Living Transformation: ISAF-SEAS Case Study for Urgent Computing

Size: px
Start display at page:

Download "Living Transformation: ISAF-SEAS Case Study for Urgent Computing"

Transcription

1 Living Transformation: ISAF-SEAS Case Study for Urgent Computing Alok Chaturvedi Purdue University West Lafayette, IN (765)

2 Topics What is ISAF? SEAS role in ISAF SEAS in theater Integration with external systems - ONA Challenges Organizational Process Technology Future Direction Towards Sentient World 1

3 SEAS-ISAF ISAF - International Security Assistance Force Setup by United Nation in 2001 to provide security assistance to the people of Afghanistan SEAS (Synthetic Environment For Analysis and Simulation) is deployed in the theater for courses of actions analysis Research funded in part by National Science Foundation since 1998 Transitioned to Simulex Inc. Currently in use at JFCOM, SOUTHCOM, OSD PA&E, USMC School, a Fortune 50 Company 2

4 SEAS current state SEAS VIS is a representation of 62 countries with validated models (well accepted, published in peer-reviewed reviewed journals) at varying degrees of detail Represents Political Nodes Military Nodes Economic Nodes Social Nodes Information Infrastructure 450+ Named Organizations 300+ Named Leaders 12,000+ Named Infrastructure Nodes 500+ Named media nodes 10+ Million Active Agents 3

5 N-sided Analysis Human-in-Loop - Adversary Multiple Human-in-the- Loop Capabilities Human-in-Loop - Coalition Intelligent Agent Country X s Intelligent Agent Intelligent Agents SEAS simulations model N-sided interactions where each side may be represented by HITL players or intelligent artificial agents.

6 Topics What is ISAF? SEAS role in ISAF SEAS in theater Integration with external systems - ONA Challenges Organizational Process Technology Future Direction Towards Sentient World 5

7 SEAS in the theater First persistent Simulation-based Decision Support Environment for Field Commander To be able to generate prediction i of instability in the region as real world events unfold To provide a Wind-tunnel for Courses of Action Simultaneous research, development, and deployment Recent events/intel constantly fed into the xna Multiple Courses of actions simulated in updated synthetic environments Decode adversaries playbooks System redundancies to ensure high availability and reach-back capability Runtime of single digit minutes to provide near instant feedback of proposed strategies 6

8 SEAS On-demand Scaling indicate on demand hotspots ous asynchron layers PMESII IED Supply Chain Recruiting GLOBAL week ticks Insurgency Orgs Communities (Refugee Camps) HumInt CITY hour ticks SECTOR IED Attack JSAF CBRN minute ticks finer detail Workflow Modeling TacSim

9 Dynamic Data Acquisition, Parameterization, and Calibration in SEAS Continuous & Concurrent Development of the Passive Environment Active Environment Input & Analysis COA Planners Automated Data Discovery Semantic Match/Filter xna Selective Persistence ONA Semantic Match/Filter Ontological Repository Calendar Day Initialization SEAS Engine Other Intel Systems Semantic Match/Filter SME User Interface Visualizations & Data Services Public Opinion PmESII Metrics Trends & Explanations Possible Alternative Futures

10 Data in extensible Net Assessment Snapshot at a specific time So ource Legend (Example) Points of View Blue Green Red 9 Sources ONA Simulex Researcher CNN Simulation COA Al Jazeera Every piece of data is stored with an effective date range, its source, and its point of view. Snapshots can be taken at any point in time, with any subset of sources and points of view.

11 Semantic Mining for XNA Transliteration Dictionary xna Repository Web Data Sources: Major News Sources Blogs of Interest Social Networking Sites Government Statistics Web Crawler Transliteration Keyword Expansion and search weighting Search Index Social network search Ontological Expansion and Search weighting Chronological Index Chronological Search Returns Search Results are Returned with Associated Timelines that Allow Analysts to View Data at Various Points in Time Analysts & Researchers xna Data Repository 10

12 System Redundancies 11

13 Service Oriented Experiment Management 1. ExMan Main Portal 2. Simulation Browsing and Selection 3. Nodes in the selected simulation 5. Execution Environments Management Calendar-based Simulation Initialization

