Funding Innovative Network and Cybersecurity Research
|
|
|
- Cornelia Wilkerson
- 10 years ago
- Views:
Transcription
1 Funding Innovative Network and Cybersecurity Research Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure May 2015
2 NSF Core Mission: Fundamental Research Fundamental Research $7.7 billion FY 2016 research budget 11,000 awards funded 94% funds research, education and related activities 2,000 NSF-funded institutions 50,000 proposals 300,000 NSF-supported researchers 2
3 Trends and Challenges for (US) Research Changing practice of science: interdisciplinary, teamoriented, global, data intensive, complex work and data flows increasingly integrated with technology The power and opportunity of technology: instrumenting everything; computational and data learning and workforce development; ubiquitous connectivity Shifting funding landscape and role for foundational research in the face of escalating global challenges Changing demographics: diversity, increased need for more computational and data scientists 3
4 Computer and Information Science and Engineering (CISE) Directorate Exploring the frontiers of computing Promote progress of computer and information science and engineering research and education, and advance the development and use of cyberinfrastructure. Promote understanding of the principles and uses of advanced computer, communications, and information systems in support of societal priorities. Contribute to universal, transparent and affordable participation in a knowledge-based society. These frontiers have interfaces with all the sciences, engineering, education and humanities and a strong emphasis on innovation for society. 4
5 Computing frontiers, national priorities Image Credit: CCC and SIGACT CATCS From Data to Knowledge to Action Manufacturing, Robotics, & Smart Systems Image Credit: ThinkStock Understanding the Brain Image Credit: Georgia Computes! Georgia Tech Image Credit: ThinkStock Image Credit: Georgia Computes! Georgia Tech Image Credit: CCC and SIGACT CATCS Secure Cyberspace Education, Workforce Development Augmenting Human Capabilities Expanding the limits of computation 5
6 Cognitive Science and Neuroscience Goal: Understanding the human brain White House BRAIN Initiative launched in April 2013 (NSF, NIH, DARPA). Addresses critical challenge of research integration across multiple scales ranging from molecular to behavioral levels. Builds on NSF s unique ability to catalyze multi-disciplinary research and ongoing NSF investments. - Cyberinfrastructure - National Brain Observatory Multiscale & Multimodal Modeling to relate dynamic brain activity to behavior Comparative Analyses Across Species to identify conserved functional circuitry: take advantage of Biodiversity Innovative Technologies to understand brain function and treat brain disorders Cyber Tools & Standards for data acquisition, analysis and integration Quantitative & Predictive Theories of brain function 6
7 Innovations at the Nexus of Food, Energy, and Water Systems (INFEWS) Securing and protecting food, energy and water resources Groundwater Resources Modeling Frameworks Hydrology Ecosystem Services Water Sustainability Education & Outreach NATIONAL SCIENCE FOUNDATIO N Decision-Support Tools Land-Ocean- Atmosphere Interactions Natural Resource Management Water Quality & Public Health Climate Variability Land-Use Change Partnership among all NSF directorates New resource management algorithms, architectures Real-time coordination, communications Robust observation, sensing, inference Large-scale data analysis/management, including modeling, simulation Optimization of complex systems Advancing computational infrastructure 7
8 Infrastructure GENI: At-scale Network Experimentation Systems research GLOBAL ENVIRONMENT FOR NETWORKING INNOVATIONS (GENI) At-scale virtual laboratory enabling experimentation with deeply programmable networks NSFCloud Extending virtualization from the network to end-end cloud US IGNITE Applications Stitching together broadband islands, enabling development of gigabit applications with high-impact public benefit Advancing science and engineering ADVANCED CYBER- INFRASTRUCTURE Cutting-edge computation and data-enabled capabilities at all scales 8
9 NSF Advanced Cyberinfrastructure (ACI) is part of the CISE Directorate Computer and Information Science and Engineering (CISE) Division of Division of Division of Division of Advanced Cyberinfrastructure (ACI) Computing and Communications Foundations (CCF) Computer and Network Systems (CNS) Information and Intelligent Systems (IIS) Data Algorithmic Foundations Computer Systems Research Cyber-Human Systems High Performance Computing Networking/ Cybersecurity Communication and Information Foundations Networking Technology and Systems Information Integration and Informatics Software Software and Hardware Foundations Robust Intelligence 9
