New Project Proposal Status Report Final Report
|
|
- Rosamond Turner
- 5 years ago
- Views:
Transcription
1 Title: Models and Software Tools for Managing Network Complexity Date: May 16, 2018 Researcher Name(s): Xin Sun University: Ball State University Long Term Goal(s) New Project Proposal Status Report Final Report This project seeks to develop quantitative models for measuring network management complexity, and a set of software tools for managing such complexity. Our long term goals are the following: Goal 1: We will develop a suite of objective models that can accurately quantify the management complexity of a given network, by measuring the amount of effort required from the operators to understand and reason about the behavior of a network. Our key insight here is that such effort is directly dependent on the various characteristics in the design and configuration of the network, including the number of moving parts, their interplay, and how they together implement networkwide policies or requirements. Thus our models will be based on such design/configuration characteristics. Goal 2: Capitalizing on the complexity models, we will develop a set of software tools for managing the complexity. More specifically, we envision the tools will be able to: - Perform what-if analysis of how a proposed design change to an existing network may impact its management complexity, and thus help operators to avoid costly quick fixes ; - Compare multiple design proposals for a new network, and enable operators to select the simplest alternative. - Diagnose an existing network to find the root cause of its high complexity, and allow operators to quickly get to the bottom of the complexity problem. Background for Long Term Goals Operator interviews and anecdotal evidence suggest that networks with higher degrees of complexity in their design generally require more manual intervention to manage, are more difficult to reason about, predict and troubleshoot, and are more prone to human errors. For many complex enterprise networks, the amount of management effort required has become the dominant cost of operation [1]. Despite this investment, design mistakes and configuration errors account for more than half of network outages [1][2], 80% of Air Force network vulnerabilities [3], and 65% of all successful cyber-attacks [4]. In a recent white paper titled "What's behind network downtime" by Juniper Networks, it is noted that "Human error is blamed for 50 to 80 percent of network outages. But in this era of complex systems, the cause is probably not incompetence. Human error should be seen not as the direct cause of the problem but as a symptom of complexity. [R]educing and managing network complexity will have the biggest potential impact on network downtime. "[2]
2 Part of the complexity is inherent, given the wide range of operational objectives that these networks must support, to include security (e.g., implementing reachability policy), resiliency (e.g., tolerating up to two component failures), safety (e.g., free of forwarding loops), and performance. There is also evidence, however, to suggest that some of the network design complexity may have resulted from a semantic gap between the high-level design objectives, and the diverse set of routing protocols and lowlevel router primitives for the operators to choose from [4]. Operators generally agree that for the same target network, multiple designs often exist to meet the same operational objectives (e.g., security and resiliency requirements), and some designs are significantly easier to implement and manage than others. However, operators' reasoning about complexity remains qualitative and objective, and essentially a black-art. Despite being an intrinsic and critically important property of a network, complexity remains the least understood one. Unlike other network properties such as performance and resiliency that have all been extensively studied and for which models and algorithms have been successfully developed, complexity has received little systematic treatment from the networking community. This project seeks to bridge this gap, by creating quantitative models for measuring network complexity, and software tools for managing network complexity. The proposed research will be facilitated by the large configuration dataset the PI has obtained, which includes complete device configuration snapshots from five operational enterprise networks. This valuable dataset will be used to guide and validate the design of the complexity metrics and models and the development of the software tools. The PI has worked extensively in the field of network management [5][6][7][8][9][10][11][12][13][14][15], and have gained valuable insights, theoretical techniques, and