14 Multiple Excursions Real World SEAS Reference Synthetic World Inject 1 Inject 2 Inject 3 Inject 4 Track Real World Organization 1 Organization 2 Organization 3 SEAS Deployment 1 T E1 E2 E3 SEAS Deployment 2 T E1 E2 E3 SEAS Deployment 3 T E1 E2 E3 Analysis Analysis Analysis Future 1 Future 2 Future 3

15 Topics What is ISAF? SEAS implmentation in ISAF SEAS in theater Integration with external systems - ONA and data entry tools Challenges Organizational Process Technology Future Direction Towards Sentient World 14

16 Tools for Updating xna ONA-XNA Integration Tool and SESEN Analyst Workbench High-level tools that allow for easy addition and manipulation of Node, Action, and Event information. SESEN allows for the addition and editing of node information within xna. The ONA-XNA Integration Tool allows for nodes to be exported from ONAto xna and augmented with additional information needed by SEAS. 15 Currently Supported: Leaders Organizations Infrastructure xna Low-level tool for viewing and manipulating the ontological structure and other data within xna. Currently a prototype, but under active development to become part of the suite of tools available for SMEs to use. Under Development: Media Citizens Institutions Economic Sectors Actions and Events

17 Topics What is ISAF? SEAS implementation in ISAF SEAS in theater Integration with external systems - ONA and data entry tools Challenges Organizational Process Technology Future Direction Towards Sentient World 16

18 Organizational Challenges The project marks several firsts, including: First operational system deployment First theater deployment First deployment outside the country First system with the requirement of near perfect uptime Living Transformation Simultaneous research, development, and deployment Simultaneous CONOP/TTP development and training Rapid accreditation, field testing, and deployment Legal, business and acquisition challenges 17

19 Process Challenges Security System The need to ready the system for NSWAN security compliance The flavor of Linux that SEAS prefers has to be replaced by Red Hat Linux Server Java Development Kit usage has to be replaced by Java Runtime Environment Data Constant research and update of the simulation with the latest data ISAF and J9 analysts are updating the xna with data with secret classification Merging and conflict detection is a challenge 18

20 Technological Challenges Low bandwidth and reliability environment The IT infrastructure in the theater is heterogeneous. Simulation clients could be accessed via satellite internet, which could be very slow and unreliable The machines available are often lesser than the required spec Guaranteed uptime and backward compatibility Constant service availability is crucial in the theater Simulation has to be running even during analysts update data Courses of actions and simulation results has to be saved and retrievable even if produced by previous versions of the software 19

21 Topics What is ISAF? SEAS implementation in ISAF SEAS in theater Integration with external systems - ONA and data entry tools Challenges Organizational Process Technology Future Direction Towards Sentient World 20

22 Towards Sentient World 21

23 SWS Deployment Framework Public Domain Open source data Developed in Collaboration Classified Worlds Hosted by Specific Intelligence Communities Augmented with User- Provided d Data Sources Reference World Regulated Development Pure Reference World Hosted at J9 Basis for Instantiating Classified & Proprietary Worlds Proprietary Worlds Inter Agency Communities

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

Discovery Net : A UK e-science Pilot Project for Grid-based Knowledge Discovery Services. Patrick Wendel Imperial College, London

Discovery Net : A UK e-science Pilot Project for Grid-based Knowledge Discovery Services. Patrick Wendel Imperial College, London Discovery Net : A UK e-science Pilot Project for Grid-based Knowledge Discovery Services Patrick Wendel Imperial College, London Data Mining and Exploration Middleware for Distributed and Grid Computing,

More information

Records Management and Interoperability Initiatives and Experiences in the EU and Estonia

Records Management and Interoperability Initiatives and Experiences in the EU and Estonia Records Management and Interoperability Initiatives and Experiences in the EU and Estonia September 18, 2012 Liivi Karpištšenko Ministry of Economic Affairs and Communication Kuldar Aas National Archives

More information

IBM Tivoli Directory Server

IBM Tivoli Directory Server Build a powerful, security-rich data foundation for enterprise identity management IBM Tivoli Directory Server Highlights Support hundreds of millions of entries by leveraging advanced reliability and

More information

ENTERPRISE-GRADE MANAGEMENT FOR OPENSTACK WITH RED HAT CLOUDFORMS

ENTERPRISE-GRADE MANAGEMENT FOR OPENSTACK WITH RED HAT CLOUDFORMS TECHNOLOGY DETAIL ENTERPRISE-GRADE MANAGEMENT FOR OPENSTACK WITH RED HAT CLOUDFORMS ABSTRACT Enterprises engaged in deploying, managing, and scaling out Red Hat Enterprise Linux OpenStack Platform have