10 Advanced Cyberinfrastructure (ACI) Supports the research, development, acquisition and provision of state-of-the-art CI resources, tools, and services: o o o o High Performance Computing: Provide open-science community with state-of-the-art HPC assets ranging from loosely coupled clusters to large scale instruments; develop a collaborative and innovative scientific HPC environment. Data: Support scientific communities in the use, sharing and archiving of data by creating building blocks to address community needs in data infrastructure. Networking and Cybersecurity: Invest in campus network improvements and re-engineering to support a range of activities in modern computational science. Support transition of cybersecurity research to practice. Software: Transform innovations in research and education into sustained software resources (shared tools and services) that are an integral part of cyberinfrastructure. 10
11 HPC: Blue Waters: Grand Challenge Computational Science and Engineering through Sustained Petascale Performance UIUC Data Center Cray XE6/XK7 accepted December, 2012 Petascale Application Projects May, 2013 Credit: Theoretical and Computational Biophysics Group ( Beckman Institute for Advanced Science and Technology, UIUC 11
12 National Ecological Observatory Network (NEON) The first integrated platform for discovery of change dynamics in the biosphere on regional to continental scales Open Data Enabled Science: 12,000 atmospheric, ground & stream sensors, and organismal sampling across 106 U.S. sites Airborne site-flyover program combining lidar, spectrocopy and optical imaging Standardized, continually re-calibrated measurements and automated data QA/QC ~700 streaming Data Products (~40 TB data/yr) will be available on the NEON Portal. Physical samples available to the research community. 12
13 Large Synoptic Survey Telescope (LSST) A survey of 20 billion objects in space and time Cerro Pachón, Chile 2700 M Probe Dark Matter & Dark Energy Map the Milky Way Galaxy Catalog Solar System Objects Detect Transient Phenomena Open Data Enabled Science: High dimensional data exploration Very large datasets allow for precision statistical analysis and automated rare and transient event detection Massively parallel astrophysics A new window on the Universe to expect the unexpected will transform astronomical research culture and practice
14 Nightly transfer rates of Tb. LSST network will use 2x100Gbps fiber from summit to base site (La Serena,Chilean Data Access Center), and then 2x40Gbps fiber to US/NCSA (Champaign- Urbana) 5/21/
15 Networking Programs in CISE/ACI Networking as a fundamental layer and underpinning of Scientific Cyberinfrastructure CC*DNI (Campus Cyberinfrastructure Data, Networking and Innovation Campus networking upgrade (re-design to sciencedmz at campus border and 10/100Gbps) and innovation program IRNC International R&E Network Scientific discovery as a global collaborative endeavor Provide network connections linking U.S. research with peer networks in other parts of the world Stimulate the deployment and operational understanding of emerging network technology and standards in an international context 100Gbps trans-oceanic experimental trials underway 15
16 Examples of Funded Network Activities Re-architecting a campus network to support large science data flows, for example by designing and building a "science DMZ Integration of networking protocols/technologies with application layer Transitioning successful research prototypes in SDN, and activities supported by GENI and FIA programs, to distributed scientific environments and campus infrastructure Innovative network solutions to problems driven by distributed computing and storage systems including cloud services. Federation-based security solutions for dynamic network services extending end-to-end Network connection upgrade (10/40/100 Gb) for the campus connection to a regional optical exchange or point-of-presence that connects to Internet2 or National Lambda Rail Gbps connectivity to/from Asia and Americas Open Exchange Points in US Primary NOC Advanced Network Measurement 16
17 The Science DMZ 17
18 CC*IIE Award Map
19 Example Science Drivers from ACI Networking Programs UMaryland developing network embedded storage and compute resources via Software Defined Networking (SDN) and exposing services to scientific applications and workflows UWashington campus networking upgrades doubled particle physics data transfers to/from PNNL to 1.4Gbps single flow (Ed Lazowska, PI) 4X capacity improvement (80Gbps aggregate) in connecting Astronomy facilities in Hawaii to US mainland 4X capacity improvement (40 Gbps aggregate) between US and South America LSST may require 100Gbps by
