Enabling the New Era of

Size: px
Start display at page:

Download "Enabling the New Era of"

Transcription

1 Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management Yushi Shen Yale Li Ling Wu EMC2 Corporation, USA Shaofeng Liu Qian Wen Endronic Corp, USA A volume in the Advances in Systems Analysis, Software Engineering, and High Performance Computing (ASASEHPC) Book Series Information Science REFERENCE An Imprint of IGI Global

2 Table of Contents Foreword by HowardA. Schmidt xi Foreword by Aloysius Cheang xiii Preface xv Acknowledgment xxii Section 1 Cloud Computing Overview Chapter 1 Cloud Computing Overview 1 The History of Cloud Computing 1 Cloud Computing Models 3 The Wave of Cloud Transformation in the Global Information Industry 7 Exploring the Cloud Era Market Demand 18 Conclusion 24 Chapter 2 Main Components of Cloud Computing 25 Cloud Era Information Hub 25 Cloud Era Communication Networks 30 Intelligent Terminals ofthe Cloud Era 36 Cloud Computing and the Internet of Things 41 Conclusions and Looking to the Future 49

3 Chapter 3 Cloud Infrastructure: Virtualization 51 Virtualization Overview 51 Virtualization Processes 52 Server Virtualization 53 Storage Virtualization 61 Network Virtualization 66 Desktop Virtualization 72 Section 2 Data Management and Data Security Chapter 4 Trusted Cloud Initiative Reference Architecture 78 Overview of the Reference Architecture 78 How to Use the TCI Reference Architecture 79 Security and Risk Management: Protecting Data and Managing Risk 80 Relationships to Other Domains 83 Business Operation Support Services: Partners with the Business 85 Technology Solution Domains 88 Chapter 5 Security Information and Event Management Implementation Guidance 94 Overview 95 Requirements 96 Architectural Implementation 102 Technical Implementation 106

4 Chapter 6 Enterprise Security Monitoring with the Fusion Center Model 116 Yale Li, Emerging Threats: Advanced Attacks 116 Problems in Defense: Inadequate Actionable Information and Organizational Silos 117 Countermeasure Solutions: Cross-Boundary Enterprise Monitoring 120 Monitoring Information Sharing 123 Vision: Global Correlation and Intelligence 125 Conclusion 130 Chapter 7 Data Protection in the Cloud Era Understanding the Problem 134 The Vision: Where We Want to Be 140 The Strategy: How We Get There 141 Next Steps: Considerations for Reference Architecture 153 Section 3 Data Storage and Big Data Chapter 8 Big Data Overview Big Data Definition 157 Big Data Characteristics 158 Big Data Value 159 Big Data Structure 161 Big Data Analytics 165 The Big Data Ecosystem 171

5 Chapter 9 Big Data Techniques, Tools, and Applications Big Data Technologies 186 Big Data Applications 198 Big Data Services Section 4 Networking in the Cloud Era Chapter 10 Cloud Computing Networks: Utilizing the Content Delivery Network 214 YudongLiu, Western Washington University, USA Cloud Computing Overview 214 Opportunities and Challenges of Cloud Computing 215 Akamai CDN Technology 218 CDN Evaluation in the Microsoft Cloud 219 Future Improvements for the Cloud CDN 223 Conclusion 224 Chapter 11 Data Transfer and Storage in Cloud Computing 226 Ling Wu, EMC- Corporation, USA 226 Related Works 229

6 Chapter 12 Parallel Data Transfer Protocol 238 Forward Error Correction Parallel Data Transfer Challenges 241 CSTP: Cross-Stream Transfer Protocol CSTP Implementation 247 Scale CSTP to Large Number of Streams 250 Conclusion Chapter 13 Border Adaptive Micro-Base-Station for Wireless Communications 256 Henry Gao, Glocom Inc.. USA Ultimate Goal of Wireless Telecom: To Provide Homogenous Service Level Comparable 256 to the Wired Network 258 Understanding of the Shannon Theory from a New Angle 259 Enhancing the Micro-Base-Station Principle to the Extreme 261 Centralized Time Division Multiple Access (CTDMA) 262 Part-Time Wireless Network Operators 265 Uninterrupted Wireless Communication Services During Catastrophes 265 Conclusion 266 Section 5 Appendix Chapter 14 Impact of Cultural Differences on the Cloud Computing Ecosystems in the USA and China 269 Jie Yang, Tayfun Keskin, University of Washington, USA 270 Cloud Computing 270 Cultural Influences on Information Technology (IT) 272 Cultural Differences Between The U.S. and China and their Impact on Cloud Computing 273 Methodology 276 Results Supporting Questions Around Culture Dimensions 280 Analysis 282 Conclusion

