The Massachusetts Open Cloud
|
|
- Constance White
- 8 years ago
- Views:
Transcription
1 The Rafik B. Hariri Institute for Computing at Boston University The Massachusetts Open Cloud Azer Bestavros Founding Director BU = Incubator for Big R&D Ideas 2 1
2 Important Driver: Big Data Not only more and better data, but also new types of data from various sources that we had no way of mining collectively before A. Bestavros The Mass Open Cloud at the BU Hariri Institute for Computing 3 Big Data Cloud Security = Big Joke Graph Mining Art History Investigative Journalism Archeology E-Commerce Immunology Big Data Sharing Economy CPS Expertise Mining Precision Oncology ebbrt Private IR & Mining Smart City Open Cloud Cloud Computing Cloud Economics Network Security Cyber Security Modular Security SDNs Malware Detection A. Bestavros The Mass Open Cloud at the BU Hariri Institute for Computing Healthcare Referral Nets Brain Activity Mapping Bioinformatics Threat Sharing Clinical Elastic MRI Applications 4 2
3 MOC: Value Proposition To Vendors A vehicle for entry and participation in the cloud marketplace A venue for testing, demonstration, prototyping, and certification To Solution Providers A platform for technology innovation (e.g., niche markets) A platform for value added services (e.g., security) To Enterprises and End Customers An antidote for vendor lock in A venue to try and to compare on level playing field before acquisitions and/or development A platform for sharing and monetizing data assets, including public data, also moving data in, out, and within the cloud efficiently and inexpensively 5 MOC: Value Proposition To Academic Institutions Increases competitiveness for funding from federal agencies Provides a unique platform for research on cloud computing Exposes students/faculty to key vendor technologies/solution Enables sharing of technology/expertise among universities Leverages vendor investment in support of IT infrastructure Puts university IT organizations at forefront of emerging technologies Potential transformation of IT from cost center to source of revenue and increasing engagement with regional clusters An R&D Differentiator 6 3
4 Envisioning the Future Smart City R&D BU Initiative on Cities & BU Sustainable Neighborhood Lab BU Pardee Center for the Study of Longer Range Future Sensor Networks, CPS, Photonics, and Smart Lighting Research Groups Healthcare R&D BU Boston Medical Center & BU New England Infectious Diseases Lab Bioinformatics & Systems Biology Research Groups Biomedical, Neuroscience, and Imaging Research Groups Cybersecurity R&D Reliable Information Systems & Cybersecurity Center Cryptography, Network Security, and Software Certification Research Groups The Greater Boston Area Charles River Cyber Ecosystem MOC MOC MOC 7 MOC: Enabling the Smart City Capitalizing on IoT, Mobile & Cloud Convergence MGHPCC 8 4
5 MOC: Smart City Cloud Platform $1M NSF PFI Grant + $2M match 9 MOC: Enabling Interactive HPC Clinical Real Time 3D Reconstruction of Fetal MRI Days Seconds Courtesy of Jonathan Appavoo & Ellen Grant Minutes A. Bestavros The Mass Open Cloud at the BU Hariri Institute for Computing 10 5
6 MOC: Enabling Precision Medicine A Pilot Collaborative Program Focusing on Lung Cancer 11 MOC: Enabling A La Carte Security Security as a (multi layer) Service Security building blocks (offered on demand, elastically, and subject to pay as you go model): Instrumentation Monitoring Check pointing Provenance Deep Packet Inspection Malware detection Sandboxing Situational awareness Moving target defense Traffic obfuscation HW supply chain diversity How to analyze, evaluate, and price security? A. Bestavros The Mass Open Cloud at the BU Hariri Institute for Computing 12 6
7 MOC: Enabling Modular Cloud Security $10M NSF Frontier Grant UConn 13 MOC: A Platform for Data Sharing Data as a Service (and Asset to Monetize) Big Data is premised on the ability to correlate/join data from a large number of sources but how do we share data assets? Issues of Privacy Issues of Ownership Solution: Data as a Service Old approach: Sharing data by shipping it over or giving access New approach: Offer services for controlled processing over data Catalyst for many mandates by funding agencies, open government, 14 7
8 MOC: Private Multi Party Analytics 15 MOC: A Platform for Education and Training 16 8
9 MOC = Catalyst for Innovation in Big Data, Cybersecurity, and Cloud Technologies Big Data Cyber Security Cloud Computing 17 MOC: What will success look like in 5 years? A self sustained operating cloud with diverse user base A healthy, profitable marketplace for vested industry partners A sponsor of academic R&D for vested university partners A test bed for research in and prototyping of cloud technology A catalyst for innovation and business development A custodian that maintains the open source base The overseer of a federation of other OCX instantiations 18 9
Big Data: Challenges. Institute = Computational Crossroads. Azer Bestavros Founding Director. Big Data Cloud Security = Big Joke 6/2/2014
