SlideShare a Scribd company logo
1 of 27
Quantum Ar tificial Intelligence - Architecture
Presented by The Reddix Group, LLC
Mission Statement:
Creates an Enterprise Common
Operational Picture, that produces
Enhanced Situational Awareness!
DoD Quantum Artificial Intelligence (Q-AI)
IN NEAR REAL - TIME “FUTURE STATE”
Potential National Security Threats - Part 1
DISASTER
SCENARIOS
CRIME
Example : product piracy, cyber attacks
AMENDMENTS TO THE LAW
Example : GDPR (2018)
INFRASTRUCTURE ISSUES
Example : power outages or network crashes
NATURAL DISASTERS
Example : earthquakes, floods
RESOURCE CONSTRAINTS
Example : loss of suppliers
LOSSES DUE TO ACCIDENTS
Examples : fire, machinery issues
HEALTH-RELATED ISSUES
Example : Flu season or any pandemics
SOCIAL & POLITICAL UNREST
Example : strikes, political upheavals, attacks
Potential National Security Threats - Part 2
Storm Damage Theft or Robbery Power Outages Viral Outbreak Technical Failure
Natural Disaster Cyber Attack Human Error Fire Accident Water Shortage
Texas Power Outages
Jackson, MS Water Shortage
Colonial Pipeline Ransomware Attack
Space
Weaponization
The Aim of Q-AI
Learning - improvements in the
deep learning training process!
Decision Problems - based on
Hamiltonian time evolution can
solve problems faster than
random walks!
Search – most search algorithms
are designed for classical
computing
Game Theory – can overcome
critical problems in quantum
communications and
implementations of Q-AI!
Open-Source modeling
and training frameworks
Substantial and skilled
developer ecosystem
Less error-prone and
more powerful computing
systems
Compelling applications
that outperforms classical
computing
Critical Milestones
Enhanced Situational Awareness (ESA)
Q-AI Plan of Attack
ALGORITHM PROCESS PRIORITIZATION IN-MEMORY - IT INTEGRATION MANAGEMENT
Risk
Assessment
DoD Impact
Analysis
Program
Assessment
Program
Design
Strategy
Design
Implementation
Program
Review
Resilience program
management
Processes and activities
Crisis teams
Business resumption
High availability
Recovery
Streamline IT
infrastructure
High availability
design
High availability
servers
Data replication
Database and software
design
Maturity model
Model ROI
Create program
roadmap
Outage impact
Risks,
vulnerabilities,
threats
1. People
2. Processes
3. Plans
4. Strategies
5. Networks
6. Platforms
7. Facilities
Awareness, review, change management, regular briefings
Current capabilities Expected recovery time
Quantum
Artificial
Intelligence
Management
Q-AI Data Readiness
Labeling data is a significant expense and bottleneck for Machine Learning
and Natural Language Processing (NLP) development. Current approaches,
such as manually labeling data through crowdsourcing and internal labeling
efforts, carry significant drawbacks including high cost, extensive time and
resource consumption, and low consistency and accuracy. Jaxon is a semi-
supervised training platform that amplifies a small number of human-
provided labels into full-scale training datasets and high-quality models for
text-oriented machine learning applications.
Jaxon brings together several open and proprietary techniques for effective
sparse-data training. These techniques incorporate knowledge from large
unlabeled corpora, human domain experts, and previously-trained models
and machine learning assets in order to drastically reduce the demand for
human labeling and annotation while improving model quality.
Quantum
Artificial
Intelligence
Management
Q-AI Application
Development
With the growth of cloud computing, more ingenious
cyberthreats, and the need for fast and easily changeable
applications, agencies are realizing that the traditional
method of application development does not serve their
needs. For more agencies, the answer is microservices. This
application development approach breaks applications into
smaller components for development.
Quantum
Artificial
Intelligence
Management
Q-AI Testing and
Evaluation
Testing & Evaluation (T&E) – There are so many things that
can go wrong during data transportation: Data can be
corrupted, hit bottlenecks causing latency, or data sources
may conflict generating duplicate or incorrect data,
eliminating duplicates and incompatible data types, to
obfuscate sensitive information while not missing critical data.
Preparing Quantum Datasets for Q-AI
Preparing
Q-AI Datasets
1
2
3
4
5
Processes, recovery
times, resource
requirements
Threat analysis,
risk exposure,
threat scenarios
Continuity, strategy, key
resources, alternatives,
service methods, and
recovery methods
Procedures
Plan validation
Convert Q-AI data to the quantum dataset
Q-AI data can be represented as a multi-
dimensional array of numbers which is called as
quantum tensors. TensorFlow processes these
tensors in order to represent, create a dataset for
further use.
01
Choose Q-AI neural network models
Based on the Q-AI data structure, Q-AI
neural network models are selected. The
aim is to perform Q-AI processing in order
to extract information hidden in an
entangled state.
02
Sample or Average
Measurement of Q-AI states extract
classical information in the form of
samples from the classical
distribution. The values are
obtained from the Q-AI state itself.
03
Evaluate a classical neural networks model
Since Q-AI data is now converted into classical
data, deep learning techniques are used to learn
