Infrastructure for RFID ILT
|
|
- Oswin Scott
- 5 years ago
- Views:
Transcription
1 Infrastructure for RFID ILT Vikram Shankar, Jeff Pettinato Intel Corporation ILT Workshop Smart Labels USA February 21, 2008
2 Presentation Outline Situation Analysis Infrastructure Areas of Interest Infrastructure Attributes of Interest Security Areas to address for promoting RFID usage Emerging trends Recommendations Discussion 2
3 Infrastructure Areas of Interest 1 Combination of readers, antennas, tags, PLCs, and data networking gear. Enables timely and secure sharing of information with business partners 4 Enables delivery of relevant data from the readers to the data analytics system. 2 3 Applications/databases to process combination of RFID/non-RFID information. 3
4 Infrastructure Attributes of Interest 1. Ease of installation and maintenance Remote configuration of devices, antenna set up 2. Task execution Complexity of tasks that can be executed automatically 3. Security Skimming, data integrity, vulnerability to viruses and worms 5. Exception detection and resolution Robustness to missing or incorrect data due to non-reads and extended reads 4. Modularity & Standardization Ability to mix and match features and capabilities to an organization s needs 4
5 Security is a key focus area for RFID Systems Security issues are similar to most other IT deployments, but: Greater amount of data shared provides more opportunity for mischief Over-the-air communication with minimal encryption provides fairly easy access to a larger system Security Focus Areas: RFID Hardware: Over the air communication is susceptible to snooping and jamming Limited computing capability of tags supports only minimal encryption Reader-Middleware Communication: Similar to IT Middleware-Data Analytics Communication: Similar to IT B2B Communication: Greater exposure to threats such as viruses and worms Impact to operations when partner organizations networks are breached but security issues are similar to most other IT deployments! 5
6 Critical Technology Needs Security Reduce vulnerability to attacks Reduce impact of infrastructure outages at partner organizations Easier ways to deploy and manage the RFID infrastructure Should not need highly specialized worker Automatic health monitoring Inter-company data exchange Better compatibility through standards Out-of-the-box solutions for fast and low cost deployment 6
7 Emerging Trends Open Source software development efforts * Lower cost due to reusable libraries and typically less restricting licensing * Quicker time-to-market, again because of reuse * More secure and robust due to a larger community of developers and testers Cost of deploying readers expected to reduce * Integrated circuits will replace discrete components * Smaller readers with lower space requirements (installation issues) Wider use of multi-protocol readers * Global supply chain Importance of middleware expected to reduce * Enterprise applications assume some functionality * Readers become smarter Emerging Trends are in the Right Direction and will accelerate RFID adoption 7
8 Near Term Recommendations ( ) Near Term Need ( ) Availability of open source software and middleware Adoption of standards University & Research Consortia Provide test beds to validate open source Identify and help close implementation gaps Validate open source ROI and deploy in products Consolidate projects and realign talent and effort to bring projects to fruition faster Validate and help refine Standards based on lessons learned Adopt standards in products Develop multiprotocol readers Recommended Action Industry Funding Agencies (NSF, MITI, 5th Framework, etc.) Fund test beds N/A Standards Bodies Enable a portfolio of open source software closely linked to standards. Participate in test beds to validate both standards and software Enable interoperability of products by harmonizing standards across all geographies Using Industry Standards and Open Source Are Critical to Accelerating RFID Cost Reduction and Adoption Rates 8
9 Long Term Recommendations (2012+) Long Term Needs (2012+): Low cost technology solutions for ILT Tunable antennas Deployment complexity University & Research Consortia Create Centers of Excellence (CoE) Develop low complexity/cost encryption algorithms Create Centers of Excellence (CoE) for tunable antennas Train RFID-savvy students for both engineering and advanced research Industry Participate in CoE Commercialize and produce low cost ILT technologies Develop antennas that can be configured on-the-fly for any of a broad range of frequencies Deliver standard, easy-to-use and configurable solutions; Adopt global standards Databases and business applications that are tolerant of incomplete or incorrect data Recommended Action Fund centers of excellence to enable the inemi ILT roadmap Fund centers of excellence to enable the inemi ILT roadmap N/A Funding Agencies Standards Bodies Tailor standards to low cost price points by intelligently reducing requirements Encourage technologies that will use white space frequencies Encourage plug-andplay philosophy and build into the standards There is a Huge Opportunity for Consortia and Universities to Do Highly Applicable Research and Create Centers of Excellence 9