More information

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses

More information

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model Indian Journal of Science and Technology, Vol 8(20), DOI:10.17485/ijst/2015/v8i20/79311, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Future Internet Applications based on

More information

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Risk Management Theory Application in national information security risk control Analysis of the relationship

More information

Cybersecurity for Product Lifecycle Management A Research Roadmap

Cybersecurity for Product Lifecycle Management A Research Roadmap Cybersecurity for Product Lifecycle Management A Research Roadmap Elisa Bertino CS Department, CERIAS, and Cyber Center PLM Center Fellow Purdue University Cyber Center Why is Security Challenging in

More information

Simplifying Information Sharing Across Security Boundaries. Deep-Secure Overview 12 th November 2013, Prague. Presentation to.

Simplifying Information Sharing Across Security Boundaries. Deep-Secure Overview 12 th November 2013, Prague. Presentation to. Simplifying Information Sharing Across Security Boundaries Presentation to Deep-Secure Overview 12 th November 2013, Prague 10 October 2011 1 What we do Deep-Secure offer solutions that help organisations

More information

Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead

Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead Achieving a Secure and Resilient Cyber Ecosystem: A Way Ahead January 2016 Continuing to strengthen the security and resilience of our nation s critical infrastructure in partnership with you Our Responsibilities

More information

How Co-Occurrence can Complement Semantics?

How Co-Occurrence can Complement Semantics? How Co-Occurrence can Complement Semantics? Atanas Kiryakov & Borislav Popov ISWC 2006, Athens, GA Semantic Annotations: 2002 #2 Semantic Annotation: How and Why? Information extraction (text-mining) for

More information

The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse

The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse The Modeling and Simulation Catalog for Discovery, Knowledge, and Reuse Stephen Hunt OSD CAPE Joint Data Support (SAIC) Stephen.Hunt.ctr@osd.mil The DoD Office of Security Review has cleared this report

More information

INTELLIGENT SYSTEMS OVER THE INTERNET

INTELLIGENT SYSTEMS OVER THE INTERNET INTELLIGENT SYSTEMS OVER THE INTERNET Web-Based Intelligent Systems Intelligent systems use a Web-based architecture and friendly user interface Web-based intelligent systems: Use the Web as a platform

More information

Symantec Network Security 7100 Series

Symantec Network Security 7100 Series Symantec Network Security 7100 Series Proactive intrusion prevention device protects against known and unknown attacks to secure critical networks transition can be accomplished transparent to any network

More information

COCKPIT FP Citizens Collaboration and Co-Creation in Public Service Delivery. Deliverable D Opinion Mining Tools 1st version

COCKPIT FP Citizens Collaboration and Co-Creation in Public Service Delivery. Deliverable D Opinion Mining Tools 1st version COCKPIT FP7-248222 Citizens Collaboration and Co-Creation in Public Service Delivery Deliverable D2.1.1 Opinion Mining Tools 1st version Editor(s): Responsible Partner: Kostas Giannakakis ATC, INTRASOFT

More information

Automating the Top 20 CIS Critical Security Controls

Automating the Top 20 CIS Critical Security Controls 20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises

More information

WEB USER GUIDE NAVIGATING AND SEARCHING THE KNOWLEDGE BASE NAVIGATING

WEB USER GUIDE NAVIGATING AND SEARCHING THE KNOWLEDGE BASE NAVIGATING WEB USER GUIDE NAVIGATING AND SEARCHING THE KNOWLEDGE BASE NAVIGATING The Knowledge Base home page contains the following sections: Featured Content Recent Downloads Just In The right hand column has the

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

Contents USER S MANUAL 1

Contents USER S MANUAL 1 USER S MANUAL IRENA 2016 This manual was prepared by the International Renewable Energy Agency (IRENA) to provide comprehensive, step-by-step guidance to users of the web-based Sustainable Energy Marketplace

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY

More information

UNCLASSIFIED. All Prior Years FY 2012 FY 2013 # Base

UNCLASSIFIED. All Prior Years FY 2012 FY 2013 # Base Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Defense Security Cooperation Agency DATE: April 2013 COST ($ in Millions) All Prior Years FY 2012 FY 2013 # Base Information Management System (PIMS)

