Technology behind Aadhaar. Unique Identification Authority of India Tampa, 20 th September 2012
|
|
- Brice Johnson
- 8 years ago
- Views:
Transcription
1 Technology behind Aadhaar Unique Identification Authority of India Tampa, 20 th September 2012
2 Aadhaar at a Glance Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions Agenda
3 Aadhaar at a Glance Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions
4 1.2 billion residents India 640,000 villages, ~60% lives under $2/day ~75% literacy, <3% pays Income Tax, <20% banking ~800 million mobile, ~ mn migrant workers Govt. spends about $60 bn annually on direct subsidies/payments 4
5 Vision Create a common national identity for every resident Biometric backed identity to eliminate duplicates Verifiable online identity for portability Applications ecosystem using open APIs Aadhaar enabled bank account and payment platform Aadhaar enabled electronic, paperless KYC 5
6 Issue unique IDs UID Unique number Random number Name Parents Gender DoB PoB Address Basic demographic data and biometrics stored centrally Standardized identity attributes UID = No duplicates(1:n check) Flexibility to partners on Know Your Resident (KYR)+ Central UID database Property of UIDAI - Highly confidential 6
7 and authenticate IDs online, real-time Authentication - Are you who you claim to be? UID = Central UID database 1:1 check, no ID fraud Only YES/NO response, no details no invasion of privacy Person can see self-details, no one else can 7
8 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions
9 Consultation & Standards Biometric Standards Demographic data standards and verification procedure Process (90 days) Representation from agencies, academic and industry Standardization on modalities and data formats
10 PoC to Determine Enrollment Process Three states, 10s of villages Rural areas emphasized Data collected in 2 sessions from 75K people Capture time is 4 min. Spread is 50% Social customs are not a major problem Zero FTE is possible De-duplication of 1.2 B possible through 10 finger prints and dual irises
11 Biometric Strategy Multi-modal: Improve de-duplication accuracy using multiple modalities 10 Fingerprint, 2 Iris, Face Multi-Vendor Risk Mitigation No Vendor Lock-in Vendors compete for volume allocation Performance Accuracy
12 Overall Strategy Best of breed through standards & open source Sourcing from multiple suppliers Leverage market forces for technology improvement Create national standards wherever necessary through extensive consultation Build eco-system Device certification Operator certification Empanelment of enrollment agencies IT and other suppliers training for state level reengineering apps Conduct field test to validate assumptions
13 Technology Stack Multi-platform client All 3 rd party interfaces abstracted through standard API layer (VDM, ABIS, Language Support, Linux with virtualization at OS layer MySQL as RDBMS Java application Apache Hadoop (HDFS, Hive, Pig, etc.) stack for large scale compute and distributed storage RabbitMQ (AMQP standard) as messaging framework Drools for rules engine Several other open source libraries
14
15 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions
16 Architecture Principles Design for scale Every component needs to scale to large volumes Millions of transactions and billions of records Accommodate failure and design for recovery Open architecture Use of open standards to ensure interoperability Allow the ecosystem to build libraries to standard APIs Use of open-source technologies wherever prudent Security End to end security of resident data Use of open source 16 Data privacy handling (API and data anonymization)
17 Designed for Scale Horizontal scalability for all components Open Scale-out is the key Distributed computing on commodity hardware Distributed data store and data partitioning Horizontal scaling of data store a must! Use of right data store for right purpose No single point of bottleneck for scaling Asynchronous processing throughout the system Allows loose coupling various components Allows independent component level scaling 17
18 Aadhaar Services Open Architecture Core Authentication API and supporting Best Finger Detection, OTP Request APIs New services being built on top Aadhaar Open Standards for Plug-n-play Biometric Device API Biometric SDK API Biometric Identification System API Transliteration API for Indian Languages 18
19 Open Standards & specs Open Source Biometric Standards UID Specifications Hadoop ISO X Enrolment Device HBase CBEFF Authentication Device MySQL MINEX Mongo DB IREX RabbitMQ PIV - FP BI: Hive
