Technology behind Aadhaar. Unique Identification Authority of India Tampa, 20 th September 2012

Size: px
Start display at page:

Download "Technology behind Aadhaar. Unique Identification Authority of India www.uidai.gov.in Tampa, 20 th September 2012"

Transcription

1 Technology behind Aadhaar Unique Identification Authority of India Tampa, 20 th September 2012

2 Aadhaar at a Glance Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions Agenda

3 Aadhaar at a Glance Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions

4 1.2 billion residents India 640,000 villages, ~60% lives under $2/day ~75% literacy, <3% pays Income Tax, <20% banking ~800 million mobile, ~ mn migrant workers Govt. spends about $60 bn annually on direct subsidies/payments 4

5 Vision Create a common national identity for every resident Biometric backed identity to eliminate duplicates Verifiable online identity for portability Applications ecosystem using open APIs Aadhaar enabled bank account and payment platform Aadhaar enabled electronic, paperless KYC 5

6 Issue unique IDs UID Unique number Random number Name Parents Gender DoB PoB Address Basic demographic data and biometrics stored centrally Standardized identity attributes UID = No duplicates(1:n check) Flexibility to partners on Know Your Resident (KYR)+ Central UID database Property of UIDAI - Highly confidential 6

7 and authenticate IDs online, real-time Authentication - Are you who you claim to be? UID = Central UID database 1:1 check, no ID fraud Only YES/NO response, no details no invasion of privacy Person can see self-details, no one else can 7

8 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions

9 Consultation & Standards Biometric Standards Demographic data standards and verification procedure Process (90 days) Representation from agencies, academic and industry Standardization on modalities and data formats

10 PoC to Determine Enrollment Process Three states, 10s of villages Rural areas emphasized Data collected in 2 sessions from 75K people Capture time is 4 min. Spread is 50% Social customs are not a major problem Zero FTE is possible De-duplication of 1.2 B possible through 10 finger prints and dual irises

11 Biometric Strategy Multi-modal: Improve de-duplication accuracy using multiple modalities 10 Fingerprint, 2 Iris, Face Multi-Vendor Risk Mitigation No Vendor Lock-in Vendors compete for volume allocation Performance Accuracy

12 Overall Strategy Best of breed through standards & open source Sourcing from multiple suppliers Leverage market forces for technology improvement Create national standards wherever necessary through extensive consultation Build eco-system Device certification Operator certification Empanelment of enrollment agencies IT and other suppliers training for state level reengineering apps Conduct field test to validate assumptions

13 Technology Stack Multi-platform client All 3 rd party interfaces abstracted through standard API layer (VDM, ABIS, Language Support, Linux with virtualization at OS layer MySQL as RDBMS Java application Apache Hadoop (HDFS, Hive, Pig, etc.) stack for large scale compute and distributed storage RabbitMQ (AMQP standard) as messaging framework Drools for rules engine Several other open source libraries

14

15 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions

16 Architecture Principles Design for scale Every component needs to scale to large volumes Millions of transactions and billions of records Accommodate failure and design for recovery Open architecture Use of open standards to ensure interoperability Allow the ecosystem to build libraries to standard APIs Use of open-source technologies wherever prudent Security End to end security of resident data Use of open source 16 Data privacy handling (API and data anonymization)

17 Designed for Scale Horizontal scalability for all components Open Scale-out is the key Distributed computing on commodity hardware Distributed data store and data partitioning Horizontal scaling of data store a must! Use of right data store for right purpose No single point of bottleneck for scaling Asynchronous processing throughout the system Allows loose coupling various components Allows independent component level scaling 17

18 Aadhaar Services Open Architecture Core Authentication API and supporting Best Finger Detection, OTP Request APIs New services being built on top Aadhaar Open Standards for Plug-n-play Biometric Device API Biometric SDK API Biometric Identification System API Transliteration API for Indian Languages 18

19 Open Standards & specs Open Source Biometric Standards UID Specifications Hadoop ISO X Enrolment Device HBase CBEFF Authentication Device MySQL MINEX Mongo DB IREX RabbitMQ PIV - FP BI: Hive

20 Security & Data Privacy Encryption of Enrollment Packet Decrypted packet never stored on disk Biometric images archived logically offline Data anonymized from ABIS vendors Only store templates and not raw images Data Centre Security DMZ, firewalls, IDS, IPS

21 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions

22 Enrollment Process

23 Enrollment process Demographic Data Compulsory data: Name, Age/Date of Birth, Gender and Address of the resident. Conditional data: Parents/Guardian details Optional data: Phone no., address Biometric Data Resident s Photograph Resident s Finger Prints Resident s Iris # Provision of Exception handling 23

24 NOC for Enrolment Monitoring

25 UID Middleware Standardization of the ABIS interface Highly distributed, concurrent, fault tolerant architecture Continuous unit and accuracy testing on the production system Test using real data (probes representative) No information is provided to ABISs to distinguish probes from real data Continuous testing of data integrity System management, monitoring and diagnostics

