Saleem G. Zoughbi. UN Expert and IEEE Computer Society e-government STC
|
|
- Edwina Cunningham
- 8 years ago
- Views:
Transcription
1 Saleem G. Zoughbi UN Expert and IEEE Computer Society e-government STC The ICT-driven security indispensable to the security of individuals, properties, institutions, states and the entire world ICT AS A MODERN SOLUTION O TO SECURITY THREAT, EARLY DETECTION AND PREVENTION OF CRIMES CAFRAD International Conference of ICT Security and Defense Experts June 23-25, 2014, Tangiers, Morocco Keywords The ICT-driven security indispensable to the security of individuals, properties, institutions, states and the entire world. The ICT-driven security indispensable to the security of individuals, properties, institutions, states and the entire world. The ICT-driven security indispensable to the security of individuals, properties, institutions, states and the entire world. 2/37 1
2 I. Information & Communications Technologies (ICT) II. ICT-driven security policies III. Implementation options paradigm IV. The first steps. 3/37 Information, technology & computing! Information is a key resource for all government offices, especially the police. Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions. Technology is becoming pervasive in all aspects of business and personal life. Ubiquitous computing is becoming common 4/37 2
3 Spectrum to technologies for ICTdriven security Technologies Mobile Applications Data Centers and Clouding Smart technology Shared Sevrices Technology Broadbands Operational technology 5/37 10 New trends in Technology that will shape future e-government 1. Hybrid Cloud and IT as Service Broker Bringing together personal clouds and external private cloud services is an imperative. More deployment compositions will emerge as CSBs and IaaS. 2. Cloud/Client Architecture Cloud/client computing models are shifting. In the cloud/client architecture, the client is a rich application running on an Internet-connected device, and the server is a set of application services hosted in an increasingly elastically scalable cloud computing platform. 3. The Era of Personal Cloud The personal cloud era will make a power shift away from devices toward services. 6/37 3
4 Technology for future e- Government 4. Mobile Device Diversity and Management More sophisticated and yet smarter smart phones, including bring gyour own device (BYOD) programs will make "everything everywhere" strategies unachievable. 5. Mobile Apps and Applications: Such as improved JavaScript performance will begin to push HTML5 and the browser as a mainstream enterprise application development environment. 6. The Internet of Everything (IoE) 7/37 The Internet is expanding beyond PCs and mobile devices into enterprise assets such as field equipment, and consumer items such as cars and televisions: something beyond the Internet of Things (IoT): Manage; Monetize; Operate; Extend. 7. Software Defined Anything Software-defined anything (SDx) is associated with improved standards for infrastructure programmability and data center interoperability driven by automation inherent to cloud computing. 8. Web-Scale IT Web-scale IT is a pattern of global-class computing that delivers the capabilities of large cloud service providers within an enterprise IT setting by rethinking positions across several dimensions. 9. Smart Machines Through 2020, the smart machine era will blossom with a proliferation of contextually aware, intelligent personal assistants, smart advisors (such as IBM Watson), advanced global industrial systems and public availability of early examples of autonomous vehicles D Printing (and not before long 4-D) Worldwide shipments of 3D printers are expected to grow 75 percent in 2014 followed by a near doubling of unit shipments in /37 4
5 Potential Smart technologies for security The Semantic Web and Other Metadata: Metadata, or data about data, enables greater automated analysis of information Digital Identity Management and Biometrics: allows the amassing and automatic processing of personal data; biometrics provides means by which human beings can be uniquely identified. Radio Frequency Identification & Sensors: These technologies monitor the physical world, using communications technology to distribute information about a specific location. 9/37 The Geospatial Web and Location-Based Services: these technologies serve to associate digital data with physical locations. Mesh Networking: formation of networks across areas without existing communications infrastructures Grid Computing: This technology may allow the world s computing power and data storage resources to be pooled for people to access as needed. New Computing Technologies: a powerful mix of optics, quantum computing, and other new technologies has potential to bring about a global brain. 10/37 5