20 Security & Data Privacy Encryption of Enrollment Packet Decrypted packet never stored on disk Biometric images archived logically offline Data anonymized from ABIS vendors Only store templates and not raw images Data Centre Security DMZ, firewalls, IDS, IPS
21 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions
22 Enrollment Process
23 Enrollment process Demographic Data Compulsory data: Name, Age/Date of Birth, Gender and Address of the resident. Conditional data: Parents/Guardian details Optional data: Phone no., address Biometric Data Resident s Photograph Resident s Finger Prints Resident s Iris # Provision of Exception handling 23
24 NOC for Enrolment Monitoring
25 UID Middleware Standardization of the ABIS interface Highly distributed, concurrent, fault tolerant architecture Continuous unit and accuracy testing on the production system Test using real data (probes representative) No information is provided to ABISs to distinguish probes from real data Continuous testing of data integrity System management, monitoring and diagnostics
26
27 99.943%
28
29 Enrolment Volume 600 to 800 million UIDs in 4 years 1 million a day 200+ trillion matches every day!!! ~5MB per resident Maps to about PB of raw data (2048-bit PKI encrypted!) About 30 TB I/O daily Replication and backup across DCs of about 5+ TB of incremental data every day Lifecycle updates & new enrolments will continue for ever Additional process data Several million events on an average moving through async channels (some persistent and some transient) Needing complete update and insert guarantees across data stores 29
30 Enrolments happening all over the country Represents geographies with registered stations 60,000+ active Enrolment stations 60+ registrars - State Governments, Banks, India Post, Financial Institutions etc
31 Enrollment Devices Today Cost reduction Enrollment Station > 50% price reduction to $2,000 Slap scanner and Dual eye Iris camera From >$2,000 to $600 average Zero FTE is achievable Device innovation Hot swappable, UNIX/Windows support
32 Enrollment Quality - Definitions Methodology Quality metrics embedded in enrollment packet Face: ICAO-- (slightly relaxed) FP: Poor quality when there is at least one finger with NFIQ >3 in each of three slaps (4, 4, 2) Iris: Poor quality when Irisness score < 50 (proprietary)
33 Enrolment Quality - Results Govt. Policy - everyone must be enrolled ie FTE=0% Biometric FTE: 0.14% (no FP & Iris captured) Poor Quality FP & Iris: 0.23% Poor Quality FP: 2.9%, Iris: 3.0%
34 Analysis & Interpretation Multiple modality improves FTE by 10 to 25x Quality is comparable to Western results despite Diverse demographic Effect of manual labor (FP) Good biometric obtainable from 5 yrs age Senior population difficult but still feasible
35 Multi ABIS Multimodal Results FPIR Probe size: 4M False rejects: 2,309 FNIR Probe size: 32,000 False accept: 11 FPIR: 0.057% FNIR: Gallery = 84 Million NIST 7112 Ten FP Results FPIR: Gallery= 1 Million Multiple modality provides similar accuracy for 100X larger gallery
36 De-duplication Conclusion Competitive advantage of using 3 ABIS & SDKs Continuous FPIR/FNIR measurements Possible to maintain low FPIR/FNIR over wide range of gallery size
37 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions
38 Authentication YES Name, gender, DoB, Age, Address, Mobile, , OR NO 38
39 Why is Biometric Authentication challenging? Inclusiveness Can t deny benefits. Diverse subjects Manual labor Senior and children benefit programs Interoperability under open architecture Enrollment done using 11 different devices 30+ single FP scanners & extractors 8+ iris mobile cameras Mobile GPRS network Variety of applications 1 st in the world to operate on-line Auth.
40 Thumb: Enrollment & Verification Slap Scanner for enrolment Single Finger Auth Device
41 9 PoC over 12 months across India 50,000+ subjects Study Coverage or FTE Devices # of fingers, # of eyes Image quality Demography Network, mobility Proof of Concepts
42 Proof of Concept Scenario Conducted in the real field environment Real subjects representing local demography Production system & network Technology 17 distinct scanner models Every resident verifies on ALL devices Images captured at source 3,000 subjects Best Finger Detection - BFD
43 Throughput Performance 10 million authentications in 10 hours Average response time around 200 milliseconds or 295 concurrent requests/sec. Performance test environment consisted of 15 blade servers including database servers, biometric matching servers, messaging server, caching servers, and audit logging servers. Configuration: x86 Linux dual CPU 6-core.
