Biometrics Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group
|
|
- Bryce Blair
- 8 years ago
- Views:
Transcription
1 2020 Workshop The evolution of largescale biometric architecture Facilitators Mark Crego, Accenture Mike Matyas, Mount Airey Group
2 Approach and Agenda Workshop Goal: An open discussion on the future of largescale biometric architecture Agenda Brief Context Setting Where we ve come from The danger of bad vision Needs View 2020 Vision Roundtable Discussion Client of the future Network Service Oriented Architecture Data Matching Intelligence 2
3 Fingerprint Matching Circa
4 FBI Identification Division Operations 4
5 A view from five years ago Future Business and Volume Demands Drive Future Architecture 2,000 1,500 1, Transactions per day (K) ,300 2,000 People in DB (M) Facts (so we thought ) Transactions per day will grow to 2 million by 2009 People stored will grow to 450 million by 2009 Number of additional s will triple by 2007 Implications Need to increase transaction throughput by over 10 times Need to Increase data storage capacity by 40 times Need to improve ability to support new s 5
6 A NeedsBased View Needs in 2020 and beyond Expanded Modalities (finger, face, iris, palm, DNA ) Realtime all the time Available everywhere Access to all the data Criminal Justice data Immigration Civilian Department of Defense Privacy and Security Architecture Requirements Modular, Service Oriented Architecture Extreme scalability Ubiquitous Access Interoperability via Shared Services Privacy and Security 6
7 2020 Vision: Realtime Identification Anytime, Anywhere Whoever needs the data gets it securely, privately. Standardsbased services Identification Matching Enrollment Notification Support any modality Identity emerges from the data Zero: Downtime Failures to enroll False accepts False rejects 7
8 2020 Vision Reference Architecture Internet Enterprise Service Bus (Secure, Standardsbased) Universal Translator) Workflow & Transaction Management Intelligence Local Service Bus (standardsbased abstraction) Modular Matching Tier 8
9 2020 Vision Discussion Topic The Client of the Future Enterprise Service Bus (Secure, Standardsbased) Universal Translator) Workflow & Transaction Management Internet Intelligence Local databases Antispoofing Provisioning Security Authentication Authorization Sensors Modularity Local Service Bus (standardsbased abstraction) Modular Matching Tier 9
10 2020 Vision Discussion Topic The Network Enterprise Service Bus (Secure, Standardsbased) Universal Translator) Workflow & Transaction Management Local Service Bus (standardsbased abstraction) Modular Matching Tier Internet Intelligence Internet or private network? Security Model Ubiquitous access Satcom Bandwidth PKI Local or Central caching of data Grid/offgrid 10
11 2020 Vision Discussion Topic Service Oriented Architecture Enterprise Service Bus Workflow Middleware v buildyourown Local Service Bus Enterprise Service Bus (Secure, Standardsbased) Universal Translator) Workflow & Transaction Management Internet Intelligence Local Service Bus (standardsbased abstraction) Modular Matching Tier 11
12 2020 Vision Discussion Topic Data Emergence Enterprise Service Bus (Secure, Standardsbased) Universal Translator) Workflow & Transaction Management Local Service Bus (standardsbased abstraction) Modular Matching Tier Internet Intelligence Identity Management versus Identity Emergence Semantic Representations (e.g. Semantic Web) Shared data or shared data services Physical challenges of largescale data Data access controls Where security and privacy come home to roost. 12
13 2020 Vision Discussion Topic LargeScale Matching Enterprise Service Bus (Secure, Standardsbased) Universal Translator) Workflow & Transaction Management Local Service Bus (standardsbased abstraction) Modular Matching Tier Internet Intelligence Cloud Computing Multibiometric Biometric Middleware MapReduce ScatterGather Biometric Indexing (!) Moore s Law Proprietary algorithms versus? Zero FTE Zero Errors Grid Computing Supercomputing models GPUbased matching 13