The Rafik B. Hariri Institute for Computing at Boston University The Hariri Institute at BU A world class center for discovery and innovation in computing and computational science & engineering Azer Bestavros
More informationA marketplace driven direction for SDI: Towards an Open Cloud Exchange
A marketplace driven direction for SDI: Towards an Open Cloud Exchange Orran Krieger (BU), Peter Desnoyers (NU), John Goodhue (MGHPCC), Azer Bestavros (BU), Johnathan Appavoo (BU), Margo Seltzer (Harvard),
More informationCybersecurity at the Nexus of a Hyper- Connected World
Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major
More informationThe Massachusetts Open Cloud (MOC)
The Massachusetts Open Cloud (MOC) October 11, 2012 Abstract The Massachusetts open cloud is a new non-profit open public cloud that will be hosted (primarily) at the MGHPCC data center. Its mission is
More informationThe Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium. Bruce J. Bakis, The MITRE Corporation
The Advanced Cyber Security Center (ACSC): A Cyber Threat Information Sharing Consortium Bruce J. Bakis, The MITRE Corporation Outline Essence Goals Member value proposition Organization Milestones Sharing
More informationEnterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
More informationConnected Threat Defense Strategy. Eva Chen, Co-Founder and CEO
Connected Threat Defense Strategy Eva Chen, Co-Founder and CEO Japanese Pension Service Over a Million of Personal Data Leaked by APT IT Pro, June 1, 2015 Tokyo Government Office 9 PCs infected by watering
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationSmart City Live! 9-10 May 2016, Nice
Monday, May 9, 2016 Smart City Live! 9-10 May 2016, Nice Draft agenda as of November 20, 2015 SMART LIVING SMART CITY SERVICES 9:00 AM CASE STUDY: Developing Smart Energy communities Understanding the
More informationIndustry 4.0 Vision to Reality Siemens AG 2015 siemens.com
Alan Norbury Siemens UK Industrial CTO Industry 4.0 Vision to Reality siemens.com Future of Manufacturing - Video http://www.siemens.co.uk/future-of-manufacturing Page 2 Industry 4.0.moving into a fourth
More informationSDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
More informationBig Data-ready, Secure & Sovereign Cloud
Copernicus Big Data Workshop Big Data-ready, Secure & Sovereign Cloud A Technology Enabler for Copernicus Data Innovation March 14 th, 2014 Brussels F. BOUJEMAA R&D Manager E. MICONNET - Head of Cyber
More informationDriving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging
More informationonetransport 2016 InterDigital, Inc. All Rights Reserved.
onetransport 1 onetransport: Who We are Today Platform Provider Transport Expert Analytics Sensors / Analytics Data providers / Use case owners 11 partners 2- year project 3.5m Total funding 2 How this
More information2015. 9. 17 ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics
ARTIK TM The Ultimate Platform Solution for IoT 2015. 9. 17 MyungKoo Kang (VP) Samsung Electronics Future Changes from IoT Privacy in the Web Security in SmartGrill 2 IoT Market Forecast ($T) 7 6 5 4 3
More informationInnovative Security for an Accelerating World New Approaches for Chief Security Officers
Information Systems Security Association Innovative Security for an Accelerating World New Approaches for Chief Security Officers John N. Stewart Senior Vice President Chief Security and Trust Officer
More informationCommonwealth Advanced Data Analytics Alliance & The President s Precision Medicine Initiative
Commonwealth Advanced Data Analytics Alliance & The President s Precision Medicine Initiative Deputy Secretary Anthony Fung Presentation to the Health IT Standards Advisory Committee December 17, 2015
More informationT r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things
M A R K E T S P O T L I G H T T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things May 2015 Adapted from Perspective: The Internet of Things Gains Momentum in Manufacturing in 2015,
More informationSecurity Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
More informationWhy big data? Lessons from a Decade+ Experiment in Big Data
Why big data? Lessons from a Decade+ Experiment in Big Data David Belanger PhD Senior Research Fellow Stevens Institute of Technology dbelange@stevens.edu 1 What Does Big Look Like? 7 Image Source Page:
More informationThibaut Kleiner (HoU) Rolf Riemenschnieder (HoS) E1 Network Technologies DG CONNECT European Commission
Digitizing European Industry Dimension of Internet of Things (IoT) Thibaut Kleiner (HoU) Rolf Riemenschnieder (HoS) E1 Network Technologies DG CONNECT European Commission Outline 1. Motivation 2. Towards
More informationDelivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
More information9.Web Based Customer Favorite vehicle Search Engine. 10.Step by Step Monitoring for Product Purchasing System
1.Data Mining Analysis on EB bill system 2.Graph Based Share Market Data Updations 3.Web Based Book Publishing System 4.Online product opinion and Ranking system 5. Online Dynamic Form creation for Non-IT
More informationOvercoming Five Critical Cybersecurity Gaps
Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.
More informationProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
More informationCenter for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission
Photo courtesy of Justin Reuter Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission CDDA Mission Mission of our CDDA
More informationMaster s Degree Programs. Global Technology Leadership
Master s Degree Programs Global Technology Leadership Why BU? Consistently ranked among the most prestigious graduate engineering programs in the U.S. Study with the Best Work with renowned faculty and
More informationCenter for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC)
Photo courtesy of Justin Reuter Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Photo courtesy of Justin Reuter University Consortium
More information3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
More informationStandard Big Data Architecture and Infrastructure
Standard Big Data Architecture and Infrastructure Wo Chang Digital Data Advisor Information Technology Laboratory (ITL) National Institute of Standards and Technology (NIST) wchang@nist.gov May 20, 2016
More informationModerator: Julian M. Goldman, MD, Harvard Medical School, MGH, Partners HealthCare
Panel IV: Challenges: The Digital Health Platform (System of Systems) Moderator: Julian M. Goldman, MD, Harvard Medical School, MGH, Partners HealthCare Regulatory Ambiguity and Requirements for New Devices
More informationThe Internet of Things: Connected Home, Auto, and Life
The Internet of Things: Connected Home, Auto, and Life An Author: Denise Garth, SMA Partner Published Date: November, 2014 SMA Summit A Connected Experience During the 2014 SMA Summit, and for a week and
More informationThe notion of computing as a commodity
View from the Cloud Editor: George Pallis gpallis@cs.ucy.ac.cy Toward an Open Cloud Marketplace Vision and First Steps Azer Bestavros and Orran Krieger, Boston University The Open Cloud Exchange (OCX)
More informationURBAN MOBILITY IN CLEAN, GREEN CITIES
URBAN MOBILITY IN CLEAN, GREEN CITIES C. G. Cassandras Division of Systems Engineering and Dept. of Electrical and Computer Engineering and Center for Information and Systems Engineering Boston University
More informationResearch Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era
Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of
More informationaio Bottiglieri usiness Development
achine to Machine services offer CSPs an pportunity to grow business beyond traditional Telco aio Bottiglieri usiness Development genda M2M Market Opportunity Key Success Factors M2M Value Chain Vertical
More informationPARTNER SEARCH FORM. Aware Engineering. Newton USA. Robert CEO. 1. Company Profile 1.1 General Profile Full Name of Company.
