Petroleum User Group Meeting, April 2006 Houston, TX. Leveraging Semantic Technology for Improved Enterprise Search and Knowledge Discovery

Size: px
Start display at page:

Download "Petroleum User Group Meeting, April 2006 Houston, TX. Leveraging Semantic Technology for Improved Enterprise Search and Knowledge Discovery"

Transcription

1 Petroleum User Group Meeting, April 2006 Houston, TX Leveraging Semantic Technology for Improved Enterprise Search and Knowledge Discovery

2 Petroleum User Group Meeting, April 2006 Houston, TX OR GIS as a part of an Integrated, Dynamic Information Model

3 Why? Research, intelligence, life science, security, identity, energy (natural gas) Selective and easy access to data, metadata and knowledge from anywhere, ability to annotate and relate, analyze and report Use, share and re-process information assets Collect project relevant data into application independent projects (shoeboxes) Develop and test evolving models, pose hypothesis and analyze Capture recipes for knowledge transfer and re-use..in dynamic (often spatially oriented) environments

4 Expanding the Reach of GIS Google Earth Dedicated users Periodic users need familiar metaphors, integration with other applications/known environments and data and compelling reasons to use spatial data - Google - Expectation that all information is searchable, transcends physical and application boundaries Gmail no explicit location for information. Flickr,.. Tagging metaphor gaining momentum

5 Search and Tag Limits of Web search today lack semantics/meaningful tags: Houston - Houston, TX - Whitney Houston Refine search with synonyms ranked by Google, author is often unknown, purpose for document often unknown Semantic web what it is (metadata) and what it means (semantics). Houston place

6 Semantics Semantic approaches now in the enterprise Allow communities to describe their terms and relationships Expand search capability Allow the capture of context of information Enable identification of evolving knowledge trends Who uses them? Communities that want to eliminate and support ambiguity Communities with evolving knowledge models Communities who want to use their own language and relationships for accessing information

7 Metadata Data Metadata Knowledge } aren t static Gain insight with time based views, filtering,.. Collecting more data and metadata isn t enough DATA DEMANDS ATTENTION DELIVERING MORE DATA CAN PREVENT USERS FROM DOING ANALYSIS INFORMATION NEEDS TO BE TIMELY AND RELEVANT Communities will not agree on a single metadata/knowledge description DIFFERENT PROBLEMS REQUIRE DIFFERENT DESCRIPTIONS and EVER CHANGING, PROBLEM SPECIFIC RELATIONSHIPS

8 Knowledge Need to capture, share and re-use knowledge Know more about data when it is captured or created Automate metadata capture Evolve through usage Search and access using familiar terms Easily find and relate information

9 Tags Semantic descriptions Dictionaries of categories, properties and relationships Problem focused Could have different dictionaries for different roles or activities Interconnectable

10 Thetus Develops knowledge modeling and discovery infrastructure software for customers who: Have high-value data not easily structured using traditional database technology Has evolving meaning Has no single representation Need automated processing, notification and search Need recorded history of information Want to do predictive modeling NEED to use a semantic approach

11 Bridging the Knowledge Gap KNOWLEDGE DISCOVERY DATA HYPOTHESIS AND ANALYSIS TESTING AND VERIFICATION Defensible Tracking, Reporting, and Publishing OBSERVATION MODELING EXPERIMENTATION STRUCTURED DATA TOOLS AND METHODS

12 Metadata Lineage Search Reporting Automated Re-Processing Modeling

13 Thetus Knowledge Knowledge Modeling Discovery Infrastructure Solution: Software How it Works Θ Distributed Users Θ Ubiquitous Access to Θ Real-Time Context-Specific Search Discovering and Task Processing Network Knowledge Across Data, Θ Event-Triggered Θ Accidental Discovery via Inferencing Collaborating within a Applications, Θ Automation, Personalization, and Alerts Θ Multi-Dimensional Knowledge Modeling Common Framework of Departments, and Knowledge Disciplines Evolving Data Model Dynamic Indexing Lineage Tracking Metadata Extraction