software tools from the past experience, which will ensure the success of this project. The proposed research will also be strengthened by the extensive interactions the PI has with the operators community. Intermediate Term Objectives - Characterize the design and configuration of operational enterprise networks, and distill common design/configuration patterns. - Analyze the management complexity of the distilled patterns, and abstract the findings into mathematical models. - Create an algorithm for automatically applying the models and compute the complexity of a given network; - Develop software tools for what-if analysis and for complexity root-cause diagnose. Schedule of Major Steps We expect the project to starts on August 1 st, 2018, and below is the estimated timeline of the major steps:
3 Task Timeline Design of preliminary complexity models August December 31, 2018 Development of software tool for what-if analysis Development of software tool for complexity root-cause diagnose Write up the final project report July, 2019 January March 31, 2019 April June 30, 2019 Dependencies The design and validation of the complexity models depend on the availability of configuration data from operational networks. The PI has successfully secured such data from six networks, and they will be used in every step of the research project. Major Risks None. Budget One graduate research assistant, for one semester (stipend and tuition): $7,930 Two-week summer pay for the PI: %5,964 Fringe benefits: $1,083 Travel to future S2ERC meetings (both PI and student): $3,380 Indirect cost (10%): $1,643 Total: $20,000 Staffing PI: Dr. Xin Sun One graduate student Category of Current Stage New proposal
4 Contacts with Affiliates None. Publications and Other Research Products (actual or potential) We expect multiple publications from this project in peer-reviewed conferences and journals. References [1] Z. Kerravala. "As the value of enterprise networks escalates, so does the need for configuration management." The Yankee Group Report, [2] Juniper Networks. "What is behind network downtime?". White paper. Available at ibm.com/services/tw/gts/ pdf/ pdf, 2008 [3] Center for Strategic and International Studies. "Securing cyberspace for the 44th presidency." Available at http: //csis.org/files/media/csis/pubs/081208_securingcyberspace_44.pdf, [4] J. Pescatore. Taxonomy of software vulnerabilities. The Gartner Group Report, [5] Xin Sun and Geoffrey Xie. An Integrated Systematic Approach to Designing Enterprise Access Control. IEEE/ACM Transactions on Networking. Accepted for publication, [6] Xin Sun. A top-down framework for modeling routing design complexity. Chapter in book Redesigning the Future of Internet Architectures. IGI Global. ISBN13: May 2015 [7] Dennis Volpano, Xin Sun and Geoffrey Xie. Towards Systematic Detection and Resolution of Network Control Conflicts, In Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), Chicago, IL, August pp [8] Xin Sun and Geoffrey Xie. Minimizing Network Complexity through Integrated Top-down Design. In proceedings of ACM CoNEXT, Santa Barbara, CA, December pp [9] Xin Sun, Sanjay Rao and Geoffrey Xie. Modeling Complexity of Enterprise Routing Design. In proceedings of ACM CoNEXT, Nice, France, December pp [10] Minlan Yu, Xin Sun, Nick Feamster, Sanjay Rao, Jennifer Rexford. A Survey of Virtual LAN Usage in Campus Networks, IEEE Communications Magazine. Volume 49, issue 7, pp , July [11] Yu-Wei Sung, Xin Sun, Sanjay Rao, Geoffery Xie and David Maltz. Towards Systematic Design of Enterprise Networks. IEEE/ACM Transactions on Networking, Volume 1,9 Issue 3, pp , June [12] Xin Sun, Jinliang Wei, Sanjay Rao and Geoffrey Xie. A Software Toolkit for Visualizing Enterprise Routing Design. In Proceedings of IEEE Symposium on Configuration Analytics and Automation (SafeConfig), Arlington, VA. October pp [13] Xin Sun and Sanjay Rao. A Cost-Benefit Framework for Judicious Enterprise Network Redesign. IEEE INFOCOM (mini-conference), Shanghai, China, April. 2011
5 [14] Mohammad Hajjat, Xin Sun, Yu-Wei Sung, David Maltz, Sanjay Rao, Kunwadee Sripanidkulchai, and Mohit Tawarmalani. Cloudward Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud. In Proceedings of ACM SIGCOMM, New Delhi, India, pp [15] Mohammad Hajjat, Xin Sun, Yu-Wei Sung, David Maltz, Sanjay Rao, Kunwadee Sripanidkulchai, and Mohit Tawarmalani. Cloudward Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud. In Proceedings of ACM SIGCOMM, New Delhi, India, pp
VITA B. PROFESSIONAL EMPLOYMENT PRIOR TO ARRIVAL AT BALL STATE
VITA PART I. PERSONAL DATA Name Current Rank Department Xin Sun Assistant Professor Computer Science A. EDUCATION Degree Date University Major Minor Doctor of Philosophy 08/2012 Purdue University, West
