrepreneur.ma by March 31st, 2013.

The preliminary program can be viewed or downloaded from the Young Entrepreneur Forum.

Thank you for circulating this call among persons who might be interested.
 
Cordialement

Best regards

Fondation du Jeune Entrepreneur
www.fjemaroc.ma

 

              

                

   

 

 

samedi 16 février 2013

Les 7 Ingrédients des idées d'Innovation

Chers Collègues,

Enfin, Cédric Villani, Directeur de l'Institut Point-Carré et Médaille Fields de Mathématiques et Serge Haroche, Prix Nobel de Physique donnent à la Faculté des Sciences de Rabat, le mardi 19 février courant à 18h une conférence très importante sous l'intitulé "Les 7 Ingrédients des idées d'Innovation".

Pour voire la même conférence faite par C. Villani, je vous invite à consulter la vidéo (et d'autres séquences autour de l'innovation et progrès humain) sur : vimeo.com/51917073.

Très Cordialement,
Yassine



Encryption in the Cloud : Who is responsible for data protection in the cloud?

Chers Collègues,

Un rapport d'enquête très utile a été réalisé sur la sécurité des données via le chiffrage sur le web 2.0, notamment les services du cloud computing  tels que les SAAS, par Thales s-Security et Ponemon Institute (date de publication Juillet 2012).

Ce rapport relevant d'une étude intitulée "2011 Global Encryption Trends  Study", publiée en février 2012, pourrait être téléchargée sur le site : www.ponemon.org.

Cette enquête témoigne de la responsabilité partagée de la sécurité des données des fournisseurs de services et des utilisateurs.

Ci-après, les principales conclusions extraites du rapport en question :


Following is a summary of key findings relating to data protection, encryption and key management activities in the cloud :

1. Currently, about half of all respondents say their organizations transfer sensitive or confidential data to the cloud environment. Within the next two years, another one-third of respondents say their organizations are very likely to transfer sensitive or confidential to the cloud. At 56 percent, German companies appear to have the highest rate of sensitive or confidential data transferred to the cloud.

2. Thirty-nine percent of respondents believe cloud adoption has decreased their companies’ security posture. However, 44 percent of respondents believe the adoption of cloud services has not increased or decreased their organization’s security posture. Only 10 percent of respondents believe the move to the cloud has increased their organization’s security posture. With respect to country differences, results suggest that French organizations are most likely to view cloud deployment as diminishing the effectiveness of data protection efforts.

3. Forty-four percent of respondents believe the cloud provider has primary responsibility for protecting sensitive or confidential data in the cloud environment and 30 percent believe it is the cloud consumer. There are also differences among countries as to who is most responsible. Sixty-seven percent of French companies appear to be the most likely to hold the cloud provider responsible for data protection activities. In contrast, 48 percent of Japanese companies hold the cloud consumer primarily responsible for data protection.

4. Companies that currently transfer sensitive or confidential data to the cloud are much more likely to hold the cloud provider primarily responsible for data protection. In contrast, companies that do not transfer sensitive or confidential information to the cloud are more likely to hold the cloud consumer with primary responsibility for data protection.

5. Sixty-three percent of respondents say they do not know what cloud providers are doing to protect the sensitive or confidential data entrusted to them. Once again, French respondents (76 percent) are least likely to say they know what their cloud providers do to safeguard their organization’s information assets.

6. In general, respondents who select the cloud provider as the most responsible party for protecting data are more confident in their cloud provider’s actual ability to do so (51 percent) compared to only 32 percent of respondents who report confidence in their own abilities to protect data even though they consider their own organization to be primarily responsible for protecting data.

7. Where is data encryption applied? According to 38 percent of respondents, their organizations rely on encryption of data as it is transferred over the network (typically the internet) between the organization and the cloud. Another 35 percent say the organization applies persistent encryption data before it is transferred to the cloud provider. Only 27 percent say they rely on encryption that is applied within the cloud environment.

8. Among the companies that encrypt data inside the cloud, nearly 74 percent believe the cloud provider is most responsible for protecting that data. However, only 34 percent of organizations that encrypt data inside their organization prior to sending it to the cloud hold the cloud provider primarily responsible for data protection.

9. Who manages the encryption keys when sensitive or confidential data is transferred to the cloud? Thirty-six percent of respondents say their organization is most responsible for managing the keys. Twenty-two percent say the cloud provider is most responsible for encryption key management. Another 22 percent says a third party (i.e. another independent service provider) is most responsible for managing the keys. Even in cases where encryption is performed outside the cloud, more than half of respondents hand over control of the keys. With respect to country differences, German organizations appear to be the least likely to relinquish control of encryption keys to the cloud provider. Companies in Australia and Brazil appear to be the most likely to transfer control of encryption keys to the cloud provider.