26

27 99.943%

28

29 Enrolment Volume 600 to 800 million UIDs in 4 years 1 million a day 200+ trillion matches every day!!! ~5MB per resident Maps to about PB of raw data (2048-bit PKI encrypted!) About 30 TB I/O daily Replication and backup across DCs of about 5+ TB of incremental data every day Lifecycle updates & new enrolments will continue for ever Additional process data Several million events on an average moving through async channels (some persistent and some transient) Needing complete update and insert guarantees across data stores 29

30 Enrolments happening all over the country Represents geographies with registered stations 60,000+ active Enrolment stations 60+ registrars - State Governments, Banks, India Post, Financial Institutions etc

31 Enrollment Devices Today Cost reduction Enrollment Station > 50% price reduction to $2,000 Slap scanner and Dual eye Iris camera From >$2,000 to $600 average Zero FTE is achievable Device innovation Hot swappable, UNIX/Windows support

32 Enrollment Quality - Definitions Methodology Quality metrics embedded in enrollment packet Face: ICAO-- (slightly relaxed) FP: Poor quality when there is at least one finger with NFIQ >3 in each of three slaps (4, 4, 2) Iris: Poor quality when Irisness score < 50 (proprietary)

33 Enrolment Quality - Results Govt. Policy - everyone must be enrolled ie FTE=0% Biometric FTE: 0.14% (no FP & Iris captured) Poor Quality FP & Iris: 0.23% Poor Quality FP: 2.9%, Iris: 3.0%

34 Analysis & Interpretation Multiple modality improves FTE by 10 to 25x Quality is comparable to Western results despite Diverse demographic Effect of manual labor (FP) Good biometric obtainable from 5 yrs age Senior population difficult but still feasible

35 Multi ABIS Multimodal Results FPIR Probe size: 4M False rejects: 2,309 FNIR Probe size: 32,000 False accept: 11 FPIR: 0.057% FNIR: Gallery = 84 Million NIST 7112 Ten FP Results FPIR: Gallery= 1 Million Multiple modality provides similar accuracy for 100X larger gallery

36 De-duplication Conclusion Competitive advantage of using 3 ABIS & SDKs Continuous FPIR/FNIR measurements Possible to maintain low FPIR/FNIR over wide range of gallery size

37 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions

38 Authentication YES Name, gender, DoB, Age, Address, Mobile, , OR NO 38

39 Why is Biometric Authentication challenging? Inclusiveness Can t deny benefits. Diverse subjects Manual labor Senior and children benefit programs Interoperability under open architecture Enrollment done using 11 different devices 30+ single FP scanners & extractors 8+ iris mobile cameras Mobile GPRS network Variety of applications 1 st in the world to operate on-line Auth.

40 Thumb: Enrollment & Verification Slap Scanner for enrolment Single Finger Auth Device

41 9 PoC over 12 months across India 50,000+ subjects Study Coverage or FTE Devices # of fingers, # of eyes Image quality Demography Network, mobility Proof of Concepts

42 Proof of Concept Scenario Conducted in the real field environment Real subjects representing local demography Production system & network Technology 17 distinct scanner models Every resident verifies on ALL devices Images captured at source 3,000 subjects Best Finger Detection - BFD

43 Throughput Performance 10 million authentications in 10 hours Average response time around 200 milliseconds or 295 concurrent requests/sec. Performance test environment consisted of 15 blade servers including database servers, biometric matching servers, messaging server, caching servers, and audit logging servers. Configuration: x86 Linux dual CPU 6-core.

44 FP Conclusions Achievable Accuracy (for 98.2% of population) FRR < 1% with two best finger fusion FRR < 2.5% with one best finger Device Certification More selective devices improve FRR by 2X Placement guide can also improve FRR materially PIV compliance insufficient indicator FAP 20 very useful Field accuracy test should be part of device certification Throughput of 1M/hr is easily achievable

45 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions

46 Proof of Concept- iris Objective- the feasibility of using iris modality for online authentication Coverage/ Accuracy/Readiness Set-up 4 single eye, 4 dual-eye cameras Every resident verifies on ALL devices Production system & network 5,000 subjects semi-rural location Poc X Seniors Mysore years years 66 and above India % 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

47 Coverage Single-eye cameras Authenticated in first try Dual-eye cameras Authenticated in multiple tries Failed (FTC+FRR) Over 99.5% population coverage is possible for on-line iris authentication

48 50% of Failures (FRR, FTC) due to Intra Capsular Cataract Extraction (ICCE) & Other types of surgery Special eye conditions

49 Accuracy Auth mode Single eye camera Dual eye camera Single eye 96.21% N/A Two eye 99.54% 99.73% High accuracy is possible using both single eye and dual eye cameras Use of second IRIS improves accuracy by 3%

50 FRR Flat Error Curve (DET) 1.00% 0.80% Iris DET (2 Iris, 2 Attempts) Single IRIS Camera Dual IRIS Camera 0.60% 0.46% 0.40% 0.34% 0.33% 0.31% 0.20% 0.27% 0.23% 0.22% 0.21% 0.00% 1.00E E E E-03 FAR Uniquely suitable for high security application