6 I. Information & Communications Technologies (ICT) II. ICT-driven security policies III. Implementation options paradigm IV. The first steps. 11/37 5/25 We cannot solve our problems with the same thinking we used when we created them. The only source of knowledge is experience. Imagination is more important than knowledge. We cannot speak of ICT-driven security to countries in the same way we speak of ICT development We have to be aware of how ICTdriven security is responding to the actual people governance. This is our source of knowledge for the new change management. Imagination about ways ICT-driven security in countries can go is more important than classical research. 12/37 6
7 Government dependence ON ICT By 2014, more than 50% of IT spending will be decided outside of IT departments in at least 30% of government organizations. By 2015, scenario planning (or equivalent techniques) will be used for IT budgeting in more than 30% of government organizations. By 2016, IT-enabled productivity per government worker in the bottom third of agencies by size will increase at twice the rate in comparison to the top third by size. Gartner, /37 Highlights of technology for public governance Work Place Channels Business Processes Applications Data Infrastructure Blend of police (government) and citizen/consumer tools Intermediary Social media Business process Utilities (BPU) crowdsourcing SaaS citizen/consumer apps Social profiles, Open data Public cloud 14/37 7
8 ICT-driven Security Situations Available resources Integrated Government Safe Country Aware but poor! Mismanagement & Corruption Chaos! Fragmented Government 15/37 Lack of resources 1. Technical know-how is not difficult to attain, what is difficult is commitment and hard work. (No limitation on technology use by poor countries if it is made available) 2. Competition just began : All are in starting line now. If you prepare well in advance for the next generation ICTdriven security, you will become winner. 3. 'Gerschenkron s Hypothesis' in which "Late-comers would become forerunners if they prepare the new technology in advance" can be applied in the era of the Smart Government. We do not have to restart where others started if we work hard 16/37 8
9 ICT-driven security principles Meeting stakeholders needs Separating governance from management Covering the government end-to-end The 5 principle s Enabling a holistic approach Applying a single integrated framework 17/37 ICT-driven security is like a house of cards Difficult to build (build confidence and cooperation) Easy to destroy (struggle for power, switch off networks, hard-headed policies) 18/37 9
10 However: Three requirements become more needed than ever! Digital leadership with a transformative leadership role, not just an IT functional manager. Technology awareness & vision that is least affected by Transitions forces Efficient police-citizen citizen relationship development and communications skills 19/37 General Strategy for ICT-driven Security success factors 20/37 10
11 I. Information & Communications Technologies (ICT) II. ICT-driven security policies III. Implementation options paradigm IV. The first steps. 21/37 Paradigm for implementing ICT-driven security Legislation, privacy, civil rights Innovative technology means Innovative actions to provide security 22/37 11
12 No Security Legislati on& Citizen's rights Good Governa nce Adequat e & Proper Technol ogy 23/37 Week Security Legislati i Good on& Governa Citizen's nce rights Adequat e & Proper Technol ogy 24/37 12
13 Some Security Legislati Good on& Citizen's rights Adequat Governa nce e & Proper Technol ogy 25/37 Strong Security Legislati Good on& Adequat Governa Citizen's e & nce rights Proper Technol ogy 26/37 13
14 Perfect Security Adequat Legislati Good e & on& Governa Proper Citizen's Technol nce rights ogy 27/37 Week Security Overview 28/37 14
15 I. Information & Communications Technologies (ICT) II. ICT-driven security policies III. Implementation options paradigm IV. The first steps. 29/37 The First Steps! 30/37 15
16 Step 1: Define and Respect How Security Can Be Practiced! 31/37 Step 2: Establish Proper Governance Form high-level h l steering committee across major government stakeholders Define Security strategic goals to be achieved 32/37 16
