Agenda 4/21/ Big Data Level Set 2. Who are we? 3. What do we do? 4. What have we done so far? 5. What are we working on? 6.
|
|
- Ezra Carpenter
- 8 years ago
- Views:
Transcription
1 Wilco van Ginkel, Co-Chair BDWG Agenda 1. Big Data Level Set 2. Who are we? 3. What do we do? 4. What have we done so far? 5. What are we working on? 6. Q&A 1
2 Big Data Level Set 2
3 Word on the street Sliding window Dimensions don t always expand in the same directions. Examples: Twitter feeds (small data, but very high velocity) Hubble Telescope pictures (large pic, but low volume) Is Unstructured Data really unstructured? 3
4 What s next in BD? Fast data (e.g., IoT) Climb up the BD stack Visualization Applying BD techniques to Dark Data (e.g., Ayasdi) And much more BD Security Yeah, what about it? 4
5 Big Data Life Cycle Internal External Owned, subscribed, bought Format Governance Data silos Storage infrastructure Data Scientists Predictive Prescriptive Visualization Think different Not always why Plug information in business process Actionable Source: Verizon Big Data White Paper How to thrive on the frontiers of data Still need to balance Security Requirements (CIAA) Risk Profile Business Requirements 5
6 And also ensure data qualities Source: ISACA White Paper Big Data Impact & Benefits, March 2013 Can t we just use current security controls and standards? Well, Yes and No 6
7 Change of playing field New Paradigm/Technology The Big Data V s Data Explosion Cloud: cheap & easy access to compute & storage Data on the go Mobility all the way Data without borders Difference in international legislation So, there is work to do 7
8 Nice to meet you! Who are we? Started April 2012 Focus on Big Data Privacy & Security Different Initiatives/sub working groups Works together with other orgs, like NIST Leadership team: Chair - Sree Rajan, Fujitsu Co-Chair - Wilco van Ginkel, Verizon Co-chair - Neel Sundaresan, Ebay 8
9 Our Journey Develop best practices for security and privacy in big data Support industry and government on adoption of best practices Establish liaisons with other organizations in order to coordinate the development of big data security and privacy standards Accelerate the adoption of novel research aimed to address security and privacy issues Focus areas Security Analytics Cryptography and Privacy Technologies Infrastructure Security Privacy, Policy, Governance and Legal Issue Framework and Taxonomy 9
10 What have we done so far? The Top Ten November 2012 April
11 Cloud Security Alliance, Use Case(s) Modeling Analysis Implementation 11
12 Big Data Analytics Report September BD Analytics for Security Examples Botnet monitoring WINE Platform APT Detection 12
13 The Top Ten Crypto Challenges March Big Data Taxonomy Taxonomy = The science or practice of classification 13
14 Source: Big Data Taxonomy September
15 15
16 Other initiatives BDWG Other Initiatives We provided input for the upcoming NIST Big Data Standard. We provided comments to the White House Request for Comment on Big Data Privacy. Check out: Lots of media interviews. Particularly after we have published a deliverable 16
17 What is next? 17
18 10 Sections 1. Secure Computations in Distributed Programming Frameworks 2. Security Best Practices for Non-Relational Data Stores 3. Secure Data Storage and Transactions Logs 4. End-point Input Validation/Filtering 5. Real-Time Security/Compliance Monitoring 6. Scalable and Composable Privacy-Preserving analytics 7. Crypto-Enforced Access Control and Secure Communication 8. Granular Access Control 9. Granular Audits 10. Data Provenance Help needed 1. Secure Computations in Distributed Programming Frameworks 2. Security Best Practices for Non-Relational Data Stores 3. Secure Data Storage and Transactions Logs 4. End-point Input Validation/Filtering 5. Real-Time Security/Compliance Monitoring 6. Scalable and Composable Privacy-Preserving analytics 7. Crypto-Enforced Access Control and Secure Communication 8. Granular Access Control 9. Granular Audits 10. Data Provenance 18
19 How to get involved? CSA Big Data Working Group Site: CSA, Big Data LinkedIn: Basecamp Project Collaboration Site Request Form For any questions/remarks/feedback, please contact either: Who How Sreeranga (Sree) Rajan (Fujitsu) Wilco van Ginkel (Verizon) Neel Sundaresan (ebay) 19
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
More informationArnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
More informationTop Ten Big Data Security and Privacy Challenges
Top Ten Big Data Security and Privacy Challenges November 2012 2012 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and
More informationModerator: Panelists: Panel #2 Big Data: Application Security and Privacy. Keith Swenson, VP of Research and Development, Fujitsu America, Inc.