7 Chapter 15 Cloud Strategy Leads Innovation in China A New Generation of E-Government Platform 285 Micro-Entrepreneurship and Civilian Innovation 287 Conclusion and Outlook 288 Compilation of References 290 About the Contributors 307 Index 310

Network Security. Windows 2012 Server. Securing Your Windows. Infrastructure. Network Systems and. Derrick Rountree. Richard Hicks, Technical Editor

Network Security. Windows 2012 Server. Securing Your Windows. Infrastructure. Network Systems and. Derrick Rountree. Richard Hicks, Technical Editor Windows 2012 Server Network Security Securing Your Windows Network Systems and Infrastructure Derrick Rountree Richard Hicks, Technical Editor AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN

More information

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso Cyber Attacks Protecting National Infrastructure Student Edition Edward G. Amoroso ELSEVIER. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann

More information

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap AAMVA Region I Conference E-ID, DLDV, and Privacy Conducting Business Securely

More information

Managing Data in Motion

Managing Data in Motion Managing Data in Motion Data Integration Best Practice Techniques and Technologies April Reeve ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY

More information

Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO

Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO Federal Cloud Computing The Definitive Guide for Cloud Service Providers Matthew Metheny ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO

More information

Virtualization and Forensics

Virtualization and Forensics Virtualization and Forensics A Digital Forensic Investigator's Guide to Virtual Environments Diane Barrett Gregory Kipper Technical Editor Samuel Liles ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK

More information

M.Tech. Software Systems

M.Tech. Software Systems M.Tech. Software Systems Input Requirements Employed professionals holding an Integrated First Degree of BITS or its equivalent in relevant disciplines, with minimum one year work experience in relevant

More information

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments Contents Foreword Preface Acknowledgments 1 Introduction 1 1.1 Motivation for Network Convergence 1 1.2 The Core Network 2 1.3 Legacy Service Requirements 4 1.4 New Service Requirements 5 1.5 Architectures

More information

Strategic Management of Information Systems

Strategic Management of Information Systems A ^OL 2^? OK y l 'TH EDITION Strategic Management of Information Systems International Student Version KERI E. PEARLSON KP Partners CAROL S. SAUNDERS University of Central Florida Dr. Theo and Friedl Schoeller

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

NASA Information Technology Requirement

NASA Information Technology Requirement NASA Information Technology Requirement NITR-2800-2 Effective Date: September 18,2009 Expiration Date: September 18, 2013 Email Services and Email Forwarding Responsible Office: OCIO/ Chief Information

More information

Build Your Competitive Edge in Big Data with Cisco. Rick Speyer Senior Global Marketing Manager Big Data Cisco Systems 6/25/2015

Build Your Competitive Edge in Big Data with Cisco. Rick Speyer Senior Global Marketing Manager Big Data Cisco Systems 6/25/2015 Build Your Competitive Edge in Big Data with Cisco Rick Speyer Senior Global Marketing Manager Big Data Cisco Systems 6/25/2015 Big Data Trends Increasingly Everything will be Connected to Everything Massive

More information

WJEC GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

WJEC GCSE in Computer Science Computer Science Microsoft IT Academy Mapping WJEC GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 1. Computer Systems 1.1 Identify and describe computer systems Windows Server Administration Fundamentals: Lesson 1 Server Overview

More information

Agile Cyber Security Security for the Real World, Architectural Approach

Agile Cyber Security Security for the Real World, Architectural Approach Agile Cyber Security Security for the Real World, Architectural Approach Osama Al-Zoubi Senior Manger, Systems Engineering Fahad Aljutaily Senior Solution Architect, Security Market Trends Welcome to the

More information

IBM Next Generation Analytics Platform, fattore abilitante strategico per la trasformazione del business

IBM Next Generation Analytics Platform, fattore abilitante strategico per la trasformazione del business IBM Next Generation Analytics Platform, fattore abilitante strategico per la trasformazione del business Bruno Marcantonio Information Management Leader Software Group IBM Italia November 7, 2013 2013

More information

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry AKAMAI WHITE PAPER The Challenges of Connecting Globally in the Pharmaceutical Industry The Challenges of Connecting Globally in the Pharmaceutical Industry TABLE OF CONTENTS EXECUTIVE SUMMARY 1 GLOBAL

More information

Become a hunter: fi nding the true value of SIEM.