17 Step 3: Identify Security Needs Conduct current risk and security viability survey Adopt prioritized risks and threats with detailed security requirements studied 33/37 Step 4: Harnessing ICT to implement security needs defined in step 3 Develop architecture infrastructure for solutions to security needs defined Develop a framework for monitoring and assessment of successful operation of these solutions 34/37 17
18 Step 5: Establish SERT (Security Emergency Response Team) Establish SRT to work with CERT (Computer Emergency Response Team) to provide immediate help in correcting any malfunction of solutions developed Use simulation, and then select a pilot period of time to test operations, and keep adjusting until satisfied with operations results 35/37 Step 6, 7, ad lib: EDM (Evaluate, Develop & Monitor) 36/37 18
19 THANK YOU 19
Top 10 IT Trends that will shape 2014. David Chin Chair BICSI Southeast Asia
Top 10 IT Trends that will shape 2014 David Chin Chair BICSI Southeast Asia Gartner Hype Cycle: Emerging Technologies 2013 Convergence of cloud, social, mobile, devices, analytic-driven automation and
More informationConsumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014
Consumption IT Michael Shepherd Business Development Manager Cisco Public Sector May 1 st 2014 Short Bio Cloud BDM in Public Sector (SLED + FED) Cisco for 14 + years Focused on cloud for 4 + years Awareness,
More informationVCE AND THE SIMPLIFIED DATACENTRE
VCE AND THE SIMPLIFIED DATACENTRE Paul Ruinaard SOME MAJOR THEMES FOR 2014 Mobile Device and Diversity Management the unintended consequence of bring your own device (BYOD) programs has been to render
More informationCloud Computing An Elephant In The Dark
Cloud Computing An Elephant In The Dark Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir
More informationNetworking technologies and applications
Networking technologies and applications May 11, 2015 Networking technologies and applications May 11, 2015 1 4G - LTE LTE Long Term Evolution Developed by the 3GPP (Third Generation PartnerShip Project)
More informationNetwork Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services
Network Evolution, Cloud & Future Services Opportunities & Challenges for Next-Decade Services Outline Trends: Data, Services & Networks Cloud What is Next? 2 Law of Telecom Complexity Telecom complexity,
More informationShaping the crazy future in the IT sector through directed evolution of software systems
Shaping the crazy future in the IT sector through directed evolution of software systems Stelian Brad, PhD (Engg.), PhD (Econ.) President Cluj IT Cluster the crazy future my risky job for today to introduce
More informationNFV Live! 15. Using closed-loop automation and data analytics to manage virtualized and hybrid networks
NFV Live! MONDAY, MAY 9, 2016 1. CASE STUDY: Real world deployment - the transformation to a virtualized network 2. CROSS INDUSTRY CASE STUDY: Virtualizing the data center to enable the efficient delivery
More informationCloud, Mobile, and Analytics. Looking Beyond the Hype
Cloud, Mobile, and Analytics Looking Beyond the Hype Trimming the Word Clouds A good model to think about Hype Source: Gartner Cloud Computing: Established Areas Browser Client OS Sales Force Automation
More informationSecuring the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
More informationThe Private Cloud Your Controlled Access Infrastructure
White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,
More informationThe 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
More informationCyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
More informationA Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
More informationCONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS
CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS Didier Mora System Engineer Cisco Mayo, 2015 Converging Digital Disruptions The Nexus of Forces The 3rd Platform The Industrial Internet IoT = $1.9
More informationMobile and Cloud computing and SE
Mobile and Cloud computing and SE This week normal. Next week is the final week of the course Wed 12-14 Essay presentation and final feedback Kylmämaa Kerkelä Barthas Gratzl Reijonen??? Thu 08-10 Group
More informationCloud vs. On Premise: Is there a Middle Ground?
Cloud vs. On Premise: Is there a Middle Ground? Building Multi Channel Business Applications without Re Coding Magic Software March 2010 Magic Software is a trademark of Magic Software Enterprises Ltd.