More informationColumbia University COMS W Virtual Machine Migration
E-Migrate RESEARCH Columbia University COMS W6998-6 Virtual Machine Migration Kay Sripanidkulchai, IBM T.J. Watson Research Center October 13, 2010 Migration Technologies and Process Steps Virtualization
More informationModeling the Complexity of Enterprise Routing Design
Modeling the Complexity of Enterprise Routing Design Xin Sun (Florida International U.), Sanjay G. Rao (Purdue U.) and Geoffrey G. Xie (Naval Postgraduate School) 1 The costs of complexity We propose that
More informationA Software Toolkit for Visualizing Enterprise Routing Design
A Software Toolkit for Visualizing Enterprise Routing Design Xin Sun, Jinliang Wei, Sanjay G. Rao, and Geoffrey G. Xie School of Electrical and Computer Engineering, Purdue University Department of Computer
More informationTowards Systematic Design of Enterprise Networks
Towards Systematic Design of Enterprise Networks Geoffrey Xie Naval Postgraduate School In collaboration with: Eric Sung, Xin Sun, and Sanjay Rao (Purdue Univ.) David Maltz (MSR) Copyright 2008 AT&T. All
More informationA Cost-Benefit Framework for Judicious Enterprise Network Redesign
This paper was presented as part of the Mini-Conference at IEEE INFOCOM 2011 A Cost-Benefit Framework for Judicious Enterprise Network Redesign Xin Sun and Sanjay G. Rao Purdue University Abstract Recent
More informationAbstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School
Abstraction-Driven Network Verification and Design (a personal odyssey) Geoffrey Xie Naval Postgraduate School xie@nps.edu It started in 2004 A sabbatical at CMU Joined a collaborative project with AT&T
More informationJun Li, Ph.D. School of Computing and Information Sciences Phone:
Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/
More informationTowards Systematic Design of Enterprise Networks
Towards Systematic Design of Enterprise Networks Yu-Wei Eric Sung 1, Sanjay G. Rao 1, Geoffrey G. Xie 2, David A. Maltz 3 1 Purdue University 2 Naval Postgraduate School 3 Microsoft Research Copyright
More informationWeb Security Vulnerabilities: Challenges and Solutions
Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA
More informationThe goal of this project is to enhance the identification of code duplication which can result in high cost reductions for a minimal price.
Code Duplication New Proposal Dolores Zage, Wayne Zage Ball State University June 1, 2017 July 31, 2018 Long Term Goals The goal of this project is to enhance the identification of code duplication which
More informationConfigSynth: A Formal Framework for Network Security Design Synthesis
ConfigSynth: A Formal Framework for Network Security Design Synthesis Mohammad Ashiqur Rahman and Ehab Al-Shaer CyberDNA Research Center, UNC Charlotte Motivation Complexity of Security Configuration is
More informationwhite paper Rocket Rocket U2 High Availability / Disaster Recovery Best Practices
white paper Rocket Rocket U2 High Availability / Disaster Recovery Best Practices Rocket U2 High Availability /Disaster Recovery Best Practices Revised October 2014 Rocket Software, Inc. or its affiliates
More informationCASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC
CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION Alan Stuart, Managing Director National Science Foundation s New Headquarters in Alexandria, Virginia 1. Introduction to the National
More informationCYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management
CYSE 411/AIT 681 Secure Software Engineering Topic #3. Risk Management Instructor: Dr. Kun Sun Outline 1. Risk management 2. Standards on Evaluating Secure System 3. Security Analysis using Security Metrics
More informationSecurity in India: Enabling a New Connected Era
White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile
More informationVideo Streaming Over the Internet
Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality
More informationHow to Become a CMA (Certified Management Accountant) May 10, 2017
How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements
More informationUIUC. Application of Game Theory to High Assurance Cloud Computing. 20 September 2016
UIUC Application of Game Theory to High Assurance Cloud Computing 20 September 2016 Integrity Service Excellence Charles Kamhoua, Ph.D. Research Electronics Engineer Air Force Research Laboratory Cyber
More informationInteractive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN
Interactive Monitoring, Visualization, and Configuration of OpenFlow-Based SDN Pedro Heleno Isolani Juliano Araujo Wickboldt Cristiano Bonato Both Lisandro Zambenedetti Granville Juergen Rochol July 16,
More informationTowards Validated Network Configurations with NCGuard
