SlideShare a Scribd company logo
XVIIIth Airborne Corps -
Enterprise Data Management
John Welby, CEO & Chief Strategist/Warfighter-Support, LLC
john@warfighter-support.com
Mobile: +1 919/247.7891
****** Warfighter-Support, LLC Confidential*******9/29/2016 1
Agenda
• The “New Data World”
• Current Systems (Discuss)
• Define Types of Storage
• Big Data Analytics (BDA) Primer
• BDA for Strategic, Operations & Tactical Intelligence
• Components of BDA/Enterprise Data Management
****** Warfighter-Support, LLC Confidential*******9/29/2016 2
Army Challenges
• Policy
• Laws
• Culture
• Access to Resources from Secure Mobile Devices
****** Warfighter-Support, LLC Confidential*******9/29/2016 3
Project Goals & Background
• Design, test and implement a common user experience across
echelons, formations and phases [integrate w/ SOCOM’s TACLAN]
• Solutions for supporting smaller combat teams
• Extend services to tactical edge [integrate w/ Digital Edge
program]
• Deploy Small Teams Anywhere in the World in Austere
Environments
• Self-Defending Networks
• Everything into the Cloud
****** Warfighter-Support, LLC Confidential*******9/29/2016 4
Project Optimization w/ MAPR
• Most Reliable Hadoop Solution
• Unique Globalization Architecture
• Scales in size for very large data center deployment [CENTCOM] to smaller
deployments [FOB] to very small [Forward Deployed Personnel]
• Information is available to harness, store, analyze and use to increase mission
performance
• “The Perfect Big Data Platform”
• Hadoop / NoSQL / SQL-on-Hadoop
****** Warfighter-Support, LLC Confidential*******9/29/2016 5
Project Goals & Background
• Network-Enable:
• 24/7 Situational Awareness
• Reachback
• “Project, People, & Technology”
• Ramp Up to Support the Warfighter
• Codify Home Station Missions
• Moving Mobility Down to the Field (e.g. A/D running in vehicles)
• Level of Acceptable Risk Assessments
• Always ON Global Infrastructure
• Theater Intelligence Command  (6) Combatant Commander  Intel feeds to
Home
• Military Utility or Internet of Things (IoT) – sensors on everything
(vehicles/facilities/soldiers
****** Warfighter-Support, LLC Confidential*******9/29/2016 6
System Requirements (per XVIIIth)
Current Tactical Field Communications Kit Upgrade Req’s
More powerful / additional capabilities
Lighter (current system approx. 500lbs)
Support up to 20 paratroopers
Satellite communications
LMR voice
Active Directory
Email
Storage
Self-Contained Power
****** Warfighter-Support, LLC Confidential*******9/29/2016 7
Types of Storage
Definition of Terms
Benefits to XVIIIth Airborne
Questions to Ask
****** Warfighter-Support, LLC Confidential*******9/29/2016 8
“Hot” / “Warm” / “Cold” Storage
• Hot storage is storage used for frequently accessed data that
can be accessed very quickly. An example is Flash Array
Storage.
• Warm storage is storage with medium IOPS & medium BW
such as hard disk drives.
• Cold storage is storage used for infrequently accessed data.
An example is magnetic tape.
****** Warfighter-Support, LLC Confidential*******9/29/2016 9
What is Big Data?
****** Warfighter-Support, LLC Confidential*******9/29/2016 10
Big Data is…
• Big data is a broad term for data sets so large or complex
that traditional data processing applications are inadequate.
Challenges include analysis, capture, curation,
search, sharing, storage, transfer, visualization,
and information privacy. The term often refers simply to the
use of predictive analytics or other certain advanced
methods to extract value from data, and seldom to a
particular size of data set.
Source: Wikipedia
****** Warfighter-Support, LLC Confidential*******9/29/2016 11
Big Data Analytics
• The Army, like any other entity, generates terabytes &
petabytes of data daily.
• U.S. intelligence agencies and the military are increasingly
leveraging analytics platforms based on machine learning to
sift through data sources like social media. In the vernacular
of the Pentagon, these efforts are generally referred to as
open source intelligence initiatives.
