Saleem G. Zoughbi. UN Expert and IEEE Computer Society e-government STC

Size: px
Start display at page:

Download "Saleem G. Zoughbi. UN Expert and IEEE Computer Society e-government STC"

Transcription

1 Saleem G. Zoughbi UN Expert and IEEE Computer Society e-government STC The ICT-driven security indispensable to the security of individuals, properties, institutions, states and the entire world ICT AS A MODERN SOLUTION O TO SECURITY THREAT, EARLY DETECTION AND PREVENTION OF CRIMES CAFRAD International Conference of ICT Security and Defense Experts June 23-25, 2014, Tangiers, Morocco Keywords The ICT-driven security indispensable to the security of individuals, properties, institutions, states and the entire world. The ICT-driven security indispensable to the security of individuals, properties, institutions, states and the entire world. The ICT-driven security indispensable to the security of individuals, properties, institutions, states and the entire world. 2/37 1

2 I. Information & Communications Technologies (ICT) II. ICT-driven security policies III. Implementation options paradigm IV. The first steps. 3/37 Information, technology & computing! Information is a key resource for all government offices, especially the police. Information is created, used, retained, disclosed and destroyed. Technology plays a key role in these actions. Technology is becoming pervasive in all aspects of business and personal life. Ubiquitous computing is becoming common 4/37 2

3 Spectrum to technologies for ICTdriven security Technologies Mobile Applications Data Centers and Clouding Smart technology Shared Sevrices Technology Broadbands Operational technology 5/37 10 New trends in Technology that will shape future e-government 1. Hybrid Cloud and IT as Service Broker Bringing together personal clouds and external private cloud services is an imperative. More deployment compositions will emerge as CSBs and IaaS. 2. Cloud/Client Architecture Cloud/client computing models are shifting. In the cloud/client architecture, the client is a rich application running on an Internet-connected device, and the server is a set of application services hosted in an increasingly elastically scalable cloud computing platform. 3. The Era of Personal Cloud The personal cloud era will make a power shift away from devices toward services. 6/37 3

4 Technology for future e- Government 4. Mobile Device Diversity and Management More sophisticated and yet smarter smart phones, including bring gyour own device (BYOD) programs will make "everything everywhere" strategies unachievable. 5. Mobile Apps and Applications: Such as improved JavaScript performance will begin to push HTML5 and the browser as a mainstream enterprise application development environment. 6. The Internet of Everything (IoE) 7/37 The Internet is expanding beyond PCs and mobile devices into enterprise assets such as field equipment, and consumer items such as cars and televisions: something beyond the Internet of Things (IoT): Manage; Monetize; Operate; Extend. 7. Software Defined Anything Software-defined anything (SDx) is associated with improved standards for infrastructure programmability and data center interoperability driven by automation inherent to cloud computing. 8. Web-Scale IT Web-scale IT is a pattern of global-class computing that delivers the capabilities of large cloud service providers within an enterprise IT setting by rethinking positions across several dimensions. 9. Smart Machines Through 2020, the smart machine era will blossom with a proliferation of contextually aware, intelligent personal assistants, smart advisors (such as IBM Watson), advanced global industrial systems and public availability of early examples of autonomous vehicles D Printing (and not before long 4-D) Worldwide shipments of 3D printers are expected to grow 75 percent in 2014 followed by a near doubling of unit shipments in /37 4

5 Potential Smart technologies for security The Semantic Web and Other Metadata: Metadata, or data about data, enables greater automated analysis of information Digital Identity Management and Biometrics: allows the amassing and automatic processing of personal data; biometrics provides means by which human beings can be uniquely identified. Radio Frequency Identification & Sensors: These technologies monitor the physical world, using communications technology to distribute information about a specific location. 9/37 The Geospatial Web and Location-Based Services: these technologies serve to associate digital data with physical locations. Mesh Networking: formation of networks across areas without existing communications infrastructures Grid Computing: This technology may allow the world s computing power and data storage resources to be pooled for people to access as needed. New Computing Technologies: a powerful mix of optics, quantum computing, and other new technologies has potential to bring about a global brain. 10/37 5