51 FRR Age Distribution Age wise DET Curves (2 Iris, 2 Attempts) 1.20% 1.00% 1.06% 0.80% 0.87% 0.84% 0.81% < % % 0.20% 0.00% 0.29% 0.22% 0.21% 0.20% 0.19% 0.14% 0.14% 0.14% 1.00E E E E-03 FAR >60 Overall accuracy is > 98.94% for all age categories. Children performed best, followed by adults & seniors

52 Observations Two irises authentications provide significant improvement in accuracy and coverage over one iris. Second attempt only marginally improves accuracy. Focus, motion blur or gaze not a major source of false rejects (Matcher 2 seemed to compensate for it)

53 Device Observations Device ergonomics affects Better capture aid for operator and residents can significantly improve image capture Actionable feedback visual aid (LCD on camera, slit for operator for focus) Appropriate visible light source cameras that block ambient light. Improved capture algorithm for special eye conditions KIND 7 image formats

54 Iris Conclusions Over 99.5% population coverage is possible for on-line iris authentication. True accept rate of over 99% is possible Failure : Due to eye surgery (ICCE) (<0.3%) Devices Both single eye and dual-eye work Easy to train, easy to use Further improvement through capture aids Median transaction time < 60 seconds Throughput of 1M/hr is easily achievable

55 Feasibility of FP or Iris authentication Clearly viable in Indian context High (> 98%) coverage and >99% accuracy achievable with 2 fingers or irises. Variety of devices available Iris suitable for children and high security (low FAR) apps. Median Transaction time < 60 secs. 1M/ hour sustained rate easy to achieve Capture can be improved through capture aids.

56 Context of UIDs in India Technology Strategy Architecture Enrollment Process Status Authentication Fingerprint PoC Iris Poc Conclusions

57 Biometric Challenges Conclusive quality measures at capture point point is everything Fraud detection techniques Reissue/revocation of biometric credential Matching algorithm FP matcher tuning by age group Iris capture matcher for special eye conditions

58 Conclusions Standardize for vendor and technology neutrality Process standards Technology standards (APIs) and certification Multi-vendor, multi-modal approach Use of open source Ecosystem approach to scaling Security and privacy by design Data driven analytics for transparency and continuous improvement 58

59 Thank You

Biometric Authentication. Biometric Consortium Conference Tampa

Biometric Authentication. Biometric Consortium Conference Tampa Biometric Authentication Biometric Consortium Conference Tampa 18 September 2013 Features of UID (Aadhaar) Authentication Only Numbers No Smart Cards Random Numbers No Intelligence, No Profiling All Residents

More information

De-duplication The Complexity in the Unique ID context

De-duplication The Complexity in the Unique ID context De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance

More information

NOTICE INVITING APPLICATIONS FOR HIRING OF BIOMETRICS CONSULTANT (A-11016/07/10-UIDAI)

NOTICE INVITING APPLICATIONS FOR HIRING OF BIOMETRICS CONSULTANT (A-11016/07/10-UIDAI) UNIQUE INDENTIFICATION AUTHORITY OF INDIA PLANNING COMMISSION GOVERNMENT OF INDIA 3 rd Floor, Tower-II, Jeevan Bharati Building, Connaught Circus, New Delhi - 110 001 NOTICE INVITING APPLICATIONS FOR HIRING

More information

Very large scale systems

Very large scale systems Very large scale systems - Challenges, needs and methods Ravindra Gadde Research Engineer Iris ID Systems, Inc. 1 Large scale biometric systems and philosophy 1 Million? 10 Million? 100 Million? Large

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

Installation and Configuration of Aadhaar Enrolment Client

Installation and Configuration of Aadhaar Enrolment Client Installation and Configuration of Aadhaar Enrolment Client UIDAI Unique Identification Authority of India Version: 2.0.0.2 Release date: 27-11-2012 Preface This training manual contains the detailed steps

More information

Big Data Analytics - Accelerated. stream-horizon.com

Big Data Analytics - Accelerated. stream-horizon.com Big Data Analytics - Accelerated stream-horizon.com Legacy ETL platforms & conventional Data Integration approach Unable to meet latency & data throughput demands of Big Data integration challenges Based

More information

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics

Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

Aadhaar. Authentication Framework. Version 1.0. Unique Identification Authority of India (UIDAI)

Aadhaar. Authentication Framework. Version 1.0. Unique Identification Authority of India (UIDAI) Aadhaar Authentication Framework Version 1.0 Unique Identification Authority of India (UIDAI) Contents 1. Introduction... 3 2. Aadhaar Authentication... 4 3. Uses of Aadhaar Authentication... 5 4. Aadhaar

More information

Procedure for obtaining Biometric Device Certification (Authentication)

Procedure for obtaining Biometric Device Certification (Authentication) Procedure for obtaining Biometric Device Certification (Authentication) (BDCS(A)-03-02) ISSUE 1 STQC - IT Services STQC Directorate, Department of Information Technology, Ministry of Communications & Information