More information

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved. NetWitness Overview 1 The Current Scenario APT Network Security Today Network-layer / perimeter-based Dependent on signatures, statistical methods, foreknowledge of adversary attacks High failure rate

More information

Implementing Polaris Community Profiles at Your Library

Implementing Polaris Community Profiles at Your Library Implementing Polaris Community Profiles at Your Library Copyright 2012 by Polaris Library Systems This document is copyrighted. All rights are reserved. No part of this document may be photocopied or reproduced

More information

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT 2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer

More information

Oregon State Police. Information Technology. Honor Loyalty. Pride Dedication

Oregon State Police. Information Technology. Honor Loyalty. Pride Dedication Oregon State Police Information Technology Pride Dedication Honor Loyalty Presented by: David Alamein, CIO & Tom M. Worthy, Captain Presentation Date: March 31, 2015 OSP I.T. Mission and Strategy Modernize

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

Texas Connector Training Manual. For TDCJ Users [2016]

Texas Connector Training Manual. For TDCJ Users [2016] Texas Connector Training Manual For TDCJ Users [2016] CONTENTS OneStar Foundation and Texas Connector Overview... 3 The Data... 3 How To Log In... 4 TDCJ Quick Report Generator... 4 The Map... 8 Support

More information

Summary of Consultation with Key Stakeholders

Summary of Consultation with Key Stakeholders Summary of Consultation with Key Stakeholders Technology and Communications Sector Electronic Manufacturing Services & Original Design Manufacturing Software & IT Services Hardware Semiconductors Telecommunication

More information

Cyber Partnership Blueprint: An Outline

Cyber Partnership Blueprint: An Outline Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.

More information

ONE-ITS Science Gateway

ONE-ITS Science Gateway Science Gateway None of us is as smart as all of us B. Abdulhai, Ph.D., P.Eng. Canada Research Chair in ITS Director, Toronto ITS Centre, U of Toronto M. El-Darieby, Ph.D., P.Eng. Chair, Software Systems

More information

Applying Auto-Data Classification Techniques for Large Data Sets

Applying Auto-Data Classification Techniques for Large Data Sets SESSION ID: PDAC-W02 Applying Auto-Data Classification Techniques for Large Data Sets Anchit Arora Program Manager InfoSec, Cisco The proliferation of data and increase in complexity 1995 2006 2014 2020

More information

CLOUD GOVERNANCE SPECIALIST Certification

CLOUD GOVERNANCE SPECIALIST Certification CLOUD GOVERNANCE SPECIALIST Certification The Cloud Professional (CCP) program from Arcitura is dedicated to excellence in the fields of cloud computing technology, mechanisms, platforms, architecture,

More information

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification

Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification Service Description Managed Security Services - Automated Analysis, Threat Analyst Monitoring and Notification The services described herein are governed by the terms and conditions of the agreement specified

More information

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities

More information

Community Edition. Web User Interface 3.X. User Guide

Community Edition. Web User Interface 3.X. User Guide Community Edition Talend MDM Web User Interface 3.X User Guide Version 3.2_a Adapted for Talend MDM Web User Interface 3.2 Web Interface User Guide release. Copyright This documentation is provided under

More information

IBM SmartCloud Notes Security

IBM SmartCloud Notes Security IBM Software White Paper September 2014 IBM SmartCloud Notes Security 2 IBM SmartCloud Notes Security Contents 3 Introduction 3 Service Access 4 People, Processes, and Compliance 5 Service Security IBM

More information

Siebel Application Deployment Manager Guide. Version 8.0, Rev. A April 2007

Siebel Application Deployment Manager Guide. Version 8.0, Rev. A April 2007 Siebel Application Deployment Manager Guide Version 8.0, Rev. A April 2007 Copyright 2005, 2006, 2007 Oracle. All rights reserved. The Programs (which include both the software and documentation) contain

More information

RiskSense Attack Surface Validation for Web Applications

RiskSense Attack Surface Validation for Web Applications RiskSense Attack Surface Validation for Web Applications 2018 RiskSense, Inc. Keeping Pace with Digital Business No Excuses for Not Finding Risk Exposure We needed a faster way of getting a risk assessment

More information

CTI Capability Maturity Model Marco Lourenco

CTI Capability Maturity Model Marco Lourenco 1 CTI Capability Maturity Model Cyber Threat Intelligence Course NIS Summer School 2018, Crete October 2018 MARCO LOURENCO - ENISA Cyber Security Analyst Lead European Union Agency for Network and Information