6 I. Information & Communications Technologies (ICT) II. ICT-driven security policies III. Implementation options paradigm IV. The first steps. 11/37 5/25 We cannot solve our problems with the same thinking we used when we created them. The only source of knowledge is experience. Imagination is more important than knowledge. We cannot speak of ICT-driven security to countries in the same way we speak of ICT development We have to be aware of how ICTdriven security is responding to the actual people governance. This is our source of knowledge for the new change management. Imagination about ways ICT-driven security in countries can go is more important than classical research. 12/37 6

7 Government dependence ON ICT By 2014, more than 50% of IT spending will be decided outside of IT departments in at least 30% of government organizations. By 2015, scenario planning (or equivalent techniques) will be used for IT budgeting in more than 30% of government organizations. By 2016, IT-enabled productivity per government worker in the bottom third of agencies by size will increase at twice the rate in comparison to the top third by size. Gartner, /37 Highlights of technology for public governance Work Place Channels Business Processes Applications Data Infrastructure Blend of police (government) and citizen/consumer tools Intermediary Social media Business process Utilities (BPU) crowdsourcing SaaS citizen/consumer apps Social profiles, Open data Public cloud 14/37 7

8 ICT-driven Security Situations Available resources Integrated Government Safe Country Aware but poor! Mismanagement & Corruption Chaos! Fragmented Government 15/37 Lack of resources 1. Technical know-how is not difficult to attain, what is difficult is commitment and hard work. (No limitation on technology use by poor countries if it is made available) 2. Competition just began : All are in starting line now. If you prepare well in advance for the next generation ICTdriven security, you will become winner. 3. 'Gerschenkron s Hypothesis' in which "Late-comers would become forerunners if they prepare the new technology in advance" can be applied in the era of the Smart Government. We do not have to restart where others started if we work hard 16/37 8

9 ICT-driven security principles Meeting stakeholders needs Separating governance from management Covering the government end-to-end The 5 principle s Enabling a holistic approach Applying a single integrated framework 17/37 ICT-driven security is like a house of cards Difficult to build (build confidence and cooperation) Easy to destroy (struggle for power, switch off networks, hard-headed policies) 18/37 9

10 However: Three requirements become more needed than ever! Digital leadership with a transformative leadership role, not just an IT functional manager. Technology awareness & vision that is least affected by Transitions forces Efficient police-citizen citizen relationship development and communications skills 19/37 General Strategy for ICT-driven Security success factors 20/37 10

11 I. Information & Communications Technologies (ICT) II. ICT-driven security policies III. Implementation options paradigm IV. The first steps. 21/37 Paradigm for implementing ICT-driven security Legislation, privacy, civil rights Innovative technology means Innovative actions to provide security 22/37 11

12 No Security Legislati on& Citizen's rights Good Governa nce Adequat e & Proper Technol ogy 23/37 Week Security Legislati i Good on& Governa Citizen's nce rights Adequat e & Proper Technol ogy 24/37 12

13 Some Security Legislati Good on& Citizen's rights Adequat Governa nce e & Proper Technol ogy 25/37 Strong Security Legislati Good on& Adequat Governa Citizen's e & nce rights Proper Technol ogy 26/37 13

14 Perfect Security Adequat Legislati Good e & on& Governa Proper Citizen's Technol nce rights ogy 27/37 Week Security Overview 28/37 14

15 I. Information & Communications Technologies (ICT) II. ICT-driven security policies III. Implementation options paradigm IV. The first steps. 29/37 The First Steps! 30/37 15

16 Step 1: Define and Respect How Security Can Be Practiced! 31/37 Step 2: Establish Proper Governance Form high-level h l steering committee across major government stakeholders Define Security strategic goals to be achieved 32/37 16

17 Step 3: Identify Security Needs Conduct current risk and security viability survey Adopt prioritized risks and threats with detailed security requirements studied 33/37 Step 4: Harnessing ICT to implement security needs defined in step 3 Develop architecture infrastructure for solutions to security needs defined Develop a framework for monitoring and assessment of successful operation of these solutions 34/37 17

18 Step 5: Establish SERT (Security Emergency Response Team) Establish SRT to work with CERT (Computer Emergency Response Team) to provide immediate help in correcting any malfunction of solutions developed Use simulation, and then select a pilot period of time to test operations, and keep adjusting until satisfied with operations results 35/37 Step 6, 7, ad lib: EDM (Evaluate, Develop & Monitor) 36/37 18

