The Human Element in Cyber Security and Critical Infrastructure Protection: Lessons Learned
|
|
|
- Homer Robertson
- 10 years ago
- Views:
Transcription
1 The Human Element in Cyber Security and Critical Infrastructure Protection: Lessons Learned Marco Carvalho, Ph.D. Research Scientist Institute for Human and Machine Cognition 40 South Alcaniz St., Pensacola, FL (850)
2
3 Human Centered Computing
4 Cyber Security and Critical Infrastructure Protection Complex Infrastructures Multiple interacting systems Often under different administrative control Very large number of heterogeneous sensors and data streams Multiple operating time-scales for different components and subsystems Time-critical / Mission-critical Users generally track specific metrics at any given time. Difficult to model and predict
5 Automation in Complex System Monitoring Small scale systems were first monitored directly by users. User has a mental model of the system Single administrative domain Increasing scale and complexity requires some level of automation High-tempo events Large number of nodes Large number of events Complex very complex model Human becomes increasingly detached form the system Control/Defense becomes brittle and hard to understand/control Automation Automation
6 Our Research Focus: Human-Centered Defense Infrastructures Autonomic Defense Infrastructures Design security infrastructures to enhance human capabilities and performance on monitoring, diagnostics and control of complex and critical systems. Design new human-in-the-loop defense infrastructures that are semi-autonomous or autonomic in nature a required feature for effective defense systems. Build cognitive, mix-initiative systems for cyber defense and critical infrastructure protection.
7 Current Projects and Lessons Learned Enterprise Network Security Tactical Network Security and Mission Survivability Supervisory Control and Data Acquisition SCADA Systems Network Operations Center Intelligent Transportation Systems
8 Enterprise Network Security
9 Enterprise Network Security Network Map
10 Enterprise Network Security Technical Background Knowledge Network Map
11 Enterprise Network Security Technical Background Knowledge Network Map Corporate Background Knowledge
12 Enterprise Network Security Technical Background Knowledge Network Map Corporate Background Knowledge Sec.Tech. Advisories
13 Enterprise Network Security Technical Background Knowledge Network Map Corporate Background Knowledge Sec.Tech. Advisories Technical Background Knowledge Corporate Background Knowledge Technical Background Knowledge Other Analysts Corporate Background Knowledge
14 Proposed Approach Shared Knowledge Models between analysts Autonomous Software Agents acting as roaming security guards Better Coverage and enforcement of security policies Disconnected Operation Cognitive Software Agents for Analyst support Specialized Agents for Security and Network Discovery
15 Enterprise Network Security Agent Management Knowledge Management
16 Enterprise Network Security Agent Management Knowledge Management
17 Enterprise Network Security Agent Management Knowledge Management Mediating knowledge representation between humans Graphical notation using concepts, links, and attached resources NOT a formal representation like a conceptual graph or a semantic network Flexible and easy-to-use metaphor for expressing and browsing knowledge
18 Enterprise Network Security Agent Management Knowledge Management Agent Management Knowledge Management
19 Enterprise Network Security Agent Management Knowledge Management Simple security/admin operations Maintains state across multiple hosts Ensure system coverage Supports disconnected operations Multiple perspectives for network discovery Persistent operations (at shutdown) Off-site policy enforcement
20 The Agent Management Console mast.ihmc.us
21 Lessons Learned Building Agents System required the user to explicitly specify the functions of the agent (with few exceptions) Upfront investment for agent creation/customization Managing Agents Locating/understanding and launching agents Interfacing with Agents Large volume (overload) Difficult to Identify
22 Attaching Agents to Knowledge Models Building Chat Interfaces mast.ihmc.us
23 Biologically Inspired Tactical Security Infrastructure (Army Research Laboratory) Sponsor: Army Research Laboratory Collaborative Project with the Florida Institute of Technology Enabling Mission Survivability Fighting Through Capabilities)
24 Proof-of-Concept Implementation: Mission Survivability Maintain System operations in face of disruptions Reactive and proactive reconfiguration for mission continuity (slow the high-freq. effects)
25 Policy Estimation Prob Actions Prob Actions
26 Lessons Learned Understanding the environment Dynamics of the system Dynamics of the defense infrastructure Eventual dissonance between user s mental models and collective agent responses (poor mission mapping) Benefits in slowing down highfrequency effects for human response (engine failure at takeoff example) Maintain System operations in face of disruptions Reactive and proactive reconfiguration for mission continuity (slow the high-freq. effects)
27 Traffic Management Monitored by operators in centralized control centers Mostly used for traffic announcements and dispatches Thousands of data collection sensors (indirect measurements) MnDOT (54K Twin Cities Metro) Problem: Understand the interdependencies of the system (spatial/temporal) for corrective/preventive action (Greatly relies on user expertise)
28 Transportation Systems Automatic Regulatory Structure Discovery for Accident Prevention True Causal Graph Markov Equivalent Class