14 Cross Application Knowledge

15 GIS Connection: Knowledge Analyst Knowledge Select Select and: -Search -Search Similar -Search Related -Get Report Knowledge Identify Similar to Arc Identify tool, provides quick KM report for items. Knowledge Search Brings up search interface to browse knowledge structure and search on categories and properties Relate Tool Allows users to relate items on the map with items not represented spatially and relate map items. KM Client Launch Opens KM Client, if not present launches web page. Quick Search Launches Quick Search. (See quick search web interface)

16 Knowledge Sharing and Re-use

17 Use Spatial Information

18 Connecting Across Domains

19 Context-Specific Access to Knowledge Service call Person hascrew hasmember workswith Group trainedwith Group Equipment hasmember hasmember hasmember Person Person Person hasmember Person Policy-Based Access Group alliedwith trainedwith Group Equipment

20 Dynamically-Evolving Knowledge Bases Rich Networks of Relationships Event Person Group perpetrator hasmember alliedwith perpetrator Group Explicit Event and Implicit hasmember perpetrator hasmember Person Person hasalias Event hasmember Hidden Trends, Patterns, and Relationships among Data Group alliedwith Person perpetrator Group Event

21 Examples of Gas Utility Applications Damage Loss Prevention Gas Loss Identification Service Management Pipeline Integrity Management Asset Management

22 Damage Loss Problem Lots of Pipe close to surface in high density areas Lots of Construction not all permitted 50% of Damage caused when no Locate (call before you dig) request made No single source for information inside and outside the enterprise Different views of information needed Need predictive model to prevent damage through education, inspection - not just penalties

23 Damage Loss Prevention

24 Questions Are certain types of contractors more likely to cause damage? How can we prevent? Can I be notified when at risk contractors are about to start work? Does damage happen more often under certain types of conditions Economic Weather

25 Hazardous Condition Worker Monitoring

26 Related Service Personnel Portal Emergency Personnel Portal Web Portals Management / Leadership Planners Analysts INTERNET External Data Sources JSP Server Data Integration Layer for Real-Time Monitoring, Reporting, and Modeling Wireless Sensors Heart Rate Motion Skin Temperature Mission / Service Data Task Servers Thetus Publisher Evolving Knowledge Bases TenXsys Databases Additional Sensor Data

27 Danielle Forsyth Thetus Corporation

Overview of Web Mining Techniques and its Application towards Web

Overview of Web Mining Techniques and its Application towards Web Overview of Web Mining Techniques and its Application towards Web *Prof.Pooja Mehta Abstract The World Wide Web (WWW) acts as an interactive and popular way to transfer information. Due to the enormous

More information

Automated, Real-Time Risk Analysis & Remediation

Automated, Real-Time Risk Analysis & Remediation Automated, Real-Time Risk Analysis & Remediation TABLE OF CONTENTS 03 EXECUTIVE SUMMARY 04 VULNERABILITY SCANNERS ARE NOT ENOUGH 06 REAL-TIME CHANGE CONFIGURATION NOTIFICATIONS ARE KEY 07 FIREMON RISK

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

Manufacturing security: Bridging the gap between IT and OT

Manufacturing security: Bridging the gap between IT and OT Manufacturing security: Bridging the gap between IT and OT For manufacturers, every new connection point is an opportunity. And a risk. The state of IT/OT security in manufacturing On the plant floor,

More information

Esri Technical Demonstration What s a Web Map? (And Why It Matters For National Security Missions) Jeff Baranyi, Esri Chris Delaney, Esri

Esri Technical Demonstration What s a Web Map? (And Why It Matters For National Security Missions) Jeff Baranyi, Esri Chris Delaney, Esri Esri Technical Demonstration What s a Web Map? (And Why It Matters For National Security Missions) Jeff Baranyi, Esri Chris Delaney, Esri The National Security Platform Vision Knowledge Workers Planning

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

Understanding ArcGIS Pipeline Referencing for Vertically Integrated Gas Companies. GeoConX 2017 September 7, 2017

Understanding ArcGIS Pipeline Referencing for Vertically Integrated Gas Companies. GeoConX 2017 September 7, 2017 Understanding ArcGIS Pipeline Referencing for Vertically Integrated Gas Companies GeoConX 2017 September 7, 2017 The Asset Intelligence Imperative GOAL The necessity to learn ever more, in as close to