20 University of Dayton Impact a high performance connection driven by our NSF strategy of providing DMZ connections for researchers with a specific need. NSF is truly helping the University of Dayton raise the entire harbor for science and engineering work on campus and we have used the prestige of this grant to get the attention of our campus leadership to ensure the continued funding for HPC investments. Impact on Dayton Partners - Our work bringing up the connections at Central State Univ (Historically Black College) has gone well. Part of our funding supports upgrades at their campus. CSU does not have deep-expertise on networking at their campus, so we sent our engineering staff to supervise the work of contractors in upgrading their fiber and connecting the new DMZ infrastructure the NSF support has truly transformed a chunk of the CSU network into a science-ready environment that has our researchers working collaboratively with their faculty and students. The funding from NSF is making a huge difference for several faculty and students at Central State - They are working on cutting edge projects with Vijay Asari on our campus in the area of "Computer Vision Thomas Skill, PI (CIO) University of Dayton 20
21 University of Houston Upgrade of Regional Capacity to 100Gbps This expands the effected student base and researchers by multiple orders of magnitude. In fact, Baylor College of Medicine alone sometimes may require sustained ~5 Gbps upload processes that may go on for a few days at this time. Their genome researchers and other biomedical researchers are leaders in the nation. The other institutions include: MD Anderson Cancer Center, Houston Museum of Natural Science, University of Texas Health Sciences Campus, and so on. The network refresh has revamped the SETG organization to refresh their technical advisory group, decision processes, and future investment perspectives in supporting research in network science and engineering as well as better support of science data flows with more transparency and control. Deniz Gurkan, PI, Univ. of Houston 21
22 CC*IIE Campus Design: Northwest Indian College Teaching/Learning & Science High speed connectivity for distance learning, including federated identity. Science DMZ to share GIS data, specimen catalogs, and experimental measurements Broader Impact: Give American Indian students broader access to catalogs and computing resources at other institutions. 22
23 CC*IIE Integration: Colorado State U Supporting Climate Applications over NDN Need: climate and other big data applications have overwhelmed existing networking and data management solutions Data size and diversity Naming, discovery, retrieval, sharing, etc. Approach: migrate workflows to NDN Name based rather than host based paradigm Easy migration: automatically translate existing ad-hoc names to structured NDN names Evaluate over state-of-the-art NDN testbed deployed in partnership with ESnet Benefit: vastly simplified application and networking environment Robustness and speed: in-network caching, efficient content distribution, automatic failover, security, etc. Simplified management: highly structured, standardized naming across application domains Trivial publishing, grouping and discovery LBNL 10G SACRAMENTO 10G Publish Retrieve UCSD (planned) 10G data discovery and fast retrieval CSU(AT MOS) CSU(CS 10G DENVER # : NSF CC-NIE Integration award 23
24 Cybersecurity Innovation for Cyberinfrastructure (CICI) $11M Focus areas: Data Provenance Secure Architecture/Design Cybersecurity Center of Excellence Themes: Data Integrity, Secure Software Defined Networking (SDN), Identity Management, Secure Data Transfer, Secure Cloud Proofs of Concept/Operational Deployments encouraged 24
25 Secure and Trustworthy Cyberspace (SaTC) $75M Annual Budget. Supports fundamental scientific advances and technologies to protect cyber-systems from malicious behavior, while preserving privacy and promoting usability. Develop the foundations for engineering systems inherently resistant to malicious cyber disruption Cybersecurity is a multi-dimensional problem, involving both the strength of security technologies and variability of human behavior. Encourage and incentivize socially responsible and safe behavior by individuals and organizations Focus on Privacy: Dear Colleague Letter for new collaborations between Computer and Social Scientists, including a focus on privacy. 25
26 SaTC: Program Scope and Principles Cast a wide net and let the best ideas surface, rather than pursuing a prescriptive research agenda Engage the research community in developing new fundamental ideas and concepts Promote a healthy connection between academia and a broad spectrum of pubic and private stakeholders to enable transition of innovative and transformative results 26
