Petroleum User Group Meeting, April 2006 Houston, TX. Leveraging Semantic Technology for Improved Enterprise Search and Knowledge Discovery
|
|
- Laurel Todd
- 5 years ago
- Views:
Transcription
1 Petroleum User Group Meeting, April 2006 Houston, TX Leveraging Semantic Technology for Improved Enterprise Search and Knowledge Discovery
2 Petroleum User Group Meeting, April 2006 Houston, TX OR GIS as a part of an Integrated, Dynamic Information Model
3 Why? Research, intelligence, life science, security, identity, energy (natural gas) Selective and easy access to data, metadata and knowledge from anywhere, ability to annotate and relate, analyze and report Use, share and re-process information assets Collect project relevant data into application independent projects (shoeboxes) Develop and test evolving models, pose hypothesis and analyze Capture recipes for knowledge transfer and re-use..in dynamic (often spatially oriented) environments
4 Expanding the Reach of GIS Google Earth Dedicated users Periodic users need familiar metaphors, integration with other applications/known environments and data and compelling reasons to use spatial data - Google - Expectation that all information is searchable, transcends physical and application boundaries Gmail no explicit location for information. Flickr,.. Tagging metaphor gaining momentum
5 Search and Tag Limits of Web search today lack semantics/meaningful tags: Houston - Houston, TX - Whitney Houston Refine search with synonyms ranked by Google, author is often unknown, purpose for document often unknown Semantic web what it is (metadata) and what it means (semantics). Houston place
6 Semantics Semantic approaches now in the enterprise Allow communities to describe their terms and relationships Expand search capability Allow the capture of context of information Enable identification of evolving knowledge trends Who uses them? Communities that want to eliminate and support ambiguity Communities with evolving knowledge models Communities who want to use their own language and relationships for accessing information
7 Metadata Data Metadata Knowledge } aren t static Gain insight with time based views, filtering,.. Collecting more data and metadata isn t enough DATA DEMANDS ATTENTION DELIVERING MORE DATA CAN PREVENT USERS FROM DOING ANALYSIS INFORMATION NEEDS TO BE TIMELY AND RELEVANT Communities will not agree on a single metadata/knowledge description DIFFERENT PROBLEMS REQUIRE DIFFERENT DESCRIPTIONS and EVER CHANGING, PROBLEM SPECIFIC RELATIONSHIPS
8 Knowledge Need to capture, share and re-use knowledge Know more about data when it is captured or created Automate metadata capture Evolve through usage Search and access using familiar terms Easily find and relate information
9 Tags Semantic descriptions Dictionaries of categories, properties and relationships Problem focused Could have different dictionaries for different roles or activities Interconnectable
10 Thetus Develops knowledge modeling and discovery infrastructure software for customers who: Have high-value data not easily structured using traditional database technology Has evolving meaning Has no single representation Need automated processing, notification and search Need recorded history of information Want to do predictive modeling NEED to use a semantic approach
11 Bridging the Knowledge Gap KNOWLEDGE DISCOVERY DATA HYPOTHESIS AND ANALYSIS TESTING AND VERIFICATION Defensible Tracking, Reporting, and Publishing OBSERVATION MODELING EXPERIMENTATION STRUCTURED DATA TOOLS AND METHODS
12 Metadata Lineage Search Reporting Automated Re-Processing Modeling
13 Thetus Knowledge Knowledge Modeling Discovery Infrastructure Solution: Software How it Works Θ Distributed Users Θ Ubiquitous Access to Θ Real-Time Context-Specific Search Discovering and Task Processing Network Knowledge Across Data, Θ Event-Triggered Θ Accidental Discovery via Inferencing Collaborating within a Applications, Θ Automation, Personalization, and Alerts Θ Multi-Dimensional Knowledge Modeling Common Framework of Departments, and Knowledge Disciplines Evolving Data Model Dynamic Indexing Lineage Tracking Metadata Extraction