14 Designing for Capacity Not you average problem Average Capacity 2 x Average Capacity 3.5 x Average Capacity Entry Transactions processed per min in a typical IDENT day Entry Transactions processed per min in a typical IDENT day Entry Transactions processed per min in a typical IDENT day Queuing Delays Additional Time to process each transaction Queuing Delays Additional Time to process each transaction Queuing Delays Additional Time to process each transaction Designing for Average Capacity (Figures on left) illustrate without sufficient capacity, variables in volumes of day will cause significant queuing At 10:30 in the morning, when entry transactions exceed designed capacity, queuing builds up to as much as 8 hours and 42 minutes of delay. Queues are never cleared, and any workload carryover from the previous day adds to queuing problems of the next day Designing for 2 x Average Capacity (Middle Figures) will result in a 1 hour wait at Primary In the early afternoon, when number of entry transactions exceeds designed capacity per minute, queuing begins, and delays range from 752 mins. Although entry transaction volume drops beneath designed capacity at 5:30pm, delay impacts continue until 8:30pm due to accumulated queues Designing for 3.5 x Average Capacity (Figures on right) will result in acceptable wait times (seconds) at Primary 14
15 2020 Vision Discussion Topic Intelligence Enterprise Service Bus (Secure, Standardsbased) Universal Translator) Workflow & Transaction Management Local Service Bus (standardsbased abstraction) Modular Matching Tier Internet Intelligence Mission Perspective Comprehensive view of a person Linking of data to underlying facts Analytics Operational Perspective Performance data Biometric Accuracy monitoring Quality Assurance Capacity Management SLA management Concerns Data Mining Privacy Security 15
16 Contact Information Mark Crego Chief Architect, Accenture support of USVISIT (703) Michael Matyas Biometric Architect, Mount Airey Group (703)
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD. Cloud Management of Multi-Modal Biometrics
IDENTITY-AS-A-SERVICE IN A MOBILE WORLD Cloud Management of Multi-Modal Biometrics ImageWare Systems, Inc. Headquarters in San Diego, CA Offices worldwide (US, Canada, Germany, Mexico) Over 15 years of
More informationReaching Customers Across Multiple Channels
Leading Provider of Cloud-Based Customer Experience Solutions Relies on Integrated, Modular WSO2 Middleware to Speed the Delivery of Services that Enhance User Engagement Businesses recognize that brand
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationOracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
More informationNFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
More informationBiometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
More informationThe Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
More informationBiometric Enterprise Architecture
Prepared by: Team Biometric Enterprise Architecture (Team BM-EA) In partial fulfillment Of Requirements for SYS/OR 798 Fall 2009 Date: Revision History Date Purpose Revision Level Responsible Person October
More informationMultimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research
More informationImageWare Systems, Inc.
ImageWare Systems, Inc. Delivering next-generation biometrics as an interactive and scalable cloud-based service SUMMARY Catalyst ImageWare Systems, Inc. (IWS) is a developer of leading-edge, identity-based,
More informationThe Virginia Corrections Information System (VirginiaCORIS)
NASCIO The Virginia Corrections Information System (VirginiaCORIS) NASCIO Staff Contact: Eric Sweden, MSIH MBA Program Director, Enterprise Architecture & Governance NASCIO NASCIO represents state chief
More informationSoftware-defined Storage Architecture for Analytics Computing
Software-defined Storage Architecture for Analytics Computing Arati Joshi Performance Engineering Colin Eldridge File System Engineering Carlos Carrero Product Management June 2015 Reference Architecture
More informationMaster of Science Advanced Software Services. Courses description
Master of Science Advanced Software Services Courses description Architecture of Service Oriented Information Systems The course explains the concept of the different architectural views (e.g. function