27 SaTC FY14 Funding Areas Access control Anti-malware Anticensorship Applied cryptography Authentication Cellphone network security Citizen science Cloud security Cognitive psychology Competitions Cryptographic theory Cyber physical systems Cybereconomics Cyberwar Digital currencies Education Forensics Formal methods Governance Hardware security Healthcare security Insider threat Intrusion detection Mobile security Network security Operating systems Personalization Privacy Provenance Security usability Situational awareness Smart Grid Social networks Sociology of security Software security Vehicle security Verifiable computation Voting systems security Web security 27
28 Secure, Trustworthy, Assurted and Resilient Semiconductors and Systems (STARSS) Hardware security, with focus on Design for Assurance Jointly funded partnership between NSF and the Semiconductor Research Corporation (SRC) Partnership with SRC provides researchers greater insight and access to industry needs/capabilities/resources; facilitates transition to practice; and provides students opportunities to engage with industry. Supporting fundamental research to make semiconductors and systems more trustworthy and secure 28
29 Semiconductor Design & Manufacture Flow: Potential Points of Vulnerability to Attack/Theft 3rd Party Design IP Specification Design HW Trojan HW Trojan Signoff Design Verification Unauthorized copy Mask Fabrication Wafer Fabrication Packaging and Testing Scrap / diversion SW Trojan Software Shipping and Distribution End Product Chip ID / PUF, Metering, DNA marking Counterfeit! Possible reliability or security risk Intrusion / hack Reclaim / re-mark Source: Kevin Kemp, Freescale Firewalls, tamper detection, code authentication Security Risk! Current tools/techniques do not provide broad security assurance 29
30 SaTC: Social Behavioral and Economics (SBE) Example Securing Cyber Space: Understanding the Cyber Attackers and Attacks via Social Media Analytics - Hsinchun Chen U of Arizona Objectives: Develop a computational social media analytics framework for text analytics and visualization of multilingual cybercriminal communities Analyze cyberattacker motives, emerging threats and trends, cyberattacker community social structure, and hacker culture and market in the international hacker ecosystem Methods: Multiple data source from Cyberattacker community data (e.g. hacker forums, IRC channels, honeypots) in the United States, China, Russia, and the Middle-East Prospective Broader Impact: Development of automated multilingual content analysis methods, cyberattacker social media analytics techniques, and open source tools to support security researchers and social scientists 30
31 Transition to Practice: ShellOS Secure Document Analysis 31
32 Transition to Practice: Bro Network Security Monitor Bro provides a flexible, open network monitoring platform. Developed since 1995, now at ICSI & NCSA. Open-source with a BSD license. Fundamentally different from a traditional IDS. Particularly well-suited for scientific environments. Comprehensive logging for forensics. Extensive standard library for typical, complex detection tasks. Domain-specific scripting language for custom analysis. Bridges gap between academia and operations. Has helped transition research into practice for almost two decades. Deployed operationally by universities, research labs, Fortune 20. Bro Center of Expertise supports NSF community. Provide assistance for operating and customizing Bro installations. Develop new functionality tailored to the NSF community. Support research community in transitioning technology into practice. 32
33 Sample of Small projects BGPSecurity/RPKI: Exploring RPKI as a Solution for Secure Internet Routing SDN Security: Secure and Effective Policy Enforcement in Software Defined WANs 33
34 Cybersecurity Education Funding Opportunities: CyberCorps : Scholarship For Service (SFS) CyberCorps Scholarship for Service (SFS) Increase the capacity of the United States higher education enterprise to produce professionals in these fields. Funding supports curriculum, outreach, faculty (Capacity BuildingTrack; $ per project) Increase the number of qualified students entering information assurance and computer security by providing funding to colleges and universities (Scholarship Track; $1-5M per project) Provides: Tuition, fees, and stipends ($20-30K per year) for 2-3 final years of study (U.S. Citizens only). Over 2000 scholarships have been awarded since the inception of the program. 51 participating universities with 475 students in school. About 75% at the master s level and 20% undergraduates. Over 93% of graduates go to work for the Government. Website: 34