the correlation between data.
04
Exercising & Testing
Its main purpose is to validate the
Q-AI continuity strategy, activities,
assumptions regarding usefulness
and security levels.
05
Continued Q-AI Maintenance Plan
This phase maintain the Q-AI
algorithms in a constant ready-
state. The maintenance process of
a Q-AI ecosystem is constant and
dynamic.
06
Q-AI Application Development Framework
LEARN / OPTIMIZE
UPDATE
Q-AI before & after an events
AGGREGATE / LABEL / OPTIMIZATION
UTILIZE
Train the Q-AI in a crisis or exercise
EXPLORE / TRANSFORM / REALTIME
STRUCTURE
Decide on how to structure the Q-AI
MOVE / STORE / COLLECT
Q-AI PLAN
Build ML template & get started
Hierarchy of Needs KEY TO SUCCESS
Q-AI
GigaSpaces’s InsightEdge was designed to help enterprises seamlessly accelerate and scale their
mission
critical, time-sensitive applications and services. This distributed in-memory software platform
can ingest, process and store large volumes of any data type, and ensures low latency performance
dynamic scale across all environments. Customers leverage InsightEdge to power open banking
initiatives, real time fraud and risk analysis, customer 360, analytics and BI on fresh data and more.
The InsightEdge platform integrates to siloed operational data stores and to the enterprise’s systems
of record with a single click (no-code connect), aggregating data in a low-latency data fabric. The
dynamically scaling Data Integration Hub offloads API access from the enterprise’s data stores (on-
premise and cloud) and delivers rapid application response times to internal and external customers
no matter the load while ensuring always-on services. The ability to collocate business logic with data
in memory and perform dynamic server-side aggregations, reduces the movement of data to the client
and delivers extreme performance.
Q-AI: IN-MEMORY SOLUTION
Q-AI GigaSpaces: Orchestration
1
3
Q-AI GigaSpaces: Data Flows
1
4
Q-AI GigaSpaces: Cloud & Datacenter Integration
1
6
Q-AI GigaSpaces: AI/ML
Q-AI GigaSpaces: How To Run Microservices
CASE
STUDY:
• Railway corporation runs predictive
analytics on its fleet of trains in real-time
BUSINESS CHALLENGE:
• Trains location heatmap
• Correlating fuel consumption, temperature,
weather and road conditions
• Bad weather alerts filter
• Real-time enriched data with external data
TECHNICAL CHALLENGE:
• Improve train performance and reduce downtime with
real-time visibility of 10Ks trains
• Reduce maintenance costs by up to 75% per mile
• Faster time to market of new online services
RESULTS:
TRANSPORTATION/
IOT
Predictive Maintenance
Reduce maintenance costs by up to 75% per mile
Q-AI GigaSpaces: Example
Q-AI Resource Requirements
Q-AI Build Cycle
ASSESSMENTS
Development & implementation of test
scenarios, staff training, Gap analysis
ANALYSIS
Identify, Risk assessment,
Business impact analysis
DEVELOP
Strategy review &
implementation, Plan
development
INTEGRATION
Coordination with
external organizations &
companies
MAINTENANCE
Change management,
Scheduling, Financial audit
management
PROJECT STARTS
Project management & awareness,
leadership, basic development
Q-AI Model Development Flow
ANALYZE
DESIGN
SOLUTIONS
IMPLEMENT
TEST AND
ACCEPT
Identify potential threats or
risks, impacted business
processes, warning and
communication process
Design or define addition
solutions, strategy,
documentation processes and
supplier dependencies
Initiate response checklist and
relocation strategies of critical
processes in the business
disruption.
Recovery time objectives,
test critical processes,
monitor primary and
alternate facility details.
Update key details and
associated processes as
deficiencies & inaccuracies
are identified.
MAINTAIN
DEVELOP DATA INPUTS
Determine the selection of
alternative Data Strategies available
for mitigate loss (testing scenarios).
02
03 05
01
04
IDENTIFY & ANALYZE
Identifies all significant AI
roles of risks, resources &
all critical processes.
IMPLEMENTATION PLANS
Here you can develop plans which
includes role allocation &
responsibilities in case of crisis.
DEFINE OBJECTIVES
What are the AI objectives,
defined value & cybersecurity
requirements.
BUILD TRAINING MODEL
Testing helps to create
awareness for execution in the
event of any disaster or risk.
06
ESTABLISH BENCHMARKS
It helps to create awareness among
managers, employees and partners
in company.
Test & Evaluation
Q-AI as a Component of Resilience Management
CRISIS MANAGEMENT
EMERGENCY PREPAREDNESS
Impact
Strategy
Plan
Training + Test
Emergency
Measures
Emergency
Operations
Resume
Normal
Operations
Q-AI
Q-AI Cyber Risk Analysis Steps
01
IDENTIFY RISKS
• Internal and external risks
• Direct and indirect risks
• Risks that can and cannot
be managed
02
EVALUATE RISKS
• Assess risk probability
• Assess impact
• Assigning and prioritizing risk
03
DESIGN POSSIBLE RISK SCENARIO
• IT failure and network collapse
• Building damage
• Delivery bottlenecks
• Loss of employees
04
SELECT RISK STRATEGIES
• Acceptance
• Transfer
• Avoidance
• Reduction
Strategic Q-AI Framework
Q-AI STRESS
TESTING
Define
Identify
Assess
impact
Design
changes
Execute
changes
Q-AI
CONTINUITY
MGMT.
Test &
maintain
Project
initiation
Identify
& impact
Design
measure
Implement
MODIFIES & CREATE VALUE SUSTAINS & PRESERVES VALUE
Reddix Group - Quantum AI - Presentation