More informationData collection architecture for Big Data
Data collection architecture for Big Data a framework for a research agenda (Research in progress - ERP Sense Making of Big Data) Wout Hofman, May 2015, BDEI workshop 2 Big Data succes stories bias our
More informationOffice of Biometric Identity Management Expenditure Plan
Office of Biometric Identity Management Expenditure Plan June 11, 2015 Fiscal Year 2015 Report to Congress Office of the Chief Financial Officer Executive Summary The Office of Biometric Identity Management
More informationIEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
More information3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
More informationA Holistic Framework for Enterprise Data Management DAMA NCR
A Holistic Framework for Enterprise Data Management DAMA NCR Deborah L. Brooks March 13, 2007 Agenda What is Enterprise Data Management? Why an EDM Framework? EDM High-Level Framework EDM Framework Components
More informationIndustry 4.0 and Big Data
Industry 4.0 and Big Data Marek Obitko, mobitko@ra.rockwell.com Senior Research Engineer 03/25/2015 PUBLIC PUBLIC - 5058-CO900H 2 Background Joint work with Czech Institute of Informatics, Robotics and
More informationSECURITY BIOMETRICS PDF
SECURITY BIOMETRICS PDF ==> Download: SECURITY BIOMETRICS PDF SECURITY BIOMETRICS PDF - Are you searching for Security Biometrics Books? Now, you will be happy that at this time Security Biometrics PDF
More informationExamples of Large Scale Biometrics Systems:
Examples of Large Scale Biometrics Systems: International Solutions for Exit/Entry, Border Control, National ID and Secure Passport Systems Biometrics Consortium Conference Pat Sankar, Behnam Bavarian
More informationehr Solution for HKSAR GOVT ehealth Project
ehr Solution for HKSAR GOVT ehealth Project 3717 Columbia Pike. Arlington, VA 22204. 703.575.8400. www.plan-sys.com October 31, 2011 People. Service. Integrity Company Profile Founded 1988 Products Core
More informationMAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY
LA TECHNOLOGY TRANSFER PRESENTS PRESENTA MAX DOLGICER THE INTERNET OF THINGS NAVIGATING THE FUTURE OF INFORMATION TECHNOLOGY DECEMBER 14-15, 2015 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)
More information1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto
More informationPublished International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
More informationWhite Paper Think BIG
White Paper Think BIG Fusion of Biometric and Biographic Data In Large-Scale Identification Projects WCC is a global leader in search and match technology with a market leading platform for identification
More informationTactical Service Bus: The flexibility of service oriented architectures in constrained theater environments
Tactical Bus: The flexibility of service oriented architectures in constrained theater environments Tactical Edge in NATO Context Tactical still very much under control of national forces: Zone of Operations
More informationNOTICE INVITING APPLICATIONS FOR HIRING OF BIOMETRICS CONSULTANT (A-11016/07/10-UIDAI)
UNIQUE INDENTIFICATION AUTHORITY OF INDIA PLANNING COMMISSION GOVERNMENT OF INDIA 3 rd Floor, Tower-II, Jeevan Bharati Building, Connaught Circus, New Delhi - 110 001 NOTICE INVITING APPLICATIONS FOR HIRING
More informationStrategic Healthcare IT Advanced Research. SHARPS Project and ILHIE Prototype June 26, 2013
Strategic Healthcare IT Advanced Research Projects on Security (SHARPS) SHARPS Project and ILHIE Prototype June 26, 2013 Strategic Health IT Advanced Research Projects (SHARP) SHARP Area 1 Security and
More informationENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationThe Future Of Cloud Computing. Thursday, September 1, 11
1 The Future Of Cloud Computing 2 ::Setting Some Context Cloud Computing is a natural, disruptively innovative and timely opportunistic response to a converging set of socioeconomic, political, cultural
More informationEnergy Management Solutions for a Better and Greener Government