1. Company Profile 1.1 General Profile Full Name of Company Aware Engineering Registration # Prior name of Company Type of Company HT R&D Research Institute University Other Stage Seed R&D Initial Revenues
More informationChapter 2: Transparent Computing and Cloud Computing. Contents of the lecture
Chapter 2: Transparent Computing and Computing Lecture 2 透 明 计 算 与 云 计 算 的 关 联 Prof. Zixue Cheng 程 子 学 University of Aizu, 会 津 大 学 Visiting Professor of CSU 1 Contents of the lecture Definition, Architecture
More informationRegional Vision and Strategy The European HPC Strategy
Regional Vision and Strategy The European HPC Strategy BDEC 29 January 2015 Augusto BURGUEÑO ARJONA Head of Unit einfrastructure - DG CONNECT European Commission @ABurguenoEU aburguenoeu.wordpress.com
More informationIntelligence at the Edge: Data Analytics in the Mobile World to Improve Business Decisions and Generate Value
Intelligence at the Edge: Data Analytics in the Mobile World to Improve Business Decisions and Generate Value Thank You to our Sponsors! #IoTWF Tech-04 Panel: Intelligence at the Edge: Data Analytics in
More informationEvolving operator roles. How the Internet of Things can create innovative solutions that support society
Evolving operator roles How the Internet of Things can create innovative solutions that support society WHAT IS THE INTERNET OF THINGS? A definition The Internet of Things (IoT) is the design and implementation
More informationTowards a Thriving Data Economy: Open Data, Big Data, and Data Ecosystems
Towards a Thriving Data Economy: Open Data, Big Data, and Data Ecosystems Volker Markl volker.markl@tu-berlin.de dima.tu-berlin.de dfki.de/web/research/iam/ bbdc.berlin Based on my 2014 Vision Paper On
More informationBig Data Executive Survey
Big Data Executive Full Questionnaire Big Date Executive Full Questionnaire Appendix B Questionnaire Welcome The survey has been designed to provide a benchmark for enterprises seeking to understand the
More informationAnalyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
More informationCONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS
CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS Didier Mora System Engineer Cisco Mayo, 2015 Converging Digital Disruptions The Nexus of Forces The 3rd Platform The Industrial Internet IoT = $1.9
More informationSoftware-Based Network Intelligence Survey: Final Results
Software-Based Network Intelligence Survey: Final Results Prepared by www.heavyreading.com Sponsored by March 2013 Overview The Software-Based Network Intelligence Benchmark survey was conducted in February/March
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationAuto Insurance in the Era of Autonomous Vehicles
Auto Insurance in the Era of Autonomous Vehicles 24 th Annual Insurance Issues Conference Automobile Insurance in the Era of Autonomous Vehicles KPMG U.S. recently published two documents on Automobile
More information23RD ITS WORLD CONGRESS 2016 MELBOURNE. 10 14 OCTOBER 2016 Melbourne Convention and Exhibition Centre CALL FOR DEMONSTRATIONS
23RD ITS WORLD CONGRESS 2016 MELBOURNE 10 14 OCTOBER 2016 Melbourne Convention and Exhibition Centre CALL FOR DEMONSTRATIONS Hosted by Co-hosted by ABOUT THE 23RD ITS WORLD CONGRESS 2016 MELBOURNE The
More informationINTERNET OF THINGS: SCIENCE FICTION OR BUSINESS FACT?
A HARVARD BUSINESS REVIEW ANALYTIC SERVICES REPORT INTERNET OF THINGS: SCIENCE FICTION OR BUSINESS FACT? Copyright 2014 Harvard Business School Publishing. sponsored by SPONSOR PERSPECTIVE Each year the
More informationinternet of things Patrick Pax Business Development Manager Chris Geary Innovation Manager
internet of things Patrick Pax Business Development Manager Chris Geary Innovation Manager agenda 1 2 3 4 internet of things moving into main stream uncover new opportunities in your business call for
More informationIoT Solutions from Things to the Cloud
IoT Solutions from Things to the Cloud Intel Quark SoC X1000 Applications Marketing Seminar Anaheim, California Oct. 29, 2014 Intel, the Intel logo, the Intel Inside logo, Intel Atom, Intel Core, Quark
More information1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS
1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS $32.8B 100,000 Cyber Criminals State-Sponsored Spies Hactivists We live in a POST-PREVENTION Amount enterprises are
More informationExecutive Summary. Principal Findings
On May 30, 2012, Governor Deval Patrick launched the Massachusetts Big Data Initiative, to leverage and expand the Commonwealth s position as a global leader in the rapidly growing big data sector. The
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationUsing Cloud to Deliver Innovation and Efficiency