10 Discussion For comments and feedback please 10
11 Backup 11
12 Infrastructure Technology Needs (1) State of the Art Mid-term (2012) Long-Term (2017) Features Attributes Attributes Tech. Needs Attributes Tech. Needs Infrastructur e Health Monitoring Remote deviceby-device diagnostics and limited reconfiguration Centralized equipment failure prediction and preemptive maintenance Equipment performance and health analytics Failure prediction algorithms Autonomic infrastructure management and failure recovery Self-aware devices and infrastructure Infrastructur e features and capability Conduit for data collection and exchange Databases and information systems to detect missing or incorrect data and to take corrective action Data analysis and outlier recognition algorithms Dynamic quickchange information systems Technologies that enable easy and rapid process changes without the need for extensive software reimplementatio n Infrastructur e set-up Requires highly trained RFID professionals Human interfaces for set-up and maintenance made easy enough for regular IT staff Read range selfconfiguration based on input criteria Plug and play RFID devices Automatic channel state comprehension 12
13 Infrastructure Technology Needs (2) State of the Art Mid-term (2012) Long-Term (2017) Features Attributes Attributes Tech. Needs Attributes Tech. Needs Security Proprietary encryption algorithms for tag-reader communica-tion that depend on secrecy of algorithm More secure tag-reader comm. (when needed) Open encryption algorithms for multi-vendor compatibility Open, standardized mechanisms that do not depend on algorithm secrecy Prevent breach of security and privacy through inference Inference engines to aggregate shared data to check if information can be inferred from shared data Intercompany Data exchange and compatibility Limited or caseby-case compatibility Compatibility between immediate trade partners information exchange standards Out-of-the-box compatibility between partners in the entire supply chain Global information exchange standards 13
14 Open Source Efforts 1. RadioActive Foundation is currently working on three projects: Neutrino, Fusion, and Graviton. Fusion is a middleware that gathers data from tags and readers and delivers that data to enterprise information systems; Neutrino is a software suite that enables the exchange of EPC data between business partners; and Graviton is a simulator for RFID hardware from various manufacturers. 2. LogicAlloy is developing a middleware that implements the Application Level Events (ALE) interface. ALE is an interface standard from EPC Global that provides a layer of abstraction between the data providers such as RFID readers and the data subscribers such as enterprise information systems (e.g. Warehouse Management software). 3. FirstOpen is developing a middleware called Singularity Middleware and is also working on EPC-IS. 4. Pramari is developing a reader emulator called Rifidi. The emulator will enable rapid development of RFID applications by allowing developers to test their applications against emulated scenarios and hardware rather than real hardware. 5. The University of Arkansas is developing a middleware called TagCentric that collects data from a network of RFID readers and sends to a database. 6. Open Source Innovation has received a grant from the UK government to develop open source RFID solutions. 7. Several RFID vendors have joined together to develop the LLRP Toolkit a set of open source libraries for the implementation of the Low Level Reader Protocol based applications. 8. Accada is a rapid prototyping platform that implements the EPC Network specifications. 14
15 Open Source Needs Gaps Development Needs Timeline EPC architecture Discovery services Object naming services Pedigree Short to medium term (1-5 years) Business-to-business information exchange Lack of open source production-ready business logic software Software must be improved to meet production grade requirements of reliability, maintainability and security Short to medium term (1-5 years) Tag protocols Lack of standards for 2.4 GHz and 5.8 GHz Development and implementation of microwave air interface protocols Short term (1-3 years) 15
16 Information Technology Needs Data Filtering Data Mining Exception Detection and Resolution Task Execution Modularity Disconnected Operation 16
Government IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationCOURSE DESCRIPTION LTE FOR COMMERCIAL PROFESSIONALS. Format: 4 x 2 Hour Modules. Duration: 1 Day (with 2-Day Option)