More information

AADHAAR E-KYC SERVICE

AADHAAR E-KYC SERVICE UIDAI Unique Identification Authority of India Planning Commission, Govt. of India, 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR E-KYC SERVICE NOVEMBER 2012

More information

I. Hardware Setup Required for Enrollment Station : II. Fresh Installation: Installing Dependencies: First the following driver dependencies need to

I. Hardware Setup Required for Enrollment Station : II. Fresh Installation: Installing Dependencies: First the following driver dependencies need to I. Hardware Setup Required for Enrollment Station : 1. Laptop with Internet Connectivity 2. Iris Capturing Device 3. Fingerprint Capturing Device 4. Digital Camera 5. White Background Screen 6. Printer

More information

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research

More information

Hadoop IST 734 SS CHUNG

Hadoop IST 734 SS CHUNG Hadoop IST 734 SS CHUNG Introduction What is Big Data?? Bulk Amount Unstructured Lots of Applications which need to handle huge amount of data (in terms of 500+ TB per day) If a regular machine need to

More information

Petabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, SIGMOD, New York, June 2013

Petabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, SIGMOD, New York, June 2013 Petabyte Scale Data at Facebook Dhruba Borthakur, Engineer at Facebook, SIGMOD, New York, June 2013 Agenda 1 Types of Data 2 Data Model and API for Facebook Graph Data 3 SLTP (Semi-OLTP) and Analytics

More information

Authentication Scenarios India. Ramachandran

Authentication Scenarios India. Ramachandran Authentication Scenarios India Ramachandran India 1.2 billion residents -640,000 villages -~800 million mobile, ~200-300 mn migrant workers Authentication Scenarios Government e-praman authentication framework

More information

In Memory Accelerator for MongoDB

In Memory Accelerator for MongoDB In Memory Accelerator for MongoDB Yakov Zhdanov, Director R&D GridGain Systems GridGain: In Memory Computing Leader 5 years in production 100s of customers & users Starts every 10 secs worldwide Over 15,000,000

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Scalable Architecture on Amazon AWS Cloud

Scalable Architecture on Amazon AWS Cloud Scalable Architecture on Amazon AWS Cloud Kalpak Shah Founder & CEO, Clogeny Technologies kalpak@clogeny.com 1 * http://www.rightscale.com/products/cloud-computing-uses/scalable-website.php 2 Architect

More information

Implement Hadoop jobs to extract business value from large and varied data sets

Implement Hadoop jobs to extract business value from large and varied data sets Hadoop Development for Big Data Solutions: Hands-On You Will Learn How To: Implement Hadoop jobs to extract business value from large and varied data sets Write, customize and deploy MapReduce jobs to

More information

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM

A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar 1, Prof.Chaitali S.Surtakar 2 Student of B.E., Information Technology, J.D.I.E.T, sborkar95@gmail.com Assistant Professor, Information

More information

SAP HANA SAP s In-Memory Database. Dr. Martin Kittel, SAP HANA Development January 16, 2013

SAP HANA SAP s In-Memory Database. Dr. Martin Kittel, SAP HANA Development January 16, 2013 SAP HANA SAP s In-Memory Database Dr. Martin Kittel, SAP HANA Development January 16, 2013 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase

More information

Biometrics. 2020 Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group

Biometrics. 2020 Workshop. The evolution of large-scale biometric architecture. Facilitators. Mark Crego, Accenture Mike Matyas, Mount Airey Group 2020 Workshop The evolution of largescale biometric architecture Facilitators Mark Crego, Accenture Mike Matyas, Mount Airey Group Approach and Agenda Workshop Goal: An open discussion on the future of

More information

Biometrics and Cyber Security

Biometrics and Cyber Security Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important

More information

Swabhiman-ICT based Financial Inclusion Implementation- A Case of Bank of Maharashtra

Swabhiman-ICT based Financial Inclusion Implementation- A Case of Bank of Maharashtra Swabhiman-ICT based Financial Inclusion Implementation- A Case of Bank of Maharashtra Hello. I am Devdatta Rokade. I am from Bank of Maharashtra. I am here today to discuss with you all about ICT based

More information

Trafodion Operational SQL-on-Hadoop

Trafodion Operational SQL-on-Hadoop Trafodion Operational SQL-on-Hadoop SophiaConf 2015 Pierre Baudelle, HP EMEA TSC July 6 th, 2015 Hadoop workload profiles Operational Interactive Non-interactive Batch Real-time analytics Operational SQL

More information

Biometric SSO Authentication Using Java Enterprise System

Biometric SSO Authentication Using Java Enterprise System Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect edward.clay@sun.com & Ramesh Nagappan CISSP Java Technology Architect ramesh.nagappan@sun.com Agenda Part 1 : Identity