More information

Workflow, Planning and Performance Information, information, information Dr Andrew Stephen M c Gough

Workflow, Planning and Performance Information, information, information Dr Andrew Stephen M c Gough Workflow, Planning and Performance Information, information, information Dr Andrew Stephen M c Gough Technical Coordinator London e-science Centre Imperial College London 17 th March 2006 Outline Where

More information

Texas Connector Training Manual [2016]

Texas Connector Training Manual [2016] Texas Connector Training Manual [2016] CONTENTS OneStar Foundation and Texas Connector Overview... 2 The Data... 2 How To Create An Account... 3 How To Log In... 3 How To Create An Account Visual Guide

More information

Panel: Research on Complex Enterprise Systems of Systems. Complex Adaptive Systems Conference 14-NOV-2013

Panel: Research on Complex Enterprise Systems of Systems. Complex Adaptive Systems Conference 14-NOV-2013 Panel: Research on Complex Enterprise Systems of Systems Complex Adaptive Systems Conference 14-NOV-2013 Dan DeLaurentis School of Aeronautics & Astronautics and Center for Integrated Systems in Aerospace

More information

Introduction. Key Features and Benefits

Introduction. Key Features and Benefits Introduction Stabilix Underwriting Framework is a highly adaptable XML based J2EE com-pliant software platform built on the Stabilix s business process automation (BPA) suite, code named CloudEx. CloudEx

More information

(c) Addison Wesley Chapter 3. ! Interviewing customers and domain experts. ! Questionnaires. ! Observation. ! Study of documents and software systems

(c) Addison Wesley Chapter 3. ! Interviewing customers and domain experts. ! Questionnaires. ! Observation. ! Study of documents and software systems MACIASZEK, L.A. (2001): Analysis and System Design. Developing Information Systems with UML, Addison Wesley elicitation Domain Expert Customer Chapter 3 Determination Domain Knowledge Business Analyst

More information

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION

GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION GENERIC CONTROL SYSTEM ARCHITECTURE FOR CRITICAL INFRASTRUCTURE PROTECTION Hrvoje Sagrak 1 Introduction In an interconnected world that we live in, protection of our societies and values relies highly

More information

A global open source ecosystem for power systems

A global open source ecosystem for power systems A global open source ecosystem for power systems Fostering the digitalisation of energy The energy sector is meeting the global challenge of climate change by embracing decarbonisation, decentralisation,

More information

Case Study: Macarthur Minerals

Case Study: Macarthur Minerals A unique network design simultaneously supporting corporate and welfare interests and managed with Acceleration & QoS technology SpeedCast Limited Unit 1, 25 Tulloch Way, Canning Vale WA 6155 AUSTRALIA

More information

TIBCO Complex Event Processing Evaluation Guide

TIBCO Complex Event Processing Evaluation Guide TIBCO Complex Event Processing Evaluation Guide This document provides a guide to evaluating CEP technologies. http://www.tibco.com Global Headquarters 3303 Hillview Avenue Palo Alto, CA 94304 Tel: +1

More information

Towards a National Data Infrastructure First Insights Regarding Its Design and Its Governance

Towards a National Data Infrastructure First Insights Regarding Its Design and Its Governance Towards a National Data Infrastructure First Insights Regarding Its Design and Its Governance Opendata.ch Conference, 13 June 2016, Lausanne Beat Estermann, Marianne Fraefel, Prof. Dr. Alessia Neuroni

More information

Executing Evaluations over Semantic Technologies using the SEALS Platform

Executing Evaluations over Semantic Technologies using the SEALS Platform Executing Evaluations over Semantic Technologies using the SEALS Platform Miguel Esteban-Gutiérrez, Raúl García-Castro, Asunción Gómez-Pérez Ontology Engineering Group, Departamento de Inteligencia Artificial.