19 THANK YOU 19

Top 10 IT Trends that will shape 2014. David Chin Chair BICSI Southeast Asia

Top 10 IT Trends that will shape 2014. David Chin Chair BICSI Southeast Asia Top 10 IT Trends that will shape 2014 David Chin Chair BICSI Southeast Asia Gartner Hype Cycle: Emerging Technologies 2013 Convergence of cloud, social, mobile, devices, analytic-driven automation and

More information

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014 Consumption IT Michael Shepherd Business Development Manager Cisco Public Sector May 1 st 2014 Short Bio Cloud BDM in Public Sector (SLED + FED) Cisco for 14 + years Focused on cloud for 4 + years Awareness,

More information

VCE AND THE SIMPLIFIED DATACENTRE

VCE AND THE SIMPLIFIED DATACENTRE VCE AND THE SIMPLIFIED DATACENTRE Paul Ruinaard SOME MAJOR THEMES FOR 2014 Mobile Device and Diversity Management the unintended consequence of bring your own device (BYOD) programs has been to render

More information

Cloud Computing An Elephant In The Dark

Cloud Computing An Elephant In The Dark Cloud Computing An Elephant In The Dark Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir

More information

Networking technologies and applications

Networking technologies and applications Networking technologies and applications May 11, 2015 Networking technologies and applications May 11, 2015 1 4G - LTE LTE Long Term Evolution Developed by the 3GPP (Third Generation PartnerShip Project)

More information

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services Network Evolution, Cloud & Future Services Opportunities & Challenges for Next-Decade Services Outline Trends: Data, Services & Networks Cloud What is Next? 2 Law of Telecom Complexity Telecom complexity,

More information

Shaping the crazy future in the IT sector through directed evolution of software systems

Shaping the crazy future in the IT sector through directed evolution of software systems Shaping the crazy future in the IT sector through directed evolution of software systems Stelian Brad, PhD (Engg.), PhD (Econ.) President Cluj IT Cluster the crazy future my risky job for today to introduce

More information

NFV Live! 15. Using closed-loop automation and data analytics to manage virtualized and hybrid networks

NFV Live! 15. Using closed-loop automation and data analytics to manage virtualized and hybrid networks NFV Live! MONDAY, MAY 9, 2016 1. CASE STUDY: Real world deployment - the transformation to a virtualized network 2. CROSS INDUSTRY CASE STUDY: Virtualizing the data center to enable the efficient delivery

More information

Cloud, Mobile, and Analytics. Looking Beyond the Hype

Cloud, Mobile, and Analytics. Looking Beyond the Hype Cloud, Mobile, and Analytics Looking Beyond the Hype Trimming the Word Clouds A good model to think about Hype Source: Gartner Cloud Computing: Established Areas Browser Client OS Sales Force Automation

More information

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation

Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns

More information

The Private Cloud Your Controlled Access Infrastructure

The Private Cloud Your Controlled Access Infrastructure White Paper: Private Clouds The ongoing debate on the differences between a Public and Private Cloud are broad and often loud. The bottom line is that it s really about how the resource, or computing power,

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

A Study on Service Oriented Network Virtualization convergence of Cloud Computing A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute

More information

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS Didier Mora System Engineer Cisco Mayo, 2015 Converging Digital Disruptions The Nexus of Forces The 3rd Platform The Industrial Internet IoT = $1.9

More information

Mobile and Cloud computing and SE

Mobile and Cloud computing and SE Mobile and Cloud computing and SE This week normal. Next week is the final week of the course Wed 12-14 Essay presentation and final feedback Kylmämaa Kerkelä Barthas Gratzl Reijonen??? Thu 08-10 Group

More information

Cloud vs. On Premise: Is there a Middle Ground?

Cloud vs. On Premise: Is there a Middle Ground? Cloud vs. On Premise: Is there a Middle Ground? Building Multi Channel Business Applications without Re Coding Magic Software March 2010 Magic Software is a trademark of Magic Software Enterprises Ltd.