Become a hunter: fi nding the true value of SIEM. Become a hunter: fi nding the true value of SIEM. When Security Information and Event Management (SIEM) hit the security scene, it was heralded as a breakthrough in threat detection. However, SIEM is just

More information

Master Data Management and Data Governance Second Edition

Master Data Management and Data Governance Second Edition Master Data Management and Data Governance Second Edition Alex Berson Larry Dubov Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore

More information

How does Big Data disrupt the technology ecosystem of the public cloud?

How does Big Data disrupt the technology ecosystem of the public cloud? How does Big Data disrupt the technology ecosystem of the public cloud? Copyright 2012 IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda Market trends 2020 Vision Introduce

More information

ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York

ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ ^ Boca Raton London New York ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an

More information

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Internet Video Streaming and Cloud-based Multimedia Applications. Outline Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video

More information

HIMSS Survey Uncovers Critical Weaknesses In Hospital Web Security

HIMSS Survey Uncovers Critical Weaknesses In Hospital Web Security HIMSS Survey Uncovers Critical Weaknesses In Hospital Web Security HIMSS Survey Uncovers Critical Weaknesses in Hospital Web Security 2 HIMSS Analytics, in partnership with Akamai, recently conducted a

More information

Emerging Geospatial Trends The Convergence of Technologies. Jim Steiner Vice President, Product Management

Emerging Geospatial Trends The Convergence of Technologies. Jim Steiner Vice President, Product Management Emerging Geospatial Trends The Convergence of Technologies Jim Steiner Vice President, Product Management United Nation Analysis Initiative on Global GeoSpatial Information Management Future Trends Technology

More information

Data Warehousing in the Age of Big Data

Data Warehousing in the Age of Big Data Data Warehousing in the Age of Big Data Krish Krishnan AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD * PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of Elsevier

More information

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Future Threat Landscape - How will technology evolve and what does it mean for cyber security? James Hanlon CISSP, CISM Security Strategist Office of the CTO EMEA Future Threat Landscape - How will technology evolve and what does it mean for cyber security? Think > What does the future of technology

More information

Customer Relationship Management

Customer Relationship Management Customer Relationship Management Concepts and Technologies Second edition Francis Buttle xlloillvlcjx. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY

More information

Fostering Incident Response and Digital Forensics Research

Fostering Incident Response and Digital Forensics Research Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1 Introduction Acknowledgments Support & Feedback Preparing for the Exam xv xvi xvii xviii Chapter 1 Plan and deploy a server infrastructure 1 Objective 1.1: Design an automated server installation strategy...1

More information

Internet of Things. Key Enabler for the Digital Economy. Luis Jaraquemada VP Technology Huawei Chile 2015-11-16

Internet of Things. Key Enabler for the Digital Economy. Luis Jaraquemada VP Technology Huawei Chile 2015-11-16 Internet of Things Key Enabler for the Digital Economy Luis Jaraquemada VP Technology Huawei Chile 2015-11-16 IoT Trend In the next five years, IoT Markets will enter into the fast lane Network undergoing

More information

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture

More information

Making the Internet Business-Ready

Making the Internet Business-Ready Making the Internet Business-Ready If you ve ever shopped online, downloaded music, watched a web video or connected to work remotely, you ve probably used Akamai. Our solutions help to deliver the best

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services Network Evolution, Cloud & Future Services Opportunities & Challenges for Next-Decade Services Outline Trends: Data, Services & Networks Cloud What is Next? 2 Law of Telecom Complexity Telecom complexity,

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

The Next Wave of. Technologies. Opportunitiesfrom Chaos PHIL SIMON WILEY. John Wiley & Sons, Inc.