44 FP Conclusions Achievable Accuracy (for 98.2% of population) FRR < 1% with two best finger fusion FRR < 2.5% with one best finger Device Certification More selective devices improve FRR by 2X Placement guide can also improve FRR materially PIV compliance insufficient indicator FAP 20 very useful Field accuracy test should be part of device certification Throughput of 1M/hr is easily achievable
45 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions
46 Proof of Concept- iris Objective- the feasibility of using iris modality for online authentication Coverage/ Accuracy/Readiness Set-up 4 single eye, 4 dual-eye cameras Every resident verifies on ALL devices Production system & network 5,000 subjects semi-rural location Poc X Seniors Mysore years years 66 and above India % 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
47 Coverage Single-eye cameras Authenticated in first try Dual-eye cameras Authenticated in multiple tries Failed (FTC+FRR) Over 99.5% population coverage is possible for on-line iris authentication
48 50% of Failures (FRR, FTC) due to Intra Capsular Cataract Extraction (ICCE) & Other types of surgery Special eye conditions
49 Accuracy Auth mode Single eye camera Dual eye camera Single eye 96.21% N/A Two eye 99.54% 99.73% High accuracy is possible using both single eye and dual eye cameras Use of second IRIS improves accuracy by 3%
50 FRR Flat Error Curve (DET) 1.00% 0.80% Iris DET (2 Iris, 2 Attempts) Single IRIS Camera Dual IRIS Camera 0.60% 0.46% 0.40% 0.34% 0.33% 0.31% 0.20% 0.27% 0.23% 0.22% 0.21% 0.00% 1.00E E E E-03 FAR Uniquely suitable for high security application
51 FRR Age Distribution Age wise DET Curves (2 Iris, 2 Attempts) 1.20% 1.00% 1.06% 0.80% 0.87% 0.84% 0.81% < % % 0.20% 0.00% 0.29% 0.22% 0.21% 0.20% 0.19% 0.14% 0.14% 0.14% 1.00E E E E-03 FAR >60 Overall accuracy is > 98.94% for all age categories. Children performed best, followed by adults & seniors
52 Observations Two irises authentications provide significant improvement in accuracy and coverage over one iris. Second attempt only marginally improves accuracy. Focus, motion blur or gaze not a major source of false rejects (Matcher 2 seemed to compensate for it)
53 Device Observations Device ergonomics affects Better capture aid for operator and residents can significantly improve image capture Actionable feedback visual aid (LCD on camera, slit for operator for focus) Appropriate visible light source cameras that block ambient light. Improved capture algorithm for special eye conditions KIND 7 image formats
54 Iris Conclusions Over 99.5% population coverage is possible for on-line iris authentication. True accept rate of over 99% is possible Failure : Due to eye surgery (ICCE) (<0.3%) Devices Both single eye and dual-eye work Easy to train, easy to use Further improvement through capture aids Median transaction time < 60 seconds Throughput of 1M/hr is easily achievable
55 Feasibility of FP or Iris authentication Clearly viable in Indian context High (> 98%) coverage and >99% accuracy achievable with 2 fingers or irises. Variety of devices available Iris suitable for children and high security (low FAR) apps. Median Transaction time < 60 secs. 1M/ hour sustained rate easy to achieve Capture can be improved through capture aids.