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Enterprise Knowledge Map: Toward Subject Centric Computing. March 21st, 2007 Dmitry Bogachev

Enterprise Knowledge Map: Toward Subject Centric Computing. March 21st, 2007 Dmitry Bogachev Enterprise Knowledge Map: Toward Subject Centric Computing March 21st, 2007 Dmitry Bogachev Are we ready?...the idea of an application is an artificial one, convenient to the programmer but not to the

More information

Overview of PECO s Distribution Integrity Management Plan

Overview of PECO s Distribution Integrity Management Plan Overview of PECO s Distribution Integrity Management Plan PUC Gas Safety Seminar September 8, 2016 David Bonner, PE Robert Ridgeway, PE Agenda PECO Distribution System Overview DIMP Pillar #1 DIMP DIMP

More information

Next-Generation Standards Management with IHS Engineering Workbench

Next-Generation Standards Management with IHS Engineering Workbench ENGINEERING & PRODUCT DESIGN Next-Generation Standards Management with IHS Engineering Workbench The addition of standards management capabilities in IHS Engineering Workbench provides IHS Standards Expert

More information

Part of the complete suite of itracs award-winning DCIM capabilities. DCIM Software. itracs CPIM : Mastering the Connectivity Challenge

Part of the complete suite of itracs award-winning DCIM capabilities. DCIM Software. itracs CPIM : Mastering the Connectivity Challenge Part of the complete suite of itracs award-winning DCIM capabilities DCIM Software itracs CPIM : Mastering the Connectivity Challenge itracs CPIM Intelligence. Automation. Insight. Impact! Business Value

More information

Cisco Connected Factory Accelerator Bundles

Cisco Connected Factory Accelerator Bundles Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment

More information

Enterprise Geographic Information Servers. Dr David Maguire Director of Products Kevin Daugherty ESRI

Enterprise Geographic Information Servers. Dr David Maguire Director of Products Kevin Daugherty ESRI Enterprise Geographic Information Servers Dr David Maguire Director of Products Kevin Daugherty ESRI Outline Introduction Enterprise GIS vs. Spatially-enabled IS Architectures for building Enterprise GIS

More information

GIS as a Data Integration Platform

GIS as a Data Integration Platform GIS as a Data Integration Platform By: Malcolm Wardlaw Malcolm Wardlaw is the Director of Strategic Partnerships for R7 Solutions. A former consultant with McKinsey & Company, Mr. Wardlaw has experience

More information

Linked Open Data and Semantic Technologies for Research in Agriculture and Forestry

Linked Open Data and Semantic Technologies for Research in Agriculture and Forestry Linked Open and Semantic Technologies for Research in Agriculture and Forestry Platform Linked Nederland 2 April 2015 Rob Lokers, Alterra, Wageningen UR Contents related challenges in agricultural (and

More information

Delay Injection for. Service Dependency Detection

Delay Injection for. Service Dependency Detection Delay Injection for Service Dependency Detection Richard A. Kemmerer Computer Security Group Department of Computer Science University of California, Santa Barbara http://seclab.cs.ucsb.edu ARO/MURI Meeting

More information

Cisco Open Platform for Safety and Security

Cisco Open Platform for Safety and Security Cisco Open Platform for Safety and Security 1 Agenda Market Overview Business Drivers Barriers and Risks Cisco Open Platform for Safety and Security Scenarios Ecosystem Partners Summary 2 Market Overview

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

Cisco Wireless Video Surveillance: Improving Operations and Security

Cisco Wireless Video Surveillance: Improving Operations and Security Cisco Wireless Video Surveillance: Improving Operations and Security What You Will Learn Today s organizations need flexible, intelligent systems to help protect people and assets as well as streamline

More information

TIES for Microsoft CityNext Next-Generation Situational Awareness

TIES for Microsoft CityNext Next-Generation Situational Awareness BROCHURE A CLOSER LOOK AT! TIES for Microsoft CityNext Next-Generation Situational Awareness INTRODUCTION! TIES for Microsoft CityNext (TMCN) is an all-hazard threat monitoring and situation awareness

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

SCADA Getting Smarter Gary Clouser April 1, 2013

SCADA Getting Smarter Gary Clouser April 1, 2013 SCADA Getting Smarter Gary Clouser April 1, 2013 Supervisory Control and Data Acquisition (SCADA) technical advances have changed the role that automation and remote monitoring play in midstream operations.