35 Research to Enable Smart Systems Application sectors Image Credit: MicroStrain, Inc. Image Credit: Bristol Robotics Lab Cyber-Physical Systems (CPS) Deeply integrate computation, communication, and control into physical systems Aspects of CPS include pervasive computation, sensing and control; networking at multi- and extreme scales; dynamically reorganizing/reconfiguring systems; and high degrees of automation Dependable operation with high assurance of reliability, safety, security, and usability National Robotics Initiative (NRI) Develop the next generation of collaborative robots, or co-robots, that work beside and cooperatively with people A nationally concerted cross-agency effort among NSF, NASA, USDA, and NIH Initiative includes aim to understand the long-term social, behavioral, and economic implications Potential to enhance personal safety, health, and productivity Transportation Energy and Industrial Automation Health and Medical Care Critical Infrastructure 35
36 CyberPhysical Systems (CPS) Security Cross-cutting program that seeks fundamental scientific and engineering principles and technologies to underpin the integration of cyber and physical elements across all sectors: systems you can bet your life on. Multi-agency solicitation including DHS Cyber Security Division, Department of Transportation and Federal Highway Administration, NIH Addresses Cybersecurity aspect of systems such as industrial controls NSF/Intel Partnership on Cyber-Physical Systems Security and Privacy 36
37 Questions? me: 37
SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015
SDN Security Challenges Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015 Cybersecurity Enhancement Act 2014 Public-Private Collaboration on Security (NIST
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC)
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong competitive edge in the Nation
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 st CENTURY SCIENCE AND ENGINEERING (CIF21) Goal Develop and deploy comprehensive, integrated, sustainable, and secure cyberinfrastructure (CI) to accelerate research
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21)
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering, and Education (CIF21) investment
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2%
SECURE AND TRUSTWORTHY CYBERSPACE (SaTC) $124,250,000 +$1,500,000 / 1.2% Overview The Secure and Trustworthy Cyberspace (SaTC) investment is aimed at building a cybersecure society and providing a strong
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43%
CYBERINFRASTRUCTURE FRAMEWORK FOR 21 ST CENTURY SCIENCE, ENGINEERING, AND EDUCATION (CIF21) $100,070,000 -$32,350,000 / -24.43% Overview The Cyberinfrastructure Framework for 21 st Century Science, Engineering,
NSF Cybersecurity: Opportunities for Innovation. Anita Nikolich (CISE/ACI) Kevin Thompson (CISE/ACI) April, 2014
NSF Cybersecurity: Opportunities for Innovation Anita Nikolich (CISE/ACI) Kevin Thompson (CISE/ACI) April, 2014 NSF Cybersecurity Overview Cybersecurity Research Programs & Funding Opportunities Cybersecurity
Big Data R&D Initiative
Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment
Take My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research)
Take My Cash, Please (only be sure always to call it, please, research) aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) The SaTC Team: Nina Amla, Chris Cli.on, Jeremy Epstein,
CC-NIE PI Workshop Plenary
CC-NIE PI Workshop Plenary Farnam Jahanian April 30, 2014 Image Credit: Exploratorium. Pervasive Impact We are at the center of an ongoing societal transformation and will be for decades to come. Advances
How To Teach Data Science
The Past, Present, and Future of Data Science Education Kirk Borne @KirkDBorne http://kirkborne.net George Mason University School of Physics, Astronomy, & Computational Sciences Outline Research and Application
COGNITIVE SCIENCE AND NEUROSCIENCE
COGNITIVE SCIENCE AND NEUROSCIENCE Overview Cognitive Science and Neuroscience is a multi-year effort that includes NSF s participation in the Administration s Brain Research through Advancing Innovative
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India
3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India Call for Papers Cloud computing has emerged as a de facto computing
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto
Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory. The Nation s Premier Laboratory for Land Forces UNCLASSIFIED
Dr. Raju Namburu Computational Sciences Campaign U.S. Army Research Laboratory 21 st Century Research Continuum Theory Theory embodied in computation Hypotheses tested through experiment SCIENTIFIC METHODS
Data Driven Discovery In the Social, Behavioral, and Economic Sciences
Data Driven Discovery In the Social, Behavioral, and Economic Sciences Simon Appleford, Marshall Scott Poole, Kevin Franklin, Peter Bajcsy, Alan B. Craig, Institute for Computing in the Humanities, Arts,
Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data.
Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data. 1 Advances in information technologies are transforming the fabric of our society and data represent
The New Dynamism in Research and Education Networks
a s t r at egy paper fr om The New Dynamism in Research and Education Networks Software-defined networking technology delivers network capacity and flexibility for academic users brocade The New Dynamism
Internet2 Network Services Community, Service and Business Overview
Internet2 Network Services Community, Service and Business Overview Executive Summary: For universities and colleges to succeed in the broader transformation of higher education, successful collaboration
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY
MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Next Generation Clouds, The Chameleon Cloud Testbed, and Software Defined Networking (SDN)
Next Generation Clouds, The Chameleon Cloud Testbed, and Software Defined Networking (SDN) Joe Mambretti, Director, ([email protected]) International Center for Advanced Internet Research (www.icair.org)
Big Data R&D Initiative
Big Data R&D Initiative Mhyron Gutmann Directorate for the Social, Behavioral and Economic Sciences National Science Foundation Image Credit: Exploratorium. Digital Preservation 2012 July 25, 2012 Advances
HHSN316201200042W 1 QSSI - Quality Software Services, Inc
ARTICLE C.1. STATEMENT OF WORK This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and Human Services (DHHS), and all other federal agencies to acquire
EL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
PAGE 6 of 51 SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Statement of Work This contract is designed to permit the Institutes and Centers (ICs) of NIH, the Department of Health and
NITRD: National Big Data Strategic Plan. Summary of Request for Information Responses
NITRD: National Big Data Strategic Plan Summary of Request for Information Responses Introduction: Demographics Summary of Responses Next generation Capabilities Data to Knowledge to Action Access to Big
Cyber Security Research and Development a Homeland Security Perspective
FBI ----------------------------------------- INFRAGARD National Conference ----------------------------------------- 2005 Cyber Security Research and Development a Homeland Security Perspective Annabelle
High Performance Computing Initiatives
High Performance Computing Initiatives Eric Stahlberg September 1, 2015 DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Cancer Institute Frederick National Laboratory is
LSST and the Cloud: Astro Collaboration in 2016 Tim Axelrod LSST Data Management Scientist
LSST and the Cloud: Astro Collaboration in 2016 Tim Axelrod LSST Data Management Scientist DERCAP Sydney, Australia, 2009 Overview of Presentation LSST - a large-scale Southern hemisphere optical survey
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT
SECTION A: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article A.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
A guide to ICT-related activities in WP2014-15
A guide to ICT-related activities in WP2014-15 ICT in H2020 an Overview As a generic technology, ICT is present in many of the H2020 areas. This guide is designed to help potential proposers find ICT-related
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as
SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT Article C.1 Introduction This contract is intended to provide IT solutions and services as defined in FAR 2.101(b) and further clarified in the Clinger-Cohen
Charting the Evolution of Campus Cyberinfrastructure: Where Do We Go From Here? 2015 National Science Foundation NSF CC*NIE/IIE/DNI Principal
Jim Bottum Charting the Evolution of Campus Cyberinfrastructure: Where Do We Go From Here? 2015 National Science Foundation NSF CC*NIE/IIE/DNI Principal Investigators Meeting The CC* Mission Campuses today
High Performance Computing
High Parallel Computing Hybrid Program Coding Heterogeneous Program Coding Heterogeneous Parallel Coding Hybrid Parallel Coding High Performance Computing Highly Proficient Coding Highly Parallelized Code
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
How To Manage Research Data At Columbia