56 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions
57 Biometric Challenges Conclusive quality measures at capture point point is everything Fraud detection techniques Reissue/revocation of biometric credential Matching algorithm FP matcher tuning by age group Iris capture matcher for special eye conditions
58 Conclusions Standardize for vendor and technology neutrality Process standards Technology standards (APIs) and certification Multi-vendor, multi-modal approach Use of open source Ecosystem approach to scaling Security and privacy by design Data driven analytics for transparency and continuous improvement 58
59 Thank You
Biometric Authentication. Biometric Consortium Conference Tampa
Biometric Authentication Biometric Consortium Conference Tampa 18 September 2013 Features of UID (Aadhaar) Authentication Only Numbers No Smart Cards Random Numbers No Intelligence, No Profiling All Residents
More informationDe-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
More informationNOTICE INVITING APPLICATIONS FOR HIRING OF BIOMETRICS CONSULTANT (A-11016/07/10-UIDAI)
UNIQUE INDENTIFICATION AUTHORITY OF INDIA PLANNING COMMISSION GOVERNMENT OF INDIA 3 rd Floor, Tower-II, Jeevan Bharati Building, Connaught Circus, New Delhi - 110 001 NOTICE INVITING APPLICATIONS FOR HIRING
More informationVery large scale systems
Very large scale systems - Challenges, needs and methods Ravindra Gadde Research Engineer Iris ID Systems, Inc. 1 Large scale biometric systems and philosophy 1 Million? 10 Million? 100 Million? Large
More informationesign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
More informationesign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
More informationInstallation and Configuration of Aadhaar Enrolment Client
Installation and Configuration of Aadhaar Enrolment Client UIDAI Unique Identification Authority of India Version: 2.0.0.2 Release date: 27-11-2012 Preface This training manual contains the detailed steps
More informationBig Data Analytics - Accelerated. stream-horizon.com
Big Data Analytics - Accelerated stream-horizon.com Legacy ETL platforms & conventional Data Integration approach Unable to meet latency & data throughput demands of Big Data integration challenges Based
More informationPublished International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationAadhaar. Authentication Framework. Version 1.0. Unique Identification Authority of India (UIDAI)
Aadhaar Authentication Framework Version 1.0 Unique Identification Authority of India (UIDAI) Contents 1. Introduction... 3 2. Aadhaar Authentication... 4 3. Uses of Aadhaar Authentication... 5 4. Aadhaar
More informationProcedure for obtaining Biometric Device Certification (Authentication)
Procedure for obtaining Biometric Device Certification (Authentication) (BDCS(A)-03-02) ISSUE 1 STQC - IT Services STQC Directorate, Department of Information Technology, Ministry of Communications & Information
More informationAADHAAR E-KYC SERVICE
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India, 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR E-KYC SERVICE NOVEMBER 2012
More informationI. Hardware Setup Required for Enrollment Station : II. Fresh Installation: Installing Dependencies: First the following driver dependencies need to
I. Hardware Setup Required for Enrollment Station : 1. Laptop with Internet Connectivity 2. Iris Capturing Device 3. Fingerprint Capturing Device 4. Digital Camera 5. White Background Screen 6. Printer
More informationMultimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research
More informationHadoop IST 734 SS CHUNG
Hadoop IST 734 SS CHUNG Introduction What is Big Data?? Bulk Amount Unstructured Lots of Applications which need to handle huge amount of data (in terms of 500+ TB per day) If a regular machine need to
More informationPetabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, SIGMOD, New York, June 2013
Petabyte Scale Data at Facebook Dhruba Borthakur, Engineer at Facebook, SIGMOD, New York, June 2013 Agenda 1 Types of Data 2 Data Model and API for Facebook Graph Data 3 SLTP (Semi-OLTP) and Analytics
More informationAuthentication Scenarios India. Ramachandran
Authentication Scenarios India Ramachandran India 1.2 billion residents -640,000 villages -~800 million mobile, ~200-300 mn migrant workers Authentication Scenarios Government e-praman authentication framework
More informationIn Memory Accelerator for MongoDB
In Memory Accelerator for MongoDB Yakov Zhdanov, Director R&D GridGain Systems GridGain: In Memory Computing Leader 5 years in production 100s of customers & users Starts every 10 secs worldwide Over 15,000,000
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationScalable Architecture on Amazon AWS Cloud
Scalable Architecture on Amazon AWS Cloud Kalpak Shah Founder & CEO, Clogeny Technologies kalpak@clogeny.com 1 * http://www.rightscale.com/products/cloud-computing-uses/scalable-website.php 2 Architect
More informationImplement Hadoop jobs to extract business value from large and varied data sets
Hadoop Development for Big Data Solutions: Hands-On You Will Learn How To: Implement Hadoop jobs to extract business value from large and varied data sets Write, customize and deploy MapReduce jobs to