Panel #2 Big Data: Application Security and Privacy 2:15 PM 3:00 PM Moderator: Keith Swenson, VP of Research and Development, Fujitsu America, Inc. Panelists: Taka Matsutsuka, Researcher, Fujitsu Laboratories
More informationOrganizational Impact of Big Data on Privacy & Security
Organizational Impact of Big Data on Privacy & Security Marijn Janssen, Agung Wahyudi Delft University of Technology EdCon Puerto Rico, 12 August 2015 OUTLINE 01 Privacy & Security in Organization 02 Big
More informationTop Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
More informationNIST Big Data Public Working Group
NIST Big Data Public Working Group Requirements May 13, 2014 Arnab Roy, Fujitsu On behalf of the NIST BDWG S&P Subgroup S&P Requirements Emerging due to Big Data Characteristics Variety: Traditional encryption
More informationCloud Data Security. Sol Cates CSO @solcates scates@vormetric.com
Cloud Data Security Sol Cates CSO @solcates scates@vormetric.com Agenda The Cloud Securing your data, in someone else s house Explore IT s Dirty Little Secret Why is Data so Vulnerable? A bit about Vormetric
More informationBig Data Research Sponsorship
Big Data Research Sponsorship Overview The term Big Data refers to the massive amounts of digital information companies and governments collect about us and our surroundings. Providing security and privacy
More informationA Study on Security and Privacy in Big Data Processing
A Study on Security and Privacy in Big Data Processing C.Yosepu P Srinivasulu Bathala Subbarayudu Assistant Professor, Dept of CSE, St.Martin's Engineering College, Hyderabad, India Assistant Professor,
More informationBig Data Trust and Reputation, Privacy Cyber Threat Intelligence
Big Data Trust and Reputation, Privacy Cyber Threat Intelligence October 27, 2015 Start Time: 9 am US Pacific / 12 noon US Eastern / 5 pm London Time #ISSAWebConf Big Data Trust and Reputation, Privacy
More informationNIST Big Data Phase I Public Working Group
NIST Big Data Phase I Public Working Group Reference Architecture Subgroup May 13 th, 2014 Presented by: Orit Levin Co-chair of the RA Subgroup Agenda Introduction: Why and How NIST Big Data Reference
More informationBig Data Standardisation in Industry and Research
Big Data Standardisation in Industry and Research EuroCloud Symposium ICS Track: Standards for Big Data in the Cloud 15 October 2013, Luxembourg Yuri Demchenko System and Network Engineering Group, University
More informationOverview NIST Big Data Working Group Activities
Overview NIST Big Working Group Activities and Big Architecture Framework (BDAF) by UvA Yuri Demchenko SNE Group, University of Amsterdam Big Analytics Interest Group 17 September 2013, 2nd RDA Plenary
More informationIncident Management & Forensics Working Group. Charter
Incident Management & Forensics Working Group Charter February 2013 2013 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print,
More informationCloud and Big Data Standardisation
Cloud and Big Data Standardisation EuroCloud Symposium ICS Track: Standards for Big Data in the Cloud 15 October 2013, Luxembourg Yuri Demchenko System and Network Engineering Group, University of Amsterdam
More informationAgenda 4/21/2015. Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems
Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems Cloud Security Alliance, 2015 Agenda Charter /Members What is Data Governance Data
More informationSUPPORTING CIO STRATEGIES AND PRIORITIES: FROM THE CLOUD
SUPPORTING CIO STRATEGIES AND PRIORITIES: FROM THE CLOUD Presented by: CloudAccess: CloudAccess provides comprehensive security-as-a-service from the cloud. Our suite of robust and scalable solutions eliminates
More informationPrivacy Management Standards: What They Are and Why They Are Needed Now
ITU-T Q10/17 Identity Summit Geneva December 10, 2010 Privacy Management Standards: What They Are and Why They Are Needed Now John Sabo Director Global Government Relations Chair, OASIS IDtrust Member