An experience/position paper for the Workshop on Research Data Management Implementations *, March 13-14, 2013, Arlington Rajendra Bose, Ph.D., Manager, CUIT Research Computing Services Amy Nurnberger,
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
US Federal Cyber Security Research Program. NITRD Program
US Federal Cyber Security Research Program NITRD Program Purpose The primary mechanism by which the U.S. Government coordinates its unclassified Networking and IT R&D (NITRD) investments Supports NIT-related
Introduction to LSST Data Management. Jeffrey Kantor Data Management Project Manager
Introduction to LSST Data Management Jeffrey Kantor Data Management Project Manager LSST Data Management Principal Responsibilities Archive Raw Data: Receive the incoming stream of images that the Camera
Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
Primary Strategic Priority/Foundational Element/Integrating Theme Addressed:
Proposal Title: Transform Rutgers New Brunswick Campus into an Urban Sustainability Laboratory and Classroom Principle Initiator(s): Nenad Gucunski and Jie Gong Primary Contact Name and Number: Nenad Gucunski,
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
Education and Workforce Development in the High End Computing Community
Education and Workforce Development in the High End Computing Community The position of NITRD s High End Computing Interagency Working Group (HEC-IWG) Overview High end computing (HEC) plays an important
Requirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
Cybersecurity at ODU ( www.odu.edu/ccser )
Cybersecurity at ODU ( www.odu.edu/ccser ) We offer a variety of options for individuals to learn about cybersecurity. These include: a. Twenty-one separate undergraduate courses related to the topic.
Big Data and the Data Lake. February 2015
Big Data and the Data Lake February 2015 My Vision: Our Mission Data Intelligence is a broad term that describes the real, meaningful insights that can be extracted from your data truths that you can act
Cyber Security VTT and the Finnish Approach
Cyber Security VTT and the Finnish Approach September 22, 2015 Reijo Savola, Principal Scientist CHALLENGES Explosive increase in number and impact of cyber security attacks Use of Internet technologies
NITRD and Big Data. George O. Strawn NITRD
NITRD and Big Data George O. Strawn NITRD Caveat auditor The opinions expressed in this talk are those of the speaker, not the U.S. government Outline What is Big Data? Who is NITRD? NITRD's Big Data Research
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
National Nursing Informatics Deep Dive Program
National Nursing Informatics Deep Dive Program What is Nursing Informatics and Why is it Important? Connie White Delaney, PhD, RN, FAAN, FACMI Dean and Professor, School of Nursing Director, Clinical and
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
Information Technology Strategic Plan 2014-2017
Information Technology Strategic Plan 2014-2017 Leveraging information technology to create a competitive advantage for UW-Green Bay Approved December 2013 (Effective January 2014 December 2017) Contents
Standard Big Data Architecture and Infrastructure
Standard Big Data Architecture and Infrastructure Wo Chang Digital Data Advisor Information Technology Laboratory (ITL) National Institute of Standards and Technology (NIST) [email protected] May 20, 2016
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
Information Technology R&D and U.S. Innovation
Information Technology R&D and U.S. Innovation Peter Harsha Computing Research Association Ed Lazowska University of Washington Version 9: December 18, 2008 1 Peter Lee Carnegie Mellon University Advances
Participants: Introduction:
National Conversation A Trusted Cyber Future Discussion Led by Dan Massey, CSD Program Manager Moderator: Joe Gersch (Secure 64) Department of Homeland Security Science and Technology Directorate (DHS
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013
The University of Alabama at Birmingham Information Technology Strategic Plan 2011 2013 Table of Contents Message from the Vice President... 3 About UAB... 4 About UAB Information Technology Meeting needs
Metrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