29 Transportation Systems Automatic Regulatory Structure Discovery for Accident Prevention
30 Lessons Learned Powerful in providing some insight on useful knobs Often known by experienced operators Lack of projection (what if) capabilities Structure discovery process is obscure at times Lack of trust in the process
31 Lessons Learned It is more than just a visualization issue (although visualization is very important) Understanding the collective actions and effects of individual agents Tracking and predicting the trajectory of the system Tracking the progress of Agents (Progress Appraisal) It is about teamwork! Collaborative environment Policy regulation Learning from experience Image Source: Sandia, cyber3d Informatique,armsflow
32 Ongoing Developments Separate Interfaces to different views of system Human is responsible for maintaining the mental model of the systems Advanced filters help improve the understanding of each perspective Mission Goals exist only at human level
33 Ongoing Developments Information Fusion Fusing multiple sources of data or perspectives in a common view Focus on visualization technologies Automatic data analysis may identify correlations between events and sources Mission goals still reside at the human level Filter/Fusion definition is done offline for the optimization of pre-defined tasks
34 IHMC Cyber SA Framework Policy-based multi-agent system for teamwork support Data Processing Agents Simple Data Processing for data filtering Pre-defined pattern search Self Organizing hierarchies Template hierarchies for specific tasks (created/ accepted) Randomized Patterns Search Explicit user feedback Through policies and configuration Implicit user feedback Visualization controls
35 Cognitive Software Agents Multi-user collaborative environment Cognitive Agents Collect information from multiple agents/sources Learn from human actions and explicit procedural descriptions Build hypothesis based on sequence of events Branch parallel test for validation/ negation Learn new system policies through task refinement
36 Cognitive Software Agents Agent functionality is represented in an ontology (using OWL). Analysts can assemble agents to create workflows at runtime. Mechanism for knowledge Capture (sharing) Agents publish their capabilities (functional descriptions) other agents can assemble flows automatically (self-organization) Data-driven model for flow tasking and organization
37 Current Application: Cyber Defense Situation Awareness Sponsor: DoD and Industry Mixed-Initiative Multi-Agent Systems for Cyber Situation Awareness CyberLab (Ocala, FL)
38 Acknowledgements Cyber Situation Awareness Jeff Bradshaw Larry Bunch Tom Eskridge Paul Feltovitch Matt Johnson Cyber Lab Carlos Perez Adrian Granados Marco Arguedas Massimiliano Marcon Giacomo Benincasa
39 Thank you! Marco Carvalho Research Scientist (850) Institute for Human and Machine Cognition 15 SE Osceola Ave. Ocala, FL.
Network Mission Assurance
Network Mission Assurance Michael F. Junod, Patrick A. Muckelbauer, PhD, Todd C. Hughes, PhD, Julius M. Etzl, and James E. Denny Lockheed Martin Advanced Technology Laboratories Camden, NJ 08102 {mjunod,pmuckelb,thughes,jetzl,jdenny}@atl.lmco.com
EL Program: Smart Manufacturing Systems Design and Analysis
EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical
Human Dimension in Cyber Operations Research and Development Priorities
Human Dimension in Cyber Operations Research and Development Priorities Chris Forsythe a, Austin Silva a, Susan Stevens-Adams a, Jeffrey Bradshaw b a Sandia National Laboratories, Albuquerque, NM, USA,
Information Visualization WS 2013/14 11 Visual Analytics
1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and
Cognitive and Organizational Challenges of Big Data in Cyber Defense
Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory [email protected], [email protected] The cognitive and organizational
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)
Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC) Daniel V. Bart DISA Infrastructure Development Cyber Situational Awareness and Analytics 22 April 2016 Presentation
Manjula Ambur NASA Langley Research Center April 2014
Manjula Ambur NASA Langley Research Center April 2014 Outline What is Big Data Vision and Roadmap Key Capabilities Impetus for Watson Technologies Content Analytics Use Potential use cases What is Big
Communicating Agents Architecture with Applications in Multimodal Human Computer Interaction
Communicating Agents Architecture with Applications in Multimodal Human Computer Interaction Maximilian Krüger, Achim Schäfer, Andreas Tewes, Rolf P. Würtz Institut für Neuroinformatik, Ruhr-Universität
Release Notes: SANsymphony-V System Center Operations Manager (SCOM) Management Pack 1.3
Release Notes Cumulative Change Summary Date Original 1.0 release November 1, 2011 Added additional troubleshooting notes April 3, 2012 Clarified Management Pack Software Requirements; added known issue
Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013
Complexity and Scalability in Semantic Graph Analysis Semantic Days 2013 James Maltby, Ph.D 1 Outline of Presentation Semantic Graph Analytics Database Architectures In-memory Semantic Database Formulation
Detect, Contain and Control Cyberthreats
A SANS Whitepaper Written by Eric Cole, PhD June 2015 Sponsored by Raytheon Websense 2015 SANS Institute Introduction Dwell Time Relates to damage because the longer a system is compromised, the bigger
The Big Data Paradigm Shift. Insight Through Automation
The Big Data Paradigm Shift Insight Through Automation Agenda The Problem Emcien s Solution: Algorithms solve data related business problems How Does the Technology Work? Case Studies 2013 Emcien, Inc.