More information

Context Aware Computing

Context Aware Computing CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware

More information

Veritas Provisioning Manager

Veritas Provisioning Manager Veritas Provisioning Manager Automated server provisioning, part of the Veritas Server Foundation suite, automates server provisioning and management from physical bare metal discovery and OS installation

More information

Digitalization in the energy landscape - integrating renewable energy FAPESP, Sao Paulo, 13. November 2017

Digitalization in the energy landscape - integrating renewable energy FAPESP, Sao Paulo, 13. November 2017 Digitalization in the energy landscape - integrating renewable energy FAPESP, Sao Paulo, 13. November 2017 Morten Dæhlen Professor/Dean First, a few words about The University of Oslo (UiO) Science and

More information

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not

More information

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin ARC VIEW DECEMBER 7, 2017 Critical Industries Need Active Defense and Intelligence-driven Cybersecurity By Sid Snitkin Keywords Industrial Cybersecurity, Risk Management, Threat Intelligence, Anomaly &

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT PROJECT PERIODIC REPORT Grant Agreement number: 257403 Project acronym: CUBIST Project title: Combining and Uniting Business Intelligence and Semantic Technologies Funding Scheme: STREP Date of latest

More information

Managing your Cloud with Confidence

Managing your Cloud with Confidence Mobility Cloud and Security Managing your Cloud with Confidence Stephen Miles VP Service Assurance - APJ Agenda The Digital Revolution and the changing IT Landscape Management challenges in the new world

More information

Jane s Military & Security Assessments Intelligence Centre. Understand Threats. Assess Capabilities. Challenge Assumptions.

Jane s Military & Security Assessments Intelligence Centre. Understand Threats. Assess Capabilities. Challenge Assumptions. Jane s Military & Security Assessments Intelligence Centre Understand Threats. Assess Capabilities. Challenge Assumptions. OVERVIEW Comprehensive open-source data and independent expert analysis Jane s

More information

Village Software. Security Assessment Report

Village Software. Security Assessment Report Village Software Security Assessment Report Version 1.0 January 25, 2019 Prepared by Manuel Acevedo Helpful Village Security Assessment Report! 1 of! 11 Version 1.0 Table of Contents Executive Summary

More information

Creating a Corporate Taxonomy. Internet Librarian November 2001 Betsy Farr Cogliano

Creating a Corporate Taxonomy. Internet Librarian November 2001 Betsy Farr Cogliano Creating a Corporate Taxonomy Internet Librarian 2001 7 November 2001 Betsy Farr Cogliano 2001 The MITRE Corporation Revised October 2001 2 Background MITRE is a not-for-profit corporation operating three

More information

DAML: ATLAS Project Carnegie Mellon University

DAML: ATLAS Project Carnegie Mellon University DAML: ATLAS Project Carnegie Mellon University Katia Sycara Anupriya Ankolekar, Massimo Paolucci, Naveen Srinivasan November 2004 0 Overall Program Summary What is the basic problem you are trying to solve?

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

IBM Advantage: IBM Watson Compare and Comply Element Classification

IBM Advantage: IBM Watson Compare and Comply Element Classification IBM Advantage: IBM Watson Compare and Comply Element Classification Executive overview... 1 Introducing Watson Compare and Comply... 2 Definitions... 3 Element Classification insights... 4 Sample use cases...

More information

Symantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure

Symantec Discovery. Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure Symantec Discovery Track hardware/software assets and monitor license compliance throughout a multiplatform IT infrastructure OVERVIEW Symantec Discovery helps ensure Client Resilience by identifying and

More information

webmethods Task Engine 9.9 on Red Hat Operating System

webmethods Task Engine 9.9 on Red Hat Operating System webmethods Task Engine 9.9 on Red Hat Operating System Performance Technical Report 1 2015 Software AG. All rights reserved. Table of Contents INTRODUCTION 3 1.0 Benchmark Goals 4 2.0 Hardware and Software

More information

YOU VE GOT 99 PROBLEMS AND A BUDGET S ONE

YOU VE GOT 99 PROBLEMS AND A BUDGET S ONE YOU VE GOT 99 PROBLEMS AND A BUDGET S ONE Rebekah Brown @PDXBek Threat Intelligence Lead at Rapid7 But before that Gunnery Sergeant United State Marine Corps Chinese Crypto linguist and Network Warfare

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change

LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK. Department of Economics and Business. Curriculum Change Senate Meeting of April 28, 2010 Graduate Studies Committee Hegis Code: 0502 Program Code: 32786 LEHMAN COLLEGE OF THE CITY UNIVERSITY OF NEW YORK Department of Economics and Business Curriculum Change

More information

Part I: Data Mining Foundations

Part I: Data Mining Foundations Table of Contents 1. Introduction 1 1.1. What is the World Wide Web? 1 1.2. A Brief History of the Web and the Internet 2 1.3. Web Data Mining 4 1.3.1. What is Data Mining? 6 1.3.2. What is Web Mining?