• U.S. intelligence community is spending billions of dollars on
geospatial intelligence
****** Warfighter-Support, LLC Confidential*******9/29/2016 12
Machine Data (aka log data)
Intelligence Data
• Full-Motion Drop-Zone Video
• Video Analytics
• Logs
• Image Processing
• Geo-Spatial Processing
• Graph Analytics
• Text Processing
• Sentiment Analysis
“Maintenance” Data
• Hardware & Software Inventory
• Software Version
• Patch Updates
• End-of-Life Information
• Supply Levels
• Vehicle Maintenance Records
• Compliance Information
****** Warfighter-Support, LLC Confidential*******9/29/2016 13
Gleaning Strategic, Operational & Tactical
Intelligence from Machine Data
• One of the biggest challenges for intelligence analysts is the
soaring volume of unstructured open source data as the bad
guys resort to Facebook and Twitter to communicate and
recruit.
• Employ Splunk, MAPR on Cisco UCS to store, analyze,
package and disseminate timely, actionable intel to
Commanders.
****** Warfighter-Support, LLC Confidential*******9/29/2016 14
Benefits of Next Generation Army Network
• Turn data into actionable information – unified, timely
information and predictions
• Assure the 18th’s creed, “America’s Contingency, Anywhere in 18
hours” is fulfilled with maximum impact, consistency,
transparency, reliability and effectiveness
• Focus resources intelligently by putting them in the right place,
on the right day and at the right time
• Results rigorously measured and commanders held accountable
for their performance
• More effectively interface with Allies and Conventional Forces
Some info on following slides taken from CW5 Rick Pina’s Keynote Address at WWT Geek Day (May 2015)
****** Warfighter-Support, LLC Confidential*******9/29/2016 15
Benefits of Next Generation Army Network
• Create “Commanders Risk Reduction Dashboard”
• consolidate info from multiple Army databases
• Soldiers can’t move if “at risk1”
• Company & Battalion Commanders (28 feeds)
• Cyber Network Security
• capture every packet and analyze later
• Tactical Operational Center (TOC)
• Mobile applications reside in TOC
• Secure delivery of mobile applications
• Working with DISA on Army App Store (DISA has its own App Store)
****** Warfighter-Support, LLC Confidential*******9/29/2016 16
Benefits of Next Generation Army Network
• DISA is partnering with Army and Air Force to change the way DoD
secures and protects information networks
• Firewall/Intrusion Detection/Enterprise Management/VRF/Big Data Analytics
• Partner with and take advantage of DISA’s upgrade of DISN:
• Global Infrastructure – 100Gb Fiber
• All Installations = 10Gb connections
• Major Installations = 20Gb connections
• Security Upgrades/Consolidation w/ Joint Regional Security Stacks
[JRSS]
• 25 Top-Level Architecture [TLA] Stacks (* future, now approx. 1000 stacks)
****** Warfighter-Support, LLC Confidential*******9/29/2016 17
Benefits of Next Generation Army Network
• Big Data Support Down-Range
[adding additional capabilities leveraging existing infrastructure]
• Commercial Satellites
• Wideband Satellites
• Line-of-Sight Microwave
• Distributed Nodes
• 4G Wireless
****** Warfighter-Support, LLC Confidential*******9/29/2016 18
Questions to Ask
• What Army programs are already in play / can we leverage?
• Collaborate with partners that have performed in the past [IGOV]
• Where is XVIIIth/Army in current program lifecycle?
• What is the key mission challenge(s) to solve?
• What if the XVIIIth had access to data it currently cannot access?
• What “other” data will enhance XVIIIth’s mission?
• What existing capabilities do we have now?
• What is the state of my data, the data I want to “predict” from?
****** Warfighter-Support, LLC Confidential*******9/29/2016 19
Questions to Ask
• What do we get for the cost, what do we need?
[Spend more $$$ for pre-packaged or build what you need]
****** Warfighter-Support, LLC Confidential*******9/29/2016 20
ADVANTAGE DIS-ADVANTAGE COMMENT
Pre-Packaged End-to-
End Solution
More $$$
Requires fewer in-
house resources &
expertise
A Platform for Building
Less $$$
More Flexibility
Requires resources to
build & customize
More legwork but you
are not paying for stuff
you don’t need
How Do We Harness BDA?