The Next Wave of. Technologies. Opportunitiesfrom Chaos PHIL SIMON WILEY. John Wiley & Sons, Inc. The Next Wave of Technologies Opportunitiesfrom Chaos PHIL SIMON WILEY John Wiley & Sons, Inc. Contents Foreword Preface Acknowledgments About the Contributors xi xv xxii xxiii PART I INTRODUCTION, BACKGROUND,

More information

Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream

Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream Zhong Wei 1, a, Wang Jianming 2, b and Zhang Yang 3, c 1 Beijing University of Posts and Telecommunications,

More information

Contents. BBS Software as a Service (SaaS),7. EH introducing aoudco.pu.ing 1. Distinguishing Cloud Types 4. Exploring

Contents. BBS Software as a Service (SaaS),7. EH introducing aoudco.pu.ing 1. Distinguishing Cloud Types 4. Exploring Contents Preface xvii EH introducing aoudco.pu.ing 1 Web 2.0 and the Cloud 3 Distinguishing Cloud Types 4 Cloud Deployment Models 5 Cloud Service Models 6 Exploring Uses of the Cloud 9 Introducing Scalability

More information

Mobile Multimedia Meet Cloud: Challenges and Future Directions

Mobile Multimedia Meet Cloud: Challenges and Future Directions Mobile Multimedia Meet Cloud: Challenges and Future Directions Chang Wen Chen State University of New York at Buffalo 1 Outline Mobile multimedia: Convergence and rapid growth Coming of a new era: Cloud

More information

SQL Server Integration Services Design Patterns

SQL Server Integration Services Design Patterns SQL Server Integration Services Design Patterns Second Edition Andy Leonard Tim Mitchell Matt Masson Jessica Moss Michelle Ufford Apress* Contents J First-Edition Foreword About the Authors About the Technical

More information

Contents. Preface Acknowledgements. Chapter 1 Introduction 1.1

Contents. Preface Acknowledgements. Chapter 1 Introduction 1.1 Preface xi Acknowledgements xv Chapter 1 Introduction 1.1 1.1 Cloud Computing at a Glance 1.1 1.1.1 The Vision of Cloud Computing 1.2 1.1.2 Defining a Cloud 1.4 1.1.3 A Closer Look 1.6 1.1.4 Cloud Computing

More information

USING EXCHANGE HOSTED ENCRYPTION

USING EXCHANGE HOSTED ENCRYPTION MICROSOFT CUSTOMERS USING EXCHANGE HOSTED ENCRYPTION Microsoft Customers using Exchange Hosted - Sales Intelligence Sales Intellect Company is providing Customer Sales Intelligence about that consists

More information

Carrier Cloud Services 2014-2019

Carrier Cloud Services 2014-2019 Brochure More information from http://www.researchandmarkets.com/reports/2905638/ Carrier Cloud Services 2014-2019 Description: The Cloud has moved beyond simply computing to encompass communications,

More information

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use Enhancing Safeguards Through Information Analysis: Business Analytics Tools IAEA, Vienna, 09/10/2014 Julian Midwinter - Business Unit Executive i2, Threat and Counter Fraud General Use 2014 IBM Corporation

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Java and the Internet of Things

Java and the Internet of Things Java and the Internet of Things Henrik Stahl Vice President Java Product Management 1 9 Million+ Java developers worldwide #1 Choice for developers #1 Development platform 5 of Top 5 OEMs ship Java ME

More information

ASSESSMENT PLAN: M.S. in Computer Science

ASSESSMENT PLAN: M.S. in Computer Science Department of Mathematics, CSCI ASSESSMENT PLAN: M.S. in Computer Science Updated Date: Winter 2015 by Matt Johnson PROGRAM MISSION CSUEB Missions, Commitments, and ILOs, 2012 CSUEB Computer Science Program

More information

The Cyber Security Leap: From Laggard to Leader. April 2015

The Cyber Security Leap: From Laggard to Leader. April 2015 The Cyber Security Leap: From Laggard to Leader April 2015 How do some organizations achieve better security performance? We compared organizations that were able to leapfrog their security effectiveness

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 , pp. 331-342 http://dx.doi.org/10.14257/ijfgcn.2015.8.2.27 Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 Changming Li, Jie Shen and