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

A Study of Mountain Environment Monitoring Based Sensor Web in Wireless Sensor Networks

A Study of Mountain Environment Monitoring Based Sensor Web in Wireless Sensor Networks , pp.96-100 http://dx.doi.org/10.14257/astl.2014.60.24 A Study of Mountain Environment Monitoring Based Sensor Web in Wireless Sensor Networks Yeon-Jun An 1, Do-Hyeun Kim 2 1,2 Dept. of Computing Engineering

More information

!!!!!! Portfolio Summary!! for more information July, C o n c e r t T e c h n o l o g y

!!!!!! Portfolio Summary!! for more information  July, C o n c e r t T e c h n o l o g y Portfolio Summary July, 2014 for more information www.concerttechnology.com bizdev@concerttechnology.com C o n c e r t T e c h n o l o g y Overview The screenplay project covers emerging trends in social

More information

AUTOMATION. Dr. Ibrahim Al-Naimi

AUTOMATION. Dr. Ibrahim Al-Naimi AUTOMATION Dr. Ibrahim Al-Naimi Chapter four Industrial Control Systems Process and Discrete Industries Level of automation. Variables and parameters. Continuous and Discrete Variables/Parameters Continuous

More information

Day 1 summary for day 2. Addison, TX

Day 1 summary for day 2. Addison, TX Technical Interoperability Day 1 summary for day 2 April 12, 2007 Addison, TX Overview Summary of day 1 Top 5 issues Other topics discussed Issues for the future (day 2) Main Issues (1) Title: Adopt /

More information

Mission Defense via Information-Centric Security

Mission Defense via Information-Centric Security Mission Defense via Information-Centric Security Overview It s About the Information Traditional CND Tools are Not Sufficient Not All Data is Created Equal "The views expressed in this presentation are

More information

Autodesk Utility Design and Your GIS

Autodesk Utility Design and Your GIS UT4523-P Autodesk Utility Design and Your GIS Prashant Srivastav Quality Assurance Lead, Utilities Co Speakers: Jeff Saunders, Carsten Hess The Power Track Utility Design Power Track at a glance... and

More information

Data Virtualization Implementation Methodology and Best Practices

Data Virtualization Implementation Methodology and Best Practices White Paper Data Virtualization Implementation Methodology and Best Practices INTRODUCTION Cisco s proven Data Virtualization Implementation Methodology and Best Practices is compiled from our successful

More information

Best practices in IT security co-management

Best practices in IT security co-management Best practices in IT security co-management How to leverage a meaningful security partnership to advance business goals Whitepaper Make Security Possible Table of Contents The rise of co-management...3

More information

Daniel Appelquist 22 April The Emerging Widgets Ecosystem

Daniel Appelquist 22 April The Emerging Widgets Ecosystem Daniel Appelquist 22 April 2009 The Emerging Widgets Ecosystem Contents 1. Intro 2. The mobile Web, past present and future 3. What s in a Widget? 4. Vodafone s Widgets Beta (and how to win 20,000) 5.

More information

FOR FINANCIAL SERVICES ORGANIZATIONS

FOR FINANCIAL SERVICES ORGANIZATIONS RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly

More information

Certified Petroleum Data Analyst (CPDA) Certification Update

Certified Petroleum Data Analyst (CPDA) Certification Update PROFESSIONAL PETROLEUM DATA MANAGEMENT ASSOCIATION Certified Petroleum Data (CPDA) Certification Update Sharon Barnes, PDMCC Member Ingrid Kristel, Project Manager, PPDM 1 3/17/2015 WHO IS THE PDMCC? Data

More information

Data publication and discovery with Globus

Data publication and discovery with Globus Data publication and discovery with Globus Questions and comments to outreach@globus.org The Globus data publication and discovery services make it easy for institutions and projects to establish collections,