More informationAn Overview of Big Data Technology and Security Implications
An Overview of Big Data Technology and Security Implications Tim Grance Senior Computer Scientist NIST Information Technology Laboratory grance@nist.gov Disclaimer The ideas herein represent the author
More informationBIG Big Data Public Private Forum
DATA STORAGE Martin Strohbach, AGT International (R&D) THE DATA VALUE CHAIN Value Chain Data Acquisition Data Analysis Data Curation Data Storage Data Usage Structured data Unstructured data Event processing
More informationTrends in Information Technology (IT) Auditing
Trends in Information Technology (IT) Auditing Padma Kumar Audit Officer May 21, 2015 Discussion Topics Common and Emerging IT Risks Trends in IT Auditing IT Audit Frameworks & Standards IT Audit Plan
More informationGRC Stack Research Sponsorship
GRC Stack Research Sponsorship Overview Achieving Governance, Risk Management and Compliance (GRC) goals requires appropriate assessment criteria, relevant control objectives and timely access to necessary
More informationWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud - Practical advice for cloud data security Ulf Mattsson CTO, Protegrity Ulf.Mattsson@protegrity.com Ulf Mattsson, Protegrity CTO Cloud Security Alliance
More informationBIG DATA THE NEW OPPORTUNITY
Feature Biswajit Mohapatra is an IBM Certified Consultant and a global integrated delivery leader for IBM s AMS business application modernization (BAM) practice. He is IBM India s competency head for
More informationHow To Build A Digital Business From The Ground Up
Powering Business Value and Seamless Experiences GSMA Mobile Connect Accelerator and API Exchange by Apigee Apigee Digital Value Chain for Network Operators and Service Providers APP DEVELOPER Wants to
More informationBig Data: Overview and Roadmap. 2015 eglobaltech. All rights reserved.
Big Data: Overview and Roadmap 2015 eglobaltech. All rights reserved. What is Big Data? Large volumes of complex and variable data that require advanced techniques and technologies to enable capture, storage,
More informationSmall Business Working Group. Charter
Small Business Working Group Charter March 2013 2013 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud
More informationBig Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure
Big Security for Big : Addressing Security Challenges for the Big Infrastructure Yuri Demchenko SNE Group, University of Amsterdam On behalf of Yuri Demchenko, Canh Ngo, Cees de Laat, Peter Membrey, Daniil
More informationStandard Big Data Architecture and Infrastructure
Standard Big Data Architecture and Infrastructure Wo Chang Digital Data Advisor Information Technology Laboratory (ITL) National Institute of Standards and Technology (NIST) wchang@nist.gov May 20, 2016
More informationWhat REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond!
What REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond! HOW to best integrate security into the office AND the cloud? And what is a thing is that MORE we have
More informationBUILDING THE CASE FOR CLOUD: HOW BUSINESS FUNCTIONS IN UK MANUFACTURERS ARE DRIVING PUBLIC CLOUD ADOPTION
BUILDING THE CASE FOR CLOUD: HOW BUSINESS FUNCTIONS IN UK MANUFACTURERS ARE DRIVING PUBLIC CLOUD ADOPTION Industry Report Contents 2 4 6 Executive Summary Context for the Sector Key Findings 3 5 9 About
More informationFP7-ICT-2013-11-4.2. Scalable Data Analytics. Deadline: 16 April 2013 at 17:00:00 (Brussels local time)
Scalable Data Analytics Deadline: 16 April 2013 at 17:00:00 (Brussels local time) Agenda Time 14H30 Programme Overview of Objective 4.2 Scalable Data Analytics By Carola Carstens, European Commission,
More informationIIA Conference. September 18, 2015. Paige Needling Director, Global Information Security Recall, Inc.