More information

Scope of Work Microsoft Infrastructure Upgrade

Scope of Work Microsoft Infrastructure Upgrade Introduction Scope of Work Microsoft Infrastructure Upgrade The University of Texas M. D. Anderson Cancer Center (M. D. Anderson) in Houston, Texas, celebrating six decades of Making Cancer History, is

More information

雲 端 運 算 願 景 與 實 現 馬 維 英 博 士 微 軟 亞 洲 研 究 院 常 務 副 院 長

雲 端 運 算 願 景 與 實 現 馬 維 英 博 士 微 軟 亞 洲 研 究 院 常 務 副 院 長 雲 端 運 算 願 景 與 實 現 馬 維 英 博 士 微 軟 亞 洲 研 究 院 常 務 副 院 長 Important Aspects of the Cloud Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Information and Knowledge

More information

Integrated Ecosystems

Integrated Ecosystems Integrated Ecosystems Toronto s Complete Business Performance System Business Case In association with: The Information and Communications Technology Council (ICTC) is a centre of expertise in ICT business

More information

Cloud Application Marketplace 2015-2020

Cloud Application Marketplace 2015-2020 Brochure More information from http://www.researchandmarkets.com/reports/3292821/ Cloud Application Marketplace 2015-2020 Description: Cloud is moving beyond computing and storage and into an entirely

More information

The Technology System Framework of the Internet of Things and its Application Research in Agriculture

The Technology System Framework of the Internet of Things and its Application Research in Agriculture The Technology System Framework of the Internet of Things and its Application Research in Agriculture Hong ZHOU 1, BingWu LIU, PingPing DONG School of Information Science & Technology, Beijing Wuzi University,Beijing,

More information

The Network Alone Can t Protect Your Data

The Network Alone Can t Protect Your Data The Network Alone Can t Protect Your Data SESSION ID: STU-T07B Elliot Lewis Chief Security Architect Dell / Dell Software Group @elliotdlewis Chad Skipper Senior Principal Engineer Dell / End User Computing

More information

Transition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution

Transition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution Solution Overview Transition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution Microsoft support for all versions of Windows Server 2003 and Windows Server 2003 R2 ends on

More information

Available online at www.sciencedirect.com Available online at www.sciencedirect.com. Advanced in Control Engineering and Information Science

Available online at www.sciencedirect.com Available online at www.sciencedirect.com. Advanced in Control Engineering and Information Science Available online at www.sciencedirect.com Available online at www.sciencedirect.com Procedia Procedia Engineering Engineering 00 (2011) 15 (2011) 000 000 1822 1826 Procedia Engineering www.elsevier.com/locate/procedia

More information

Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools

Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools Jack Greenfield Keith Short WILEY Wiley Publishing, Inc. Preface Acknowledgments Foreword Parti Introduction to

More information

State of the States: IT Trends, Priorities and Issues

State of the States: IT Trends, Priorities and Issues State of the States: IT Trends, Priorities and Issues OSC Financial Conference 2012 Doug Robinson, Executive Director National Association of State Chief Information Officers Fiscal recovery: budgets are

More information

JAVA 2 Network Security

JAVA 2 Network Security JAVA 2 Network Security M A R C O PISTOIA DUANE F. RELLER DEEPAK GUPTA MILIND NAGNUR ASHOK K. RAMANI PTR, UPPER http://www.phptr.com PRENTICE HALL SADDLE RIVER, NEW JERSEY 07458 Contents Foreword Preface

More information

Preface. Table of Contents. List of Figures. List of Tables. List of Abbreviations. 1 Introduction 1. 2 Problem 23.

Preface. Table of Contents. List of Figures. List of Tables. List of Abbreviations. 1 Introduction 1. 2 Problem 23. XI Outline Foreword Preface Outline Table of Contents List of Figures List of Tables List of Abbreviations VII IX XI XIII XXI XXIII XXV 1 Introduction 1 2 Problem 23 3 Related Work 35 4 Development of

More information

White Paper. Carrier Cloud. Carrier-centric, Carrier-grade and Founded on IT and Network Innovation. NEC Corporation http://www.nec.