14 Cross Application Knowledge
15 GIS Connection: Knowledge Analyst Knowledge Select Select and: -Search -Search Similar -Search Related -Get Report Knowledge Identify Similar to Arc Identify tool, provides quick KM report for items. Knowledge Search Brings up search interface to browse knowledge structure and search on categories and properties Relate Tool Allows users to relate items on the map with items not represented spatially and relate map items. KM Client Launch Opens KM Client, if not present launches web page. Quick Search Launches Quick Search. (See quick search web interface)
16 Knowledge Sharing and Re-use
17 Use Spatial Information
18 Connecting Across Domains
19 Context-Specific Access to Knowledge Service call Person hascrew hasmember workswith Group trainedwith Group Equipment hasmember hasmember hasmember Person Person Person hasmember Person Policy-Based Access Group alliedwith trainedwith Group Equipment
20 Dynamically-Evolving Knowledge Bases Rich Networks of Relationships Event Person Group perpetrator hasmember alliedwith perpetrator Group Explicit Event and Implicit hasmember perpetrator hasmember Person Person hasalias Event hasmember Hidden Trends, Patterns, and Relationships among Data Group alliedwith Person perpetrator Group Event
21 Examples of Gas Utility Applications Damage Loss Prevention Gas Loss Identification Service Management Pipeline Integrity Management Asset Management
22 Damage Loss Problem Lots of Pipe close to surface in high density areas Lots of Construction not all permitted 50% of Damage caused when no Locate (call before you dig) request made No single source for information inside and outside the enterprise Different views of information needed Need predictive model to prevent damage through education, inspection - not just penalties
23 Damage Loss Prevention
24 Questions Are certain types of contractors more likely to cause damage? How can we prevent? Can I be notified when at risk contractors are about to start work? Does damage happen more often under certain types of conditions Economic Weather
25 Hazardous Condition Worker Monitoring
26 Related Service Personnel Portal Emergency Personnel Portal Web Portals Management / Leadership Planners Analysts INTERNET External Data Sources JSP Server Data Integration Layer for Real-Time Monitoring, Reporting, and Modeling Wireless Sensors Heart Rate Motion Skin Temperature Mission / Service Data Task Servers Thetus Publisher Evolving Knowledge Bases TenXsys Databases Additional Sensor Data
27 Danielle Forsyth Thetus Corporation
Overview of Web Mining Techniques and its Application towards Web
Overview of Web Mining Techniques and its Application towards Web *Prof.Pooja Mehta Abstract The World Wide Web (WWW) acts as an interactive and popular way to transfer information. Due to the enormous
More informationAutomated, Real-Time Risk Analysis & Remediation
Automated, Real-Time Risk Analysis & Remediation TABLE OF CONTENTS 03 EXECUTIVE SUMMARY 04 VULNERABILITY SCANNERS ARE NOT ENOUGH 06 REAL-TIME CHANGE CONFIGURATION NOTIFICATIONS ARE KEY 07 FIREMON RISK
More informationAn Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)
An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for
More informationManufacturing security: Bridging the gap between IT and OT
Manufacturing security: Bridging the gap between IT and OT For manufacturers, every new connection point is an opportunity. And a risk. The state of IT/OT security in manufacturing On the plant floor,
More informationEsri Technical Demonstration What s a Web Map? (And Why It Matters For National Security Missions) Jeff Baranyi, Esri Chris Delaney, Esri
Esri Technical Demonstration What s a Web Map? (And Why It Matters For National Security Missions) Jeff Baranyi, Esri Chris Delaney, Esri The National Security Platform Vision Knowledge Workers Planning
More informationCyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS
Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported
More informationUnderstanding ArcGIS Pipeline Referencing for Vertically Integrated Gas Companies. GeoConX 2017 September 7, 2017
Understanding ArcGIS Pipeline Referencing for Vertically Integrated Gas Companies GeoConX 2017 September 7, 2017 The Asset Intelligence Imperative GOAL The necessity to learn ever more, in as close to
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationEnterprise Knowledge Map: Toward Subject Centric Computing. March 21st, 2007 Dmitry Bogachev
Enterprise Knowledge Map: Toward Subject Centric Computing March 21st, 2007 Dmitry Bogachev Are we ready?...the idea of an application is an artificial one, convenient to the programmer but not to the
More informationOverview of PECO s Distribution Integrity Management Plan
Overview of PECO s Distribution Integrity Management Plan PUC Gas Safety Seminar September 8, 2016 David Bonner, PE Robert Ridgeway, PE Agenda PECO Distribution System Overview DIMP Pillar #1 DIMP DIMP
More informationNext-Generation Standards Management with IHS Engineering Workbench
ENGINEERING & PRODUCT DESIGN Next-Generation Standards Management with IHS Engineering Workbench The addition of standards management capabilities in IHS Engineering Workbench provides IHS Standards Expert
More informationPart of the complete suite of itracs award-winning DCIM capabilities. DCIM Software. itracs CPIM : Mastering the Connectivity Challenge
Part of the complete suite of itracs award-winning DCIM capabilities DCIM Software itracs CPIM : Mastering the Connectivity Challenge itracs CPIM Intelligence. Automation. Insight. Impact! Business Value
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationEnterprise Geographic Information Servers. Dr David Maguire Director of Products Kevin Daugherty ESRI
Enterprise Geographic Information Servers Dr David Maguire Director of Products Kevin Daugherty ESRI Outline Introduction Enterprise GIS vs. Spatially-enabled IS Architectures for building Enterprise GIS
More informationGIS as a Data Integration Platform
GIS as a Data Integration Platform By: Malcolm Wardlaw Malcolm Wardlaw is the Director of Strategic Partnerships for R7 Solutions. A former consultant with McKinsey & Company, Mr. Wardlaw has experience
More informationLinked Open Data and Semantic Technologies for Research in Agriculture and Forestry
Linked Open and Semantic Technologies for Research in Agriculture and Forestry Platform Linked Nederland 2 April 2015 Rob Lokers, Alterra, Wageningen UR Contents related challenges in agricultural (and
More informationDelay Injection for. Service Dependency Detection
Delay Injection for Service Dependency Detection Richard A. Kemmerer Computer Security Group Department of Computer Science University of California, Santa Barbara http://seclab.cs.ucsb.edu ARO/MURI Meeting
More informationCisco Open Platform for Safety and Security
Cisco Open Platform for Safety and Security 1 Agenda Market Overview Business Drivers Barriers and Risks Cisco Open Platform for Safety and Security Scenarios Ecosystem Partners Summary 2 Market Overview
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationCisco Wireless Video Surveillance: Improving Operations and Security
Cisco Wireless Video Surveillance: Improving Operations and Security What You Will Learn Today s organizations need flexible, intelligent systems to help protect people and assets as well as streamline
More informationTIES for Microsoft CityNext Next-Generation Situational Awareness
BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness
More informationContinuous protection to reduce risk and maintain production availability
Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading
More informationSCADA Getting Smarter Gary Clouser April 1, 2013
SCADA Getting Smarter Gary Clouser April 1, 2013 Supervisory Control and Data Acquisition (SCADA) technical advances have changed the role that automation and remote monitoring play in midstream operations.