More information

Using Operations Dashboard for ArcGIS: An Introduction

Using Operations Dashboard for ArcGIS: An Introduction FedGIS Conference February 24 25, 2016 Washington, DC Using Operations Dashboard for ArcGIS: An Introduction Ken Gorton Carmella A. Burdi, GISP Solution Engineer Esri National Government Team kgorton@esri.com

More information

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments The New Normal Unique Challenges When Monitoring Hybrid Cloud Environments The Evolving Cybersecurity Landscape Every day, the cybersecurity landscape is expanding around us. Each new device connected

More information

Resource Discovery in IoT: Current Trends, Gap Analysis and Future Standardization Aspects

Resource Discovery in IoT: Current Trends, Gap Analysis and Future Standardization Aspects Resource Discovery in IoT: Current Trends, Gap Analysis and Future Standardization Aspects Soumya Kanti Datta Research Engineer, EURECOM TF-DI Coordinator in W3C WoT IG Email: dattas@eurecom.fr Roadmap

More information

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP) SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP) Adaptive Cybersecurity at the Speed of Your Business Attackers Evolve. Risk is in Constant Fluctuation. Security is a Never-ending Cycle.

More information

Effective Threat Modeling using TAM

Effective Threat Modeling using TAM Effective Threat Modeling using TAM In my blog entry regarding Threat Analysis and Modeling (TAM) tool developed by (Application Consulting and Engineering) ACE, I have watched many more Threat Models

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Connecting Space and Time OSIsoft & Esri

Connecting Space and Time OSIsoft & Esri Connecting Space and Time OSIsoft & Esri Presented by Michelle Kuiee Product Manager Frank Batke Senior Systems Engineer 2 Which of these describe your need? Operating Engineers & Analysts Environmental

More information

Predictive Resilience: Leveraging Integrated DCIM to Reduce Data Center Downtime

Predictive Resilience: Leveraging Integrated DCIM to Reduce Data Center Downtime July 17, 2013 Predictive Resilience: Leveraging Integrated DCIM to Reduce Data Center Downtime siemens.com/answers Predictive Resilience Table of content What is DCIM & Its Business Value Extract Maximum

More information

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries First united and open ecosystem to support enterprise-wide visibility and rapid response The cybersecurity industry needs a more efficient

More information

IMAGE ACQUISTION AND PROCESSING FOR FINANCIAL DUE DILIGENCE

IMAGE ACQUISTION AND PROCESSING FOR FINANCIAL DUE DILIGENCE Technical Disclosure Commons Defensive Publications Series August 24, 2016 IMAGE ACQUISTION AND PROCESSING FOR FINANCIAL DUE DILIGENCE Matthew Wood Patrick Dunagan John Clark Kristina Bohl David Gonzalez

More information

Context Aware Computing

Context Aware Computing CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware

More information

Eleven+ Views of Semantic Search

Eleven+ Views of Semantic Search Eleven+ Views of Semantic Search Denise A. D. Bedford, Ph.d. Goodyear Professor of Knowledge Management Information Architecture and Knowledge Management Kent State University Presentation Focus Long-Term

More information

RSA IT Security Risk Management

RSA IT Security Risk Management RSA IT Security Risk Adding Insight to Security March 18, 2014 Wael Jaroudi GRC Sales Specialist 1 Where is Security Today? Companies have built layer upon layer of security, but is it helping? Complexity

More information

The Value of Data Governance for the Data-Driven Enterprise

The Value of Data Governance for the Data-Driven Enterprise Solution Brief: erwin Data governance (DG) The Value of Data Governance for the Data-Driven Enterprise Prepare for Data Governance 2.0 by bringing business teams into the effort to drive data opportunities

More information

A Practical Guide to Efficient Security Response

A Practical Guide to Efficient Security Response A Practical Guide to Efficient Security Response The Essential Checklist Start The Critical Challenges to Information Security Data breaches constantly threaten the modern enterprise. And the risk continues