Integrating a Big Data Platform into Government:
Integrating a Big Data Platform into Government: Drive Better Decisions for Policy and Program Outcomes John Haddad, Senior Director Product Marketing, Informatica Digital Government Institute s Government
New Era in Cyber Security. Technology Development
New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security
Data Intensive Science and Computing
DEFENSE LABORATORIES ACADEMIA TRANSFORMATIVE SCIENCE Efficient, effective and agile research system INDUSTRY Data Intensive Science and Computing Advanced Computing & Computational Sciences Division University
Establishing a business performance management ecosystem.
IBM business performance management solutions White paper Establishing a business performance management ecosystem. IBM Software Group March 2004 Page 2 Contents 2 Executive summary 3 Business performance
A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools
A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools Dong-Joo Kang and Sunju Park Yonsei University [email protected], [email protected] Abstract
Information Services for Smart Grids
Smart Grid and Renewable Energy, 2009, 8 12 Published Online September 2009 (http://www.scirp.org/journal/sgre/). ABSTRACT Interconnected and integrated electrical power systems, by their very dynamic
The Geospatial Approach to Cybersecurity: An Executive Overview. An Esri White Paper January 2014
The Geospatial Approach to Cybersecurity: An Executive Overview An Esri White Paper January 2014 Copyright 2014 Esri All rights reserved. Printed in the United States of America. The information contained
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
Pragmatic Web 4.0. Towards an active and interactive Semantic Media Web. Fachtagung Semantische Technologien 26.-27. September 2013 HU Berlin
Pragmatic Web 4.0 Towards an active and interactive Semantic Media Web Prof. Dr. Adrian Paschke Arbeitsgruppe Corporate Semantic Web (AG-CSW) Institut für Informatik, Freie Universität Berlin [email protected]
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Driving Customer Experience Excellency: 360 Degree Voice of Customers Analytics. Tan Meng Teck Head of Contact Center Solution Sales Avaya APAC
Driving Customer Experience Excellency: 360 Degree Voice of Customers Analytics Tan Meng Teck Head of Contact Center Solution Sales Avaya APAC Industry and Consumer Trends Driving Change in the Market
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Automated Oil Analysis Interpretation System. www.conditionmonitoringintl.com
Automated Oil Analysis Interpretation System www.conditionmonitoringintl.com Global Solutions for Condition Monitoring Services and Support Laboratory Oil Testing Instruments Oil Samples to Check Machine
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
Oracle Real Time Decisions
A Product Review James Taylor CEO CONTENTS Introducing Decision Management Systems Oracle Real Time Decisions Product Architecture Key Features Availability Conclusion Oracle Real Time Decisions (RTD)
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
Better planning and forecasting with IBM Predictive Analytics
IBM Software Business Analytics SPSS Predictive Analytics Better planning and forecasting with IBM Predictive Analytics Using IBM Cognos TM1 with IBM SPSS Predictive Analytics to build better plans and
ScienceLogic vs. Open Source IT Monitoring
ScienceLogic vs. Open Source IT Monitoring Next Generation Monitoring or Open Source Software? The table below compares ScienceLogic with currently available open source network management solutions across
ORACLE HEALTHCARE ANALYTICS DATA INTEGRATION
ORACLE HEALTHCARE ANALYTICS DATA INTEGRATION Simplifies complex, data-centric deployments that reduce risk K E Y B E N E F I T S : A key component of Oracle s Enterprise Healthcare Analytics suite A product-based
Autonomy for SOHO Ground Operations