More informationModern Database Architectures Demand Modern Data Security Measures
Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing
More informationA Study of Mountain Environment Monitoring Based Sensor Web in Wireless Sensor Networks
, pp.96-100 http://dx.doi.org/10.14257/astl.2014.60.24 A Study of Mountain Environment Monitoring Based Sensor Web in Wireless Sensor Networks Yeon-Jun An 1, Do-Hyeun Kim 2 1,2 Dept. of Computing Engineering
More information!!!!!! Portfolio Summary!! for more information July, C o n c e r t T e c h n o l o g y
Portfolio Summary July, 2014 for more information www.concerttechnology.com bizdev@concerttechnology.com C o n c e r t T e c h n o l o g y Overview The screenplay project covers emerging trends in social
More informationAUTOMATION. Dr. Ibrahim Al-Naimi
AUTOMATION Dr. Ibrahim Al-Naimi Chapter four Industrial Control Systems Process and Discrete Industries Level of automation. Variables and parameters. Continuous and Discrete Variables/Parameters Continuous
More informationDay 1 summary for day 2. Addison, TX
Technical Interoperability Day 1 summary for day 2 April 12, 2007 Addison, TX Overview Summary of day 1 Top 5 issues Other topics discussed Issues for the future (day 2) Main Issues (1) Title: Adopt /
More informationMission Defense via Information-Centric Security
Mission Defense via Information-Centric Security Overview It s About the Information Traditional CND Tools are Not Sufficient Not All Data is Created Equal "The views expressed in this presentation are
More informationAutodesk Utility Design and Your GIS
UT4523-P Autodesk Utility Design and Your GIS Prashant Srivastav Quality Assurance Lead, Utilities Co Speakers: Jeff Saunders, Carsten Hess The Power Track Utility Design Power Track at a glance... and
More informationData Virtualization Implementation Methodology and Best Practices
White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful
More informationBest practices in IT security co-management
Best practices in IT security co-management How to leverage a meaningful security partnership to advance business goals Whitepaper Make Security Possible Table of Contents The rise of co-management...3
More informationDaniel Appelquist 22 April The Emerging Widgets Ecosystem
Daniel Appelquist 22 April 2009 The Emerging Widgets Ecosystem Contents 1. Intro 2. The mobile Web, past present and future 3. What s in a Widget? 4. Vodafone s Widgets Beta (and how to win 20,000) 5.
More informationFOR FINANCIAL SERVICES ORGANIZATIONS
RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly
More informationCertified Petroleum Data Analyst (CPDA) Certification Update
PROFESSIONAL PETROLEUM DATA MANAGEMENT ASSOCIATION Certified Petroleum Data (CPDA) Certification Update Sharon Barnes, PDMCC Member Ingrid Kristel, Project Manager, PPDM 1 3/17/2015 WHO IS THE PDMCC? Data
More informationData publication and discovery with Globus
Data publication and discovery with Globus Questions and comments to outreach@globus.org The Globus data publication and discovery services make it easy for institutions and projects to establish collections,
More informationUsing Operations Dashboard for ArcGIS: An Introduction
FedGIS Conference February 24 25, 2016 Washington, DC Using Operations Dashboard for ArcGIS: An Introduction Ken Gorton Carmella A. Burdi, GISP Solution Engineer Esri National Government Team kgorton@esri.com
More informationThe New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments
The New Normal Unique Challenges When Monitoring Hybrid Cloud Environments The Evolving Cybersecurity Landscape Every day, the cybersecurity landscape is expanding around us. Each new device connected
More informationResource Discovery in IoT: Current Trends, Gap Analysis and Future Standardization Aspects
Resource Discovery in IoT: Current Trends, Gap Analysis and Future Standardization Aspects Soumya Kanti Datta Research Engineer, EURECOM TF-DI Coordinator in W3C WoT IG Email: dattas@eurecom.fr Roadmap
More informationSOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)
SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP) Adaptive Cybersecurity at the Speed of Your Business Attackers Evolve. Risk is in Constant Fluctuation. Security is a Never-ending Cycle.