More information

Toward a Standard Rule Language for Semantic Integration of the DoD Enterprise

Toward a Standard Rule Language for Semantic Integration of the DoD Enterprise 1 W3C Workshop on Rule Languages for Interoperability Toward a Standard Rule Language for Semantic Integration of the DoD Enterprise A MITRE Sponsored Research Effort Suzette Stoutenburg 28 April 2005

More information

GDPR: An Opportunity to Transform Your Security Operations

GDPR: An Opportunity to Transform Your Security Operations GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)

More information

Luncheon Webinar Series April 25th, Governance for ETL Presented by Beate Porst Sponsored By:

Luncheon Webinar Series April 25th, Governance for ETL Presented by Beate Porst Sponsored By: Luncheon Webinar Series April 25th, 2014 Governance for ETL Presented by Beate Porst Sponsored By: 1 Governance for ETL Questions and suggestions regarding presentation topics? - send to editor@dsxchange.com

More information

Service Vs. System. Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011

Service Vs. System. Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011 Service Vs. System Why do we need Services and a Services Viewpoint in DM2 and DoDAF? Fatma Dandashi, PhD March 4, 2011 1. Does DoD Need To Model a Service? Bottom Line Up front (BLUF) DoD has a requirement

More information

THE NATIONAL DATA SERVICE(S) & NDS CONSORTIUM A Call to Action for Accelerating Discovery Through Data Services we can Build Ed Seidel

THE NATIONAL DATA SERVICE(S) & NDS CONSORTIUM A Call to Action for Accelerating Discovery Through Data Services we can Build Ed Seidel THE NATIONAL DATA SERVICE(S) & NDS CONSORTIUM A Call to Action for Accelerating Discovery Through Data Services we can Build Ed Seidel National Center for Supercomputing Applications University of Illinois

More information

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses

More information

Chevron Position Paper for W3C Workshop on Semantic Web in Oil & Gas Industry

Chevron Position Paper for W3C Workshop on Semantic Web in Oil & Gas Industry Enterprise Architecture Chevron Position Paper for W3C Workshop on Semantic Web in Oil & Gas Industry Frank Chum, ITC EA Mario Casetta, ETC IM Roger Cutler, ITC EA 9 December 2008 Houston, Texas 2008 Chevron

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

Changing the way companies run their data centers

Changing the way companies run their data centers Infrastructure Management & Monitoring for Business-Critical Continuity TM Changing the way companies run their data centers The Aperture TM Suite Optimize performance of your data center without COmpromising

More information

Active Archive and the State of the Industry

Active Archive and the State of the Industry Active Archive and the State of the Industry Taking Data Archiving to the Next Level Abstract This report describes the state of the active archive market. New Applications Fuel Digital Archive Market

More information

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever

More information

Geospatial Enterprise Search. June

Geospatial Enterprise Search. June Geospatial Enterprise Search June 2013 www.voyagersearch.com www.voyagersearch.com/demo The Problem: Data Not Found The National Geospatial-Intelligence Agency is the primary source of geospatial intelligence

More information

Intelligent Enterprise meets Science of Where. Anand Raisinghani Head Platform & Data Management SAP India 10 September, 2018

Intelligent Enterprise meets Science of Where. Anand Raisinghani Head Platform & Data Management SAP India 10 September, 2018 Intelligent Enterprise meets Science of Where Anand Raisinghani Head Platform & Data Management SAP India 10 September, 2018 Value The Esri & SAP journey Customer Impact Innovation Track Record Customer

More information

Beyond Web Services A network-centric approach to system design

Beyond Web Services A network-centric approach to system design 1 Beyond Web Services A network-centric approach to system design David Crute Principal Architect Integrated Systems Division General Dynamics C4 Systems 2 Network Services Evolution Software Integration

More information

The Value of Data Modeling for the Data-Driven Enterprise

The Value of Data Modeling for the Data-Driven Enterprise Solution Brief: erwin Data Modeler (DM) The Value of Data Modeling for the Data-Driven Enterprise Designing, documenting, standardizing and aligning any data from anywhere produces an enterprise data model