White Paper. Carrier Cloud. Carrier-centric, Carrier-grade and Founded on IT and Network Innovation. NEC Corporation http://www.nec. White Paper Carrier Cloud Carrier-centric, Carrier-grade and Founded on IT and Network Innovation NEC Corporation http://www.nec.com/ Carrier Cloud Table of Contents 1. Acquiring New Value Chains with

More information

... Foreword... 17. ... Preface... 19

... Foreword... 17. ... Preface... 19 ... Foreword... 17... Preface... 19 PART I... SAP's Enterprise Information Management Strategy and Portfolio... 25 1... Introducing Enterprise Information Management... 27 1.1... Defining Enterprise Information

More information

Telecom Master Data For Multi-Channel Business Model

Telecom Master Data For Multi-Channel Business Model 2081 Business Center Dr. Irvine, CA 92612 800.215.4671 www.zendeux.com Telecom Master Data For Multi-Channel Business Model A Zendeux Business Data Solutions White Paper Majd Izadian Managing Partner Contents

More information

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time)

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Module: Computer Literacy Knowing how to use a computer has become a necessity for many people.

More information

Computer Security Literacy

Computer Security Literacy Computer Security Literacy Staying Safe in a Digital World Douglas Jacobson and Joseph Idziorek CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis

More information

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group Cloud Computing Data-Intensive Computing and Scheduling Frederic Magoules, Jie Pan, and Fei Teng SILKQH CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor

More information

CONTENT DELIVERY NETWORKS

CONTENT DELIVERY NETWORKS T H E NEXT G E N E R A T I O N O F CONTENT DELIVERY NETWORKS For The Next Generation of Business to Go Forward, The Next Generation of CDN Must Go Faster THE FUTURE OF CDN 55% of global Internet traffic

More information

The Emergence of Security Business Intelligence: Risk

The Emergence of Security Business Intelligence: Risk The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are

More information

Cloud Application Marketplace 2013-2018

Cloud Application Marketplace 2013-2018 Brochure More information from http://www.researchandmarkets.com/reports/2720876/ Cloud Application Marketplace 2013-2018 Description: There are thousands of cloud applications in the market that are offered

More information

The Cloud at Your Service

The Cloud at Your Service The Cloud at Your Service The when, how, and why of enterprise cloud computing JOTHY ROSENBERG ARTHUR MATEOS II MANNING Greenwich (74 w. long.) contents foreword xiii preface xv acknowledgments xvii about

More information

ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments

ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Call 5 NCP briefing 12th May 2009 ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Peter Friess, Project officer, Head of Cluster Alain Jaume, Deputy Head of Unit D4 Cristina Martinez,

More information

Code of Practice for Cyber Security in the Built Environment

Code of Practice for Cyber Security in the Built Environment Brochure More information from http://www.researchandmarkets.com/reports/3085299/ Code of Practice for Cyber Security in the Built Environment Description: This code of practice explains why and how cyber

More information

Leading The World Into Connected Security. Paolo Florian Sales Engineer

Leading The World Into Connected Security. Paolo Florian Sales Engineer Leading The World Into Connected Security Paolo Florian Sales Engineer History of Defining Largest Dedicated Delivering a Next Generation Architecture Security Provider Security Architecture Inventor of

More information

Cloud Computing Service and Deployment Models:

Cloud Computing Service and Deployment Models: Cloud Computing Service and Deployment Models: Layers and Management Alberto M. Bento University of Baltimore, USA Anil K. Aggarwal University of Baltimore, USA Detailed Table of Contents Foreword Xlll

More information

1. Introduction to ehealth:

1. Introduction to ehealth: 1. Introduction to ehealth: E-Health is one of the fastest growing areas within the health sector. The scope of e- Health involves application of the knowledge, skills and tools, which enable information

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Federal GIS Conference 2014. February 10 11, 2014 Washington DC

Federal GIS Conference 2014. February 10 11, 2014 Washington DC Federal GIS Conference 2014 February 10 11, 2014 Washington DC Integrating with your Enterprise Systems: Part 2- CRM and SharePoint Marcella Cavallaro Evan Caldwell Kevin Sigwart Imran Bashir, InfoReliance:

More information

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann

More information

Networking. Cloud and Virtual. Data Storage. Greg Schulz. Your journey. effective information services. to efficient and.