Towards Validated Network Configurations with NCGuard Laurent VANBEVER, Grégory PARDOEN, Olivier BONAVENTURE INL: IP Networking Lab (http://inl.info.ucl.ac.be,laurent.vanbever@uclouvain.be) Université
More informationSplitting of traffic to maximize the data transmission in mobile ad hoc network under different constraints
www.ijcsi.org 558 Splitting of traffic to maximize the data transmission in mobile ad hoc network under different constraints Sushil Chandra Dimri 1, Kamlesh Chandra Purohit 2 and Durgesh Pant 1 Graphic
More informationInformation Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure
Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationThe Start of Websites for Bhagavan Sri Sathya Sai Baba
Om Sai Ram Om Sai Ram The Start of Websites for Bhagavan Sri Sathya Sai Baba After discussing the start of a website for the International Sai Organization with Michael Goldstein and others, in an interview
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationDr. Spencer Sevilla Postdoctoral Researcher, University of Washington
Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington email: sevilla@cs.washington.edu Research Interests Computer networks, Host mobility, Web technology, Content caching Education University
More informationWestern States Power Crisis EPRI White Paper - An Overview -
Western States Power Crisis EPRI White Paper - An Overview - Dejan J. Sobajic July, 2001 Western States Power Crisis.1 Origins of the White Paper The roots of the document go back to several discussions
More informationCMMI Version 1.2. Josh Silverman Northrop Grumman
CMMI Version 1.2 Josh Silverman Northrop Grumman Topics The Concept of Maturity: Why CMMI? CMMI Overview/Aspects Version 1.2 Changes Sunsetting of Version 1.1 Training Summary The Concept of Maturity:
More informationToward an Automated Future
2017 State of the Network Engineer: Toward an Automated Future netbraintech.com Executive Summary Today s enterprises have reached a tipping point when it comes to network management. Networks are growing
More informationCyber Risk A Corporate Directors' Briefing Webcast Q&A Summary
Cyber Risk A Corporate Directors' Briefing Webcast Q&A Summary Cyber experts from Marsh & McLennan Companies and WomenCorporateDirectors hosted an engaging webcast on August 16 th entitled Cyber Risk A
More informationKeynote Speech Keys to Resilience for SMEs
2014/EPWG-SMEWG/HLPD/003 Session 2 Keynote Speech Keys to Resilience for SMEs Submitted by: IBM High Level Policy Dialogue on Resilient SMEs for Better Global Supply Chains Taichung, Chinese Taipei 24
More informationInformation Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017
Information Technology Services Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services TABLE OF CONTENTS UPDATE ON PROJECTS &
More informationCHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION
CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CONTENTS: Enterprise Mobility Strategy and BYOD Policies Endpoint Vulnerabilities and Challenges Conclusion For several decades,
More informationNETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE NETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST Chate A.B 1, Chirchi V.R 2 1 PG Student, Dept of CNE, M.B.E.S College
More informationReducing Cybersecurity Costs & Risk through Automation Technologies
Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research
More informationOverview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET
Overview of ABET Kent Hamlin Director Institute of Nuclear Power Operations Commissioner TAC of ABET 1 st National Meeting on Improving Education and Training For Chinese Nuclear Power Industry Personnel
More informationOperationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results
Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec
More informationHow Your Organization Can Drive Success in the Age of Digital Disruption
How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,
More informationBachelor of Information Technology (Network Security)
Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year
More informationData Plane Verification and Anteater
Data Plane Verification and Anteater Brighten Godfrey University of Illinois Work with Haohui Mai, Ahmed Khurshid, Rachit Agarwal, Matthew Caesar, and Sam King Summer School on Formal Methods and Networks
More informationMachine-Based Penetration Testing
Always in Control CyBot Suite Machine-Based Penetration Testing www.cronus-cyber.com - April 2016 CyBot PRODUCT SUITE Unique, patented Machine-based Penetration Testing Software with Global Attack Path
More informationDegree Branch / Specialization College University CSE SONA COLLEGE OF TECHNOLOGY : ASSISTANT PROFESSOR (SENIOR GRADE) ASSISTANT PROFESSOR