COURSE DESCRIPTION LTE FOR COMMERCIAL PROFESSIONALS Format: 4 x 2 Hour Modules Duration: 1 Day (with 2-Day Option) COURSE SUMMARY HIGHLIGHTS Highly focused and in-depth training from the experts - including
More informationCIO Forum Maximize the value of IT in today s economy
CIO Forum Maximize the value of IT in today s economy Laura Scott, Vice President Service Product Line Sales Global Technology Services IT infrastructure is reaching a breaking point. 85% idle In distributed
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationEvolution For Enterprises In A Cloud World
Evolution For Enterprises In A Cloud World Foreword Cloud is no longer an unseen, futuristic technology that proves unattainable for enterprises. Rather, it s become the norm; a necessity for realizing
More informationOntario Smart Grid Forum: Support Presentation. Tuesday, March 8 th 2011
Ontario Smart Grid Forum: Support Presentation Tuesday, March 8 th 2011 Agenda Item # 1 S.G.F. Minutes 2 Agenda Item # 1: Minutes January 17 th 2011 minutes: no further comments received. Recommended as
More informationInformation Infrastructure and Security. The value of smart manufacturing begins with a secure and reliable infrastructure
Information Infrastructure and Security The value of smart manufacturing begins with a secure and reliable infrastructure The Case for Connection To be competitive, you must be connected. That is why industrial
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationOracle and Tangosol Acquisition Announcement
Oracle and Tangosol Acquisition Announcement March 23, 2007 The following is intended to outline our general product direction. It is intended for information purposes only, and may
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationTHE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly
More informationThe Future of Solid State Lighting in Europe
PLUS Conference "LED Lighting Strategies for Urban Spaces", 20/6/2012 The Future of Solid State Lighting in Europe Michael Ziegler European Commission DG Information Society and Media [-> DG CONNECT -
More informationThe role of ICT in managing the complex Smart Grid Infrastructure. Nampuraja Enose Infosys Labs
The role of ICT in managing the complex Smart Grid Infrastructure Nampuraja Enose Infosys Labs Smart Grid The Smart Grid isn t a thing, but rather a Vision for the power system of the future Its a mix
More informationBUILD BETTER MICROSOFT SQL SERVER SOLUTIONS Sales Conversation Card
OVERVIEW SALES OPPORTUNITY Lenovo Database Solutions for Microsoft SQL Server bring together the right mix of hardware infrastructure, software, and services to optimize a wide range of data warehouse
More informationEMC ACADEMIC ALLIANCE
EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. Equip your students with the broad and deep knowledge required in today s complex
More information21ST century enterprise. HCL Technologies Presents. Roadmap for Data Center Transformation
21ST century enterprise HCL Technologies Presents Roadmap for Data Center Transformation june 2016 21st Century Impact on Data Centers The rising wave of digitalization has changed the way IT impacts business.
More informationConverged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products
Converged security Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products Increased risk and wasted resources Gartner estimates more than $1B in
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationCisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions
Data Sheet Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security
More informationSummary of Cyber Security Issues in the Electric Power Sector
Summary of Cyber Security Issues in the Electric Power Sector Jeff Dagle, PE Chief Electrical Engineer Energy Technology Development Group Pacific Northwest National Laboratory (509) 375-3629 jeff.dagle@pnl.gov
More information29-31 OCTOBER cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE
29-31 OCTOBER 2019 cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE CYBERSECURITY AND ETHICAL HACKING CONGRESS The Barcelona Cyber Ethical Days Congress will be the
More informationBetter skilled workforce
Better skilled workforce for the New Style of Business HPE Education Services November 20, 2015 Education is the most powerful weapon which you can use to change the world Nelson Mandela The New Style
More informationIDC FutureScape: Worldwide Security Products and Services 2017 Predictions
IDC FutureScape: Worldwide Security Products and Services 2017 Predictions Sean Pike, Program Vice President, Robert Ayoub, Research Director IDC Web Conference December, 7, 2016 Logistics Submit any questions
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationRun the business. Not the risks.
Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.