More information

Big data blue print for cloud architecture

Big data blue print for cloud architecture Big data blue print for cloud architecture -COGNIZANT Image Area Prabhu Inbarajan Srinivasan Thiruvengadathan Muralicharan Gurumoorthy Praveen Codur 2012, Cognizant Next 30 minutes Big Data / Cloud challenges

More information

The Design and Implementation of the Zetta Storage Service. October 27, 2009

The Design and Implementation of the Zetta Storage Service. October 27, 2009 The Design and Implementation of the Zetta Storage Service October 27, 2009 Zetta s Mission Simplify Enterprise Storage Zetta delivers enterprise-grade storage as a service for IT professionals needing

More information

BIG DATA TRENDS AND TECHNOLOGIES

BIG DATA TRENDS AND TECHNOLOGIES BIG DATA TRENDS AND TECHNOLOGIES THE WORLD OF DATA IS CHANGING Cloud WHAT IS BIG DATA? Big data are datasets that grow so large that they become awkward to work with using onhand database management tools.

More information

Big Data Analytics. with EMC Greenplum and Hadoop. Big Data Analytics. Ofir Manor Pre Sales Technical Architect EMC Greenplum

Big Data Analytics. with EMC Greenplum and Hadoop. Big Data Analytics. Ofir Manor Pre Sales Technical Architect EMC Greenplum Big Data Analytics with EMC Greenplum and Hadoop Big Data Analytics with EMC Greenplum and Hadoop Ofir Manor Pre Sales Technical Architect EMC Greenplum 1 Big Data and the Data Warehouse Potential All

More information

Petabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, UC Berkeley, Nov 2012

Petabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, UC Berkeley, Nov 2012 Petabyte Scale Data at Facebook Dhruba Borthakur, Engineer at Facebook, UC Berkeley, Nov 2012 Agenda 1 Types of Data 2 Data Model and API for Facebook Graph Data 3 SLTP (Semi-OLTP) and Analytics data 4

More information

Registrar On-Boarding Process

Registrar On-Boarding Process UIDAI Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 Registrar On-Boarding Process

More information

Biometrics in e-governance and Academia using Hand-held Fingerprint Terminals

Biometrics in e-governance and Academia using Hand-held Fingerprint Terminals Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC Biometrics in e-governance and Academia using Hand-held Fingerprint Terminals A. Tirupathi Rao 1, N. Pattabhi Ramaiah 1, Ahmed

More information

Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam sastry.vedantam@oracle.com

Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam sastry.vedantam@oracle.com Using MySQL for Big Data Advantage Integrate for Insight Sastry Vedantam sastry.vedantam@oracle.com Agenda The rise of Big Data & Hadoop MySQL in the Big Data Lifecycle MySQL Solutions for Big Data Q&A

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Petabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, XLDB Conference at Stanford University, Sept 2012

Petabyte Scale Data at Facebook. Dhruba Borthakur, Engineer at Facebook, XLDB Conference at Stanford University, Sept 2012 Petabyte Scale Data at Facebook Dhruba Borthakur, Engineer at Facebook, XLDB Conference at Stanford University, Sept 2012 Agenda 1 Types of Data 2 Data Model and API for Facebook Graph Data 3 SLTP (Semi-OLTP)

More information

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology

Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology MegaMattcher g Ma Case a Sttudy Bangladesh Voter Registration Duplicate Search System Implemented by the Bangladesh Army and Dohatec Based on MegaMatcher Technology Bangladesh selected MegaMatcher multi-biometric

More information

THE HADOOP DISTRIBUTED FILE SYSTEM

THE HADOOP DISTRIBUTED FILE SYSTEM THE HADOOP DISTRIBUTED FILE SYSTEM Konstantin Shvachko, Hairong Kuang, Sanjay Radia, Robert Chansler Presented by Alexander Pokluda October 7, 2013 Outline Motivation and Overview of Hadoop Architecture,

More information

Data-Centric security and HP NonStop-centric ecosystems. Andrew Price, XYPRO Technology Corporation Mark Bower, Voltage Security

Data-Centric security and HP NonStop-centric ecosystems. Andrew Price, XYPRO Technology Corporation Mark Bower, Voltage Security Title Data-Centric security and HP NonStop-centric ecosystems A breakthrough strategy for neutralizing sensitive data against advanced threats and attacks Andrew Price, XYPRO Technology Corporation Mark

More information

MyISAM Default Storage Engine before MySQL 5.5 Table level locking Small footprint on disk Read Only during backups GIS and FTS indexing Copyright 2014, Oracle and/or its affiliates. All rights reserved.

More information

Hadoop & Spark Using Amazon EMR

Hadoop & Spark Using Amazon EMR Hadoop & Spark Using Amazon EMR Michael Hanisch, AWS Solutions Architecture 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda Why did we build Amazon EMR? What is Amazon EMR?