FACULTY PROFILE Name Designation Email ID : NISHA SOMS : ASSISTANT PROFESSOR (SENIOR GRADE) : nishasoms.cse@srit.org Area of Specialization : Wireless Ad Hoc Networks, Mobile Computing Cryptography and
More informationStrengthening Surveillance: The TB Surveillance Checklist of Standards and Benchmarks Rationale and Development
Strengthening Surveillance: The TB Surveillance Checklist of Standards and Benchmarks Rationale and Development Emily Bloss, PhD Division of Tuberculosis Elimination Centers for Disease Control and Prevention
More informationAPPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS
APPLYING DATA CENTER INFRASTRUCTURE MANAGEMENT IN COLOCATION DATA CENTERS Table of Contents Executive Summary 3 The Colocation Market 4 An Introduction to DCIM 5 The Value of DCIM for Colocation Providers
More informationMiddleware for Ubiquitous Computing
Middleware for Ubiquitous Computing Software Testing for Mobile Computing National Institute of Informatics Ichiro Satoh Abstract When a portable computing device is moved into and attached to a new local
More informationHOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018
HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018 Table of Contents A short technology overview 3 How micro-segmentation
More informationBicycle Access & Parking Plan Project List Review
Bicycle Access & Parking Plan Project List Review Bicycle Advisory Committee September 19th, 2013 Strategy Overview New Bicycle Issues and Ideas (BAC, staff, public) Funding External Agency Lead BAPP s
More informationSanjay Gopinatha Rao October 2017
1 Sanjay Gopinatha Rao October 2017 Education: B.Tech, Computer Science and Engineering, May 1997, Indian Institute of Technology, Madras M.S. in Computer Science, Dec 2000, Carnegie Mellon University
More informationIT Progress Report. Presented by: Owen Brady Director of Information Technology. Board. 19 th March 2015
Item 6 IT Progress Report Presented by: Owen Brady Director of Information Technology Board 19 th March 2015 Action for Board: For information For consideration For decision Table of Contents 1. Executive
More informationInteractive Campaign Planning for Marketing Analysts
Interactive Campaign Planning for Marketing Analysts Fan Du University of Maryland College Park, MD, USA fan@cs.umd.edu Sana Malik Adobe Research San Jose, CA, USA sana.malik@adobe.com Eunyee Koh Adobe
More informationMILLENNIUM PROJECT PROPOSAL
MILLENNIUM PROJECT PROPOSAL WANDERING VALLEY COMMUNITY COLLEGE Network Administrators: Ciprich, Mora, & Saidi ISM 6231 Fall 2000 Dr. Judy Wynekoop MILLENNIUM PROJECT PROPOSAL TABLE OF CONTENTS BACKGROUND
More informationInternational Journal of Advance Engineering and Research Development. Simulation Based Improvement Study of Overprovisioned IP Backbone Network
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 8, August -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 Simulation
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationFlooding Attacks by Exploiting Persistent Forwarding Loops
Flooding Attacks by Exploiting Persistent Forwarding Jianhong Xia, Lixin Gao, Teng Fei University of Massachusetts at Amherst {jxia, lgao, tfei}@ecs.umass.edu ABSTRACT In this paper, we present flooding
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationSoutheast Florida Regional Climate Change Compact Update. Broward Climate Change Task Force February 16, 2017
Southeast Florida Regional Climate Change Compact Update Broward Climate Change Task Force February 16, 2017 Overview Recent Activities RCAP Update Forthcoming Efforts Regional Resilience Projects Summit
More informationTotal Cost of Ownership: Benefits of ECM in the OpenText Cloud
Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required
More informationOperationalizing Cyber Security Risk Assessments for the Dams Sector
Operationalizing Cyber Security Risk Assessments for the Dams Sector Kevin Burns, Jason Dechant, Darrell Morgeson, and Reginald Meeson, Jr. The Problem To evaluate vulnerability to the postulated threat,
More informationERO Enterprise IT Projects Update
ERO Enterprise IT Projects Update Stan Hoptroff, Vice President, Chief Technology Officer and Director of Information Technology Technology and Security Committee Meeting November 6, 2018 Agenda ERO IT
More informationRedefining Networking with Network Virtualization
WHITE PAPER Redefining Networking with Network ization Why Networking Is Ripe for a Change Table of Contents Overcoming the Obstacle Blocking the Benefits of a Hybrid Cloud... 3 What Is Network ization?...4
More informationNCSF Foundation Certification
NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity
More informationProposal Title: Developing the Planetarium as a Center for Public Outreach, Content!! Production, and Student Involvement. Amount Req.