More informationCall to Action on Smart Sustainable Cities
Call to Action on Smart Sustainable Cities 1. Introduction Achieving sustainable urbanization, along with the preservation of our planet, has been recognized as one of the major challenges of our society
More informationDIGITAL 21 STRATEGY ADVISORY COMMITTEE. Adoption of Cloud Computing Model in Government
For discussion Paper No. 2/2011 on 22 March 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Adoption of Cloud Computing Model in Government Purpose The Government will be adopting the Cloud Computing 1 Model
More informationThe Internet of Everything
The Internet of Everything The Next Evolution of the Internet is Changing Everything Todd Meister Vice President, Software and Solutions Innovation Americas Partner Organization, Cisco October 23, 2014
More informationFEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS
International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationExtending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy
Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy 2014 VMware Inc. All rights reserved. IT Management Processes are Not Optimized For Change
More informationDon't outsource IT! Bring your own Cloud with SDN
Don't outsource IT! Bring your own Cloud with SDN Education Session 19 Herman Chao Systems Engineering Manager, Cisco State of CA Government May 2015 Agenda Industry Need and Trends The Network Challenge
More informationTamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
More informationOUTSIDE-IN Transforming Enterprise IT
OUTSIDE-IN Transforming Enterprise IT Recognize that Innovation Is Moving Outside the Firm New value increasingly created outside the firm Social Media Community Content Mobile/ Location Big Data Cocreation
More informationIoT Prospects of Worldwide Development and Current Global Circumstances
IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in
More informationRethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona
More informationCapability Paper. Today, aerospace and defense (A&D) companies find
Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find themselves at potentially perplexing crossroads. On one hand, shrinking defense budgets, an increasingly
More informationVickie Stephens, CRM December 3, 2014
Vickie Stephens, CRM December 3, 2014 Records management and technology What is Information Governance? 2 ... Every two days now we create as much information as we did from the dawn of civilization up
More informationCombining the INTERNET of THINGS and the INTERNET of SERVICES
On RFID Conference and Exhibition LAGOAS PARK, LISBON Combining the INTERNET of THINGS and the INTERNET of SERVICES Dr. Joachim Schaper Vice President SAP Research EMEA, SAP AG Agenda 1 2 3 4 5 The VISION
More informationHow To Understand The Power Of The Internet Of Things
Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,
More informationHybrid Cloud - Your Path to Business Agility
IBM BusinessConnect 2015 Seize the Moment 21 st October 2015 Hybrid Cloud - Your Path to Business Agility Peter Eeles Executive IT Architect IBM Cloud Worldwide Tiger Team peter.eeles@uk.ibm.com Agenda
More informationTelecom, ICT & Internet Futures and Sustainable Broadband: The next 5 years
Telecom, ICT & Internet Futures and Sustainable Broadband: The next 5 years 1 2 4 8 16 32 64 How does a person go broke? Gradually, then suddenly Ernest Hemingway How does a person go broke? Gradually,
More informationSystems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things
Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things Mac Devine CTO, IBM Cloud Services Division IBM Distinguished Engineer wdevine@us.ibm.com twitter: mac_devine Forecast for
More informationWhy Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB
Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),
More informationTop 10 Tech Trends For 2015 by Gartner
Software defined business Panos Theodossopoulos General Manager Logicom Solutions Top 10 Tech trends for 2015 (by Gartner) 1. Computing Everywhere 2. The Internet of Things (IoT) 3. 3D printing 4. Advanced,
More informationTop 10 Strategic Technology Trends for Smart Government
Top 10 Strategic Technology Trends for Smart Government Rick Howard Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form
More informationCloud Computing Landscape: The Importance Of Standards
Cloud Computing Landscape: The Importance Of Standards Ndu Emuchay, Chief Architect, Cloud Computing Client Engagements IBM Corporation July 22, 2009 Abstract Customers expect the Cloud Services they use
More informationA Framework of Smart Internet of Things based Cloud Computing
A Framework of Smart Internet of Things based Cloud Computing Mauricio Alejandro Gomez Morales, Aymen Abdullah Alsaffar, Seung-Jin Lee and Eui-Nam Huh Innovative Cloud and Security (ICNS) Laboratory Dept.