More information

End to End BPM: From process modeling to execution with Signavio and Red Hat. Red Hat Summit Wednesday May 3.

End to End BPM: From process modeling to execution with Signavio and Red Hat. Red Hat Summit Wednesday May 3. End to End BPM: From process modeling to execution with Signavio and Red Hat Red Hat Summit 2017 Wednesday May 3 www.signavio.com www.redhat.com SeanPavonePhoto/Bigstock.com Agenda Solution Introduction

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

ACCELERATE YOUR SHAREPOINT ADOPTION AND ROI WITH CONTENT INTELLIGENCE

ACCELERATE YOUR SHAREPOINT ADOPTION AND ROI WITH CONTENT INTELLIGENCE June 30, 2012 San Diego Convention Center ACCELERATE YOUR SHAREPOINT ADOPTION AND ROI WITH CONTENT INTELLIGENCE Stuart Laurie, Senior Consultant #SPSSAN Agenda 1. Challenges 2. What comes out of the box

More information

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior Years

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

MESH. Multimedia Semantic Syndication for Enhanced News Services. Project Overview

MESH. Multimedia Semantic Syndication for Enhanced News Services. Project Overview MESH Multimedia Semantic Syndication for Enhanced News Services Project Overview Presentation Structure 2 Project Summary Project Motivation Problem Description Work Description Expected Result The MESH

More information

Exchange 2007 End of Service: Modernize with Office 365. Todd Sweetser Technical Solutions Professional

Exchange 2007 End of Service: Modernize with Office 365. Todd Sweetser Technical Solutions Professional Exchange 2007 End of Service: Modernize with Office 365 Todd Sweetser Technical Solutions Professional Today s Presenter Todd has been in the IT industry for over two decades. He started out working with

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Cyber Security Updates and Trends Affecting the Real Estate Industry

Cyber Security Updates and Trends Affecting the Real Estate Industry Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways

More information

CA ERwin Data Profiler

CA ERwin Data Profiler PRODUCT BRIEF: CA ERWIN DATA PROFILER CA ERwin Data Profiler CA ERWIN DATA PROFILER HELPS ORGANIZATIONS LOWER THE COSTS AND RISK ASSOCIATED WITH DATA INTEGRATION BY PROVIDING REUSABLE, AUTOMATED, CROSS-DATA-SOURCE

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution. AD ediscovery Collect, Audit and Analyze with a Seamless, Secure Solution Take control of your e-discovery process. Increase efficiency, reduce risk and keep costs in line with an integrated solution.

More information

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD

FLUID COMPUTING. ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River IN A SOFTWARE-DEFINED WORLD FLUID COMPUTING IN A SOFTWARE-DEFINED WORLD ARC FORUM, India Ricky Watts Director of Industrial Solutions, Wind River Chemical Sector Commercial Building Sector Communications Sector Critical Manufacturing

More information

ArcGIS in the Cloud. Andrew Sakowicz & Alec Walker

ArcGIS in the Cloud. Andrew Sakowicz & Alec Walker ArcGIS in the Cloud Andrew Sakowicz & Alec Walker Key Takeaways How to Identify Organizational Strategy & Priorities Esri s Cloud Offerings A Broad Spectrum Successfully Executing Your Strategy The Cloud

More information

JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT, VOL SPECIAL ISSUE

JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT, VOL SPECIAL ISSUE JOURNAL OF INFORMATION SYSTEMS & OPERATIONS MANAGEMENT, VOL.5.2.1 SPECIAL ISSUE INFRASTRUCTURE FOR INTEROPERABILITY OF THE E- GOVERNMENT APPLICATIONS BASED ON SEMANTIC WEB SERVICES Abstract Maria Moise

More information

Looking beyond IEEE 13th System of Systems Engineering Conference - SoSE 2018 Sandro D'Elia -

Looking beyond IEEE 13th System of Systems Engineering Conference - SoSE 2018 Sandro D'Elia - Looking beyond 2020 IEEE 13th System of Systems Engineering Conference - SoSE 2018 Sandro D'Elia - sandro.delia@ec.europa.eu The overall context of EU research Multiannual Financial Framework budget proposal