More informationA REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM
A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar 1, Prof.Chaitali S.Surtakar 2 Student of B.E., Information Technology, J.D.I.E.T, sborkar95@gmail.com Assistant Professor, Information
More informationSAP HANA SAP s In-Memory Database. Dr. Martin Kittel, SAP HANA Development January 16, 2013
SAP HANA SAP s In-Memory Database Dr. Martin Kittel, SAP HANA Development January 16, 2013 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase
More informationBiometrics. 2020 Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group
2020 Workshop The evolution of largescale biometric architecture Facilitators Mark Crego, Accenture Mike Matyas, Mount Airey Group Approach and Agenda Workshop Goal: An open discussion on the future of
More informationBiometrics and Cyber Security
Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important
More informationSwabhiman-ICT based Financial Inclusion Implementation- A Case of Bank of Maharashtra
Swabhiman-ICT based Financial Inclusion Implementation- A Case of Bank of Maharashtra Hello. I am Devdatta Rokade. I am from Bank of Maharashtra. I am here today to discuss with you all about ICT based
More informationTrafodion Operational SQL-on-Hadoop
Trafodion Operational SQL-on-Hadoop SophiaConf 2015 Pierre Baudelle, HP EMEA TSC July 6 th, 2015 Hadoop workload profiles Operational Interactive Non-interactive Batch Real-time analytics Operational SQL
More informationBiometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect edward.clay@sun.com & Ramesh Nagappan CISSP Java Technology Architect ramesh.nagappan@sun.com Agenda Part 1 : Identity
More informationBig data blue print for cloud architecture
Big data blue print for cloud architecture -COGNIZANT Image Area Prabhu Inbarajan Srinivasan Thiruvengadathan Muralicharan Gurumoorthy Praveen Codur 2012, Cognizant Next 30 minutes Big Data / Cloud challenges
More informationThe Design and Implementation of the Zetta Storage Service. October 27, 2009
The Design and Implementation of the Zetta Storage Service October 27, 2009 Zetta s Mission Simplify Enterprise Storage Zetta delivers enterprise-grade storage as a service for IT professionals needing
More informationBIG DATA TRENDS AND TECHNOLOGIES
BIG DATA TRENDS AND TECHNOLOGIES THE WORLD OF DATA IS CHANGING Cloud WHAT IS BIG DATA? Big data are datasets that grow so large that they become awkward to work with using onhand database management tools.
More informationBig Data Analytics. with EMC Greenplum and Hadoop. Big Data Analytics. Ofir Manor Pre Sales Technical Architect EMC Greenplum
Big Data Analytics with EMC Greenplum and Hadoop Big Data Analytics with EMC Greenplum and Hadoop Ofir Manor Pre Sales Technical Architect EMC Greenplum 1 Big Data and the Data Warehouse Potential All
More informationPetabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, UC Berkeley, Nov 2012
Petabyte Scale Data at Facebook Dhruba Borthakur, Engineer at Facebook, UC Berkeley, Nov 2012 Agenda 1 Types of Data 2 Data Model and API for Facebook Graph Data 3 SLTP (Semi-OLTP) and Analytics data 4
More informationRegistrar On-Boarding Process
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 Registrar On-Boarding Process
More informationBiometrics in e-governance and Academia using Hand-held Fingerprint Terminals
Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Biometrics in e-governance and Academia using Hand-held Fingerprint Terminals A. Tirupathi Rao 1, N. Pattabhi Ramaiah 1, Ahmed
More informationUsing MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam sastry.vedantam@oracle.com
Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam sastry.vedantam@oracle.com Agenda The rise of Big Data & Hadoop MySQL in the Big Data Lifecycle MySQL Solutions for Big Data Q&A
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
More informationPetabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, XLDB Conference at Stanford University, Sept 2012
Petabyte Scale Data at Facebook Dhruba Borthakur, Engineer at Facebook, XLDB Conference at Stanford University, Sept 2012 Agenda 1 Types of Data 2 Data Model and API for Facebook Graph Data 3 SLTP (Semi-OLTP)
More informationBangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology
MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric
More informationTHE HADOOP DISTRIBUTED FILE SYSTEM
THE HADOOP DISTRIBUTED FILE SYSTEM Konstantin Shvachko, Hairong Kuang, Sanjay Radia, Robert Chansler Presented by Alexander Pokluda October 7, 2013 Outline Motivation and Overview of Hadoop Architecture,
More informationData-Centric security and HP NonStop-centric ecosystems. Andrew Price, XYPRO Technology Corporation Mark Bower, Voltage Security
Title Data-Centric security and HP NonStop-centric ecosystems A breakthrough strategy for neutralizing sensitive data against advanced threats and attacks Andrew Price, XYPRO Technology Corporation Mark
More informationMyISAM Default Storage Engine before MySQL 5.5 Table level locking Small footprint on disk Read Only during backups GIS and FTS indexing Copyright 2014, Oracle and/or its affiliates. All rights reserved.