More Related Content

What's hot

MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesDell EMC World
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 blior mazor
 
IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond
IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond
IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond IBM
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...SolarWinds
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Matthew Rosenquist
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodaySolarWinds
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energystacybre
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at EdgeDell EMC World
 

What's hot (19)

MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Securing and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 bSecuring and automating your application infrastructure meetup 23112021 b
Securing and automating your application infrastructure meetup 23112021 b
 
IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond
IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond
IBM Relay 2015: New Data Sources, New Value. Watson, Weather and Beyond
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS EnergyIntegration of Technology & Compliance Presented by John Heintz, CPS Energy
Integration of Technology & Compliance Presented by John Heintz, CPS Energy
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 

Similar to Reddix Group - Quantum AI - Presentation

Defining a Cloud Adoption Journey to Deliver Cloud Native Services
Defining a Cloud Adoption Journey to Deliver Cloud Native ServicesDefining a Cloud Adoption Journey to Deliver Cloud Native Services
Defining a Cloud Adoption Journey to Deliver Cloud Native ServicesAmazon Web Services
 
ADV Slides: How to Improve Your Analytic Data Architecture Maturity
ADV Slides: How to Improve Your Analytic Data Architecture MaturityADV Slides: How to Improve Your Analytic Data Architecture Maturity
ADV Slides: How to Improve Your Analytic Data Architecture MaturityDATAVERSITY
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerinevitablecloud
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicAmazon Web Services
 
Customer Presentation - IBM Cloud Pak for Data Overview (Level 100).PPTX
Customer Presentation - IBM Cloud Pak for Data Overview (Level 100).PPTXCustomer Presentation - IBM Cloud Pak for Data Overview (Level 100).PPTX
Customer Presentation - IBM Cloud Pak for Data Overview (Level 100).PPTXtsigitnist02
 
Giga Spaces Getting Ready For The Cloud
Giga Spaces   Getting Ready For The CloudGiga Spaces   Getting Ready For The Cloud
Giga Spaces Getting Ready For The Cloudchzesin
 