• Turn data into actionable information – unified, timely
information and predictions
• Help missions to have greater impact, consistency,
transparency, reliability and effectiveness
****** Warfighter-Support, LLC Confidential*******9/29/2016 21
Enterprise Data Management
Components
Cisco UCS
Hadoop
MapR
Splunk
****** Warfighter-Support, LLC Confidential*******9/29/2016 22
Cisco UCS Reference Architecture
• UCS C220/C240 M4 Servers
• Nexus 2232 Fabric Extenders
• UCS 6200 Series Fabric Interconnect
****** Warfighter-Support, LLC Confidential*******9/29/2016 23
MapR Technologies, Inc.
• MapR Distribution is the combination of a tremendous
amount of innovation in which MapR participates as part
of the Apache Open Source Community along with MapR’s
innovative data platform and management control system.
****** Warfighter-Support, LLC Confidential*******9/29/2016 24
MapR Improvements
hadoop Distributed File System
• Many limitations with HDFS
• Java Virtual Machine (JVM)
issues
• Single point-of-failure
• Read-and-Append only file
systems (not R/W)
MapR-FS
• Native NFS support – any
application that can read/write
to an NFS mount can plug into
this architecture
• No single point-of-failure (C++)
• Application data is
automatically replicated
****** Warfighter-Support, LLC Confidential*******9/29/2016 25
MapR Security
• Pluggable security model
• Linux pluggable authentication modules (PAMs)
• Kerberos is an option1
1Not optimal for long-running jobs
****** Warfighter-Support, LLC Confidential*******9/29/2016 26
MapR – Zeta Application Architecture
• Simplifies
• Data Protection Schemes
• How to Backup Data
• Failure Recovery
• Running Multiple Instances of Software
• Better hardware utilization = lower OpEx
• Google runs on a Zeta Architecture
(over 2 Billion container deployments/week)
****** Warfighter-Support, LLC Confidential*******9/29/2016 27
MapR and hadoop
• MapR works with and adopts open-source community
developments into an integrated solution offering
• hadoop is a scalable centralized data hub / distribution
solution
• Runs same problem on multiple computers
• Uses new more flexible tools and existing tools
****** Warfighter-Support, LLC Confidential*******9/29/2016 28
Benefits of MapR and hadoop
• Faster time-to-value
• Smaller hardware footprint (COTS hardware)
• Reliability
• Real snapshots for data versioning, data protection & mirroring (DR)
• hadoop is a scalable centralized data hub
• Runs work/same problem on multiple computers
• Uses new more flexible tools and existing tools
****** Warfighter-Support, LLC Confidential*******9/29/2016 29
MapR
• “Traditional” Data Warehouse
accepts:
• SQL data
• MapR w/ hadoop:
• SQL
• Machine-learned data
• Video Analytic data
• Relational Schemas
• Files
• Logs
• Click Streams
• Geo-Spatial data
• Sentiment Analysis
• WASP scanner data
• KACE inventory data
****** Warfighter-Support, LLC Confidential*******9/29/2016 30
This architecture allows scaling
up to Google’s level.
****** Warfighter-Support, LLC Confidential*******
Google’s Example
9/29/2016 31
MapR and Big Data Analytics
in Action
****** Warfighter-Support, LLC Confidential*******9/29/2016 32
****** Warfighter-Support, LLC Confidential*******
AADHAAR
In the course of attaining the milestone of 600 million users, the
Aadhaar technology backend has become the largest biometric identity
repository in the world and the first to provide an online, anytime
anywhere, multi-factor authentication service. A strong technology
foundation based on open architecture enabled the rapid evolution of
the Aadhaar system. It was important to document all aspects of
Aadhaar technology and make it available in public domain. The three
white papers published by the UIDAI Technology Centre fulfill this need.
9/29/2016 33
A partnership model – UIDAI approach leverages the existing infrastructure of
government and private agencies across India. The UIDAI is the regulatory
authority managing a Central Identity Data Repository (CIDR), which will issue
Aadhaar numbers, update resident information, and authenticate the identity of
residents as required. UIDAI partners with agencies such as central and state
departments who are the 'Registrars' for the UIDAI. Registrars conduct the
enrollment camps using UIDAI software and procedures, upload the encrypted
enrolment data to the CIDR to de-duplicate resident information, and help seed
the Aadhaar number into their beneficiary databases.
****** Warfighter-Support, LLC Confidential*******
AADHAAR Strategy
9/29/2016 34
• Process to ensure no duplicates – Registrars send the applicant's encrypted
data packet to the UIDAI data centers for de-duplication. Aadhaar enrollment
system performs a search on key demographic fields and on the biometrics
for each new enrolment, to ensure uniqueness.