Networking. Cloud and Virtual. Data Storage. Greg Schulz. Your journey. effective information services. to efficient and. Cloud and Virtual Data Storage Networking Your journey to efficient and effective information services Greg Schulz CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of

More information

Enterprise Performance Management Done Right. An Operating System for Your Organization. Wiley CIO

Enterprise Performance Management Done Right. An Operating System for Your Organization. Wiley CIO Brochure More information from http://www.researchandmarkets.com/reports/2329628/ Enterprise Performance Management Done Right. An Operating System for Your Organization. Wiley CIO Description: A workable

More information

SharePoint 2010. Overview, Governance, and Planning. (^Rll^^fc^ i ip?"^biifiis:'iissiipi. Scott Jamison. Susan Hanley Mauro Cardarelli.

SharePoint 2010. Overview, Governance, and Planning. (^Rll^^fc^ i ip?^biifiis:'iissiipi. Scott Jamison. Susan Hanley Mauro Cardarelli. Ec,V$%fMM SharePoint 2010 i ip?"^biifiis:'iissiipi Overview, Governance, (^Rll^^fc^ and Planning Ipft^'" Scott Jamison Susan Hanley Mauro Cardarelli Upper Saddle River, NJ Boston Indianapolis San Francisco

More information

Cyber intelligence in an online world

Cyber intelligence in an online world Cyber intelligence in an online world James Hanlon CISM, CISSP, CMI Cyber Strategy & GTM, EMEA Cyber intelligence in an online world SYMANTEC VISION SYMPOSIUM 2014 2 Software and data powers the world

More information

Datenverwaltung im Wandel - Building an Enterprise Data Hub with

Datenverwaltung im Wandel - Building an Enterprise Data Hub with Datenverwaltung im Wandel - Building an Enterprise Data Hub with Cloudera Bernard Doering Regional Director, Central EMEA, Cloudera Cloudera Your Hadoop Experts Founded 2008, by former employees of Employees

More information

11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3

11741 E-Business Credit Hours: 3 11752 Integrated Application Systems Credit Hours: 3 11742 Enterprise Systems Architecture Credit Hours: 3 11741 E-Business E-Business is radically changing the ways in which business organizations operate and compete in the global market. This course introduces students to various aspects and models for e-business.

More information

Fundamentals of a Windows Server Infrastructure MOC 10967

Fundamentals of a Windows Server Infrastructure MOC 10967 Fundamentals of a Windows Server Infrastructure MOC 10967 Course Outline Module 1: Installing and Configuring Windows Server 2012 This module explains how the Windows Server 2012 editions, installation

More information

The Path to Behavioral Marketing

The Path to Behavioral Marketing The Path to Behavioral Marketing Taming the Complexity of Digital Marketing Tyler Altrup Strategy Solutions Consultant 23 September 2015 Copyright 2015, Oracle and/or its affiliates. All rights reserved.

More information

Frame of IoT in China

Frame of IoT in China Frame of IoT in China EuropElectro Summary Orgalime - The European Engineering Industries Association, Brussels Orgalime - 欧 洲 工 程 行 业 协 会, 布 鲁 塞 尔 ZVEI - German Electrical and Electronic Manufacturers

More information

Transforming industries: energy and utilities. How the Internet of Things will transform the utilities industry

Transforming industries: energy and utilities. How the Internet of Things will transform the utilities industry Transforming industries: energy and utilities How the Internet of Things will transform the utilities industry GETTING TO KNOW UTILITIES Utility companies are responsible for managing the infrastructure

More information

Convergence of Mobility, Analytics, Social and Cloud to Drive Innovation

Convergence of Mobility, Analytics, Social and Cloud to Drive Innovation August 2013 Convergence of Mobility, Analytics, Social and Cloud to Drive Innovation Kerrie Holley, IBM Fellow, Research Four primary forms of innovation takes place within the enterprise 2 Hal Varian,

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

Global Cyber Security Industry Report 2015

Global Cyber Security Industry Report 2015 Global Cyber Security Industry Report 2015 Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com Global Cyber Security Industry Report 2015 Date: September 1, 2015 Pages: 158 Price:

More information

Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management Metrics and Methods for Security Risk Management Carl S. Young ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Syngress is an imprint of

More information