Energy Management Solutions for a Better and Greener Government Better Facilities. Better Environments. Better Performance. From energy efficient buildings and green technology to new procurement processes
More informationBig Data Analytics Platform @ Nokia
Big Data Analytics Platform @ Nokia 1 Selecting the Right Tool for the Right Workload Yekesa Kosuru Nokia Location & Commerce Strata + Hadoop World NY - Oct 25, 2012 Agenda Big Data Analytics Platform
More informationScaling Healthcare Applications to Meet Rising Challenges of Healthcare IT
Scaling Healthcare Applications to Meet Rising Challenges of Healthcare IT December 2013 Copyright 2013 GigaSpaces. All Rights Reserved. Healthcare IT has entered the era of Big Data. Are your applications
More informationFeedback Autonomic Provisioning for guaranteeing performance (and reliability. - application to Big Data Systems
Feedback Autonomic Provisioning for guaranteeing performance (and reliability) - application to Big Data Systems Bogdan Robu bogdan.robu@gipsa-lab.fr HIPEAC - HPES Workshop Amsterdam 19-21.01.2015 Context
More informationHow In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time
SCALEOUT SOFTWARE How In-Memory Data Grids Can Analyze Fast-Changing Data in Real Time by Dr. William Bain and Dr. Mikhail Sobolev, ScaleOut Software, Inc. 2012 ScaleOut Software, Inc. 12/27/2012 T wenty-first
More informationSURVEILLANCE ENHANCED FACE RECOGNITION
SURVEILLANCE ENHANCED FACE RECOGNITION BIOMETRICS Face Recognition Biometrics technology has matured rapidly over recent years, and the use of it for security and authentication purposes has become increasingly
More informationTechnology behind Aadhaar. Unique Identification Authority of India www.uidai.gov.in Tampa, 20 th September 2012
Technology behind Aadhaar Unique Identification Authority of India www.uidai.gov.in Tampa, 20 th September 2012 Aadhaar at a Glance Technology Strategy Architecture Enrollment Process Status Authentication
More informationSCALABILITY IN THE CLOUD
SCALABILITY IN THE CLOUD A TWILIO PERSPECTIVE twilio.com OUR SOFTWARE Twilio has built a 100 percent software-based infrastructure using many of the same distributed systems engineering and design principles
More informationStatus and Evolution of ATLAS Workload Management System PanDA
Status and Evolution of ATLAS Workload Management System PanDA Univ. of Texas at Arlington GRID 2012, Dubna Outline Overview PanDA design PanDA performance Recent Improvements Future Plans Why PanDA The
More informationAn Introduction to Cloud Computing
ibm.com/developerworks/ An Introduction to Cloud Computing Dan O'Riordan IDR, La Gaude Cloud Computing 2009 IBM Corporation Agenda Presented by IBM developerworks Introduction Cloud computing services
More informationCanada's Global Viewpoint: Emerging Technologies and Healthcare Interoperability
Canada's Global Viewpoint: Emerging Technologies and Healthcare Interoperability Ron G. Parker, Group Director Canada Health Infoway Inc. 1/31/2013 www.iheusa.org 1 About The Speaker 2 28 years in IT/IM
More informationEmerging Technologies Shaping the Future of Data Warehouses & Business Intelligence
Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Service Oriented Architecture SOA and Web Services John O Brien President and Executive Architect Zukeran Technologies
More informationFederal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
More informationIDENTITY SOLUTIONS FOR A BETTER WORLD
IDENTITY SOLUTIONS FOR A BETTER WORLD OUR COMPANY #1 GLOBAL PROVIDER OF BIOMETRICS-BASED IDENTITY SOLUTIONS Founded in 2002, Fulcrum Biometrics is a leading provider, distributor, and integrator of biometric
More informationInternet of Things: What is going to change in our lives
Internet of Things: What is going to change in our lives Amrith NAWOOR Technology Manager, SADC & EA - Oracle World Telecommunication and Information Society Day May 18, 2015 Safe Harbor Statement The
More informationLuis Melo Head of CRM/CX. Capventis. Policy Automation. Knowledge Management. Field Service Management. Web Customer Service
Luis Melo Head of CRM/CX MARKETING CLOUD Capventis COMMERCE CLOUD SERVICE CLOUD SALES CLOUD SOCIAL CLOUD Web Customer Cross Channel Policy Automation Field Cloud Platform MARKETING CLOUD COMMERCE CLOUD