From: FLAIRS-01 Proceedings. Copyright 2001, AAAI (www.aaai.org). All rights reserved. Autonomy for SOHO Ground Operations Walt Truszkowski, NASA Goddard Space Flight Center (GSFC) [email protected]
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
How To Create A Help Desk For A System Center System Manager
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
IBM Operational Decision Management v8
What s new in WebSphere Operational Decision Management? Matt Roberts Decision Management Specialist July 12 th, 2012 IBM Operational Decision Management v8 Manage business policies at scale Operationalize
MULTI AGENT-BASED DISTRIBUTED DATA MINING
MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:
Situational Awareness Through Network Visualization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction
Hurwitz ValuePoint: Predixion
Predixion VICTORY INDEX CHALLENGER Marcia Kaufman COO and Principal Analyst Daniel Kirsch Principal Analyst The Hurwitz Victory Index Report Predixion is one of 10 advanced analytics vendors included in
Keep managers better informed on their areas of responsibility and highlight the issues that require their attention with dashboards!
Meet Your Targets! Effective Performance Management certainly requires more than just the technology to support it. Expertise in KPI development, target setting, framework modeling, dashboard development
SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.
SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1 IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital
WebSphere Business Modeler
Discovering the Value of SOA WebSphere Process Integration WebSphere Business Modeler Workshop SOA on your terms and our expertise Soudabeh Javadi Consulting Technical Sales Support WebSphere Process Integration
MOC 10324A: Implementing and Managing Microsoft Desktop Virtualization
MOC 10324A: Implementing and Managing Microsoft Desktop Virtualization Course Overview This course provides students with the knowledge and skills to implement and manage desktop virtualization solutions.
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
Defending against modern cyber threats
Defending against modern cyber threats Protecting Critical Assets October 2011 Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Agenda 1. The seriousness of today s situation
FutureWorks Nokia technology vision 2020: personalize the network experience. Executive Summary. Nokia Networks
Nokia Networks FutureWorks Nokia technology vision 2020: personalize the network experience Executive Summary White paper - Nokia Technology Vision 2020: Personalize the Network Experience CONTENTS Aligning
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
Sanjeev Kumar. contribute
RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 [email protected] 1. Introduction The field of data mining and knowledgee discovery is emerging as a
A University BI-solution
A University BI-solution Better insight and control over operations Easy access for all users Reliable and accessible information Infotool, leader in creating customer value in Sweden. Infotool is a leader
high performance solutions for a connected world
GE Intelligent Platforms delivers high performance solutions for a connected world Mark Pipher GM, Real Time Operational Intelligence Sources: 1. Wall Street Journal, 11/2/11; 2. More than 50 billion connected
LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
July 2016 Price List
Data Acquisition and Visualization Solutions July 2016 Price List Software Custom Development Screen Design Training Beyond SCADA CONNECTING SENSORS, SYSTEMS, DEVICES AND DATABASES WITH THE PEOPLE WHO
Three Open Blueprints For Big Data Success
White Paper: Three Open Blueprints For Big Data Success Featuring Pentaho s Open Data Integration Platform Inside: Leverage open framework and open source Kickstart your efforts with repeatable blueprints
Table of Contents. 2015 Cicero, Inc. All rights protected and reserved.