GigaSpaces - Getting Ready For The Cloud
GigaSpaces - Getting Ready For The CloudGigaSpaces - Getting Ready For The Cloud
GigaSpaces - Getting Ready For The Cloudgigaspaces
 
Accelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesAccelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesMcKinsey & Company
 
Cognizant Cloud for Utilities
Cognizant Cloud for UtilitiesCognizant Cloud for Utilities
Cognizant Cloud for UtilitiesSteve Lennon
 
Dell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services WebinarDell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services WebinarBill Wong
 
Cloud Computing Basics III
Cloud Computing Basics IIICloud Computing Basics III
Cloud Computing Basics IIIRightScale
 
InTTrust -IBM Artificial Intelligence Event
InTTrust -IBM Artificial Intelligence  EventInTTrust -IBM Artificial Intelligence  Event
InTTrust -IBM Artificial Intelligence EventMichail Pagiatakis
 
Mythbusting the Federal Cloud Journey
Mythbusting the Federal Cloud JourneyMythbusting the Federal Cloud Journey
Mythbusting the Federal Cloud JourneyAmazon Web Services
 
Innovating With Data and Analytics
Innovating With Data and AnalyticsInnovating With Data and Analytics
Innovating With Data and AnalyticsVMware Tanzu
 
Giga Spaces Alternative To GAE_JavaOne 09
Giga Spaces Alternative To GAE_JavaOne 09Giga Spaces Alternative To GAE_JavaOne 09
Giga Spaces Alternative To GAE_JavaOne 09Amnon Raviv
 
Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services. Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services. IBM
 
IIoT發展趨勢及設備業者因應之_微軟葉怡君
IIoT發展趨勢及設備業者因應之_微軟葉怡君IIoT發展趨勢及設備業者因應之_微軟葉怡君
IIoT發展趨勢及設備業者因應之_微軟葉怡君CHENHuiMei
 
The Cloud - What's different
The Cloud - What's differentThe Cloud - What's different
The Cloud - What's differentChen-Tien Tsai
 

Similar to Reddix Group - Quantum AI - Presentation (20)

How T-Mobile Tamed Metron
How T-Mobile Tamed MetronHow T-Mobile Tamed Metron
How T-Mobile Tamed Metron
 
Defining a Cloud Adoption Journey to Deliver Cloud Native Services
Defining a Cloud Adoption Journey to Deliver Cloud Native ServicesDefining a Cloud Adoption Journey to Deliver Cloud Native Services
Defining a Cloud Adoption Journey to Deliver Cloud Native Services
 
ADV Slides: How to Improve Your Analytic Data Architecture Maturity
ADV Slides: How to Improve Your Analytic Data Architecture MaturityADV Slides: How to Improve Your Analytic Data Architecture Maturity
ADV Slides: How to Improve Your Analytic Data Architecture Maturity
 
Cw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamerCw13 cloud computing & big data by ahmed aamer
Cw13 cloud computing & big data by ahmed aamer
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
Customer Presentation - IBM Cloud Pak for Data Overview (Level 100).PPTX
Customer Presentation - IBM Cloud Pak for Data Overview (Level 100).PPTXCustomer Presentation - IBM Cloud Pak for Data Overview (Level 100).PPTX
Customer Presentation - IBM Cloud Pak for Data Overview (Level 100).PPTX
 
Giga Spaces Getting Ready For The Cloud
Giga Spaces   Getting Ready For The CloudGiga Spaces   Getting Ready For The Cloud
Giga Spaces Getting Ready For The Cloud
 
GigaSpaces - Getting Ready For The Cloud
GigaSpaces - Getting Ready For The CloudGigaSpaces - Getting Ready For The Cloud
GigaSpaces - Getting Ready For The Cloud
 
Accelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securitiesAccelerating hybrid-cloud adoption in banking and securities
Accelerating hybrid-cloud adoption in banking and securities
 
IBM Think Milano
IBM Think MilanoIBM Think Milano
IBM Think Milano
 
Cognizant Cloud for Utilities
Cognizant Cloud for UtilitiesCognizant Cloud for Utilities
Cognizant Cloud for Utilities
 
Dell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services WebinarDell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services Webinar
 
Cloud Computing Basics III
Cloud Computing Basics IIICloud Computing Basics III
Cloud Computing Basics III
 