More informationEffective Threat Modeling using TAM
Effective Threat Modeling using TAM In my blog entry regarding Threat Analysis and Modeling (TAM) tool developed by (Application Consulting and Engineering) ACE, I have watched many more Threat Models
More informationForeScout Extended Module for MobileIron
Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationConnecting Space and Time OSIsoft & Esri
Connecting Space and Time OSIsoft & Esri Presented by Michelle Kuiee Product Manager Frank Batke Senior Systems Engineer 2 Which of these describe your need? Operating Engineers & Analysts Environmental
More informationPredictive Resilience: Leveraging Integrated DCIM to Reduce Data Center Downtime
July 17, 2013 Predictive Resilience: Leveraging Integrated DCIM to Reduce Data Center Downtime siemens.com/answers Predictive Resilience Table of content What is DCIM & Its Business Value Extract Maximum
More informationIntegrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries
Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries First united and open ecosystem to support enterprise-wide visibility and rapid response The cybersecurity industry needs a more efficient
More informationIMAGE ACQUISTION AND PROCESSING FOR FINANCIAL DUE DILIGENCE
Technical Disclosure Commons Defensive Publications Series August 24, 2016 IMAGE ACQUISTION AND PROCESSING FOR FINANCIAL DUE DILIGENCE Matthew Wood Patrick Dunagan John Clark Kristina Bohl David Gonzalez
More informationContext Aware Computing
CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware
More informationEleven+ Views of Semantic Search
Eleven+ Views of Semantic Search Denise A. D. Bedford, Ph.d. Goodyear Professor of Knowledge Management Information Architecture and Knowledge Management Kent State University Presentation Focus Long-Term
More informationRSA IT Security Risk Management
RSA IT Security Risk Adding Insight to Security March 18, 2014 Wael Jaroudi GRC Sales Specialist 1 Where is Security Today? Companies have built layer upon layer of security, but is it helping? Complexity
More informationThe Value of Data Governance for the Data-Driven Enterprise
Solution Brief: erwin Data governance (DG) The Value of Data Governance for the Data-Driven Enterprise Prepare for Data Governance 2.0 by bringing business teams into the effort to drive data opportunities
More informationA Practical Guide to Efficient Security Response
A Practical Guide to Efficient Security Response The Essential Checklist Start The Critical Challenges to Information Security Data breaches constantly threaten the modern enterprise. And the risk continues
More informationToward a Standard Rule Language for Semantic Integration of the DoD Enterprise
1 W3C Workshop on Rule Languages for Interoperability Toward a Standard Rule Language for Semantic Integration of the DoD Enterprise A MITRE Sponsored Research Effort Suzette Stoutenburg 28 April 2005
More informationGDPR: An Opportunity to Transform Your Security Operations
GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)
More informationLuncheon Webinar Series April 25th, Governance for ETL Presented by Beate Porst Sponsored By:
Luncheon Webinar Series April 25th, 2014 Governance for ETL Presented by Beate Porst Sponsored By: 1 Governance for ETL Questions and suggestions regarding presentation topics? - send to editor@dsxchange.com
More informationService Vs. System. Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011
Service Vs. System Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011 1. Does DoD Need To Model a Service? Bottom Line Up front (BLUF) DoD has a requirement
More informationTHE NATIONAL DATA SERVICE(S) & NDS CONSORTIUM A Call to Action for Accelerating Discovery Through Data Services we can Build Ed Seidel
THE NATIONAL DATA SERVICE(S) & NDS CONSORTIUM A Call to Action for Accelerating Discovery Through Data Services we can Build Ed Seidel National Center for Supercomputing Applications University of Illinois
More informationOptimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach
White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses
More informationChevron Position Paper for W3C Workshop on Semantic Web in Oil & Gas Industry
Enterprise Architecture Chevron Position Paper for W3C Workshop on Semantic Web in Oil & Gas Industry Frank Chum, ITC EA Mario Casetta, ETC IM Roger Cutler, ITC EA 9 December 2008 Houston, Texas 2008 Chevron
More informationCarbon Black PCI Compliance Mapping Checklist
Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and
More informationChanging the way companies run their data centers