More information

Call to Action on Smart Sustainable Cities

Call to Action on Smart Sustainable Cities Call to Action on Smart Sustainable Cities 1. Introduction Achieving sustainable urbanization, along with the preservation of our planet, has been recognized as one of the major challenges of our society

More information

DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Adoption of Cloud Computing Model in Government

DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Adoption of Cloud Computing Model in Government For discussion Paper No. 2/2011 on 22 March 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Adoption of Cloud Computing Model in Government Purpose The Government will be adopting the Cloud Computing 1 Model

More information

The Internet of Everything

The Internet of Everything The Internet of Everything The Next Evolution of the Internet is Changing Everything Todd Meister Vice President, Software and Solutions Innovation Americas Partner Organization, Cisco October 23, 2014

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy 2014 VMware Inc. All rights reserved. IT Management Processes are Not Optimized For Change

More information

Don't outsource IT! Bring your own Cloud with SDN

Don't outsource IT! Bring your own Cloud with SDN Don't outsource IT! Bring your own Cloud with SDN Education Session 19 Herman Chao Systems Engineering Manager, Cisco State of CA Government May 2015 Agenda Industry Need and Trends The Network Challenge

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

OUTSIDE-IN Transforming Enterprise IT

OUTSIDE-IN Transforming Enterprise IT OUTSIDE-IN Transforming Enterprise IT Recognize that Innovation Is Moving Outside the Firm New value increasingly created outside the firm Social Media Community Content Mobile/ Location Big Data Cocreation

More information

IoT Prospects of Worldwide Development and Current Global Circumstances

IoT Prospects of Worldwide Development and Current Global Circumstances IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in

More information

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona

More information

Capability Paper. Today, aerospace and defense (A&D) companies find

Capability Paper. Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find Today, aerospace and defense (A&D) companies find themselves at potentially perplexing crossroads. On one hand, shrinking defense budgets, an increasingly

More information

Vickie Stephens, CRM December 3, 2014

Vickie Stephens, CRM December 3, 2014 Vickie Stephens, CRM December 3, 2014 Records management and technology What is Information Governance? 2 ... Every two days now we create as much information as we did from the dawn of civilization up

More information

Combining the INTERNET of THINGS and the INTERNET of SERVICES

Combining the INTERNET of THINGS and the INTERNET of SERVICES On RFID Conference and Exhibition LAGOAS PARK, LISBON Combining the INTERNET of THINGS and the INTERNET of SERVICES Dr. Joachim Schaper Vice President SAP Research EMEA, SAP AG Agenda 1 2 3 4 5 The VISION

More information

How To Understand The Power Of The Internet Of Things

How To Understand The Power Of The Internet Of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

Hybrid Cloud - Your Path to Business Agility

Hybrid Cloud - Your Path to Business Agility IBM BusinessConnect 2015 Seize the Moment 21 st October 2015 Hybrid Cloud - Your Path to Business Agility Peter Eeles Executive IT Architect IBM Cloud Worldwide Tiger Team peter.eeles@uk.ibm.com Agenda

More information

Telecom, ICT & Internet Futures and Sustainable Broadband: The next 5 years

Telecom, ICT & Internet Futures and Sustainable Broadband: The next 5 years Telecom, ICT & Internet Futures and Sustainable Broadband: The next 5 years 1 2 4 8 16 32 64 How does a person go broke? Gradually, then suddenly Ernest Hemingway How does a person go broke? Gradually,

More information

Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things

Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things Mac Devine CTO, IBM Cloud Services Division IBM Distinguished Engineer wdevine@us.ibm.com twitter: mac_devine Forecast for

More information

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB

Why Private Cloud? Nenad BUNCIC VPSI 29-JUNE-2015 EPFL, SI-EXHEB Why Private Cloud? O P E R A T I O N S V I E W Nenad BUNCIC EPFL, SI-EXHEB 1 What Exactly Is Cloud? Cloud technology definition, as per National Institute of Standards and Technology (NIST SP 800-145),

More information

Top 10 Tech Trends For 2015 by Gartner

Top 10 Tech Trends For 2015 by Gartner Software defined business Panos Theodossopoulos General Manager Logicom Solutions Top 10 Tech trends for 2015 (by Gartner) 1. Computing Everywhere 2. The Internet of Things (IoT) 3. 3D printing 4. Advanced,