More information

EMC VPLEX Geo with Quantum StorNext

EMC VPLEX Geo with Quantum StorNext White Paper Application Enabled Collaboration Abstract The EMC VPLEX Geo storage federation solution, together with Quantum StorNext file system, enables a global clustered File System solution where remote

More information

Risk-based security in practice Turning information into smart screening. October 2014

Risk-based security in practice Turning information into smart screening. October 2014 Risk-based security in practice Turning information into smart screening October 2014 Organizations charged with securing our society s vital functions transit, commerce, communication have expansive missions

More information

Session Questions and Responses

Session Questions and Responses Product: Topic: Audience: Updated: OpenText Image Crawler Webinar Questions ILTA February 10, 2015 Discover How to Make your Scanned Images Searchable with OpenText Image Crawler Session Questions and

More information

Trends in Data Protection CDP and VTL

Trends in Data Protection CDP and VTL Trends in Data Protection CDP and VTL Agnes Lamont, TimeSpring Jason Iehl, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

LIDER Survey. Overview. Number of participants: 24. Participant profile (organisation type, industry sector) Relevant use-cases

LIDER Survey. Overview. Number of participants: 24. Participant profile (organisation type, industry sector) Relevant use-cases LIDER Survey Overview Participant profile (organisation type, industry sector) Relevant use-cases Discovering and extracting information Understanding opinion Content and data (Data Management) Monitoring

More information

DRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS).

DRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS). Harvard University Library Office for Information Systems DRS Policy Guide This Guide defines the policies associated with the Harvard Library Digital Repository Service (DRS) and is intended for Harvard

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

Perimeter Security Market by System (IDS, Video Surveillance, Alarms & Notification, Access Control), Service (System Integration & Consulting, Risk

Perimeter Security Market by System (IDS, Video Surveillance, Alarms & Notification, Access Control), Service (System Integration & Consulting, Risk Perimeter Security Market by System (IDS, Video Surveillance, Alarms & Notification, Access Control), Service (System Integration & Consulting, Risk Assessment, Managed Services, Maintenance & Support),

More information

Chapter 6 VIDEO CASES

Chapter 6 VIDEO CASES Chapter 6 Foundations of Business Intelligence: Databases and Information Management VIDEO CASES Case 1a: City of Dubuque Uses Cloud Computing and Sensors to Build a Smarter, Sustainable City Case 1b:

More information

Unified Infrastructure Management Compatibility Matrix June 26, 2015

Unified Infrastructure Management Compatibility Matrix June 26, 2015 Unified Infrastructure Management Compatibility Matrix June 26, 2015 1 Unified Infrastructure Management Compatibility Matrix- CA Technologies Legal Notices Copyright 2013, CA. All rights reserved. Warranty

More information

Providing a Rapid Response to Meltdown and Spectre for Hybrid IT. Industry: Computer Security and Operations Date: February 2018

Providing a Rapid Response to Meltdown and Spectre for Hybrid IT. Industry: Computer Security and Operations Date: February 2018 Market Guide Providing a Rapid Response to Meltdown and Spectre for Hybrid IT Industry: Computer Security and Operations Date: February 2018 Meltdown and Spectre Exploits Vulnerabilities in Common Processors

More information

BPM Case Study - Managing Regulatory Controls in the Banking and Financial Sector with Activiti. Greg Harley Director - Special Projects BP3 Global

BPM Case Study - Managing Regulatory Controls in the Banking and Financial Sector with Activiti. Greg Harley Director - Special Projects BP3 Global BPM Case Study - Managing Regulatory Controls in the Banking and Financial Sector with Activiti Greg Harley Director - Special Projects BP3 Global What is BPM? BPM Definition: A management discipline that

More information

Cisco Crosswork Network Automation

Cisco Crosswork Network Automation Cisco Crosswork Network Introduction Communication Service Providers (CSPs) are at an inflexion point. Digitization and virtualization continue to disrupt the way services are configured and delivered.

More information

Generating Fraud: Agent Based Financial Network Modeling

Generating Fraud: Agent Based Financial Network Modeling Generating Fraud: Agent Based Financial Network Modeling Matthew Koehler, Brian Tivnan, and Eric Bloedorn The MITRE Corporation 7515 Colshire Dr. McLean, VA 22102-7508 mkoehler, btivnan, and bloedorn@mitre.org

More information