Infrastructure Management & Monitoring for Business-Critical Continuity TM Changing the way companies run their data centers The Aperture TM Suite Optimize performance of your data center without COmpromising
More informationActive Archive and the State of the Industry
Active Archive and the State of the Industry Taking Data Archiving to the Next Level Abstract This report describes the state of the active archive market. New Applications Fuel Digital Archive Market
More informationAnalytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS
Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever
More informationGeospatial Enterprise Search. June
Geospatial Enterprise Search June 2013 www.voyagersearch.com www.voyagersearch.com/demo The Problem: Data Not Found The National Geospatial-Intelligence Agency is the primary source of geospatial intelligence
More informationIntelligent Enterprise meets Science of Where. Anand Raisinghani Head Platform & Data Management SAP India 10 September, 2018
Intelligent Enterprise meets Science of Where Anand Raisinghani Head Platform & Data Management SAP India 10 September, 2018 Value The Esri & SAP journey Customer Impact Innovation Track Record Customer
More informationBeyond Web Services A network-centric approach to system design
1 Beyond Web Services A network-centric approach to system design David Crute Principal Architect Integrated Systems Division General Dynamics C4 Systems 2 Network Services Evolution Software Integration
More informationThe Value of Data Modeling for the Data-Driven Enterprise
Solution Brief: erwin Data Modeler (DM) The Value of Data Modeling for the Data-Driven Enterprise Designing, documenting, standardizing and aligning any data from anywhere produces an enterprise data model
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationSMARTER CONNECTED SOCIETIES
SMARTER CONNECTED SOCIETIES Enablement & Monetization Sound Monitoring Plug N Play Connectivity Wi-Fi Liberation ehealth Services Traffic Monitoring Realize the Smart City Vision, Today! Smart Cities offer
More informationThings to consider when using Semantics in your Information Management strategy. Toby Conrad Smartlogic
Things to consider when using Semantics in your Information Management strategy Toby Conrad Smartlogic toby.conrad@smartlogic.com +1 773 251 0824 Some of Smartlogic s 250+ Customers Awards Trend Setting
More informationInformation Security Management Criteria for Our Business Partners
Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents
More informationData Governance Data Usage Labeling and Enforcement in Adobe Experience Platform
Contents What is data governance? Why data governance? Data governance roles The Adobe Experience Platform advantage A framework for data governance Data usage patterns Data governance in action Conclusion
More informationForeScout Extended Module for Splunk
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look
More informationEsri Maps for SharePoint
Esri International User Conference San Diego, California Technical Workshops July, 2012 Esri Maps for SharePoint Art Haddad Nathan Bennett Agenda Location Analytics - Esri Maps for SharePoint - Overview
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationFrom Correlation to Causation: Active Delay Injection for Service Dependency Detection
From Correlation to Causation: Active Delay Injection for Service Dependency Detection Christopher Kruegel Computer Security Group ARO MURI Meeting ICSI, Berkeley, November 15, 2012 Correlation Engine
More informationOUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER
OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER HOW TO ADDRESS GARTNER S FIVE CHARACTERISTICS OF AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER 1 POWERING ACTIONABLE
More informationGeoffrey Fox Community Grids Laboratory Indiana University
s of s of Simple Geoffrey Fox Community s Laboratory Indiana University gcf@indiana.edu s Here we propose a way of describing systems built from Service oriented s in a way that allows one to build new
More informationEXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.
EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity
More informationDELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1
DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS
More informationDecathlon: Data Center Enterprise Management Enabling predictive reliability and energy efficiency for today s data centers
Decathlon: Data Center Enterprise Management Enabling predictive reliability and energy efficiency for today s data centers Decathlon Data Center Enterprise Management 2 Decathlon Data Center Enterprise
More informationForeScout Extended Module for ServiceNow
ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...