More information

Top 10 Strategic Technology Trends for Smart Government

Top 10 Strategic Technology Trends for Smart Government Top 10 Strategic Technology Trends for Smart Government Rick Howard Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form

More information

Cloud Computing Landscape: The Importance Of Standards

Cloud Computing Landscape: The Importance Of Standards Cloud Computing Landscape: The Importance Of Standards Ndu Emuchay, Chief Architect, Cloud Computing Client Engagements IBM Corporation July 22, 2009 Abstract Customers expect the Cloud Services they use

More information

A Framework of Smart Internet of Things based Cloud Computing

A Framework of Smart Internet of Things based Cloud Computing A Framework of Smart Internet of Things based Cloud Computing Mauricio Alejandro Gomez Morales, Aymen Abdullah Alsaffar, Seung-Jin Lee and Eui-Nam Huh Innovative Cloud and Security (ICNS) Laboratory Dept.

More information

BUSINESS INTELLIGENCE PAST, PRESENT AND FUTURE

BUSINESS INTELLIGENCE PAST, PRESENT AND FUTURE Cătălina Monica ALEXE, Cristina Petronela SIMION, Cătălin George ALEXE University POLITEHNICA of Bucharest, Faculty of Entrepreneurship, Business Engineering and Management BUSINESS INTELLIGENCE PAST,

More information

Timo Koskinen, Cloud Computing Leader & Chief Technologist, IBM Finland. 2012 IBM Corporation

Timo Koskinen, Cloud Computing Leader & Chief Technologist, IBM Finland. 2012 IBM Corporation Timo Koskinen, Cloud Computing Leader & Chief Technologist, IBM Finland AGENDA Rethink IT Reinvent Business Cloud Myths 1. Cloud is New Technology 2. If It s Virtualized, It s Cloud 3. SaaS, IaaS - It

More information

The NEW POSSIBILITY. How the Data Center Helps Your Organization Excel in the Digital Services Economy

The NEW POSSIBILITY. How the Data Center Helps Your Organization Excel in the Digital Services Economy The NEW CENTER OF POSSIBILITY How the Data Center Helps Your Organization Excel in the Digital Services Economy Powering the world s best ideas Dramatic improvements in compute, storage, and network technology

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

Simple. Extensible. Open.

Simple. Extensible. Open. White Paper Simple. Extensible. Open. Unleash the Value of Data with EMC ViPR Global Data Services Abstract The following paper opens with the evolution of enterprise storage infrastructure in the era

More information

White Paper on CLOUD COMPUTING

White Paper on CLOUD COMPUTING White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples

More information

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of

More information

Circuit Protection is Key in Maintaining Growth for The Internet of Things

Circuit Protection is Key in Maintaining Growth for The Internet of Things Circuit Protection is Key in Maintaining Growth for The Internet of Things INTRODUCTION The Internet of Things (IoT) promises a future that networks billions of smart, connected devices. The value of this

More information

Mobile-edge Computing

Mobile-edge Computing Mobile-edge Computing Major strides towards RAN virtualization Nurit Sprecher 1 02/09/2014 Nokia 2014 - Nurit Sprecher Agenda Market drivers and requirements 2020 network architecture vision Cloud RAN

More information

Management of Security Information and Events in Future Internet

Management of Security Information and Events in Future Internet Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?

More information

The Power of Technology to Transform the Future. Opportunities & Challenges for Next-Decade Services

The Power of Technology to Transform the Future. Opportunities & Challenges for Next-Decade Services The Power of Technology to Transform the Future Opportunities & Challenges for Next-Decade Services Outline Top 10 Services/TechnologyTrends Cyber Security What Is Next? 2 Services Of The Future 1. Doctors

More information

CIO 100 SYMPOSIUM: WORKPLACE OF THE FUTURE

CIO 100 SYMPOSIUM: WORKPLACE OF THE FUTURE CIO 100 SYMPOSIUM: WORKPLACE OF THE FUTURE Maria Pardee, VP and General Manager, Workplace and Service Management, CSC August 10, 2015 Copyright 2015 Computer Sciences Corporation. All Rights Reserved.