More information2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE
Co-Host Host 2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its
More informationCisco ASA 5500 Series IPS Edition for the Enterprise
Cisco ASA 5500 Series IPS Edition for the Enterprise Attacks on critical information assets and infrastructure can seriously degrade an organization s ability to do business. The most effective risk mitigation
More informationEPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use
EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission
More information13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)
AGENDA ADDENDU TE REGULAR EETING OF TE AUDIT COITTEE COITTEE PUBLIC SESSION Tuesday, June 6, 2017 6:30 P.. Pages 13. Staff Reports 13.f Toronto Catholic District School Board's IT Strategic Review - Draft
More informationBusiness Architecture Implementation Workshop
Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in
More informationData Center Management and Automation Strategic Briefing
Data Center and Automation Strategic Briefing Contents Why is Data Center and Automation (DCMA) so important? 2 The Solution Pathway: Data Center and Automation 2 Identifying and Addressing the Challenges
More informationFORTIKA - Cyber Security Accelerator for trusted SMEs IT Ecosystems THE PROJECT
PROJECT ANNOUNCEMENT FORTIKA - Cyber Security Accelerator for trusted SMEs IT Ecosystems THE PROJECT The FORTIKA project aims to provide SMEs with an embedded, smart and robust hardware security layer
More informationTransforming Utility Grid Operations with the Internet of Things
Solution Brief Internet of Things Energy Industry Transforming Utility Grid Operations with the Internet of Things Access key process data in real time to increase situational awareness of grid operations.
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationSmart Manufacturing in the Food & Beverage Industry
Smart Manufacturing in the Food & Beverage Industry PUBLIC Copyright 2016 Rockwell Automation, Inc. All Rights Reserved. 1 Rockwell Automation at a Glance $5.9B FISCAL 2016 SALES 22,000 EMPLOYEES 80+ COUNTRIES
More informationISAO SO Product Outline
Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing
More informationwi4 Fixed Point-to-Multipoint Canopy Solutions
wi4 Fixed Point-to-Multipoint Canopy Solutions Canopy Technology is as Simple as it is Powerful The wi4 Fixed Point-to-Multipoint Canopy solution is streamlined, powerful and simple, with built-in installation
More informationMeasurement Challenges and Opportunities for Developing Smart Grid Testbeds
Measurement Challenges and Opportunities for Developing Smart Grid Testbeds 10th Carnegie Mellon Conference on the Electricity Industry April 1, 2015 Paul Boynton boynton@nist.gov Testbed Manager Smart
More informationFLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD
FLUID COMPUTING IN A SOFTWARE-DEFINED WORLD ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River Chemical Sector Commercial Building Sector Communications Sector Critical Manufacturing
More informationRFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template
RFP/RFI Questions for Managed Security Services Sample MSSP RFP Template Table of Contents Request for Proposal Template Overview 1 Introduction... 1 How to Use this Document... 1 Suggested RFP Outline
More informationVortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex Whitepaper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems www.adlinktech.com 2017 Table of Contents 1. Introduction........ P 3 2. Iot and
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationData Protection. Plugging the gap. Gary Comiskey 26 February 2010
Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at
More informationOneUConn IT Service Delivery Vision
OneUConn IT Service Delivery Vision The University s Academic Vision establishes a foundation and high expectations for excellence in research, teaching, learning, and outreach for all of UConn s campuses.
More informationAUTOMOTIVE FUNCTIONAL SAFETY: ACCELERATING INNOVATION THROUGH COOPERATION AND CONSENSUS IN STANDARDS
AUTOMOTIVE FUNCTIONAL SAFETY: ACCELERATING INNOVATION THROUGH COOPERATION AND CONSENSUS IN STANDARDS May 2018 BSI Standards 020 8996 7261 Alex.Price@BSIgroup.com Copyright 2012 BSI. All rights reserved.
More informationIBM Internet Security Systems Proventia Management SiteProtector
Supporting compliance and mitigating risk through centralized management of enterprise security devices IBM Internet Security Systems Proventia Management SiteProtector Highlights Reduces the costs and
More informationNext-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data
More informationThe Benefits of a Modern DCS
The Benefits of a Modern DCS Mike Brimmer Rockwell Automation Marcia Pohl Horizon Solutions PUBLIC Copyright 2018 Rockwell Automation, Inc. All Rights Reserved. 1 Copyright 2016 Rockwell Automation, Inc.
More informationARC VIEW. Honeywell s New PLC Brings Digital Transformation to the ControlEdge. Keywords. Summary. The Edge and IIoT.