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

SMARTER CONNECTED SOCIETIES

SMARTER CONNECTED SOCIETIES SMARTER CONNECTED SOCIETIES Enablement & Monetization Sound Monitoring Plug N Play Connectivity Wi-Fi Liberation ehealth Services Traffic Monitoring Realize the Smart City Vision, Today! Smart Cities offer

More information

Things to consider when using Semantics in your Information Management strategy. Toby Conrad Smartlogic

Things to consider when using Semantics in your Information Management strategy. Toby Conrad Smartlogic Things to consider when using Semantics in your Information Management strategy Toby Conrad Smartlogic toby.conrad@smartlogic.com +1 773 251 0824 Some of Smartlogic s 250+ Customers Awards Trend Setting

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

Data Governance Data Usage Labeling and Enforcement in Adobe Experience Platform

Data Governance Data Usage Labeling and Enforcement in Adobe Experience Platform Contents What is data governance? Why data governance? Data governance roles The Adobe Experience Platform advantage A framework for data governance Data usage patterns Data governance in action Conclusion

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

Esri Maps for SharePoint

Esri Maps for SharePoint Esri International User Conference San Diego, California Technical Workshops July, 2012 Esri Maps for SharePoint Art Haddad Nathan Bennett Agenda Location Analytics - Esri Maps for SharePoint - Overview

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

From Correlation to Causation: Active Delay Injection for Service Dependency Detection

From Correlation to Causation: Active Delay Injection for Service Dependency Detection From Correlation to Causation: Active Delay Injection for Service Dependency Detection Christopher Kruegel Computer Security Group ARO MURI Meeting ICSI, Berkeley, November 15, 2012 Correlation Engine

More information

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER HOW TO ADDRESS GARTNER S FIVE CHARACTERISTICS OF AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER 1 POWERING ACTIONABLE

More information

Geoffrey Fox Community Grids Laboratory Indiana University

Geoffrey Fox Community Grids Laboratory Indiana University s of s of Simple Geoffrey Fox Community s Laboratory Indiana University gcf@indiana.edu s Here we propose a way of describing systems built from Service oriented s in a way that allows one to build new

More information

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved. EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT An Insight Cyber White Paper Copyright Insight Cyber 2018. All rights reserved. The Need for Expert Monitoring Digitization and external connectivity

More information

DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1

DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 DELIVERING MISSION BASED OUTCOMES TO THE INTELLIGENCE COMMUNITY SINCE 2002 MISSION-DRIVEN SOLUTIONS 1 MISSION-DRIVEN SOLUTIONS 2018 INTEGRATED INTEL SOLUTIONS ALL RIGHTS RESERVED MISSION-DRIVEN SOLUTIONS

More information

Decathlon: Data Center Enterprise Management Enabling predictive reliability and energy efficiency for today s data centers

Decathlon: Data Center Enterprise Management Enabling predictive reliability and energy efficiency for today s data centers Decathlon: Data Center Enterprise Management Enabling predictive reliability and energy efficiency for today s data centers Decathlon Data Center Enterprise Management 2 Decathlon Data Center Enterprise

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

Pipe Replacement & DIMP. Omni Hotel, Fort Worth, TX September 12, 2011

Pipe Replacement & DIMP. Omni Hotel, Fort Worth, TX September 12, 2011 Pipe Replacement & DIMP AGA Management of Vintage Pipelines Workshop Omni Hotel, Fort Worth, TX September 12, 2011 Company Overview Atmos Energy serves 3.2 million customers in 12 States Atmos Energy provides

More information

Enterprise Data Catalog for Microsoft Azure Tutorial

Enterprise Data Catalog for Microsoft Azure Tutorial Enterprise Data Catalog for Microsoft Azure Tutorial VERSION 10.2 JANUARY 2018 Page 1 of 45 Contents Tutorial Objectives... 4 Enterprise Data Catalog Overview... 5 Overview... 5 Objectives... 5 Enterprise

More information

Analytics Fundamentals by Mark Peco

Analytics Fundamentals by Mark Peco Analytics Fundamentals by Mark Peco All rights reserved. Reproduction in whole or part prohibited except by written permission. Product and company names mentioned herein may be trademarks of their respective

More information

The McGill University Health Centre (MUHC)