InTTrust -IBM Artificial Intelligence Event
InTTrust -IBM Artificial Intelligence  EventInTTrust -IBM Artificial Intelligence  Event
InTTrust -IBM Artificial Intelligence Event
 
Mythbusting the Federal Cloud Journey
Mythbusting the Federal Cloud JourneyMythbusting the Federal Cloud Journey
Mythbusting the Federal Cloud Journey
 
Innovating With Data and Analytics
Innovating With Data and AnalyticsInnovating With Data and Analytics
Innovating With Data and Analytics
 
Giga Spaces Alternative To GAE_JavaOne 09
Giga Spaces Alternative To GAE_JavaOne 09Giga Spaces Alternative To GAE_JavaOne 09
Giga Spaces Alternative To GAE_JavaOne 09
 
Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services. Next Gen ADM: The future of application services.
Next Gen ADM: The future of application services.
 
IIoT發展趨勢及設備業者因應之_微軟葉怡君
IIoT發展趨勢及設備業者因應之_微軟葉怡君IIoT發展趨勢及設備業者因應之_微軟葉怡君
IIoT發展趨勢及設備業者因應之_微軟葉怡君
 
The Cloud - What's different
The Cloud - What's differentThe Cloud - What's different
The Cloud - What's different
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Reddix Group - Quantum AI - Presentation