IIA Conference September 18, 2015 Paige Needling Director, Global Information Security Recall, Inc. IT SECURITY UMBRELLA Compliance for IT Data Privacy Protection Privacy Risk Assessment Vulnerability
More informationAssessing Risks in the Cloud
Assessing Risks in the Cloud Jim Reavis Executive Director Cloud Security Alliance Agenda Definitions of Cloud & Cloud Usage Key Cloud Risks About CSA CSA Guidance approach to Addressing Risks Research
More informationand NoSQL Data Governance for Regulated Industries Using Hadoop Justin Makeig, Director Product Management, MarkLogic October 2013
Data Governance for Regulated Industries Using Hadoop and NoSQL Justin Makeig, Director Product Management, MarkLogic October 2013 Who am I? Product Manager for 6 years at MarkLogic Background in FinServ
More informationSTAR WARS AND THE ART OF DATA SCIENCE
STAR WARS AND THE ART OF DATA SCIENCE MELODIE RUSH, SENIOR ANALYTICAL ENGINEER CUSTOMER LOYALTY Original Presentation Created And Presented By Mary Osborne, Business Visualization Manager At 2014 SAS Global
More informationBig Data & Security. Aljosa Pasic 12/02/2015
Big Data & Security Aljosa Pasic 12/02/2015 Welcome to Madrid!!! Big Data AND security: what is there on our minds? Big Data tools and technologies Big Data T&T chain and security/privacy concern mappings
More informationHow To Create A Business Intelligence (Bi)
Oracle Business Analytics Overview Markus Päivinen Business Analytics Country Leader, Finland May 2014 1 Presentation content What are the requirements for modern BI Trend in Business Analytics Big Data
More informationHow To Make Sense Of Data With Altilia
HOW TO MAKE SENSE OF BIG DATA TO BETTER DRIVE BUSINESS PROCESSES, IMPROVE DECISION-MAKING, AND SUCCESSFULLY COMPETE IN TODAY S MARKETS. ALTILIA turns Big Data into Smart Data and enables businesses to
More informationBig Data Analytics- Innovations at the Edge
Big Data Analytics- Innovations at the Edge Brian Reed Chief Technologist Healthcare Four Dimensions of Big Data 2 The changing Big Data landscape Annual Growth ~100% Machine Data 90% of Information Human
More informationCloud Integration and the Big Data Journey - Common Use-Case Patterns
Cloud Integration and the Big Data Journey - Common Use-Case Patterns A White Paper August, 2014 Corporate Technologies Business Intelligence Group OVERVIEW The advent of cloud and hybrid architectures
More informationSecuring NoSQL Clusters
Presents Securing NoSQL Clusters Adrian Lane, CTO alane@securosis.com Twitter: @AdrianLane David Mortman dmortman@securosis.com Twitter: @ Independent analysts with backgrounds on both the user and vendor
More informationCLOUD COMPUTING AND BIG DATA ANALYTICS
CLOUD COMPUTING AND BIG DATA ANALYTICS 1. Divya Priya Dharsini.A 2.Announcia.C 1,2.Computer Science And Engineering SSM InstituteOfEngineering AndTechnology Dindigul 1. divya5dpd@gmail.com 2. announci27@gmail.com
More informationSikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges
More informationInstructor Introduction
Securing Big Data Instructor Introduction Leighton R. Johnson, III CISA, CISSP, CISM, MBCI, CSSLP, CIFI, CFCP, CAP, CRISC SC-ISACA Chapter Instructor Member: IEEE, ACM, ASIS, ISSA, IISFA, ISACA, ISC2,
More informationBIG DATA: PROMISE, POWER AND PITFALLS NISHANT MEHTA
BIG DATA: PROMISE, POWER AND PITFALLS NISHANT MEHTA Agenda Promise Definition Drivers of and for Big Data Increase revenue using Big Data Power Optimize operations and decrease costs Discover new revenue
More informationHow To Understand The Benefits Of Big Data
Findings from the research collaboration of IBM Institute for Business Value and Saïd Business School, University of Oxford Analytics: The real-world use of big data How innovative enterprises extract
More information3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
More informationG-Cloud Big Data Suite Powered by Pivotal. December 2014. G-Cloud. service definitions
G-Cloud Big Data Suite Powered by Pivotal December 2014 G-Cloud service definitions TABLE OF CONTENTS Service Overview... 3 Business Need... 6 Our Approach... 7 Service Management... 7 Vendor Accreditations/Awards...