More information

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

2011 Cyber Security and the Advanced Persistent Threat A Holistic View 2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem

More information

Start New Conversations, Open New Doors

Start New Conversations, Open New Doors @ulander Start New Conversations, Open New Doors Grow Your Business with Cisco Peder Ulander Vice President, Cloud and Managed Services Partner Organization, Cisco August 9, 2015 The World Is Changing

More information

Mobile Enterprise and IPv6 Consumerization of IT

Mobile Enterprise and IPv6 Consumerization of IT Mobile Enterprise and IPv6 Consumerization of IT Yanick Pouffary Distinguished Technologist - Technology Services - Networking HP IPv6 Global Leader April 18, 2013 Copyright 2012 Hewlett-Packard Development

More information

Tutorial on Client-Server Architecture

Tutorial on Client-Server Architecture Tutorial on Client-Server Architecture SEEM3430 Information Systems Analysis and Design Pengfei Liu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong March

More information

Case Study Panasonic India s Selection of Cloud-Based Data Protection Speeds Data Recovery While Preventing Data Loss

Case Study Panasonic India s Selection of Cloud-Based Data Protection Speeds Data Recovery While Preventing Data Loss Case Study Panasonic India s Selection of Cloud-Based Data Protection Speeds Data Recovery While Preventing Data Loss Electronic consumer product manufacturer Endpoint Device Data Protection across multiple

More information

Leveraging SDN and NFV in the WAN

Leveraging SDN and NFV in the WAN Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined

More information

Cloud Computing/ Semantic Web Initiatives & Tutorial

Cloud Computing/ Semantic Web Initiatives & Tutorial Cloud Computing/ Semantic Web Initiatives & Tutorial Chuck Vollmer March 2011 The Cloud & Semantic Web 1990s 2010s Mainframe Computing Personal Computing Cloud Computing Cloud computing is as big a paradigm

More information

Internet of Things: Consumerisation of Technology. www.avasant.com

Internet of Things: Consumerisation of Technology. www.avasant.com : Consumerisation of Technology Technology democratization has weaved an ecosystem powered by intelligent systems, connectivity services, analytics, and technology infrastructure to deliver services. With

More information

The Internet of Things: Connected Home, Auto, and Life

The Internet of Things: Connected Home, Auto, and Life The Internet of Things: Connected Home, Auto, and Life An Author: Denise Garth, SMA Partner Published Date: November, 2014 SMA Summit A Connected Experience During the 2014 SMA Summit, and for a week and

More information

CityNext: Microsoft's Future City Market Proposition

CityNext: Microsoft's Future City Market Proposition CityNext: Microsoft's Future City Market Proposition Driving a "people-first" approach with the right technology Reference Code: IT007-000728 Publication Date: 30 Oct 2013 Author: Joe Dignan SUMMARY Catalyst

More information

A Strategic Approach to Meeting the Demand for Cloud

A Strategic Approach to Meeting the Demand for Cloud White Paper For Cloud Providers A Strategic Approach to Meeting the Demand for Cloud Introduction: New Customer Challenges Propel Cloud Adoption In a dynamic business environment, enterprise customers

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

MODAClouds. An FP7 Integrated Project

MODAClouds. An FP7 Integrated Project MODAClouds An FP7 Integrated Project MODAClouds the consortium FP7 Integrated Project (n. 318484) Duration: Oct. 1 st, 2012 Sept 30 th, 2015 28 July, 2014 e-infrastructure Services for Society 2 MODAClouds

More information

ICT Development Trends (2014): Embracing the Era of Mobile-ICT

ICT Development Trends (2014): Embracing the Era of Mobile-ICT ICT Development Trends (2014): Embracing the Era of Mobile-ICT ZTE COPORATION In our fast-growing global information society, technology has had a profound effect on every aspect of society and each individual's

More information

Interconnection in the Clouds

Interconnection in the Clouds Interconnection in the Clouds William Lehr & Steve Bauer MIT WIE2014 UCSD December 10-11, 2014 Outline Why Cloud Interconnection (and not just Internet Interconnection) What are research/policy questions