  • 1. Quantum Ar tificial Intelligence - Architecture Presented by The Reddix Group, LLC
  • 2. Mission Statement: Creates an Enterprise Common Operational Picture, that produces Enhanced Situational Awareness! DoD Quantum Artificial Intelligence (Q-AI) IN NEAR REAL - TIME “FUTURE STATE”
  • 3. Potential National Security Threats - Part 1 DISASTER SCENARIOS CRIME Example : product piracy, cyber attacks AMENDMENTS TO THE LAW Example : GDPR (2018) INFRASTRUCTURE ISSUES Example : power outages or network crashes NATURAL DISASTERS Example : earthquakes, floods RESOURCE CONSTRAINTS Example : loss of suppliers LOSSES DUE TO ACCIDENTS Examples : fire, machinery issues HEALTH-RELATED ISSUES Example : Flu season or any pandemics SOCIAL & POLITICAL UNREST Example : strikes, political upheavals, attacks
  • 4. Potential National Security Threats - Part 2 Storm Damage Theft or Robbery Power Outages Viral Outbreak Technical Failure Natural Disaster Cyber Attack Human Error Fire Accident Water Shortage Texas Power Outages Jackson, MS Water Shortage Colonial Pipeline Ransomware Attack Space Weaponization
  • 5. The Aim of Q-AI Learning - improvements in the deep learning training process! Decision Problems - based on Hamiltonian time evolution can solve problems faster than random walks! Search – most search algorithms are designed for classical computing Game Theory – can overcome critical problems in quantum communications and implementations of Q-AI! Open-Source modeling and training frameworks Substantial and skilled developer ecosystem Less error-prone and more powerful computing systems Compelling applications that outperforms classical computing Critical Milestones Enhanced Situational Awareness (ESA)
  • 6. Q-AI Plan of Attack ALGORITHM PROCESS PRIORITIZATION IN-MEMORY - IT INTEGRATION MANAGEMENT Risk Assessment DoD Impact Analysis Program Assessment Program Design Strategy Design Implementation Program Review Resilience program management Processes and activities Crisis teams Business resumption High availability Recovery Streamline IT infrastructure High availability design High availability servers Data replication Database and software design Maturity model Model ROI Create program roadmap Outage impact Risks, vulnerabilities, threats 1. People 2. Processes 3. Plans 4. Strategies 5. Networks 6. Platforms 7. Facilities Awareness, review, change management, regular briefings Current capabilities Expected recovery time
  • 7. Quantum Artificial Intelligence Management Q-AI Data Readiness Labeling data is a significant expense and bottleneck for Machine Learning and Natural Language Processing (NLP) development. Current approaches, such as manually labeling data through crowdsourcing and internal labeling efforts, carry significant drawbacks including high cost, extensive time and resource consumption, and low consistency and accuracy. Jaxon is a semi- supervised training platform that amplifies a small number of human- provided labels into full-scale training datasets and high-quality models for text-oriented machine learning applications. Jaxon brings together several open and proprietary techniques for effective sparse-data training. These techniques incorporate knowledge from large unlabeled corpora, human domain experts, and previously-trained models and machine learning assets in order to drastically reduce the demand for human labeling and annotation while improving model quality.
  • 8. Quantum Artificial Intelligence Management Q-AI Application Development With the growth of cloud computing, more ingenious cyberthreats, and the need for fast and easily changeable applications, agencies are realizing that the traditional method of application development does not serve their needs. For more agencies, the answer is microservices. This application development approach breaks applications into smaller components for development.
  • 9. Quantum Artificial Intelligence Management Q-AI Testing and Evaluation Testing & Evaluation (T&E) – There are so many things that can go wrong during data transportation: Data can be corrupted, hit bottlenecks causing latency, or data sources may conflict generating duplicate or incorrect data, eliminating duplicates and incompatible data types, to obfuscate sensitive information while not missing critical data.
  • 10. Preparing Quantum Datasets for Q-AI Preparing Q-AI Datasets 1 2 3 4 5 Processes, recovery times, resource requirements Threat analysis, risk exposure, threat scenarios Continuity, strategy, key resources, alternatives, service methods, and recovery methods Procedures Plan validation Convert Q-AI data to the quantum dataset Q-AI data can be represented as a multi- dimensional array of numbers which is called as quantum tensors. TensorFlow processes these tensors in order to represent, create a dataset for further use. 01 Choose Q-AI neural network models Based on the Q-AI data structure, Q-AI neural network models are selected. The aim is to perform Q-AI processing in order to extract information hidden in an entangled state. 02 Sample or Average Measurement of Q-AI states extract classical information in the form of samples from the classical distribution. The values are obtained from the Q-AI state itself. 03 Evaluate a classical neural networks model Since Q-AI data is now converted into classical data, deep learning techniques are used to learn the correlation between data. 04 Exercising & Testing Its main purpose is to validate the Q-AI continuity strategy, activities, assumptions regarding usefulness and security levels. 05 Continued Q-AI Maintenance Plan This phase maintain the Q-AI algorithms in a constant ready- state. The maintenance process of a Q-AI ecosystem is constant and dynamic. 06
  • 11. Q-AI Application Development Framework LEARN / OPTIMIZE UPDATE Q-AI before & after an events AGGREGATE / LABEL / OPTIMIZATION UTILIZE Train the Q-AI in a crisis or exercise EXPLORE / TRANSFORM / REALTIME STRUCTURE Decide on how to structure the Q-AI MOVE / STORE / COLLECT Q-AI PLAN Build ML template & get started Hierarchy of Needs KEY TO SUCCESS Q-AI
  • 12. GigaSpaces’s InsightEdge was designed to help enterprises seamlessly accelerate and scale their mission critical, time-sensitive applications and services. This distributed in-memory software platform can ingest, process and store large volumes of any data type, and ensures low latency performance dynamic scale across all environments. Customers leverage InsightEdge to power open banking initiatives, real time fraud and risk analysis, customer 360, analytics and BI on fresh data and more. The InsightEdge platform integrates to siloed operational data stores and to the enterprise’s systems of record with a single click (no-code connect), aggregating data in a low-latency data fabric. The dynamically scaling Data Integration Hub offloads API access from the enterprise’s data stores (on- premise and cloud) and delivers rapid application response times to internal and external customers no matter the load while ensuring always-on services. The ability to collocate business logic with data in memory and perform dynamic server-side aggregations, reduces the movement of data to the client and delivers extreme performance. Q-AI: IN-MEMORY SOLUTION
  • 15. Q-AI GigaSpaces: Cloud & Datacenter Integration
  • 17. Q-AI GigaSpaces: How To Run Microservices
  • 18. CASE STUDY: • Railway corporation runs predictive analytics on its fleet of trains in real-time BUSINESS CHALLENGE: • Trains location heatmap • Correlating fuel consumption, temperature, weather and road conditions • Bad weather alerts filter • Real-time enriched data with external data TECHNICAL CHALLENGE: • Improve train performance and reduce downtime with real-time visibility of 10Ks trains • Reduce maintenance costs by up to 75% per mile • Faster time to market of new online services RESULTS: TRANSPORTATION/ IOT Predictive Maintenance Reduce maintenance costs by up to 75% per mile Q-AI GigaSpaces: Example
  • 19.
  • 21. Q-AI Build Cycle ASSESSMENTS Development & implementation of test scenarios, staff training, Gap analysis ANALYSIS Identify, Risk assessment, Business impact analysis DEVELOP Strategy review & implementation, Plan development INTEGRATION Coordination with external organizations & companies MAINTENANCE Change management, Scheduling, Financial audit management PROJECT STARTS Project management & awareness, leadership, basic development
  • 22. Q-AI Model Development Flow ANALYZE DESIGN SOLUTIONS IMPLEMENT TEST AND ACCEPT Identify potential threats or risks, impacted business processes, warning and communication process Design or define addition solutions, strategy, documentation processes and supplier dependencies Initiate response checklist and relocation strategies of critical processes in the business disruption. Recovery time objectives, test critical processes, monitor primary and alternate facility details. Update key details and associated processes as deficiencies & inaccuracies are identified. MAINTAIN
  • 23. DEVELOP DATA INPUTS Determine the selection of alternative Data Strategies available for mitigate loss (testing scenarios). 02 03 05 01 04 IDENTIFY & ANALYZE Identifies all significant AI roles of risks, resources & all critical processes. IMPLEMENTATION PLANS Here you can develop plans which includes role allocation & responsibilities in case of crisis. DEFINE OBJECTIVES What are the AI objectives, defined value & cybersecurity requirements. BUILD TRAINING MODEL Testing helps to create awareness for execution in the event of any disaster or risk. 06 ESTABLISH BENCHMARKS It helps to create awareness among managers, employees and partners in company. Test & Evaluation
  • 24. Q-AI as a Component of Resilience Management CRISIS MANAGEMENT EMERGENCY PREPAREDNESS Impact Strategy Plan Training + Test Emergency Measures Emergency Operations Resume Normal Operations Q-AI
  • 25. Q-AI Cyber Risk Analysis Steps 01 IDENTIFY RISKS • Internal and external risks • Direct and indirect risks • Risks that can and cannot be managed 02 EVALUATE RISKS • Assess risk probability • Assess impact • Assigning and prioritizing risk 03 DESIGN POSSIBLE RISK SCENARIO • IT failure and network collapse • Building damage • Delivery bottlenecks • Loss of employees 04 SELECT RISK STRATEGIES • Acceptance • Transfer • Avoidance • Reduction
  • 26. Strategic Q-AI Framework Q-AI STRESS TESTING Define Identify Assess impact Design changes Execute changes Q-AI CONTINUITY MGMT. Test & maintain Project initiation Identify & impact Design measure Implement MODIFIES & CREATE VALUE SUSTAINS & PRESERVES VALUE