The McGill University Health Centre (MUHC) The McGill University Health Centre (MUHC) Strengthening its security posture with in- depth global intelligence Overview The need MUHC security staff wanted to more quickly identify and assess potential

More information

Are all CFD s created equal? Prepared by: Associate Director: Sam Wicks

Are all CFD s created equal? Prepared by: Associate Director: Sam Wicks Are all CFD s created equal? Prepared by: Associate Director: Sam Wicks samwicks@sudlows.com Keeping cool under pressure Imagine waking up at 04:00 to an escalated BMS alert that your Dubai data hub has

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Smart Manufacturing in the Food & Beverage Industry

Smart Manufacturing in the Food & Beverage Industry Smart Manufacturing in the Food & Beverage Industry PUBLIC Copyright 2016 Rockwell Automation, Inc. All Rights Reserved. 1 Rockwell Automation at a Glance $5.9B FISCAL 2016 SALES 22,000 EMPLOYEES 80+ COUNTRIES

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

OOI CyberInfrastructure Architecture & Design

OOI CyberInfrastructure Architecture & Design OOI CI Architecture & Design Integrated Dictionary (AV-2) OOI CyberInfrastructure Architecture & Design Operational Node Connectivity Description OV-2 PDR CANDIDATE November 2007 Last revised: 11/13/2007

More information

ODPi and Data Governance Free Your MetaData! October 10, 2018

ODPi and Data Governance Free Your MetaData! October 10, 2018 ODPi and Data Governance Free Your MetaData! October 10, 2018 Today s reality @ODPiOrg Imagine An enterprise data catalogue that lists all of your data, where it is located, its origin (lineage), owner,

More information

INSPIRE Geoportal Rich user experience across member states services

INSPIRE Geoportal Rich user experience across member states services INSPIRE Geoportal Rich user experience across member states services developed under a contract with the EC (JRC) Diomede ILLUZZI 1 Nicola LUNANOVA 1 Torsten FRIEBE 2 1 Planetek Italia s.r.l Via Masaua

More information

TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS.

TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS. TARGETING CITIZENS WITH LOCATION BASED NOTIFICATIONS Introduction State and local government departments, agencies and groups face a wide variety of events. Each have their own unique characteristics.

More information

SAP Agile Data Preparation Simplify the Way You Shape Data PUBLIC

SAP Agile Data Preparation Simplify the Way You Shape Data PUBLIC SAP Agile Data Preparation Simplify the Way You Shape Data Introduction SAP Agile Data Preparation Overview Video SAP Agile Data Preparation is a self-service data preparation application providing data

More information

PI Integrator for Esri ArcGIS: A Journey Through Time and Space

PI Integrator for Esri ArcGIS: A Journey Through Time and Space PI Integrator for Esri ArcGIS: A Journey Through Time and Space Presented by Vadim Fedorov, Sr. Systems Engineer Elizabeth Ammarell, Product Manager The Past: Where We Started 2 Two companies, one vision

More information

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Concept Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains Changes in economic and social conditions, which include the growing diversity of consumer

More information

Oliver Engels & Tillmann Eitelberg. Big Data! Big Quality?

Oliver Engels & Tillmann Eitelberg. Big Data! Big Quality? Oliver Engels & Tillmann Eitelberg Big Data! Big Quality? Like to visit Germany? PASS Camp 2017 Main Camp 5.12 7.12.2017 (4.12 Kick Off Evening) Lufthansa Training & Conference Center, Seeheim SQL Konferenz

More information

Cyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary

Cyberbit Range. A Global Success Story by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary Cyberbit Range A Global Success Story 2017 by CYBERBIT 2017 by CYBERBIT Proprietary CYBERBIT Proprietary The Israeli Defense Forces Cyber Academy (Israel) The official training platform for the Israeli

More information

Five Essential Capabilities for Airtight Cloud Security

Five Essential Capabilities for Airtight Cloud Security Five Essential Capabilities for Airtight Cloud Security SECURITY IN THE CLOUD REQUIRES NEW CAPABILITIES It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption.

More information

CYBERSECURITY RESILIENCE

CYBERSECURITY RESILIENCE CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function,

More information