More informationBUSINESS INTELLIGENCE PAST, PRESENT AND FUTURE
Cătălina Monica ALEXE, Cristina Petronela SIMION, Cătălin George ALEXE University POLITEHNICA of Bucharest, Faculty of Entrepreneurship, Business Engineering and Management BUSINESS INTELLIGENCE PAST,
More informationTimo Koskinen, Cloud Computing Leader & Chief Technologist, IBM Finland. 2012 IBM Corporation
Timo Koskinen, Cloud Computing Leader & Chief Technologist, IBM Finland AGENDA Rethink IT Reinvent Business Cloud Myths 1. Cloud is New Technology 2. If It s Virtualized, It s Cloud 3. SaaS, IaaS - It
More informationThe NEW POSSIBILITY. How the Data Center Helps Your Organization Excel in the Digital Services Economy
The NEW CENTER OF POSSIBILITY How the Data Center Helps Your Organization Excel in the Digital Services Economy Powering the world s best ideas Dramatic improvements in compute, storage, and network technology
More informationSDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
More informationSimple. Extensible. Open.
White Paper Simple. Extensible. Open. Unleash the Value of Data with EMC ViPR Global Data Services Abstract The following paper opens with the evolution of enterprise storage infrastructure in the era
More informationWhite Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
More informationVMware Horizon DaaS: Desktop as a Cloud Service (DaaS)
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of
More informationCircuit Protection is Key in Maintaining Growth for The Internet of Things
Circuit Protection is Key in Maintaining Growth for The Internet of Things INTRODUCTION The Internet of Things (IoT) promises a future that networks billions of smart, connected devices. The value of this
More informationMobile-edge Computing
Mobile-edge Computing Major strides towards RAN virtualization Nurit Sprecher 1 02/09/2014 Nokia 2014 - Nurit Sprecher Agenda Market drivers and requirements 2020 network architecture vision Cloud RAN
More informationManagement of Security Information and Events in Future Internet
Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?
More informationThe Power of Technology to Transform the Future. Opportunities & Challenges for Next-Decade Services
The Power of Technology to Transform the Future Opportunities & Challenges for Next-Decade Services Outline Top 10 Services/TechnologyTrends Cyber Security What Is Next? 2 Services Of The Future 1. Doctors
More informationCIO 100 SYMPOSIUM: WORKPLACE OF THE FUTURE
CIO 100 SYMPOSIUM: WORKPLACE OF THE FUTURE Maria Pardee, VP and General Manager, Workplace and Service Management, CSC August 10, 2015 Copyright 2015 Computer Sciences Corporation. All Rights Reserved.
More information2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
More informationStart New Conversations, Open New Doors
@ulander Start New Conversations, Open New Doors Grow Your Business with Cisco Peder Ulander Vice President, Cloud and Managed Services Partner Organization, Cisco August 9, 2015 The World Is Changing
More informationMobile Enterprise and IPv6 Consumerization of IT
Mobile Enterprise and IPv6 Consumerization of IT Yanick Pouffary Distinguished Technologist - Technology Services - Networking HP IPv6 Global Leader April 18, 2013 Copyright 2012 Hewlett-Packard Development
More informationTutorial on Client-Server Architecture
Tutorial on Client-Server Architecture SEEM3430 Information Systems Analysis and Design Pengfei Liu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong March
More informationCase Study Panasonic India s Selection of Cloud-Based Data Protection Speeds Data Recovery While Preventing Data Loss