Editor's Notes

  1. CSX IOT, Geospatial, MIPS offloading, Route optimization, mainframe offload, dynamic cargo manifest Our product is used to manage core of CSX business (trains and tracks) Our product allow them to ingest high velocity of train data and faster computation to avoid delays, make better use of tracks by real-time geo-spacial queries. Optimized usage of trains and tracks by crunching real-time data and track usage. - This is a use case of predictive maintenance. CSX in realtime ingests 100,000's of sensor samples from different trains. - Each sensor has temperature, vibration, humidity, windspeed, etc. including GSP coordinates. - This data is enhanced with weather information. By combining the sensor data and the weather information they can correlate it to different types of alerts. - This allows them to predict failures before they happen and change the parts on demand reducing maintenance costs by up to 75% per mile. - They initially tried to do this with Apache Storm and Hadoop. They had a 5 minute window with a lot of false positives and inaccurate predictions. - Since they moved to GigaSpaces and to a real-time capability and are getting much higher accuracy of predictions. Speed: 100X performance boost, simulation time reduced from 45 minutes to a few seconds 24,000 miles of track in 23 states Additional Satisfaction: Prod Since 2014 Ingestion: 1000’s Intermodals / Day, 55k / week NBC: Network Basic Classing. Train Route Simulations.  CRIS: Customer Relations Applications: ↓Mainframe Costs NAS: Notification & Shipping. Container Customer UX Predictive Maintenance: ↓ Maintenance cost: 75% / mile. Sensor Data: temperature, vibration, humidity, windspeed, GPS... TrainSpace- Trip Plan Automation: 100% GigaSpaces Logic & Code Optimized Combination: Yard, Car, Intermodal, Destination, Schedule