ARC VIEW AUGUST 3, 2017 Honeywell s New PLC Brings Digital Transformation to the ControlEdge By Craig Resnick Keywords IIoT, PLC, DCS, Digital Transformation, Mobility, OPC UA, Cybersecurity Summary IIoT
More informationIncident Response Services
Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and
More informationthe steps that IS Services should take to ensure that this document is aligned with the SNH s KIMS and SNH s Change Requirement;
Shaping the Future of IS and ICT in SNH: 2014-2019 SNH s IS/ICT Vision We will develop the ICT infrastructure to support the business needs of our customers. Our ICT infrastructure and IS/GIS solutions
More informationPicasso Panel Thinking Beyond 5 G David Corman
Picasso Panel Thinking Beyond 5 G David Corman Program Director Directorate for Computer and Information Science and Engineering National Science Foundation June 19, 2018 Some Motivation: Toward Smart
More informationInformation Technology
Information Technology Company Profile 2 About Training Solutions Enterprise Solutions Infocan Infocan was established in 1989 with the mission of providing quality, professional, effective and practical
More information1Z Oracle IT Architecture SOA 2013 Essentials Exam Summary Syllabus Questions
1Z0-475 Oracle IT Architecture SOA 2013 Essentials Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-475 Exam on Oracle IT Architecture SOA 2013 Essentials 2 Oracle 1Z0-475 Certification
More informationDelivering Complex Enterprise Applications via Hybrid Clouds
Whitepaper Delivering Complex Enterprise Applications via Hybrid Clouds As enterprises and industries shake off the effects of the last recession, the focus of IT organizations has shifted from one marked
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationBPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.
BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...
More informationOracle Autonomous Database
Oracle Autonomous Database Maria Colgan Master Product Manager Oracle Database Development August 2018 @SQLMaria #thinkautonomous Safe Harbor Statement The following is intended to outline our general
More informationDATACENTER SERVICES DATACENTER
SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new
More informationORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES
ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More informationACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families
ACF Interoperability Human Services 2.0 Overview August 2011 David Jenkins Administration for Children and Families Interoperability: An Operational Definition Creating a Health and Human Service System
More informationFAQs for Background. 1. What is Open Core Engineering?
1. What is Open Core Engineering? It is a new Bosch Rexroth automation software platform and programming capability that combines the previously separate environments of PLC programming and IT programming
More informationThe smart choice for industrial switches
The smart choice for industrial switches Help your customers transform their smart cities, automated factories and wireless outdoor environments. A healthy margin and full support Specify D-Link industrial
More informationWhy is Office 365 the right choice?
Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply
More informationIntelligent Grid and Lessons Learned. April 26, 2011 SWEDE Conference
Intelligent Grid and Lessons Learned April 26, 2011 SWEDE Conference Outline 1. Background of the CNP Vision for Intelligent Grid 2. Implementation of the CNP Intelligent Grid 3. Lessons Learned from the
More informationProposed Capability-Based Reference Architecture for Real-Time Network Defense
Proposed Capability-Based Reference Architecture for Real-Time Network Defense 16 November 2015 DISTRIBUTION STATEMENT A - APPROVAL FOR PUBLIC RELEASE: DISTRIBUTION IS UNLIMITED Based on work funded by
More informationWireless Network Virtualization: Ensuring Carrier Grade Availability
AN INTEL COMPANY Wireless Network Virtualization: Ensuring Carrier Grade Availability WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY The wireless industry s battle to acquire new subscribers
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationCOURSE DESCRIPTION ICT, UNIFIED COMMUNICATIONS AND DIGITAL SERVICES. Format: Face-Face or Live-on -Web. Duration: 2 Days or 4 x 3 Hours
COURSE DESCRIPTION ICT, UNIFIED COMMUNICATIONS AND DIGITAL SERVICES Format: Face-Face or Live-on -Web Duration: 2 Days or 4 x 3 Hours COURSE SUMMARY HIGHLIGHTS Highly focused and in-depth training from
More informationChoosing the Right Solution for Strategic Deployment of Encryption
Choosing the Right Solution for Strategic Deployment of Email Encryption White Paper: Enterprise Email Encryption Email Protection Buyer s Guide Choosing the Right Solution for Strategic Deployment of
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationOUR VISION To be a global leader of computing research in identified areas that will bring positive impact to the lives of citizens and society.