More information

WHITE PAPER. Permabit Albireo Data Optimization Software. Benefits of Albireo for Virtual Servers. January 2012. Permabit Technology Corporation

WHITE PAPER. Permabit Albireo Data Optimization Software. Benefits of Albireo for Virtual Servers. January 2012. Permabit Technology Corporation WHITE PAPER Permabit Albireo Data Optimization Software Benefits of Albireo for Virtual Servers January 2012 Permabit Technology Corporation Ten Canal Park Cambridge, MA 02141 USA Phone: 617.252.9600 FAX:

More information

Oracle Database Backups and Disaster Recovery @ Autodesk

Oracle Database Backups and Disaster Recovery @ Autodesk Oracle Database Backups and Disaster Recovery @ Autodesk Alan Williams Database Design Engineer Who We Are Autodesk software, suites, and cloud technology help customers design, visualize, and simulate

More information

Shared Services Canada. Cloud Computing

Shared Services Canada. Cloud Computing Shared Services Canada Cloud Computing Architecture Framework Advisory Committee Transformation, Service Strategy and Design January 28, 2013 1 Agenda TIME TOPICS PRESENTER(S) 09:00 9:15 Opening Remarks

More information

BIG DATA CAN DRIVE THE BUSINESS AND IT TO EVOLVE AND ADAPT RALPH KIMBALL BUSSUM 2014

BIG DATA CAN DRIVE THE BUSINESS AND IT TO EVOLVE AND ADAPT RALPH KIMBALL BUSSUM 2014 BIG DATA CAN DRIVE THE BUSINESS AND IT TO EVOLVE AND ADAPT RALPH KIMBALL BUSSUM 2014 Ralph Kimball Associates 2014 The Data Warehouse Mission Identify all possible enterprise data assets Select those assets

More information

The deployment of OHMS TM. in private cloud

The deployment of OHMS TM. in private cloud Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere

More information

AADHAAR BIOMETRIC SDK API SPECIFICATION - VERSION 2.0 MAY

AADHAAR BIOMETRIC SDK API SPECIFICATION - VERSION 2.0 MAY UIDAI Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR BIOMETRIC SDK API SPECIFICATION

More information

Adobe Digital Publishing Security FAQ

Adobe Digital Publishing Security FAQ Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server

More information

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation Integrating Biometrics into the Database and Application Server Infrastructure Shirley Ann Stern Principal Product Manager Oracle Corporation 1 Agenda! Introduction Importance of the infrastructure Role

More information

Multi-Factor Authentication of Online Transactions

Multi-Factor Authentication of Online Transactions Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

The Impact of PaaS on Business Transformation

The Impact of PaaS on Business Transformation The Impact of PaaS on Business Transformation September 2014 Chris McCarthy Sr. Vice President Information Technology 1 Legacy Technology Silos Opportunities Business units Infrastructure Provisioning

More information

Putting Apache Kafka to Use!

Putting Apache Kafka to Use! Putting Apache Kafka to Use! Building a Real-time Data Platform for Event Streams! JAY KREPS, CONFLUENT! A Couple of Themes! Theme 1: Rise of Events! Theme 2: Immutability Everywhere! Level! Example! Immutable

More information

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company

Biometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published

More information

Mark Bennett. Search and the Virtual Machine

Mark Bennett. Search and the Virtual Machine Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business

More information

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

Big Data Analytics Platform @ Nokia

Big Data Analytics Platform @ Nokia Big Data Analytics Platform @ Nokia 1 Selecting the Right Tool for the Right Workload Yekesa Kosuru Nokia Location & Commerce Strata + Hadoop World NY - Oct 25, 2012 Agenda Big Data Analytics Platform

More information

Big Data. Value, use cases and architectures. Petar Torre Lead Architect Service Provider Group. Dubrovnik, Croatia, South East Europe 20-22 May, 2013

Big Data. Value, use cases and architectures. Petar Torre Lead Architect Service Provider Group. Dubrovnik, Croatia, South East Europe 20-22 May, 2013 Dubrovnik, Croatia, South East Europe 20-22 May, 2013 Big Data Value, use cases and architectures Petar Torre Lead Architect Service Provider Group 2011 2013 Cisco and/or its affiliates. All rights reserved.

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Eloquence Training What s new in Eloquence B.08.00

Eloquence Training What s new in Eloquence B.08.00 Eloquence Training What s new in Eloquence B.08.00 2010 Marxmeier Software AG Rev:100727 Overview Released December 2008 Supported until November 2013 Supports 32-bit and 64-bit platforms HP-UX Itanium

More information

AADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction

AADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction AADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction 2 Introduction Biometric Attendance System based on Aadhaar Authentication Attendance System with real time monitoring Comprehensive

More information

Lambda Architecture. Near Real-Time Big Data Analytics Using Hadoop. January 2015. Email: bdg@qburst.com Website: www.qburst.com

Lambda Architecture. Near Real-Time Big Data Analytics Using Hadoop. January 2015. Email: bdg@qburst.com Website: www.qburst.com Lambda Architecture Near Real-Time Big Data Analytics Using Hadoop January 2015 Contents Overview... 3 Lambda Architecture: A Quick Introduction... 4 Batch Layer... 4 Serving Layer... 4 Speed Layer...