10. Companies with the characteristics that indicate a strong overall security posture appear to be more likely to transfer sensitive or confidential information to the cloud environment than companies that appear to have a weaker overall security posture. In other words, companies that understand security appear to be willing and able to take advantage of the cloud. This finding appears to be at odds with the common suggestion that more security aware organizations are the more skeptical of cloud security and that it is the less security aware organizations are willing to overlook a perceived lack of security. Here, we use the Security Effectiveness Score (SES) as an objective measure of each organization’s security posture.


Bonne lecture

Deadline extension to March 1st - 3rd Call For Paper : "BPM, Web Services, SOA" track in AICCSA 2013

Dear Colleagues,

As Vice Program co-Chairs 
in AICCSA'2013 for the "BPM, Web Services, SOA" track, we are pleased to invite you to submit your research or industrial contribution to this trackbefore March 1, 2013 (instead of February, 22nd, 2013).

The Eleventh ACS/IEEE International Conference on Computer Systems and Applications (AICCSA'2013) will be held in Ifrane, Morocco, on May 27-30, 2013http://aiccsa.aui.ma/

Papers selected for presentation in AICCSA'2013 will appear in the Conference Proceedings, to be published by the IEEE Computer Society and to be submitted to IEEE Xplore for inclusion.

** New ** Best Papers selected in "BPM, Web Services, SOA" track will be submitted (inlong versions) for publication in the open access electronic journal e-TI www.revue-eti.net.

BPM, Web Services, SOA Track topics (but not limited to) :
BPM, SOA, Web Services and the Cloud
BPM, SOA, Web Services and the Big Data
BPM, SOA, Web Services and Web Semantic
BPM, SOA, Web Services and Web 2.0
BPM, SOA, Web Services and Web of things
BPM, SOA, Web Services and Long tail of processes automation and monitoring
BPM, SOA, Web Services and Patterns
BPM, SOA, Web Services Analysis
BPM, SOA, Web Services and Continuous Improvement
BPM, SOA, Web Services and Security
BPM, SOA, Web Services and Dynamic Discovery
BPM, SOA, Web Services and SLA monitoring
BPM, SOA, Web Services and Enterprise Architecture (Reference Architectures, Enterprise Repositories, Project Portfolio Management, Strategic Planning, Maturity, Governance)
BPM, SOA, Web Services and EDA (Enterprise Service Bus, Complex Event Processing)  
BPM, SOA, Web Services and informal human collaboration (Advanced case management, Groupware)
BPM, SOA, Web Services and Life Cycle Management
BPM, SOA, Web Services real projects Experiments
BPM, SOA, Web Services and Best and Worst Practices

Vice Program co-Chairs:
Karim Baïna, ENSIAS, Université Mohammed V Souissi, Morocco
Mahmoud Nassar, ENSIAS, Université Mohammed V Souissi, Morocco
Committee Members: 
El Hassan Abdelwahed, FSSM, Université Cadi Ayyad Marrakech, Morocco
Salah Baïna, ENSIAS, Université Mohammed V Souissi, Morocco
Khalid Benali, Université de Lorraine, France
Sami Bhiri, National University of Ireland, Ireland
Nacer Boudjlida, Université de Lorraine, France
Azedine Boulmakoul, Université Hassan II Mohammedia, Morocco
François Charoy, Université de Lorraine, France
Mounia Fredj, ENSIAS, Université Mohammed V Souissi, Morocco
Walid Gaaloul, TELECOM SudParis, Evry France
Faïez Gargouri, ISIM, Université de Sfax, Tunisia
Ahmed Gater, Université de Paris-Dauphine, France
Claude Godart, Université de Lorraine, France
Fabiano Dalpiaz, University of Toronto, Canada.
Brahim Medjahed, Michigan University, USA
Nanjangud Narendra, IBM Research India, India
Hye-Young Helen Paik, CSE, University of New South Wales, Australia
Fethi Rabhi, CSE, University of New South Wales, Australia
Ounsa Roudiès, EMI, Université Mohammed V – Agdal, Morocco
Farouk Toumani, Université Blaise Pascale, France
Ahmed Zellou, ENSIAS, Université Mohammed V Souissi, Morocco

Important Dates: 
Papers and Posters Submissions: March 1, 2013
Workshop, Tutorial and Panel Submissions: March 1, 2013
Notification of acceptance: April 12, 2013
Camera ready copy due: April 21, 2013
Author Registration: April 21, 2013