Proposal Title: Developing the Planetarium as a Center for Public Outreach, Content!! Production, and Student Involvement Point Person: Department: Dr. Joshua Nollenberg Physics and Astronomy Amount Req.:
More informationENGINEERING AND TECHNOLOGY MANAGEMENT
Engineering and Technology Management 1 ENGINEERING AND TECHNOLOGY MANAGEMENT Master of Science in Engineering Technology Management Tim Hardin, PhD Director Brenda L. Johnson, MS Assistant Director OSU
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident
More informationSECURING THE DIGITAL ECONOMY. Reinventing the Internet for Trust
SECURING THE DIGITAL ECONOMY Reinventing the Internet for Trust The Internet Just Can t Keep Up Companies Are Increasingly Dependent on the Internet for Business Growth 90% 76% 18% 35% to rank business
More informationCOST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS M.Angel Jasmine Shirley 1, Dr.Suneel Kumar 2 1Research Scholar, 2 Asst. Professor, Maharishi University Lucknow ------------------------------------------------------------------------------***--------------------------------------------------------------------------------
More informationDoD Strategy for Cyber Resilient Weapon Systems
DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationD DAVID PUBLISHING. Big Data; Definition and Challenges. 1. Introduction. Shirin Abbasi
Journal of Energy and Power Engineering 10 (2016) 405-410 doi: 10.17265/1934-8975/2016.07.004 D DAVID PUBLISHING Shirin Abbasi Computer Department, Islamic Azad University-Tehran Center Branch, Tehran
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationOUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society.
Join the Innovation Qatar Computing Research Institute (QCRI) is a national research institute established in 2010 by Qatar Foundation for Education, Science and Community Development. As a primary constituent
More informationProtecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery
White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About
More informationComposite Software Data Virtualization The Five Most Popular Uses of Data Virtualization
Composite Software Data Virtualization The Five Most Popular Uses of Data Virtualization Composite Software, Inc. June 2011 TABLE OF CONTENTS INTRODUCTION... 3 DATA FEDERATION... 4 PROBLEM DATA CONSOLIDATION
More informationMenggang Li. Research on Industrial. Security Theory. Springer
Menggang Li Research on Industrial Security Theory Springer Contents 1 Introduction 1 1.1 Significance of Studying Theories of Industrial Security 1 1.1.1 Theoretical Significance of Studying Industrial
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationInterim Report Technical Support for Integrated Library Systems Comparison of Open Source and Proprietary Software
Interim Report Technical Support for Integrated Library Systems Comparison of Open Source and Proprietary Software Vandana Singh Assistant Professor, School of Information Science, University of Tennessee,
More informationFine-grained Software Version Control Based on a Program s Abstract Syntax Tree
Master Thesis Description and Schedule Fine-grained Software Version Control Based on a Program s Abstract Syntax Tree Martin Otth Supervisors: Prof. Dr. Peter Müller Dimitar Asenov Chair of Programming
More informationHealthcare HIPAA and Cybersecurity Update
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity
More informationTHE CYBERSECURITY LITERACY CONFIDENCE GAP
CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks
More informationDouglas Hoffman. BACS, MSEE, MBA, ASQ Fellow, ASQ-CSQE, ASQ-CMQ/OE
Douglas Hoffman BACS, MSEE, MBA, ASQ Fellow, ASQ-CSQE, ASQ-CMQ/OE Publications 1, 2 Kaner, Cem, and Hoffman, Douglas, The Domain Testing Workbook Context Driven Press, 2013 Graham, Dorothy, and Fewster,
More informationINTRODUCING CISCO SECURITY FOR AWS
SESSION ID: SPO1-T08 INTRODUCING CISCO SECURITY FOR AWS Patrick Crowley CTO Cisco, Stealthwatch Cloud @p_crowley Three Main Points Use VPC Flow logs to make sure nothing is happening behind your back Use
More informationStavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987
413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education
More informationWelcome to Maastricht University. School of Business and Economics
Welcome to Maastricht University School of Business and Economics MSc Business Intelligence and Smart Services (BISS) Service design and development in cyber-society Dr. Alexander Grigoriev Why should
More informationClient Services Procedure Manual
Procedure: 85.00 Subject: Administration and Promotion of the Health and Safety Learning Series The Health and Safety Learning Series is a program designed and delivered by staff at WorkplaceNL to increase
More informationUndergraduate Admission File
Undergraduate Admission File June 13, 2007 Information Resources and Communications Office of the President University of California Overview Population The Undergraduate Admission File contains data on
More informationTotal Cost of Ownership: Benefits of the OpenText Cloud
Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations
More informationIT Services Performance Report
UCD IT Services IT Services Performance Report January December 2010 Prepared by: UCD IT Services Date: 9 th February 2011 Ms. Mary Crowe Chief Information and Technology Officer Contents Background 1
More informationSyllabus Revised 03/05/2015
The Department of Applied Information Technology The Volgenau School of Engineering George Mason University 4400 University Drive Fairfax. VA 22030-4444 IT 341 Data Communications and Networking Principles
More informationNew Products & Innovation
New Products & Innovation MTAC May 20, 2015 Gary Reblin V.P., New Products & Innovation 1 2015 Promotion Calendar As of: 5/7/15 JAN FEB - MARCH APRIL MAY - JUNE JULY AUG - SEPT OCT NOV - DEC FIRST-CLASS
More informationModeling and Simulating STP vs RSTP on Ring and Mesh Network Topologies
Modeling and Simulating STP vs RSTP on Ring and Mesh Network Topologies ENSC 835: Communication Networks Spring 2011 Final Project Presentation www.sfu.ca/~mmkhan Group 6: Simran Sarai (sks17@sfu.ca, 301058482)
More informationFeatured Archive. Saturday, February 28, :50:18 PM RSS. Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact
Saturday, February 28, 2009 03:50:18 PM To search, type and hit ente SEARCH RSS Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact SUBSCRIBE TO OUR MAILING LIST First Name:
More informationCost Reduction in Hybrid Clouds for Enterprise Computing
Cost Reduction in Hybrid Clouds for Enterprise Computing Biyu Zhou, Fa Zhang, Jie Wu, and Zhiyong Liu Beijing Key Laboratory of Mobile Computing and Pervasive Device, ICT, CAS, Beijing, China University
More informationVERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT
VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT VOLUME 5, ISSUE 2 2ND QUARTER 2018 Complimentary report supplied by CONTENTS EXECUTIVE SUMMARY 3 VERISIGN-OBSERVED DDoS ATTACK TRENDS: Q2 2018 4 DDoS
More informationVirtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing
Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,
More informationEnsuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp.
Ensuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp. In today s digital economy, the importance of taking a bottom-line view of your organization s electrical power
More informationWorkshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security
1. SIGMM Workshop on Social Media SIGMM Workshop on Social Media is a workshop in conjunction with ACM Multimedia 2009. With the growing of user-centric multimedia applications in the recent years, this
More informationDemonstration of Software for Optimizing Machine Critical Programs by Call Graph Generator
International Journal of Computer (IJC) ISSN 2307-4531 http://gssrr.org/index.php?journal=internationaljournalofcomputer&page=index Demonstration of Software for Optimizing Machine Critical Programs by
More information