Desktop Analytics Table of Contents Contact Center and Back Office Activity Intelligence... 3 Cicero Discovery Sensors... 3 Business Data Sensor... 5 Business Process Sensor... 5 System Sensor... 6 Session
2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
US Nuclear Regulatory Commission (NRC): National Scale/Fleet Situational Awareness and Emergency Response - Lessons Learned
US Nuclear Regulatory Commission (NRC): National Scale/Fleet Situational Awareness and Emergency Response - Lessons Learned Presented by Paul Strasser, President & CEO Agenda About PPC Review Case Study
How To Improve The Performance Of Anatm
EXPLORATORY RESEARCH IN ATM David Bowen Chief ATM 4 th May 2015 1 ATM Research in Europe HORIZON Transport Challenges smart, green and integrated transport FlightPath 2050 five challenges to aviation beyond
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Knowledge Management in Intercultural Collaborative Environments
Knowledge Management in Intercultural Collaborative Environments Mihaela MUNTEAN, Professor PhD West University of Timisoara, Romania Faculty of Economics E-mail: [email protected] Claudiu BRANDAS,
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
A Network Management Framework for Emerging Telecommunications Network. [email protected]
Symposium on Modeling and Simulation Tools for Emerging Telecommunication Networks: Needs, Trends, Challenges, Solutions Munich, Germany, Sept. 8 9, 2005 A Network Management Framework for Emerging Telecommunications
VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
RSA ARCHER OPERATIONAL RISK MANAGEMENT
RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume
SMART FACTORY: Real Time Multi-Agent Resource Allocation, Scheduling, Optimization and Controlling
SMART FACTORY: Real Time Multi-Agent Resource Allocation, Scheduling, Optimization and Controlling OBJECTIVE Real Time Multi-Agent Resource Allocation, Scheduling, Optimization and Controlling System for
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Requirements Analysis Concepts & Principles. Instructor: Dr. Jerry Gao
Requirements Analysis Concepts & Principles Instructor: Dr. Jerry Gao Requirements Analysis Concepts and Principles - Requirements Analysis - Communication Techniques - Initiating the Process - Facilitated
PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191
Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3
A Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi
Judith Hurwitz President and CEO Sponsored by Hitachi Introduction Only a few years ago, the greatest concern for businesses was being able to link traditional IT with the requirements of business units.
Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci
1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks
Semantic Business Process Management Lectuer 1 - Introduction
Arbeitsgruppe Semantic Business Process Management Lectuer 1 - Introduction Prof. Dr. Adrian Paschke Corporate Semantic Web (AG-CSW) Institute for Computer Science, Freie Universitaet Berlin [email protected]
Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot
www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that
Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost
Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations
WHITE PAPER. CRM Evolved. Introducing the Era of Intelligent Engagement
WHITE PAPER CRM Evolved Introducing the Era of Intelligent Engagement November 2015 CRM Evolved Introduction Digital Transformation, a key focus of successful organizations, proves itself a business imperative,
Traffic System for Smart Cities. Empowering Mobility Consulting Solutions Managed Services
Traffic System for Smart Cities Empowering Mobility Consulting Solutions Managed Services About US Leading provider of Toll Collection and Intelligent Transport Management Systems (ITS) More than a decade
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON
BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON Overview * Introduction * Multiple faces of Big Data * Challenges of Big Data * Cloud Computing
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
EASPI EASPI. The Integrated CMMI-based Improvement Framework for Test and Evaluation. Jeffrey L. Dutton Principal Consultant
The Integrated CMMI-based Improvement Framework for Test and Evaluation Jeffrey L. Dutton Principal Consultant Engineering and Services Performance Improvement LLC 22 Copyrights and Service Marks CMMI
Software solutions for manufacturing operations management. Helping manufacturers optimize the Digital Enterprise and realize innovation
Siemens PLM Software Software solutions for manufacturing operations management Helping manufacturers optimize the Digital Enterprise and realize innovation www.siemens.com/mom A holistic approach to optimize
Total Exploration & Production: Field Monitoring Case Study
Total Exploration & Production: Field Monitoring Case Study 1 Summary TOTAL S.A. is a word-class energy producer and provider, actually part of the super majors, i.e. the worldwide independent oil companies.
I D C A N A L Y S T C O N N E C T I O N. C o g n i t i ve C o m m e r c e i n B2B M a rketing a n d S a l e s
I D C A N A L Y S T C O N N E C T I O N Dave Schubmehl Research Director, Cognitive Systems and Content Analytics Greg Girard Program Director, Omni-Channel Retail Analytics Strategies C o g n i t i ve
Snapshot: Zantaz Enterprise Archive Solution, Digital Safe, and Introspect
Snapshot: Zantaz Enterprise Archive Solution, Digital Safe, and Introspect July 2005. Report #560 Summary of the Company s Offerings Zantaz offers multiple solutions in the data archiving, retention, compliance,
CLUSTER ANALYSIS WITH R
CLUSTER ANALYSIS WITH R [cluster analysis divides data into groups that are meaningful, useful, or both] LEARNING STAGE ADVANCED DURATION 3 DAY WHAT IS CLUSTER ANALYSIS? Cluster Analysis or Clustering