• Process to keep data up to date – Incentives in the Aadhaar system are
aligned towards a self-cleaning mechanism. The existing patchwork of
multiple databases in India gives individuals the incentive to provide different
personal information to different agencies. Since de-duplication in the
Aadhaar system ensures that residents have only one chance to be in the
database, individuals are incentivized to provide accurate data. This incentive
becomes especially powerful as benefits and entitlements are linked to the
Aadhaar number. Regular usage of identity across many services naturally
incentivizes the resident to keep Aadhaar system up to date.
****** Warfighter-Support, LLC Confidential*******
AADHAAR Strategy
9/29/2016 35
• Online authentication – UIDAI offers a strong form of online
authentication. When residents wanting to avail a service require
identity/address verification, agencies can compare demographic and
biometric information of the resident with the record stored in the
central database.
• Technology undergirds the UIDAI system – Technology systems have a
major role across the UIDAI infrastructure. Large scale biometric de-
duplication, online authentication, data security, analytics, etc require
well designed, secure, and scalable systems.
****** Warfighter-Support, LLC Confidential*******
AADHAAR Strategy
9/29/2016 36
Splunk
****** Warfighter-Support, LLC Confidential*******9/29/2016 37
****** Warfighter-Support, LLC Confidential*******
GPS, RFID, Hypervisor, Web
Servers, Email, Messaging,
Clickstreams, Mobile,
Telephony, IVR, Databases
Report and
analyze
Custom
dashboards
Monitor
and alert
Ad hoc
search
Real-time
Machine Data
Sensors, Telematics,
Storage, Servers,
Security devices,
Desktops, CDRs
Developer
Platform
External Lookups
Troop/Supply/
Geo-Spatial
Info
Network
Segments /
Honeypots
Data
stores
Splunk, The Platform For Machine Data
9/29/2016 38
Splunk App for Enterprise Security
Pre-built searches, alerts, reports, dashboards, threat intel feeds, workflow
Incident Investigations & Management
39
Dashboards and Reports
Statistical Outliers Asset and Identity Aware
9/29/2016 ****** Warfighter-Support, LLC Confidential******* 39
Splunk
• Provides a More Complete View of Threat Landscape
• US Army Authorized Splunk with Certificate of Networthiness (CoN)
• Real-time search and analysis of terabytes of data across the Army’s IT
infrastructure.
• Patented Time-Services Indexing Technology (borrowed from MapReduce1)
• The Army and approximately 70% of all US federal agencies rely on Splunk for
real-time visibility of their IT data for security, compliance and application
availability
• Splunk App for FISMA
• Used by the DOJ and NASA
1Please reference Appendix for MapReduce information.
****** Warfighter-Support, LLC Confidential*******9/29/2016 40
Splunk on SIPR
• Army Enterprise Certificate of Net Worthiness
• Networthiness Certification applies to all organizations fielding, using, or managing ISs on the Army Enterprise
Architecture/LandWarNet (LWN), to include Commercial Off-the-Shelf (COTS) and Government Off-the- Shelf (GOTS).
• In accordance with AR 25-1, paragraph 6-8 activities must obtain a Certificate of Networthiness (CoN) before they
connect hardware/software to the LWN.
• Therefore, Splunk does not need to go through JITC.
• Over 50 U.S. Army customers using Splunk
****** Warfighter-Support, LLC Confidential*******9/29/2016 41
Splunk FISMA App1
42
42
1Based on NIST 800-53 Rev 3
9/29/2016 ****** Warfighter-Support, LLC Confidential*******
Licensing Splunk
• Based on how much [new] data Splunk indexes in a 24-hr
period
• Data is ingested into Splunk once and goes against data licensed; Data indexing, manipulation
and modeling thereafter is unlimited. There is only one charge per unit of data.
• Overages do not “turn off” your system.
• License Enforcement (30-day period)
• 1st overage  message to admin
• 2nd overage  message to admin
• 3rd overage  message to admin
• 4th overage  message to admin
• 5th overage  correlator is turned off
• Contact Splunk Account Manager or Systems Engineer to get a “reset key.” No charge, the intent is to spur a conversation
between 18th Airborne and Splunk regarding capacity planning.
• Theoretically, can exceed license 48x/year w/out contacting Splunk.