More informationHadoop & Spark Using Amazon EMR
Hadoop & Spark Using Amazon EMR Michael Hanisch, AWS Solutions Architecture 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda Why did we build Amazon EMR? What is Amazon EMR?
More informationWHITE PAPER. Permabit Albireo Data Optimization Software. Benefits of Albireo for Virtual Servers. January 2012. Permabit Technology Corporation
WHITE PAPER Permabit Albireo Data Optimization Software Benefits of Albireo for Virtual Servers January 2012 Permabit Technology Corporation Ten Canal Park Cambridge, MA 02141 USA Phone: 617.252.9600 FAX:
More informationOracle Database Backups and Disaster Recovery @ Autodesk
Oracle Database Backups and Disaster Recovery @ Autodesk Alan Williams Database Design Engineer Who We Are Autodesk software, suites, and cloud technology help customers design, visualize, and simulate
More informationShared Services Canada. Cloud Computing
Shared Services Canada Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design January 28, 2013 1 Agenda TIME TOPICS PRESENTER(S) 09:00 9:15 Opening Remarks
More informationBIG DATA CAN DRIVE THE BUSINESS AND IT TO EVOLVE AND ADAPT RALPH KIMBALL BUSSUM 2014
BIG DATA CAN DRIVE THE BUSINESS AND IT TO EVOLVE AND ADAPT RALPH KIMBALL BUSSUM 2014 Ralph Kimball Associates 2014 The Data Warehouse Mission Identify all possible enterprise data assets Select those assets
More informationThe deployment of OHMS TM. in private cloud
Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere
More informationAADHAAR BIOMETRIC SDK API SPECIFICATION - VERSION 2.0 MAY
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR BIOMETRIC SDK API SPECIFICATION
More informationAdobe Digital Publishing Security FAQ
Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server
More informationIntegrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation
Integrating Biometrics into the Database and Application Server Infrastructure Shirley Ann Stern Principal Product Manager Oracle Corporation 1 Agenda! Introduction Importance of the infrastructure Role
More informationMulti-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationThe Impact of PaaS on Business Transformation
The Impact of PaaS on Business Transformation September 2014 Chris McCarthy Sr. Vice President Information Technology 1 Legacy Technology Silos Opportunities Business units Infrastructure Provisioning
More informationPutting Apache Kafka to Use!
Putting Apache Kafka to Use! Building a Real-time Data Platform for Event Streams! JAY KREPS, CONFLUENT! A Couple of Themes! Theme 1: Rise of Events! Theme 2: Immutability Everywhere! Level! Example! Immutable
More informationBiometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company
Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published
More informationMark Bennett. Search and the Virtual Machine
Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business
More informationCard Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
More informationBig Data Analytics Platform @ Nokia
Big Data Analytics Platform @ Nokia 1 Selecting the Right Tool for the Right Workload Yekesa Kosuru Nokia Location & Commerce Strata + Hadoop World NY - Oct 25, 2012 Agenda Big Data Analytics Platform
More informationBig Data. Value, use cases and architectures. Petar Torre Lead Architect Service Provider Group. Dubrovnik, Croatia, South East Europe 20-22 May, 2013
Dubrovnik, Croatia, South East Europe 20-22 May, 2013 Big Data Value, use cases and architectures Petar Torre Lead Architect Service Provider Group 2011 2013 Cisco and/or its affiliates. All rights reserved.
More informationAssignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
More informationEloquence Training What s new in Eloquence B.08.00
Eloquence Training What s new in Eloquence B.08.00 2010 Marxmeier Software AG Rev:100727 Overview Released December 2008 Supported until November 2013 Supports 32-bit and 64-bit platforms HP-UX Itanium
More informationAADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction
AADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction 2 Introduction Biometric Attendance System based on Aadhaar Authentication Attendance System with real time monitoring Comprehensive
More informationLambda Architecture. Near Real-Time Big Data Analytics Using Hadoop. January 2015. Email: bdg@qburst.com Website: www.qburst.com
Lambda Architecture Near Real-Time Big Data Analytics Using Hadoop January 2015 Contents Overview... 3 Lambda Architecture: A Quick Introduction... 4 Batch Layer... 4 Serving Layer... 4 Speed Layer...
More informationBig Data Management and Security
Big Data Management and Security Audit Concerns and Business Risks Tami Frankenfield Sr. Director, Analytics and Enterprise Data Mercury Insurance What is Big Data? Velocity + Volume + Variety = Value
More informationRole of Multi-biometrics in Usable Multi- Factor Authentication
Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 ratha@us.ibm.com *: In collaboration with colleagues from
More informationIRIS Onboarding Platform. Product Overview
IRIS Onboarding Platform Product Overview The Need for a Digitized Onboarding Platform In the current paper-based onboarding process, disparate and self-contained systems work in a non-integrated environment.
More informationDevelop HIPAA-Compliant Mobile Apps with Verivo Akula
Develop HIPAA-Compliant Mobile Apps with Verivo Akula Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200 sales@verivo.com Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200
More informationAPI Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
More informationTARRANT COUNTY PURCHASING DEPARTMENT
JACK BEACHAM, C.P.M., A.P.P. PURCHASING AGENT TARRANT COUNTY PURCHASING DEPARTMENT AUGUST 4, 2010 RFP NO. 2010-103 ROB COX, C.P.M., A.P.P. ASSISTANT PURCHASING AGENT RFP FOR DIGITAL ASSET MANAGEMENT SYSTEM
More informationDatabase Scalability and Oracle 12c
Database Scalability and Oracle 12c Marcelle Kratochvil CTO Piction ACE Director All Data/Any Data marcelle@piction.com Warning I will be covering topics and saying things that will cause a rethink in
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationXpoLog Competitive Comparison Sheet
XpoLog Competitive Comparison Sheet New frontier in big log data analysis and application intelligence Technical white paper May 2015 XpoLog, a data analysis and management platform for applications' IT
More informationMiddleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
More informationJun Liu, Senior Software Engineer Bianny Bian, Engineering Manager SSG/STO/PAC
Jun Liu, Senior Software Engineer Bianny Bian, Engineering Manager SSG/STO/PAC Agenda Quick Overview of Impala Design Challenges of an Impala Deployment Case Study: Use Simulation-Based Approach to Design
More informationHigh Availability Solutions for the MariaDB and MySQL Database
High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment
More informationWhy can you trust Google?
Why can you trust Google? Przemek Sienkiewicz Head of Enterprise CEE, Russia & CIS Why is Security So Tough? Data Problem: Users want to access their data anytime, from anywhere 60% 1-out-of-10 66% of
More informationIntroduction to Hadoop. New York Oracle User Group Vikas Sawhney
Introduction to Hadoop New York Oracle User Group Vikas Sawhney GENERAL AGENDA Driving Factors behind BIG-DATA NOSQL Database 2014 Database Landscape Hadoop Architecture Map/Reduce Hadoop Eco-system Hadoop
More informationHadoop and Map-Reduce. Swati Gore
Hadoop and Map-Reduce Swati Gore Contents Why Hadoop? Hadoop Overview Hadoop Architecture Working Description Fault Tolerance Limitations Why Map-Reduce not MPI Distributed sort Why Hadoop? Existing Data
More informationTraining Module on Aadhaar Enrolment Process
Training Module on Aadhaar Enrolment Process UIDAI Unique Identification Authority of India Preface This training manual introduces the learner to the Aadhaar enrolment process. The module is meant to
More informationMobile Application Development Platform Comparison
Mobile Application Development Platform Comparison Unvired Inc. Disclaimer: This document has been prepared based on publicly available data of other platform vendors and is subject to change. Comparison
More informationCost-Effective Business Intelligence with Red Hat and Open Source
Cost-Effective Business Intelligence with Red Hat and Open Source Sherman Wood Director, Business Intelligence, Jaspersoft September 3, 2009 1 Agenda Introductions Quick survey What is BI?: reporting,
More informationPulsar Realtime Analytics At Scale. Tony Ng April 14, 2015
Pulsar Realtime Analytics At Scale Tony Ng April 14, 2015 Big Data Trends Bigger data volumes More data sources DBs, logs, behavioral & business event streams, sensors Faster analysis Next day to hours
More informationScalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
More informationEXECUTIVE SUMMARY CONTENTS. 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix. 1.