More informationTrusting who you know and knowing who to trust. Creating a chain of trust using unique identity solutions
Trusting who you know and knowing who to Creating a chain of using unique identity solutions In a recent lecture on the nature of, Baroness Onora O Neill, a philosopher who focuses on international justice,
More informationWith DDN Big Data Storage
DDN Solution Brief Accelerate > ISR With DDN Big Data Storage The Way to Capture and Analyze the Growing Amount of Data Created by New Technologies 2012 DataDirect Networks. All Rights Reserved. The Big
More informationStrategy for Mobile ID
Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2
More informationBiometric Authentication. Biometric Consortium Conference Tampa
Biometric Authentication Biometric Consortium Conference Tampa 18 September 2013 Features of UID (Aadhaar) Authentication Only Numbers No Smart Cards Random Numbers No Intelligence, No Profiling All Residents
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
More informationApplying Architectural Patterns for the Cloud: Lessons Learned During Pattern Mining and Application
Applying Architectural Patterns for the Cloud: Lessons Learned During Pattern Mining and Application Ralph Retter (Daimler TSS GmbH) ralph.retter@daimler.com Christoph Fehling (University of Stuttgart,
More informationCCN. CCNx 1.0 Internet of Things Architectural Overview. Computer Science Laboratory Networking & Distributed Systems March 2014
CCN CCNx 1.0 Internet of Things Architectural Overview Computer Science Laboratory Networking & Distributed Systems March 2014 CCN IoT Platform Accomodate multiple IoT protocols Improve performance and
More informationBluemix: The Open Platform as a Service
Jia Tan (tanjia@cn.ibm.com) Senior Software Architect IBM China Software Development Lab Apr 2014 Bluemix: The Open Platform as a Service 2013 IBM Corporation New models of product & service innovation
More informationService Oriented Data Management
Service Oriented Management Nabin Bilas Integration Architect Integration & SOA: Agenda Integration Overview 5 Reasons Why Is Critical to SOA Oracle Integration Solution Integration
More informationCSG UCLA Enterprise Service Bus (ESB)
CSG UCLA Enterprise Service Bus (ESB) May 28, 2013 Draft Information Technology Services Enterprise Service Bus (ESB) The UCLA Enterprise Service Bus (ESB) is an application middleware solution designed
More informationInternet of Things. Reply Platform
Internet of Things Reply Platform Internet of Things: Concept Reply vision An ecosystem of connected people, objects and services; enabled by pervasive and transparent technology built to improve our quality
More informationHigh Level Modeling to Support Software Design
by Gerrit Muller Buskerud University College e-mail: gaudisite@gmail.com www.gaudisite.nl Abstract High level models are simple models with the primary goal to support understanding, analysis, communication
More informationNIST Patriot Act Biometric Testing. C. L. Wilson Image Group IAD-ITL
NIST Patriot Act Biometric Testing C. L. Wilson Image Group IAD-ITL Outline Statutory Mandates Biometrics Testing is Scale Dependent Fingerprint Vendor Technology Evaluation (FpVTE) Testing Fingerprint
More informationwhite paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by:
white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by: Big Data is the ability to collect information from diverse sources
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More informationDifferentiating Your Healthcare Institution While Improving Profitability // White Paper
The Smart Route To Visibility Healthcare, an industry in transition your services and healthcare professionals online through The demand for high-quality, safe and low-cost healthcare web portals, mobile
More informationOrbiter Series Service Oriented Architecture Applications
Workshop on Science Agency Uses of Clouds and Grids Orbiter Series Service Oriented Architecture Applications Orbiter Project Overview Mark L. Green mlgreen@txcorp.com Tech-X Corporation, Buffalo Office
More information5 things to consider when estimating the ROI on cyber security.