More information

Cloud Computing. P a n a g i o t i s F o u z a s I T S o l u t i o n s M a n a g e r

Cloud Computing. P a n a g i o t i s F o u z a s I T S o l u t i o n s M a n a g e r C l a s s i f i c a t i o n I S O 2 7 0 0 1 : P u b l i c Cloud Computing Prospects & Challenges P a n a g i o t i s F o u z a s I T S o l u t i o n s M a n a g e r 1 OUTLINE Cloud Definition and Classification

More information

Christian Dinten HP Software - Business Technology Optimization BTO Solution Consultant & Ambassador

Christian Dinten HP Software - Business Technology Optimization BTO Solution Consultant & Ambassador Christian Dinten HP Software - Business Technology Optimization BTO Solution Consultant & Ambassador 2 2009 2010 HP Confidential INTELLIGENT SERVICE MANAGEMENT A USE CASE - TODAY - Solution - Process automation

More information

A ZK Research Whitepaper. November 2014. e t. It s INTERNET OF THINGS

A ZK Research Whitepaper. November 2014. e t. It s INTERNET OF THINGS A ZK Research Whitepaper November 2014 It s inesses to em s u b r o bra f e ce tim t he INTERNET OF THINGS The Era of the Internet of Things Has Arrived The term perfect storm is used to describe a scenario

More information

Connect for new business opportunities

Connect for new business opportunities Connect for new business opportunities The world of connected objects How do we monitor the carbon footprint of a vehicle? How can we track and trace cargo on the move? How do we know when a vending machine

More information

The Internet of Things (IoT) is one of the most important technological trends of recent years.

The Internet of Things (IoT) is one of the most important technological trends of recent years. Brochure Overview The Internet of Things (IoT) is one of the most important technological trends of recent years. It is the network of billions of intelligent objects and scenarios derived from it in terms

More information

NATO s Journey to the Cloud Vision and Progress

NATO s Journey to the Cloud Vision and Progress NATO s Journey to the Cloud Vision and Progress Dr Peter J. Lenk 2 Definitions of the Cloud A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted,

More information

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation

IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing

More information

Cloud Computing. Key Considerations for Adoption. Abstract. Ramkumar Dargha

Cloud Computing. Key Considerations for Adoption. Abstract. Ramkumar Dargha Cloud Computing Key Considerations for Adoption Ramkumar Dargha Abstract Cloud Computing technology and services have been witnessing quite a lot of attention for the past couple of years now. We believe

More information

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009

Perspectives on Moving to the Cloud Paradigm and the Need for Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 Perspectives on Moving to the Cloud Paradigm and the Need for Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory 7-11-2009 2 NIST Cloud Computing Resources NIST Draft Definition of

More information

Fujitsu s Approach to Cloud Computing

Fujitsu s Approach to Cloud Computing Fujitsu s Approach to Cloud Computing Kenta Miyazawa Cloud computing (hereafter cloud or clouds) has come to be specifically used in various fields. Private clouds are used in enterprises. Groups and individuals

More information

and Deployment Roadmap for Satellite Ground Systems

and Deployment Roadmap for Satellite Ground Systems A Cloud-Based Reference Model and Deployment Roadmap for Satellite Ground Systems 2012 Ground System Architectures Workshop February 29, 2012 Dr. Craig A. Lee The Aerospace Corporation The Aerospace Corporation

More information

Internet of Things From Idea to Scale

Internet of Things From Idea to Scale PRG Symposium Internet of Things From Idea to Scale September 12, 2014 alex.blanter@atkearney.com @AlexBlanter You are here today because you are interested in the Internet of Things and so is everybody

More information

Cisco Cybersecurity Pocket Guide 2015

Cisco Cybersecurity Pocket Guide 2015 Cisco Cybersecurity Pocket Guide 2015 Why Security Security investment: A top priority Security: A critical boardroom topic Why Security? Security Investment: A Top Priority Figure 1 How Enterprises View

More information

ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments

ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Call 5 NCP briefing 12th May 2009 ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Peter Friess, Project officer, Head of Cluster Alain Jaume, Deputy Head of Unit D4 Cristina Martinez,