Case Study Panasonic India s Selection of Cloud-Based Data Protection Speeds Data Recovery While Preventing Data Loss Electronic consumer product manufacturer Endpoint Device Data Protection across multiple
More informationLeveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
More informationCloud Computing/ Semantic Web Initiatives & Tutorial
Cloud Computing/ Semantic Web Initiatives & Tutorial Chuck Vollmer March 2011 The Cloud & Semantic Web 1990s 2010s Mainframe Computing Personal Computing Cloud Computing Cloud computing is as big a paradigm
More informationInternet of Things: Consumerisation of Technology. www.avasant.com
: Consumerisation of Technology Technology democratization has weaved an ecosystem powered by intelligent systems, connectivity services, analytics, and technology infrastructure to deliver services. With
More informationThe Internet of Things: Connected Home, Auto, and Life
The Internet of Things: Connected Home, Auto, and Life An Author: Denise Garth, SMA Partner Published Date: November, 2014 SMA Summit A Connected Experience During the 2014 SMA Summit, and for a week and
More informationCityNext: Microsoft's Future City Market Proposition
CityNext: Microsoft's Future City Market Proposition Driving a "people-first" approach with the right technology Reference Code: IT007-000728 Publication Date: 30 Oct 2013 Author: Joe Dignan SUMMARY Catalyst
More informationA Strategic Approach to Meeting the Demand for Cloud
White Paper For Cloud Providers A Strategic Approach to Meeting the Demand for Cloud Introduction: New Customer Challenges Propel Cloud Adoption In a dynamic business environment, enterprise customers
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationMODAClouds. An FP7 Integrated Project
MODAClouds An FP7 Integrated Project MODAClouds the consortium FP7 Integrated Project (n. 318484) Duration: Oct. 1 st, 2012 Sept 30 th, 2015 28 July, 2014 e-infrastructure Services for Society 2 MODAClouds
More informationICT Development Trends (2014): Embracing the Era of Mobile-ICT
ICT Development Trends (2014): Embracing the Era of Mobile-ICT ZTE COPORATION In our fast-growing global information society, technology has had a profound effect on every aspect of society and each individual's
More informationInterconnection in the Clouds
Interconnection in the Clouds William Lehr & Steve Bauer MIT WIE2014 UCSD December 10-11, 2014 Outline Why Cloud Interconnection (and not just Internet Interconnection) What are research/policy questions
More informationCloud Computing. P a n a g i o t i s F o u z a s I T S o l u t i o n s M a n a g e r
C l a s s i f i c a t i o n I S O 2 7 0 0 1 : P u b l i c Cloud Computing Prospects & Challenges P a n a g i o t i s F o u z a s I T S o l u t i o n s M a n a g e r 1 OUTLINE Cloud Definition and Classification
More informationChristian Dinten HP Software - Business Technology Optimization BTO Solution Consultant & Ambassador
Christian Dinten HP Software - Business Technology Optimization BTO Solution Consultant & Ambassador 2 2009 2010 HP Confidential INTELLIGENT SERVICE MANAGEMENT A USE CASE - TODAY - Solution - Process automation
More informationA ZK Research Whitepaper. November 2014. e t. It s INTERNET OF THINGS
A ZK Research Whitepaper November 2014 It s inesses to em s u b r o bra f e ce tim t he INTERNET OF THINGS The Era of the Internet of Things Has Arrived The term perfect storm is used to describe a scenario
More informationConnect for new business opportunities
Connect for new business opportunities The world of connected objects How do we monitor the carbon footprint of a vehicle? How can we track and trace cargo on the move? How do we know when a vending machine
More informationThe Internet of Things (IoT) is one of the most important technological trends of recent years.