Security ROI in 2015 5 things to consider when estimating the ROI on cyber security. In June 2015, one of Australia s top cyber police officers, Detective Superintendent Arthur Katsogiannis, stated that
More informationService Engineering for the Internet of Things
Software & Services Priorities for WP 2009-10 Workshop, March 4, 2008 Service Engineering for the Internet of Things Mikhail Simonov, simonov@ismb.it Service engineering in the IoT and IoS Actual real
More informationCanada Health Infoway
Canada Health Infoway EHR s in the Canadian Context June 7, 2005 Mike Sheridan, COO Canada Health Infoway Healthcare Renewal In Canada National Healthcare Priorities A 10-year Plan to Strengthen Healthcare
More informationImpact of Big Data in Oil & Gas Industry. Pranaya Sangvai Reliance Industries Limited 04 Feb 15, DEJ, Mumbai, India.
Impact of Big Data in Oil & Gas Industry Pranaya Sangvai Reliance Industries Limited 04 Feb 15, DEJ, Mumbai, India. New Age Information 2.92 billions Internet Users in 2014 Twitter processes 7 terabytes
More informationData Center Technologies
Data Center Technologies Ing. Marcel Kuza mkuza@uy.ibm.com Agosto, 2010 XI Jornadas de Actualización Tecnológica: Networking, Punta del Este, Uruguay Agenda Introduction to Data Center Solutions (by IBM)
More informationThe Fusion of Supercomputing and Big Data. Peter Ungaro President & CEO
The Fusion of Supercomputing and Big Data Peter Ungaro President & CEO The Supercomputing Company Supercomputing Big Data Because some great things never change One other thing that hasn t changed. Cray
More informationFAST DATA APPLICATION REQUIRMENTS FOR CTOS AND ARCHITECTS
WHITE PAPER Fast Data FAST DATA APPLICATION REQUIRMENTS FOR CTOS AND ARCHITECTS CTOs and Enterprise Architects recognize that the consumerization of IT is changing how software is developed, requiring
More informationPalmSecureID for the EDUCATION MARKETPLACE
PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings
More informationOVERVIEW OF MICROSOFT AZURE
Hybrid Cloud Solution to Increase Business Value CloudLink is a hybrid cloud solution that interacts with existing onpremises ERP systems. With the hybrid approach, we can leverage the on-premises software
More informationPRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS
PRIVATE CLOUD SECURITY CHALLENGES, AFFORDABILITY AND ANSWER TO A RELIABLE AND MODERNIZED MULTI-BIOMETRICS IDENTIFICATION SOLUTIONS Identification technology has progressed from just being fingerprint matching
More informationHPC ON WALL ST OPENSTACK AND BIG DATA. Brent Holden Chief Field Architect, Eastern US April 2014
HPC ON WALL ST OPENSTACK AND BIG DATA Brent Holden Chief Field Architect, Eastern US April 2014 OPENSTACK FOR HIGH PUT-THROUGH DATA WORKLOADS ARE EVOLVING CLOUD WORKLOADS TRADITIONAL WORKLOADS Typically
More informationApplying Business Architecture to the Cloud
Applying Business Architecture to the Cloud Mike Rosen, Chief Scientist Mike.Rosen@ WiltonConsultingGroup.com Michael Rosen Agenda n What do we mean by the cloud? n Sample architecture and cloud support
More informationMegaMatcher Case Study
MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated
More informationThe Impact of PaaS on Business Transformation
The Impact of PaaS on Business Transformation September 2014 Chris McCarthy Sr. Vice President Information Technology 1 Legacy Technology Silos Opportunities Business units Infrastructure Provisioning
More informationCloud an Electric Power - A Case Study
Human Centric Intelligent Society and Cloud Craig Baty Exec. GM & Chief Technology Officer Fujitsu Enterprise Solutions The Cloud An Industry Vision Technology use moves to a utility model, measured according
More informationDriving More Value From OpenVMS Critical Infrastructure in Local and Global Datacenters: A CASE STUDY. Presented by: J. Barry Thompson, CTO Tervela
Driving More Value From OpenVMS Critical Infrastructure in Local and Global Datacenters: A CASE STUDY Presented by: J. Barry Thompson, CTO Tervela Case Study: Customer Challenges The Solution Overall Impact