More informationLeading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA
Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture
More informationRaul F. Chong Senior program manager Big data, DB2, and Cloud IM Cloud Computing Center of Competence - IBM Toronto Lab, Canada
What is big data? Raul F. Chong Senior program manager Big data, DB2, and Cloud IM Cloud Computing Center of Competence - IBM Toronto Lab, Canada 1 2011 IBM Corporation Agenda The world is changing What
More informationSmart City Live! 9-10 May 2016, Nice
Monday, May 9, 2016 Smart City Live! 9-10 May 2016, Nice Draft agenda as of November 20, 2015 SMART LIVING SMART CITY SERVICES 9:00 AM CASE STUDY: Developing Smart Energy communities Understanding the
More informationSecurity Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
More informationHow To Understand The Internet Of Things
www.ovum.com The Internet of Things: Understanding the evolving value chain Jamie Moss, Senior Analyst, Consumer Technology & IoT Gary Barnett, Chief Analyst, Software, Ovum Ovum s Internet of Things (IoT)
More informationIDC MaturityScape Benchmark: Big Data and Analytics in Government. Adelaide O Brien Research Director IDC Government Insights June 20, 2014
IDC MaturityScape Benchmark: Big Data and Analytics in Government Adelaide O Brien Research Director IDC Government Insights June 20, 2014 IDC MaturityScape Benchmark: Big Data and Analytics in Government
More informationAccenture Cyber Security Transformation. October 2015
Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting
More informationAPPROACHABLE ANALYTICS MAKING SENSE OF DATA
APPROACHABLE ANALYTICS MAKING SENSE OF DATA AGENDA SAS DELIVERS PROVEN SOLUTIONS THAT DRIVE INNOVATION AND IMPROVE PERFORMANCE. About SAS SAS Business Analytics Framework Approachable Analytics SAS for
More informationThe 3 questions to ask yourself about BIG DATA
The 3 questions to ask yourself about BIG DATA Do you have a big data problem? Companies looking to tackle big data problems are embarking on a journey that is full of hype, buzz, confusion, and misinformation.
More informationBig Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
More informationInformation Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
More informationThe Principles of the Business Data Lake
The Principles of the Business Data Lake The Business Data Lake Culture eats Strategy for Breakfast, so said Peter Drucker, elegantly making the point that the hardest thing to change in any organization
More informationHigh-Performance Analytics
High-Performance Analytics David Pope January 2012 Principal Solutions Architect High Performance Analytics Practice Saturday, April 21, 2012 Agenda Who Is SAS / SAS Technology Evolution Current Trends
More informationIDC MaturityScape Benchmark: Big Data and Analytics in Government
IDC MaturityScape Benchmark: Big Data and Analytics in Government Adelaide O Brien Research Director, IDC aobrien@idc.com Presentation to ACT-IAC Emerging Technology SIG July, 2014 IDC MaturityScape Benchmark:
More informationBackground. Liwei Ren. Trend Micro
Securing Your Data for the Journey to the Clouds Liwei Ren, Ph.D, Trend Micro April, 2015, SNIA DSI 2015, Santa Clara, California Copyright 2011 Trend Micro Inc. 1 Background Liwei Ren Research interests
More informationBIG DATA WITHIN THE LARGE ENTERPRISE 9/19/2013. Navigating Implementation and Governance
BIG DATA WITHIN THE LARGE ENTERPRISE 9/19/2013 Navigating Implementation and Governance Purpose of Today s Talk John Adler - Data Management Group Madina Kassengaliyeva - Think Big Analytics Growing data
More informationSuggest Topics / Workshop Event Registration Agenda
Login Signup November 13 to 15 2015, Santa Clara, USA. Overview Registration Agenda Speakers Sponsors Suggest Topics / Event Registration Agenda Day -1 ( Nov 13 7:45AM- 7:30PM ) Big Data Track 7:45 AM
More informationSplunk Company Overview
Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected
More informationTowards Smart and Intelligent SDN Controller
Towards Smart and Intelligent SDN Controller - Through the Generic, Extensible, and Elastic Time Series Data Repository (TSDR) YuLing Chen, Dell Inc. Rajesh Narayanan, Dell Inc. Sharon Aicler, Cisco Systems
More informationSurvey of Big Data Architecture and Framework from the Industry
Survey of Big Data Architecture and Framework from the Industry NIST Big Data Public Working Group Sanjay Mishra May13, 2014 3/19/2014 NIST Big Data Public Working Group 1 NIST BD PWG Survey of Big Data
More informationPCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:
PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies Agenda Instructor Biography Background On
More informationSharePoint 2010 Pragmatic implementation and use at a corporate level. Carol Van der Donck
SharePoint 2010 Pragmatic implementation and use at a corporate level Carol Van der Donck Agenda What is SP2010 Some facts SharePoint Governance Conclusion Agenda What is SP2010 Some facts SharePoint Governance
More informationTowards a common definition and taxonomy of the Internet of Things. Towards a common definition and taxonomy of the Internet of Things...