****** Warfighter-Support, LLC Confidential*******9/29/2016 43
Leidos
• Information Dominance / Command and Control
• Consistently ranked among the top federal systems integration contractors, Leidos is the company
that "pulls it all together" for U.S. forces and allies. As the lead integrator for the Global Command
and Control System (GCCS), for example, we help give warfighters an integrated picture of the
battlespace and commanders greater capability to deploy a U.S. fighting force around the globe at
any time and provide it with the information and direction to complete its mission.
• As the military's key command, control, computing, communications, and intelligence (C4I)
system, the GCCS uses the Defense Information Infrastructure Common Operating Environment
(DII COE) to support joint warfighting needs. Helping to ensure that C4I maintains its pace with
technology, Leidos leads several significant projects to bring leading edge DII COE-compliant
technologies to the GCCS community. These include Defense Advanced Research Projects Agency
(DARPA) efforts supporting senior levels of command, such as the National Command Authority
and Joint Staff, down through Joint Task Force Commanders and service components, such as the
Marine Corps' Chemical/Biological Warfare Incident Response Force.
****** Warfighter-Support, LLC Confidential*******9/29/2016 44
Wrapping it Up…
****** Warfighter-Support, LLC Confidential*******9/29/2016 45
The Solution
• Cisco UCS is the hardware platform
• MapR – “hadoop in a box” w/ Zeta architecture
• Hadoop [can be used to] provide the file system and
programming platform.
• Splunk is the “search engine on steroids.”
• Splunk and MapR “make Hadoop easier.”
• Overcomes the Big Data skills gap
****** Warfighter-Support, LLC Confidential*******9/29/2016 46
Use Cases
Combat & Command
• Timely & Applicable Intel for
cutting orders
• Policies
• Blend troop movement w/
SitReps, historical intel, Sat
images, UAV data and provide to
commanders on a single pane of
glass
Company
• True Numbers
• Data Validity
• Add Info
****** Warfighter-Support, LLC Confidential*******9/29/2016 47
Wrapping it up…
• Big Data Analytics will enable the 18th Airborne Corps to
gather, store, analyze machine data efficiently and
effectively to increase mission success and potentially
save lives.
• Machine data such as UAV images, HUMINT and social
media data is stored in a Cloudera Enterprise Hub,
extracted into Splunk [or Hadoop], Transformed in Splunk
[or Hadoop], and searched [by Splunk] and presented in a
usable form that becomes actionable intelligence.
****** Warfighter-Support, LLC Confidential*******9/29/2016 48
Thank You!
****** Warfighter-Support, LLC Confidential*******9/29/2016 49
Additional Technologies
• LISP – Locator ID Separation Protocol
• “MAC in MAC” routing
• Natively supports Equal Cost Multi-Path routing (Dijkstra’s SPF algorithm)
• Alternative to running Spanning Tree
• IS-IS for Layer 2 switching – computes SPT
• Splits Locator info from Identifier
• Locator  Endpoint ID  Overlay
****** Warfighter-Support, LLC Confidential*******9/29/2016 50
Locator/ID Split and LISP
• Addresses today combine location and identity semantics in a single 32-bit or 128-bit number
• Separating Location and Identity changes this…
• Provide a clear separation at the Network Layer between
what we are looking for vs. how best to get there
• Translation vs. Tunneling is a key question
• Network Layer Identifier: WHO you are in the network
• long-term binding to the thing that they name, does not change often at all
• Network Layer Locator: WHERE you are in the network
• Think of the source and destination “addresses” used in routing and forwarding
• WHERE you are can change WHO you are should be the same
****** Warfighter-Support, LLC Confidential*******9/29/2016 51
Appendix
****** Warfighter-Support, LLC Confidential*******9/29/2016 52
Training Requirements
****** Warfighter-Support, LLC Confidential*******9/29/2016 53
Training Recommendations - Splunk
Function Course Title
Education /Experience
Delivery
Duration
(hours)
Administrator
For Splunk
Administrators
Some college preferred/some
network administration
experience preferred
eLearning/WBT/
Instructor-led
51.5
Architect
For Splunk
Architects
Associates Degree,
Network/Programming
experience
eLearning/WBT/
Instructor-led 78.5
Info Sec
For Enterprise
Security Customers
Associates Degree,
Network/Security/Programming
experience
eLearning/WBT/
Instructor-led 83.5
****** Warfighter-Support, LLC Confidential*******9/29/2016 54
Training Recommendations - MapR
Function Course Title
Education /Experience
Delivery
Duration
(hours)
Administrator
Some college preferred/some
network administration
experience preferred
eLearning/WBT/
Instructor-led
Architect
Associates Degree,
Network/Programming
experience
eLearning/WBT/
Instructor-led
Info Sec
Associates Degree,
Network/Security/Programming
experience
eLearning/WBT/
Instructor-led
****** Warfighter-Support, LLC Confidential*******9/29/2016 55
****** Warfighter-Support, LLC Confidential*******9/29/2016 56
Digital Forensic Tools
****** Warfighter-Support, LLC Confidential*******9/29/2016 57
Digital Forensic Tools
• Dshell – Army internal analysis
framework using Python running
on Linux.