More informationDistribution transparency. Degree of transparency. Openness of distributed systems
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 01: Version: August 27, 2012 1 / 28 Distributed System: Definition A distributed
More informationBiometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect edward.clay@sun.com & Ramesh Nagappan CISSP Java Technology Architect ramesh.nagappan@sun.com Agenda Part 1 : Identity
More informationElectronic Access Control Solutions
Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical
More informationProfessional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008
Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report
More informationEnterprise Service Bus Defined. Wikipedia says (07/19/06)
Enterprise Service Bus Defined CIS Department Professor Duane Truex III Wikipedia says (07/19/06) In computing, an enterprise service bus refers to a software architecture construct, implemented by technologies
More informationDepartment of Homeland Security
Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric
More informationDe-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
More informationAdvancing Sustainability with Geospatial Steven Hagan, Vice President, Server Technologies João Paiva, Ph.D. Spatial Information and Science
Advancing Sustainability with Geospatial Steven Hagan, Vice President, Server Technologies João Paiva, Ph.D. Spatial Information and Science Engineering 1 Copyright 2011, Oracle and/or its affiliates.
More informationOrchestrating SAS Processes Using Business Process Management (BPM) Software Kimball Lewis, Health Dialog, Portland, Maine
Orchestrating SAS Processes Using Business Process Management (BPM) Software Kimball Lewis, Health Dialog, Portland, Maine ABSTRACT Business Process Management (BPM) is a technology and methodology for
More informationBig Data Analytics Roadmap Energy Industry
Douglas Moore, Principal Consultant, Architect June 2013 Big Data Analytics Energy Industry Agenda Why Big Data in Energy? Imagine Overview - Use Cases - Readiness Analysis - Architecture - Development
More informationMobile Payment Ecosystem ITI
Mobile Payment Ecosystem ITI Mar 2014 By: Mostafa Elnahhas Chief Architect & Senior Manager Fawry Agenda Mobile Payment Opportunities Mobile Payment Ecosystem Supporting Infrastructure Worldwide Mobile
More informationCapitalizing on Emerging Technology: Enhancing the Health Artifact and Image Management Solution
Mr. Alvaro E. Rodriguez, PM Care & Benefits Integrated Systems Solution Delivery Division 2015 Defense Health Information Technology Symposium Capitalizing on Emerging Technology: Enhancing the Health
More informationDigital Asset Management Developing your Institutional Repository
Digital Asset Management Developing your Institutional Repository Manny Bekier Director, Biomedical Communications Clinical Instructor, School of Public Health SUNY Downstate Medical Center Why DAM? We
More informationThe EHR Agenda in Canada
The EHR Agenda in Canada IHE Workshop June 28, 2005 Dennis Giokas, Chief Technology Officer Agenda Background on Canadian Healthcare System About Canada Health Infoway Interoperable EHR Solution Definitions
More informationTRANSFORM BIG DATA INTO ACTIONABLE INFORMATION
TRANSFORM BIG DATA INTO ACTIONABLE INFORMATION Make Big Available for Everyone Syed Rasheed Solution Marketing Manager January 29 th, 2014 Agenda Demystifying Big Challenges Getting Bigger Red Hat Big
More informationHorizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges
More informationMORPHO CRIMINAL JUSTICE SUITE
MORPHO CRIMINAL JUSTICE SUITE FULL RANGE OF PRODUCTS DEDICATED TO CRIMINAL JUSTICE MISSIONS 2 1 3 Morpho provides law enforcement with a wide range of products to support criminal investigation, background
More informationjourney to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
More informationBig Data and Your Data Warehouse Philip Russom
Big Data and Your Data Warehouse Philip Russom TDWI Research Director for Data Management April 5, 2012 Sponsor Speakers Philip Russom Research Director, Data Management, TDWI Peter Jeffcock Director,
More information