CONTENTS 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix EXECUTIVE SUMMARY Tenzing Managed IT services has recently partnered with Amazon Web Services
More informationImplementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company
Implementation of Operator Authentication Processes on an Enterprise Level Mark Heard Eastman Chemical Company Presenter Mark Heard, Eastman Chemical Company Control System Engineer Experience with several
More informationWorkshop on Hadoop with Big Data
Workshop on Hadoop with Big Data Hadoop? Apache Hadoop is an open source framework for distributed storage and processing of large sets of data on commodity hardware. Hadoop enables businesses to quickly
More informationOverview. Big Data in Apache Hadoop. - HDFS - MapReduce in Hadoop - YARN. https://hadoop.apache.org. Big Data Management and Analytics
Overview Big Data in Apache Hadoop - HDFS - MapReduce in Hadoop - YARN https://hadoop.apache.org 138 Apache Hadoop - Historical Background - 2003: Google publishes its cluster architecture & DFS (GFS)
More informatione-authentication guidelines for esign- Online Electronic Signature Service
e-authentication guidelines for esign- Online Electronic Signature Service Version 1.0 June 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry of Communications
More informationCASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1
CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level -ORACLE TIMESTEN 11gR1 CASE STUDY Oracle TimesTen In-Memory Database and Shared Disk HA Implementation
More informationSimplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!!
Simplifying Big Data Analytics: Unifying Batch and Stream Processing John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!! Streaming Analy.cs S S S Scale- up Database Data And Compute Grid
More informationThings to Consider When Planning for Cloud-Based Data Protection
Things to Consider When Planning for Cloud-Based Data Protection What are the chances? Having quadruplets? 1 in 15,000,000 Become President of the USA? 1 in 10,000,000 Hole-in-one? 1 in 12,500 Your laptop
More informationLuncheon Webinar Series May 13, 2013
Luncheon Webinar Series May 13, 2013 InfoSphere DataStage is Big Data Integration Sponsored By: Presented by : Tony Curcio, InfoSphere Product Management 0 InfoSphere DataStage is Big Data Integration
More informationOpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar
OpenNebula Open Souce Solution for DC Virtualization C12G Labs Online Webinar What is OpenNebula? Multi-tenancy, Elasticity and Automatic Provision on Virtualized Environments I m using virtualization/cloud,
More informationValue Realization at Johnson Controls using SAP HANA smart data integration Steve Carpenter Johnson Controls Ryan Champlin - SAP
Value Realization at Johnson Controls using SAP HANA smart data integration Steve Carpenter Johnson Controls Ryan Champlin - SAP Agenda What is SAP HANA smart data integration? Use cases for Smart Data
More informationNoSQL Performance Test In-Memory Performance Comparison of SequoiaDB, Cassandra, and MongoDB
bankmark UG (haftungsbeschränkt) Bahnhofstraße 1 9432 Passau Germany www.bankmark.de info@bankmark.de T +49 851 25 49 49 F +49 851 25 49 499 NoSQL Performance Test In-Memory Performance Comparison of SequoiaDB,
More informationPatterns for scalability and availability in (trading) systems. Michel André CTO Saxo Bank
Patterns for scalability and availability in (trading) systems Michel André CTO Saxo Bank October 6, 2014 Saxo Bank introduction Global online investment bank facilitator/broker setup - offices in 25 countries
More informationKey Management Best Practices
White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult
More informationSuccessfully Deploying Alternative Storage Architectures for Hadoop Gus Horn Iyer Venkatesan NetApp
Successfully Deploying Alternative Storage Architectures for Hadoop Gus Horn Iyer Venkatesan NetApp Agenda Hadoop and storage Alternative storage architecture for Hadoop Use cases and customer examples
More information