Towards a common definition and taxonomy of the Internet of Things Contents Towards a common definition and taxonomy of the Internet of Things... 1 Introduction... 2 Common characteristics of Internet
More informationThe New World of Data. Don Strickland President, Strickland & Associates
The New World of Data Don Strickland President, Strickland & Associates THE NEW WORLD OF DATA 1900 1950 2000 Physical Infrastructure Labor Capital Physical Infrastructure Labor Capital Physical Infrastructure
More informationTowards a Domain-Specific Framework for Predictive Analytics in Manufacturing. David Lechevalier Anantha Narayanan Sudarsan Rachuri
Towards a Framework for Predictive Analytics in Manufacturing David Lechevalier Anantha Narayanan Sudarsan Rachuri Outline 2 1. Motivation 1. Why Big in Manufacturing? 2. What is needed to apply Big in
More informationExposing the Cloud: It It s More than a Buzzword Tim Connors, Director, AT&T AT&T
Exposing the Cloud: It s More than a Buzzword Tim Connors, Director, AT&T Exposing the Cloud: It s More than a Buzzword Discussion Agenda Cloud Storage Target Uses When is it right? When is it wrong? Specific
More informationCloud Storage: Where Does It Fit Into Tomorrow s IT?
Cloud Storage: Where Does It Fit Into Tomorrow s IT? Vincent Franceschini CTO Distributed Data Storage Solutions Hitachi Data Systems Corporation Vincent.Franceschini@hds.com Constant, increasing reliance
More informationSOCIAL NETWORKS AND STUDENTS' FUTURE JOBS
SOCIAL NETWORKS AND STUDENTS' FUTURE JOBS Lorena Batagan 1 and Catalin Boja 2 1) 2) Bucharest University of Economic Studies, Romania E-mail: lorena.pocatilu@ie.ase.ro; E-mail: catalin.boja@ie.ase.ro Abstract
More informationAdopting Cloud Apps? Ensuring Data Privacy & Compliance. Varun Badhwar Vice President of Product Strategy CipherCloud
Adopting Cloud Apps? Ensuring Data Privacy & Compliance Varun Badhwar Vice President of Product Strategy CipherCloud Agenda Cloud Adoption & Migration Challenges Introduction to Cloud Computing Cloud Security
More informationDelivering secure, real-time business insights for the Industrial world
Delivering secure, real-time business insights for the Industrial world Arnaud Mathieu: Program Director, Internet of Things Dev., IBM amathieu@us.ibm.com @arnomath 1 We are on the threshold of massive
More informationBusin i ess I n I t n e t ll l i l g i e g nce c T r T e r nds For 2013
Business Intelligence Trends For 2013 10 Trends The last few years the change in Business Intelligence seems to accelerate under the pressure of increased business demand and technology innovations. Here
More informationCSC590: Selected Topics BIG DATA & DATA MINING. Lecture 2 Feb 12, 2014 Dr. Esam A. Alwagait
CSC590: Selected Topics BIG DATA & DATA MINING Lecture 2 Feb 12, 2014 Dr. Esam A. Alwagait Agenda Introduction What is Big Data Why Big Data? Characteristics of Big Data Applications of Big Data Problems
More informationApigee Insights Increase marketing effectiveness and customer satisfaction with API-driven adaptive apps
White provides GRASP-powered big data predictive analytics that increases marketing effectiveness and customer satisfaction with API-driven adaptive apps that anticipate, learn, and adapt to deliver contextual,
More informationSecuring Your Big Data Environment
Securing Your Big Data Environment Ajit Gaddam ajit@root777.com Abstract Security and privacy issues are magnified by the volume, variety, and velocity of Big Data. The diversity of data sources, formats,
More informationEDISON: Coordination and cooperation to establish new profession of Data Scientist for European Research and Industry
EDISON: Coordination and cooperation to establish new profession of Data Scientist for European Research and Industry Yuri Demchenko University of Amsterdam EDISON Education for Data Intensive Science
More informationHow To Use Hp Vertica Ondemand
Data sheet HP Vertica OnDemand Enterprise-class Big Data analytics in the cloud Enterprise-class Big Data analytics for any size organization Vertica OnDemand Organizations today are experiencing a greater
More informationCan We Become Resilient to Cyber Attacks?
Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,
More informationCreate and Drive Big Data Success Don t Get Left Behind
Create and Drive Big Data Success Don t Get Left Behind The performance boost from MapR not only means we have lower hardware requirements, but also enables us to deliver faster analytics for our users.
More informationCervino Marketing Delivers Smart Marketing Dashboards. Netherlands-based Klipfolio Partner Combines Big Data Engine with Klipfolio Dashboards
Cervino Marketing Delivers Smart Marketing Dashboards Netherlands-based Klipfolio Partner Combines Big Data Engine with Klipfolio Dashboards Company Background: Cervino Marketing, based in Amsterdam, the
More informationBig Data Analytics Roadmap Energy Industry
Douglas Moore, Principal Consultant, Architect June 2013 Big Data Analytics Energy Industry Agenda Why Big Data in Energy? Imagine Overview - Use Cases - Readiness Analysis - Architecture - Development
More informationCan We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
More informationDemystifying Big Data Government Agencies & The Big Data Phenomenon
Demystifying Big Data Government Agencies & The Big Data Phenomenon Today s Discussion If you only remember four things 1 Intensifying business challenges coupled with an explosion in data have pushed
More informationData Scientist for 1h
Scientist for 1h Silvia Quarteroni, NLP Expert Jérôme Berthier, Head of BI & Big Geneva, 22.04.2015 OUTLINE 1. ELCA 2. From myth to reality 3. Some proofs 4. Conclusion Visit us at our booth no. A23 21.04.2015
More informationBusiness Insight. How to thrive on the FRONTIERS OF DATA. What big data means for you, and how cloud can help you become a data-driven business
Business Insight How to thrive on the FRONTIERS OF DATA What big data means for you, and how cloud can help you become a data-driven business How to thrive on THE FRONTIERS OF DATA Finding effective strategies
More informationCLOUD COMPUTING LESSONS LEARNED. Marc Vael, Chief Audit Executive Smals / President ISACA Belgium, November 2015
CLOUD COMPUTING LESSONS LEARNED Marc Vael, Chief Audit Executive Smals / President ISACA Belgium, November 2015 WHEN WAS THE TERM USED FOR THE FIRST TIME? 26 th of October 1997 WHO HYPED ALL THIS? What's
More informationBYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity
BYE BYE PASSWORDS The Future of Online Identity Hans Zandbelt Sr. Technical Architect CTO Office - Ping Identity 2015 Copyright 2014 Ping Identity Corp. All rights reserved. 1 Agenda 1 2 3 Cloud & Mobile:
More informationIDC FutureScape: Worldwide Big Data & Analytics 2016 Predictions. IDC Web Conference November 2015
IDC FutureScape: Worldwide Big Data & Analytics 2016 Predictions IDC Web Conference November 2015 Logistics Today s Speakers Submit any questions to webconferences@idc.com You can download slides from
More informationDo You Need to be a Data Scientist to Analyze Text? Fern Halper
Do You Need to be a Data Scientist to Analyze Text? Fern Halper TDWI Research Director for Advanced Analytics May 29, 2013 Sponsor Speakers Fern Halper Research Director, Advanced Analytics, TDWI Judson
More informationCloud standards: Ready for Prime Time. CloudWatch webinar: Standards ready for prime time (part 2) 1
Cloud standards: Ready for Prime Time CloudWatch webinar: Standards ready for prime time (part 2) 1 Agenda 15:00 Welcome and introduction 15:05 IEEE P2301: Guide for Cloud Portability and Interoperability
More information