More information

Big Data Management and Security

Big Data Management and Security Big Data Management and Security Audit Concerns and Business Risks Tami Frankenfield Sr. Director, Analytics and Enterprise Data Mercury Insurance What is Big Data? Velocity + Volume + Variety = Value

More information

Role of Multi-biometrics in Usable Multi- Factor Authentication

Role of Multi-biometrics in Usable Multi- Factor Authentication Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 ratha@us.ibm.com *: In collaboration with colleagues from

More information

IRIS Onboarding Platform. Product Overview

IRIS Onboarding Platform. Product Overview IRIS Onboarding Platform Product Overview The Need for a Digitized Onboarding Platform In the current paper-based onboarding process, disparate and self-contained systems work in a non-integrated environment.

More information

Develop HIPAA-Compliant Mobile Apps with Verivo Akula

Develop HIPAA-Compliant Mobile Apps with Verivo Akula Develop HIPAA-Compliant Mobile Apps with Verivo Akula Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200 sales@verivo.com Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200

More information

API Architecture. for the Data Interoperability at OSU initiative

API Architecture. for the Data Interoperability at OSU initiative API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models

More information

TARRANT COUNTY PURCHASING DEPARTMENT

TARRANT COUNTY PURCHASING DEPARTMENT JACK BEACHAM, C.P.M., A.P.P. PURCHASING AGENT TARRANT COUNTY PURCHASING DEPARTMENT AUGUST 4, 2010 RFP NO. 2010-103 ROB COX, C.P.M., A.P.P. ASSISTANT PURCHASING AGENT RFP FOR DIGITAL ASSET MANAGEMENT SYSTEM

More information

Database Scalability and Oracle 12c

Database Scalability and Oracle 12c Database Scalability and Oracle 12c Marcelle Kratochvil CTO Piction ACE Director All Data/Any Data marcelle@piction.com Warning I will be covering topics and saying things that will cause a rethink in

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

XpoLog Competitive Comparison Sheet

XpoLog Competitive Comparison Sheet XpoLog Competitive Comparison Sheet New frontier in big log data analysis and application intelligence Technical white paper May 2015 XpoLog, a data analysis and management platform for applications' IT

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

Jun Liu, Senior Software Engineer Bianny Bian, Engineering Manager SSG/STO/PAC

Jun Liu, Senior Software Engineer Bianny Bian, Engineering Manager SSG/STO/PAC Jun Liu, Senior Software Engineer Bianny Bian, Engineering Manager SSG/STO/PAC Agenda Quick Overview of Impala Design Challenges of an Impala Deployment Case Study: Use Simulation-Based Approach to Design

More information

High Availability Solutions for the MariaDB and MySQL Database

High Availability Solutions for the MariaDB and MySQL Database High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment

More information

Why can you trust Google?

Why can you trust Google? Why can you trust Google? Przemek Sienkiewicz Head of Enterprise CEE, Russia & CIS Why is Security So Tough? Data Problem: Users want to access their data anytime, from anywhere 60% 1-out-of-10 66% of

More information

Introduction to Hadoop. New York Oracle User Group Vikas Sawhney

Introduction to Hadoop. New York Oracle User Group Vikas Sawhney Introduction to Hadoop New York Oracle User Group Vikas Sawhney GENERAL AGENDA Driving Factors behind BIG-DATA NOSQL Database 2014 Database Landscape Hadoop Architecture Map/Reduce Hadoop Eco-system Hadoop

More information

Hadoop and Map-Reduce. Swati Gore

Hadoop and Map-Reduce. Swati Gore Hadoop and Map-Reduce Swati Gore Contents Why Hadoop? Hadoop Overview Hadoop Architecture Working Description Fault Tolerance Limitations Why Map-Reduce not MPI Distributed sort Why Hadoop? Existing Data

More information

Training Module on Aadhaar Enrolment Process

Training Module on Aadhaar Enrolment Process Training Module on Aadhaar Enrolment Process UIDAI Unique Identification Authority of India Preface This training manual introduces the learner to the Aadhaar enrolment process. The module is meant to

More information

Mobile Application Development Platform Comparison

Mobile Application Development Platform Comparison Mobile Application Development Platform Comparison Unvired Inc. Disclaimer: This document has been prepared based on publicly available data of other platform vendors and is subject to change. Comparison

More information

Cost-Effective Business Intelligence with Red Hat and Open Source

Cost-Effective Business Intelligence with Red Hat and Open Source Cost-Effective Business Intelligence with Red Hat and Open Source Sherman Wood Director, Business Intelligence, Jaspersoft September 3, 2009 1 Agenda Introductions Quick survey What is BI?: reporting,

More information

Pulsar Realtime Analytics At Scale. Tony Ng April 14, 2015

Pulsar Realtime Analytics At Scale. Tony Ng April 14, 2015 Pulsar Realtime Analytics At Scale Tony Ng April 14, 2015 Big Data Trends Bigger data volumes More data sources DBs, logs, behavioral & business event streams, sensors Faster analysis Next day to hours

More information

Scalable Authentication

Scalable Authentication Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors

More information

EXECUTIVE SUMMARY CONTENTS. 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix. 1.