Conference General Chair: 
Aris M. Ouksel, Aris@uic.edu

Conference General Co-Chair:
Driss Kettani, D.Kettani@aui.ma

Advisory Committee: 
Hany Ammar, Virginia Tech
Hesham El-Rewini, University of North Dakota
Hossam Hassanein, Queen’s University
Mohamed Abdel-Mottaleb, University of Miami
Mohamed Hafeeda, Qatar Foundation
Nadjib Badache, University of Algiers
Nashat Mansour, Lebanese American University
Omar Rana, Cardiff University
Qutaibah Malluhi, Qatar University
Tarek El-Ghazawi, George Washington University
Mokrane Bouzeghoub, Versailles Saint-Quentin-en-Yvelines University
Mohammed Erradi, Mohamed V-Souissi University

Technical Program Co-Chairs: 
Boualem Benatallah, University of New South Wales
Ibrahim Kamel, University of Shajah

Please send this CFP to your networks.

Best Regards,
Karim Baïna and Mahmoud Nassar 
Vice Program co-Chairs

-------
Karim Baïna 
Professor-Associate @ ENSIAS 
Cooperation Service Responsible 
Alqualsadi (Enterprise Architectures : Quality of their Development and Integration) research team Responsible 
ENSIAS - Ecole Nationale Supérieure d'Informatique et d'Analyse des Systèmes 
Université Mohammed V Souissi 
B.P. 713 Agdal à Rabat, Morocco   
www.ensias.ma/ens/baina 
http://www.slideshare.net/kbaina 
baina@ensias.ma 
skype:karim.baina 

jeudi 14 février 2013

Call for papers WVNT 2013

WVNT 2013 1st International Workshop on Vehicular Networks and Telematics
May 2-4, 2013, Marrakech, Morocco
http://www.netys.net/wvnt2013/
In conjunction with the International Conference on NETworked sYStems

CALL FOR PAPERS

Important dates

- Paper submission : March 15, 2013
- Notification of acceptance : April 10, 2013
- Camera ready due : April 17, 2013
- Workshop: May2-4, 2013

Scope and topics:
Vehicular networks and telematics play a key role to develop Intelligent Transportation Systems (ITS) aiming to achieve road safety and to guaranty needs of drivers and passengers, in addition to improve the transportation productivity. Vehicular networks and telematics cover Vehicle-to-Vehicle (V2V) and Vehicle-to-Roadside (V2R) communications. This workshop proposes the study of the various vehicular transmission challenges such as the physical layer problems like the development of radio waves technologies, new transmission technologies (VLC etc.) and embedded systems. Moreover, logical link and medium access controls for vehicular networks will be explored. Also, vehicular networks and telematics workshop encourages original works concerning topological or geographical based routing, maintaining routes, security policies, modeling and provisioning realistic mobility models etc. This workshop is an opportunity for researchers, academics and industries to share their insight and knowledge in all areas related to vehicular networks and telematics.
Topics of interest include (but are not limited to):
The workshop topics appropriate for consideration include but are not limited to:
  • Wireless access technology for vehicular networks
  • LLC and MAC for vehicular communications
  • Standardization of vehicular technologies
  • Routing for vehicular networks
  • QoS and QoE for vehicular telematics and performance evaluations
  • Modeling of realistic mobility models for vehicular network studies
  • Vehicular ad hoc networks
  • Services, resource management and mobility in vehicular networks
  • A daptive and self-organizing for vehicular networks
  • Web Based systems
  • Mobile, Ubiquitous and Pervasive Computing and communications
  • Mobile Learning Technologies
Paper submission:

Instructions: please refer to this link:
http://www.netys.net/wvnt2013/
To submit new paper, please refer to this link: https://www.easychair.org/conferences/?conf=wvnt2013

Organizers:
Dr. Moulay Driss EL OUADGHIRI (FS-Meknès, Moulay Ismail University, E-NGN Morocco. Email: dmeloua
d@gmail.com)
Dr. Salim BITAM (LESIA Laboratory, University Mohamed Khider of Biskra, Algeria. Email:
salimbitam@gmail.com)

mardi 12 février 2013

Compétitions IEEE MS Eweek 2013

Bonjour,
Des challenges pour 2013!
La section IEEE Maroc lance, en collaboration avec les universités et écoles marocaines publics et privés, 5 compétitions au niveau national ouvertes aux étudiants, lauréats et jeunes professionnels. Elle concernent les domaines :
- Développement Web
- Application Mobiles
- Design, Graphisme et Multimédia
- Robotique et Électromécanique
- Innovation et entrepreneurship
 
Date limite de soumission : 14 avril 2013
Les prix et le lieu de la cérémonie officielle E-week’2013 vous seront communiqués prochainement.
Cordialement.
---
Prof. Mohammed El Mohajir
Vice-Chair IEEE Morocco Section
Département d’Informatique
Faculté des sciences Dhar Mahraz