More informationPipe Replacement & DIMP. Omni Hotel, Fort Worth, TX September 12, 2011
Pipe Replacement & DIMP AGA Management of Vintage Pipelines Workshop Omni Hotel, Fort Worth, TX September 12, 2011 Company Overview Atmos Energy serves 3.2 million customers in 12 States Atmos Energy provides
More informationEnterprise Data Catalog for Microsoft Azure Tutorial
Enterprise Data Catalog for Microsoft Azure Tutorial VERSION 10.2 JANUARY 2018 Page 1 of 45 Contents Tutorial Objectives... 4 Enterprise Data Catalog Overview... 5 Overview... 5 Objectives... 5 Enterprise
More informationAnalytics Fundamentals by Mark Peco
Analytics Fundamentals by Mark Peco All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks of their respective
More informationThe McGill University Health Centre (MUHC)
The McGill University Health Centre (MUHC) Strengthening its security posture with in- depth global intelligence Overview The need MUHC security staff wanted to more quickly identify and assess potential
More informationAre all CFD s created equal? Prepared by: Associate Director: Sam Wicks
Are all CFD s created equal? Prepared by: Associate Director: Sam Wicks samwicks@sudlows.com Keeping cool under pressure Imagine waking up at 04:00 to an escalated BMS alert that your Dubai data hub has
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationSmart Manufacturing in the Food & Beverage Industry
Smart Manufacturing in the Food & Beverage Industry PUBLIC Copyright 2016 Rockwell Automation, Inc. All Rights Reserved. 1 Rockwell Automation at a Glance $5.9B FISCAL 2016 SALES 22,000 EMPLOYEES 80+ COUNTRIES
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationOOI CyberInfrastructure Architecture & Design
OOI CI Architecture & Design Integrated Dictionary (AV-2) OOI CyberInfrastructure Architecture & Design Operational Node Connectivity Description OV-2 PDR CANDIDATE November 2007 Last revised: 11/13/2007
More informationODPi and Data Governance Free Your MetaData! October 10, 2018
ODPi and Data Governance Free Your MetaData! October 10, 2018 Today s reality @ODPiOrg Imagine An enterprise data catalogue that lists all of your data, where it is located, its origin (lineage), owner,
More informationINSPIRE Geoportal Rich user experience across member states services
INSPIRE Geoportal Rich user experience across member states services developed under a contract with the EC (JRC) Diomede ILLUZZI 1 Nicola LUNANOVA 1 Torsten FRIEBE 2 1 Planetek Italia s.r.l Via Masaua
More informationTARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS.
TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS Introduction State and local government departments, agencies and groups face a wide variety of events. Each have their own unique characteristics.
More informationSAP Agile Data Preparation Simplify the Way You Shape Data PUBLIC
SAP Agile Data Preparation Simplify the Way You Shape Data Introduction SAP Agile Data Preparation Overview Video SAP Agile Data Preparation is a self-service data preparation application providing data
More informationPI Integrator for Esri ArcGIS: A Journey Through Time and Space
PI Integrator for Esri ArcGIS: A Journey Through Time and Space Presented by Vadim Fedorov, Sr. Systems Engineer Elizabeth Ammarell, Product Manager The Past: Where We Started 2 Two companies, one vision
More informationSupporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains
Concept Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Changes in economic and social conditions, which include the growing diversity of consumer
More informationOliver Engels & Tillmann Eitelberg. Big Data! Big Quality?
Oliver Engels & Tillmann Eitelberg Big Data! Big Quality? Like to visit Germany? PASS Camp 2017 Main Camp 5.12 7.12.2017 (4.12 Kick Off Evening) Lufthansa Training & Conference Center, Seeheim SQL Konferenz
More informationCyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary
Cyberbit Range A Global Success Story 2017 by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary The Israeli Defense Forces Cyber Academy (Israel) The official training platform for the Israeli
More informationFive Essential Capabilities for Airtight Cloud Security
Five Essential Capabilities for Airtight Cloud Security SECURITY IN THE CLOUD REQUIRES NEW CAPABILITIES It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption.
More informationCYBERSECURITY RESILIENCE
CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,
More information