More information

Innovative Architectures For Cloud Data Centers

Innovative Architectures For Cloud Data Centers Innovative Architectures For Cloud Data Centers Cloud computing has ushered in a new era for data centers. Huawei offers efficient, flexible, and innovative cloud data centers and delivers extensive project

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

Cyber Security: Confronting the Threat

Cyber Security: Confronting the Threat 09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%

More information

Cloud Computing. by Civic Consulting (research conducted October 2011 January 2012)

Cloud Computing. by Civic Consulting (research conducted October 2011 January 2012) Cloud Computing by (research conducted October 2011 January 2012) for the European Parliament, DG Internal Policies of the Union, Directorate A (Economic and Scientific Policy); presentation for the EP

More information

雲 端 運 算 願 景 與 實 現 馬 維 英 博 士 微 軟 亞 洲 研 究 院 常 務 副 院 長

雲 端 運 算 願 景 與 實 現 馬 維 英 博 士 微 軟 亞 洲 研 究 院 常 務 副 院 長 雲 端 運 算 願 景 與 實 現 馬 維 英 博 士 微 軟 亞 洲 研 究 院 常 務 副 院 長 Important Aspects of the Cloud Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Information and Knowledge

More information

Urban Mobility India 2011 The IBM Smarter Cities Solutions: Opportunities for Intelligent Transportation

Urban Mobility India 2011 The IBM Smarter Cities Solutions: Opportunities for Intelligent Transportation Urban Mobility India 2011 The IBM Smarter Cities Solutions: Opportunities for Intelligent Transportation Himanshu Bhatt Global Program Director, Market Strategy IBM Software Group Innovative leaders are

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

THE USE OF STRONG AUTHENTICATION IN CONJUNCTION WITH IDAAS, IDENTITY AS A SERVICE FOR IDENTITY MANAGEMENT. Donald Malloy May 14 th, 2014

THE USE OF STRONG AUTHENTICATION IN CONJUNCTION WITH IDAAS, IDENTITY AS A SERVICE FOR IDENTITY MANAGEMENT. Donald Malloy May 14 th, 2014 THE USE OF STRONG AUTHENTICATION IN CONJUNCTION WITH IDAAS, IDENTITY AS A SERVICE FOR IDENTITY MANAGEMENT Donald Malloy May 14 th, 2014 Agenda What are some Technology trends? How do you define IDaaS?

More information

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and, Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already

More information

Head in the Clouds Feet On the Ground

Head in the Clouds Feet On the Ground Abhi Raina Director EPM Practice AST Corporation Head in the Clouds Feet On the Ground A Guide to Choosing Cloud Options 1 Topics Cloud Computing Options within the Cloud Oracle Cloud Q&A 2 Specialized.

More information

The Internet of Things... Hype or not?

The Internet of Things... Hype or not? The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune

More information

CONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5

CONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5 #924, 5 A The catchy phrase Internet of Things (IoT) or the Web of Things has become inevitable to the modern world. Today wireless technology has reached its zenith making it possible to interact with

More information

Horizontal IoT Application Development using Semantic Web Technologies

Horizontal IoT Application Development using Semantic Web Technologies Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges

More information

Hybrid Cloud Computing

Hybrid Cloud Computing Dr. Marcel Schlatter, IBM Distinguished Engineer, Delivery Technology & Engineering, GTS 10 November 2010 Hybrid Computing Why is it becoming popular, Patterns, Trends, Impact Hybrid Definition and Scope

More information

Critical Infrastructure in a CyberPhysicalHuman World

Critical Infrastructure in a CyberPhysicalHuman World Critical Infrastructure in a CyberPhysicalHuman World December 2015 Approved for Public Release; Distribution Unlimited. 15-3575 2015 The MITRE Corporation. All rights reserved. Chris Folk, MBA, Director,

More information

Cloud Computing and the Future of Internet Services. Wei-Ying Ma Principal Researcher, Research Area Manager Microsoft Research Asia

Cloud Computing and the Future of Internet Services. Wei-Ying Ma Principal Researcher, Research Area Manager Microsoft Research Asia Cloud Computing and the Future of Internet Services Wei-Ying Ma Principal Researcher, Research Area Manager Microsoft Research Asia Computing as Utility Grid Computing Web Services in the Cloud What is

More information