Join the Innovation Qatar Computing Research Institute (QCRI) is a national research institute established in 2010 by Qatar Foundation for Education, Science and Community Development. As a primary constituent
More informationDay One Success for DevSecOps and Automation on Azure
Day One Success for DevSecOps and Automation on Azure Chris Jeffrey Senior Cloud Architect Microsoft Azure Cloud Technology Partners, A Hewlett Packard Enterprise Company Twitter: @chrisjeffrey_uk What
More informationData Model Considerations for Radar Systems
WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,
More informationCONFIDENTLY INTEGRATE VMWARE CLOUD ON AWS WITH INTELLIGENT OPERATIONS
SOLUTION OVERVIEW CONFIDENTLY INTEGRATE VMWARE WITH INTELLIGENT OPERATIONS VMware Cloud TM on AWS brings VMware s enterprise class Software-Defined Data Center (SDDC) software to the AWS Cloud, with optimized
More informationWindows 7 Done Right: From Migration to Implementation
I D C E X E C U T I V E B R I E F Windows 7 Done Right: From Migration to Implementation Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com July 2010
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationSecurity Management Models And Practices Feb 5, 2008
TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related
More informationHuman history is a history of connections. Embracing mobile networks in the 5G era. Three challenges. Perspectives
Perspectives Embracing mobile networks in the 5G era By Edward Deng, President of Huawei Wireless Solution Human history is a history of connections. The pursuit of communication promotes the development
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationDevice Discovery for Vulnerability Assessment: Automating the Handoff
Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are
More informationService Provider Consulting
From Microsoft Services 1 Industry Overview More and more businesses are looking to outsource IT, decrease management requirements and ultimately save money. With worldwide public cloud spending expected
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationOracle Exadata: Strategy and Roadmap
Oracle Exadata: Strategy and Roadmap - New Technologies, Cloud, and On-Premises Juan Loaiza Senior Vice President, Database Systems Technologies, Oracle Safe Harbor Statement The following is intended
More informationGRIDS INTRODUCTION TO GRID INFRASTRUCTURES. Fabrizio Gagliardi
GRIDS INTRODUCTION TO GRID INFRASTRUCTURES Fabrizio Gagliardi Dr. Fabrizio Gagliardi is the leader of the EU DataGrid project and designated director of the proposed EGEE (Enabling Grids for E-science
More informationOptimizing Web and Application Infrastructure on a Limited IT Budget
Optimizing Web and Application Infrastructure on a Limited IT Budget Costs associates with deploying, maintaining and supporting web application infrastructure can be dramatically reduced with ADCs. Today
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationLeveraging the Cloud for Law Enforcement. Richard A. Falkenrath, PhD Principal, The Chertoff Group
Leveraging the Cloud for Law Enforcement Richard A. Falkenrath, PhD Principal, The Chertoff Group Law Enforcement Information Management Training Conference & Technology Exposition May 21,2013 Outline
More informationIBM Software IBM InfoSphere Information Server for Data Quality
IBM InfoSphere Information Server for Data Quality A component index Table of contents 3 6 9 9 InfoSphere QualityStage 10 InfoSphere Information Analyzer 12 InfoSphere Discovery 13 14 2 Do you have confidence
More informationDATA CENTRE SOLUTIONS
DATA CENTRE SOLUTIONS NOW OPTIMIZATION IS WITHIN REACH. CONVERGED INFRASTRUCTURE VIRTUALIZATION STORAGE NETWORKING BACKUP & RECOVERY POWER & COOLING 2 INCREASE AGILITY, STARTING IN YOUR DATA CENTRE. Chances
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationHeader Compression Capacity Calculations for Wireless Networks
Header Compression Capacity Calculations for Wireless Networks Abstract Deployment of wireless transport in a data-centric world calls for a fresh network planning approach, requiring a balance between
More informationMicrosoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit. Alan Maddison, Architect Amit Bhatia, Architect
Microsoft 365 powered device webinar series Microsoft 365 powered device Assessment Kit Alan Maddison, Architect Amit Bhatia, Architect Why did we create the Assessment kit? Assessment objectives Assess
More informationMobility Optimized Access Layer
solution brief Mobility Optimized Access Layer Completing the Hive with Aerohive Switches Designing for Mobile First Legacy enterprise networks were never designed to accommodate the complexity of a mobile-first
More information