EXECUTIVE SUMMARY CONTENTS. 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix. 1. CONTENTS 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix EXECUTIVE SUMMARY Tenzing Managed IT services has recently partnered with Amazon Web Services

More information

Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company

Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company Implementation of Operator Authentication Processes on an Enterprise Level Mark Heard Eastman Chemical Company Presenter Mark Heard, Eastman Chemical Company Control System Engineer Experience with several

More information

Workshop on Hadoop with Big Data

Workshop on Hadoop with Big Data Workshop on Hadoop with Big Data Hadoop? Apache Hadoop is an open source framework for distributed storage and processing of large sets of data on commodity hardware. Hadoop enables businesses to quickly

More information

Overview. Big Data in Apache Hadoop. - HDFS - MapReduce in Hadoop - YARN. https://hadoop.apache.org. Big Data Management and Analytics

Overview. Big Data in Apache Hadoop. - HDFS - MapReduce in Hadoop - YARN. https://hadoop.apache.org. Big Data Management and Analytics Overview Big Data in Apache Hadoop - HDFS - MapReduce in Hadoop - YARN https://hadoop.apache.org 138 Apache Hadoop - Historical Background - 2003: Google publishes its cluster architecture & DFS (GFS)

More information

e-authentication guidelines for esign- Online Electronic Signature Service

e-authentication guidelines for esign- Online Electronic Signature Service e-authentication guidelines for esign- Online Electronic Signature Service Version 1.0 June 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry of Communications

More information

CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1

CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1 CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level -ORACLE TIMESTEN 11gR1 CASE STUDY Oracle TimesTen In-Memory Database and Shared Disk HA Implementation

More information

Simplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!!

Simplifying Big Data Analytics: Unifying Batch and Stream Processing. John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!! Simplifying Big Data Analytics: Unifying Batch and Stream Processing John Fanelli,! VP Product! In-Memory Compute Summit! June 30, 2015!! Streaming Analy.cs S S S Scale- up Database Data And Compute Grid

More information

Things to Consider When Planning for Cloud-Based Data Protection

Things to Consider When Planning for Cloud-Based Data Protection Things to Consider When Planning for Cloud-Based Data Protection What are the chances? Having quadruplets? 1 in 15,000,000 Become President of the USA? 1 in 10,000,000 Hole-in-one? 1 in 12,500 Your laptop

More information

Luncheon Webinar Series May 13, 2013

Luncheon Webinar Series May 13, 2013 Luncheon Webinar Series May 13, 2013 InfoSphere DataStage is Big Data Integration Sponsored By: Presented by : Tony Curcio, InfoSphere Product Management 0 InfoSphere DataStage is Big Data Integration

More information

OpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar

OpenNebula Open Souce Solution for DC Virtualization. C12G Labs. Online Webinar OpenNebula Open Souce Solution for DC Virtualization C12G Labs Online Webinar What is OpenNebula? Multi-tenancy, Elasticity and Automatic Provision on Virtualized Environments I m using virtualization/cloud,

More information

Value Realization at Johnson Controls using SAP HANA smart data integration Steve Carpenter Johnson Controls Ryan Champlin - SAP

Value Realization at Johnson Controls using SAP HANA smart data integration Steve Carpenter Johnson Controls Ryan Champlin - SAP Value Realization at Johnson Controls using SAP HANA smart data integration Steve Carpenter Johnson Controls Ryan Champlin - SAP Agenda What is SAP HANA smart data integration? Use cases for Smart Data

More information

NoSQL Performance Test In-Memory Performance Comparison of SequoiaDB, Cassandra, and MongoDB

NoSQL Performance Test In-Memory Performance Comparison of SequoiaDB, Cassandra, and MongoDB bankmark UG (haftungsbeschränkt) Bahnhofstraße 1 9432 Passau Germany www.bankmark.de info@bankmark.de T +49 851 25 49 49 F +49 851 25 49 499 NoSQL Performance Test In-Memory Performance Comparison of SequoiaDB,

More information

Patterns for scalability and availability in (trading) systems. Michel André CTO Saxo Bank

Patterns for scalability and availability in (trading) systems. Michel André CTO Saxo Bank Patterns for scalability and availability in (trading) systems Michel André CTO Saxo Bank October 6, 2014 Saxo Bank introduction Global online investment bank facilitator/broker setup - offices in 25 countries

More information

Key Management Best Practices

Key Management Best Practices White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult

More information

Successfully Deploying Alternative Storage Architectures for Hadoop Gus Horn Iyer Venkatesan NetApp

Successfully Deploying Alternative Storage Architectures for Hadoop Gus Horn Iyer Venkatesan NetApp Successfully Deploying Alternative Storage Architectures for Hadoop Gus Horn Iyer Venkatesan NetApp Agenda Hadoop and storage Alternative storage architecture for Hadoop Use cases and customer examples

More information