IBM Northeast Europe Using Cloud to Deliver Innovation and Efficiency Christian Klezl Vice President & Cloud Leader IBM Northeast Europe October 18th 2010 IBM Northeast Europe IBM Northeast Europe Cloud
More informationIndustrial Internet of Things - Transformation of Products to Services and new Business Models. Frank Schinzel Managing Director Accenture Digital
Industrial Internet of Things - Transformation of Products to Services and new Business Models Frank Schinzel Managing Director Accenture Digital Everyday physical objects are becoming uniquely identifiable
More informationUpdate On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
More informationAustralia Intelligent Transport System.pdf
http://www.gosreports.com Analytics as a Service Market by Solutions (Financial Analytics, Risk Analytics, Customer Analytics, Marketing Analytics, Sales Analytics, Web & Social Media Analytics, Supply
More informationBoosting Business Agility through Software-defined Networking
Executive Summary: Boosting Business Agility through Software-defined Networking Completing the last mile of virtualization Introduction Businesses have gained significant value from virtualizing server
More informationHybrid Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Hybrid Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction The economic benefits offered by public clouds are attractive enough for many
More informationRuBAN tm An IOT Service Delivery Platform
RuBAN tm An IOT Service Delivery Platform IOT in Education Transportation Rail Roadways Mass Transit Aviation Security/Access Surveillance Connected Lighting Parking Technology Resources Collaborative
More information23.9.2015. Kangas Cybersecurity strategy
Kangas Cybersecurity strategy Vision of Kangas Smart Kangas Life and living at Kangas is convenient, easy and safe. Kangas is resource-wise and it is attractive place of work. Security and safety measures
More informationOverview of Action Lines Priorities. Povo, 25/03/2014 A. Guarise (Trento RISE)
Overview of Action Lines Priorities Povo, 25/03/2014 A. Guarise (Trento RISE) 2014-15 EIT ICT Labs Innovation Action Lines list Future Cloud (CLD), AKA Computing in the cloud Cyber Physical Systems (CPS)
More informationAcademic Planning Self-Study 2014
Academic Planning Self-Study 2014 Department of Computer Science College and Graduate School of Arts and Sciences Boston University Submitted: October 10, 2014 1 I. THE CURRICULAR CONTEXT A. Degrees and
More informationHigh Performance Computing Initiatives
High Performance Computing Initiatives Eric Stahlberg September 1, 2015 DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Cancer Institute Frederick National Laboratory is
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationA New Approach to Assessing Advanced Threat Solutions
A New Approach to Assessing Advanced Threat Solutions December 4, 2014 A New Approach to Assessing Advanced Threat Solutions How Well Does Your Advanced Threat Solution Work? The cyber threats facing enterprises
More informationCollaborating for Wireless Growth:
ASEAN-NICT ICT Roundtable 2015 26 February 2015 Bangkok, Thailand Collaborating for Wireless Growth: Adoption of Open Innovation Platform for IoT Boon Choong Foo Senior Director, MIMOS Berhad 26 February
More informationWearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec
Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec 3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown
More informationACTION AGENDA SMART INDUSTRY THE NETHERLANDS
ACTION AGENDA SMART INDUSTRY INTRODUCTION Belgium, Denmark, the US and China are a few examples of countries that are firmly The Netherlands has a world-class industrial committed to this development.
More informationThe Internet of Things Pacific Telecommunications Council
The Internet of Things Pacific Telecommunications Council IBM's view on how the world is becoming instrumented, interconnected and intelligent Mike Hill IBM, Vice President, Enterprise Initiatives for
More informationDriving IoT Adoption with Innovative IoT Cloud Management Ian Khan Manager of Innovation ikhan@solgenia.com
Driving IoT Adoption with Innovative IoT Cloud Management Ian Khan Manager of Innovation ikhan@solgenia.com www.solgenia.com The State of IoT The State of Cloud Managing & Monetizing IoT The State of IoT
More informationDeveloping a Healthcare Analytics Strategy Across the Continuum of Care
Developing a Healthcare Analytics Strategy July 2015 Healthcare Provider Analytics Investments Are Steadily Increasing Healthcare providers are still focusing their investment plans on more traditional
More informationA Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi
Judith Hurwitz President and CEO Sponsored by Hitachi Introduction Only a few years ago, the greatest concern for businesses was being able to link traditional IT with the requirements of business units.