Brochure Overview The Internet of Things (IoT) is one of the most important technological trends of recent years. It is the network of billions of intelligent objects and scenarios derived from it in terms
More informationNATO s Journey to the Cloud Vision and Progress
NATO s Journey to the Cloud Vision and Progress Dr Peter J. Lenk 2 Definitions of the Cloud A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted,
More informationIBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
More informationCloud Computing. Key Considerations for Adoption. Abstract. Ramkumar Dargha
Cloud Computing Key Considerations for Adoption Ramkumar Dargha Abstract Cloud Computing technology and services have been witnessing quite a lot of attention for the past couple of years now. We believe
More informationPerspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009
Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of
More informationFujitsu s Approach to Cloud Computing
Fujitsu s Approach to Cloud Computing Kenta Miyazawa Cloud computing (hereafter cloud or clouds) has come to be specifically used in various fields. Private clouds are used in enterprises. Groups and individuals
More informationand Deployment Roadmap for Satellite Ground Systems
A Cloud-Based Reference Model and Deployment Roadmap for Satellite Ground Systems 2012 Ground System Architectures Workshop February 29, 2012 Dr. Craig A. Lee The Aerospace Corporation The Aerospace Corporation
More informationInternet of Things From Idea to Scale
PRG Symposium Internet of Things From Idea to Scale September 12, 2014 alex.blanter@atkearney.com @AlexBlanter You are here today because you are interested in the Internet of Things and so is everybody
More informationCisco Cybersecurity Pocket Guide 2015
Cisco Cybersecurity Pocket Guide 2015 Why Security Security investment: A top priority Security: A critical boardroom topic Why Security? Security Investment: A Top Priority Figure 1 How Enterprises View
More informationICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments
Call 5 NCP briefing 12th May 2009 ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Peter Friess, Project officer, Head of Cluster Alain Jaume, Deputy Head of Unit D4 Cristina Martinez,
More informationInnovative Architectures For Cloud Data Centers
Innovative Architectures For Cloud Data Centers Cloud computing has ushered in a new era for data centers. Huawei offers efficient, flexible, and innovative cloud data centers and delivers extensive project
More informationCloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
More informationCyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
More informationCloud Computing. by Civic Consulting (research conducted October 2011 January 2012)
Cloud Computing by (research conducted October 2011 January 2012) for the European Parliament, DG Internal Policies of the Union, Directorate A (Economic and Scientific Policy); presentation for the EP
More information雲 端 運 算 願 景 與 實 現 馬 維 英 博 士 微 軟 亞 洲 研 究 院 常 務 副 院 長
雲 端 運 算 願 景 與 實 現 馬 維 英 博 士 微 軟 亞 洲 研 究 院 常 務 副 院 長 Important Aspects of the Cloud Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Information and Knowledge
More informationUrban Mobility India 2011 The IBM Smarter Cities Solutions: Opportunities for Intelligent Transportation
Urban Mobility India 2011 The IBM Smarter Cities Solutions: Opportunities for Intelligent Transportation Himanshu Bhatt Global Program Director, Market Strategy IBM Software Group Innovative leaders are
More informationVortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationTHE USE OF STRONG AUTHENTICATION IN CONJUNCTION WITH IDAAS, IDENTITY AS A SERVICE FOR IDENTITY MANAGEMENT. Donald Malloy May 14 th, 2014
THE USE OF STRONG AUTHENTICATION IN CONJUNCTION WITH IDAAS, IDENTITY AS A SERVICE FOR IDENTITY MANAGEMENT Donald Malloy May 14 th, 2014 Agenda What are some Technology trends? How do you define IDaaS?
More informationSome Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,
Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already
More informationHead in the Clouds Feet On the Ground
Abhi Raina Director EPM Practice AST Corporation Head in the Clouds Feet On the Ground A Guide to Choosing Cloud Options 1 Topics Cloud Computing Options within the Cloud Oracle Cloud Q&A 2 Specialized.
More informationThe Internet of Things... Hype or not?
The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune
More informationCONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5
#924, 5 A The catchy phrase Internet of Things (IoT) or the Web of Things has become inevitable to the modern world. Today wireless technology has reached its zenith making it possible to interact with
More informationHorizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges
More informationHybrid Cloud Computing
Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope
More informationCritical Infrastructure in a CyberPhysicalHuman World
Critical Infrastructure in a CyberPhysicalHuman World December 2015 Approved for Public Release; Distribution Unlimited. 15-3575 2015 The MITRE Corporation. All rights reserved. Chris Folk, MBA, Director,
More informationCloud Computing and the Future of Internet Services. Wei-Ying Ma Principal Researcher, Research Area Manager Microsoft Research Asia
Cloud Computing and the Future of Internet Services Wei-Ying Ma Principal Researcher, Research Area Manager Microsoft Research Asia Computing as Utility Grid Computing Web Services in the Cloud What is
More information