More informationLeti Introduction and Overview
Leti Introduction and Overview Leti Day in Tokyo, October 3rd 2012 Laurent Malier 2012 Leti 2012 1 CEA The CEA at a glance Commissariat à l Énergie Atomique et aux Énergies Alternatives is one of the largest
More informationISV Strategy for Revenue & Customer Growth
ISV Strategy for Revenue & Customer Growth Online Store @ Cloud Bhavin Raichura, Vijith Vayanippetta Abstract On-demand software distribution & retail e-commerce is one of the key growth strategies for
More informationON.Lab Launches Revolutionary SDN Open Source Network Operating System ONOS on behalf of its Community of Service Providers and Innovator Partners
ON.Lab Launches Revolutionary SDN Open Source Network Operating System ONOS on behalf of its Community of Service Providers and Innovator Partners Available publicly on Dec. 5, ONOS has the potential to
More informationThe Internet of Things starts with intelligence inside
The Internet of Things starts with intelligence inside Eric Chan, Intel Solutions Group Director, Segments & Broad Market Division INTELLIGENT DEVICES INTELLIGENT SYSTEM OF SYSTEMS END TO END ANALYTICS
More informationUnderstanding the Business Case of Network Function Virtualization
White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building
More informationThe Internet of Things
The Internet of Things The Power of Actionable Insight An introduction to the Internet of Things Chris Vetor Business Unit Executive, WW Programs cvetor@us.ibm.com More and more of the world s activity
More informationRising to the Challenge
CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned
More informationGenera&ng Value from Big Data in the Internet of Things
Genera&ng Value from Big Data in the Internet of Things THT10421 Cheng Kian Khor Global Industry Solu&on Leader - IoT/M2M for CSPs Communica&ons & Media Industry Solu&ons Group September 30, 2014 Safe
More informationCombating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
More informationSoftware Defined Networking (SDN) Networking excellence Maniyan Sundaresan
Software Defined Networking (SDN) Networking excellence Maniyan Sundaresan Summary Software Defined Networking (SDN) is an emerging trend in today's networking industry. It is changing the way a network
More informationM2M Analytics: A New Wave of Innovation
M2M Analytics: A New Wave of Innovation By Susan Simmons and Sidhant Jalan To date, typical enterprise Machine to Machine (M2M) projects have replaced legacy processes to serve basic operational needs,
More informationBefore the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) )
Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem Docket
More informationThe power of collaboration: Accenture capabilities + Dell solutions
The power of collaboration: Accenture capabilities + Dell solutions IT must run like a business grow with efficiency, deliver results, and deliver long-term strategic value. As technology changes accelerate
More informationKeystones for supporting collaborative research using multiple data sets in the medical and bio-sciences
Keystones for supporting collaborative research using multiple data sets in the medical and bio-sciences David Fergusson Head of Scientific Computing The Francis Crick Institute The Francis Crick Institute
More informationAdding Management. www.starlims.com
Adding Management to Your LIS Given the dynamic nature of their operations, today s clinical laboratories need to be nimble and agile. They need to cope with ever changing requirements brought about by
More informationNew Clinical Research & Care Opportunities Through Big Data Informatics
New Clinical Research & Care Opportunities Through Big Data Informatics Gregory A. Jones Chief Technology Officer Health Sciences Global Business Unit September 2014 Safe Harbor Statement The following
More informationThe Internet of Things:
The Internet of Things: What Does it Take to Make the Internet of Everything Real? Kip Compton, VP Internet of Things (IoT) Systems and Software Group @kipcompton www.linkedin.com/in/kipcompton/en Are
More informationSESSION #1: THE REVOLUTION HAS ARRIVED: ARE YOU READY?
SESSION #1: THE REVOLUTION HAS ARRIVED: ARE YOU READY? Dato Dan E Khoo, Vice President Corporate Strategy, MDeC Presented by: THE 3 RD INDUSTRIAL REVOLUTION IS MADE POSSIBLE WITH DIGITAL TECHNOLOGY 1 st
More informationPersonalized Medicine and IT
Personalized Medicine and IT Data-driven Medicine in the Age of Genomics www.intel.com/healthcare/bigdata Ketan Paranjape General Manager, Life Sciences Intel Corp. @Portlandketan 1 The Central Dogma of
More informationHigh Performance Computing
High Parallel Computing Hybrid Program Coding Heterogeneous Program Coding Heterogeneous Parallel Coding Hybrid Parallel Coding High Performance Computing Highly Proficient Coding Highly Parallelized Code
More informationThe Internet of Everything
The Internet of Everything The Next Evolution of the Internet is Changing Everything Todd Meister Vice President, Software and Solutions Innovation Americas Partner Organization, Cisco October 23, 2014
More informationGOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015
GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big
More informationFrom Data to Foresight:
Laura Haas, IBM Fellow IBM Research - Almaden From Data to Foresight: Leveraging Data and Analytics for Materials Research 1 2011 IBM Corporation The road from data to foresight is long? Consumer Reports
More informationHow to Leverage Big Data in the Cloud to Gain Competitive Advantage
How to Leverage Big Data in the Cloud to Gain Competitive Advantage James Kobielus, IBM Big Data Evangelist Editor-in-Chief, IBM Data Magazine Senior Program Director, Product Marketing, Big Data Analytics
More informationNSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing
NSF Workshop: High Priority Research Areas on Integrated Sensor, Control and Platform Modeling for Smart Manufacturing Purpose of the Workshop In October 2014, the President s Council of Advisors on Science
More information