• Purpose – help analysts
investigate compromises within
their environments
• Cisco’s OpenSOC Security
Analytics Framework.
• Designed to consume and
monitor massive amounts of
network traffic and machine
“exhaust” data of a Data Center.
• Network analysis plug-in
available to analyze network
traffic at multiple layers of the
OSI stack.
****** Warfighter-Support, LLC Confidential*******9/29/2016 58
Digital Forensic Tools
• AccessData’s Forensic Toolkit (FTK)
• Support for Microsoft’s Volume
Shadow Copy (VSC)
• Retrieve metadata for deleted files
• Chronology of how documents,
user activity, programs changed
over time
• Geomapping – data virtualization
feature
Use Case:
• Retrieving information after a disk
has been wiped clean by an anti-
forensics tool
• After cleaning the HD showed no
evidence of the proprietary data
• Examining VSCs allowed recovery
of destroyed Registry files that
proved the proprietary data had
been accessed
****** Warfighter-Support, LLC Confidential*******9/29/2016 59
Hadoop’s MapReduce Technology
****** Warfighter-Support, LLC Confidential*******
• Hadoop MapReduce is a software framework for easily writing
applications which process vast amounts of data (multi-terabyte
data-sets) in-parallel on large clusters (thousands of nodes) of
commodity hardware in a reliable, fault-tolerant manner.
• A MapReduce job usually splits the input data-set into
independent chunks which are processed by the map tasks in a
completely parallel manner. The framework sorts the outputs of
the maps, which are then input to the reduce tasks. Typically
both the input and the output of the job are stored in a file-
system. The framework takes care of scheduling tasks,
monitoring them and re-executes the failed tasks.
9/29/2016 60
Hadoop
• A Distributed, Fault-Tolerant Framework for Storing and
Analyzing Data. Composed of:
1. Hadoop File System (HDFS)
2. MapReduce Application Engine / Programming Framework
• Allows code to be written that Hadoop can process in a massively parallel
way.
• Very broadly distributed, very efficient programming and storage
of LARGE datasets.
• Hadoop does the heavy-lifting and batch processing of the
MASSIVE amounts of data.
****** Warfighter-Support, LLC Confidential*******9/29/2016 61
Big Data Extract, Transform & Load (ETL)
KACE
Inventory
Data
WASP
Scanner
Data
****** Warfighter-Support, LLC Confidential*******9/29/2016 62

More Related Content

What's hot

Netapp online training-30Hours Classes, 30Hours Lab,Assignments, Project
Netapp online training-30Hours Classes, 30Hours Lab,Assignments, ProjectNetapp online training-30Hours Classes, 30Hours Lab,Assignments, Project
Netapp online training-30Hours Classes, 30Hours Lab,Assignments, Project
Vidhyalive
 
All-Flash Versus Hybrid VMware Virtual SAN™: Performance vs. Price
All-Flash Versus Hybrid VMware Virtual SAN™: Performance vs. Price All-Flash Versus Hybrid VMware Virtual SAN™: Performance vs. Price
All-Flash Versus Hybrid VMware Virtual SAN™: Performance vs. Price
Western Digital
 
Data OnTAP Cluster Mode Administrator
Data OnTAP Cluster Mode AdministratorData OnTAP Cluster Mode Administrator
Data OnTAP Cluster Mode Administrator
Archana Parameshwari
 
Technical Report NetApp Clustered Data ONTAP 8.2: An Introduction
Technical Report NetApp Clustered Data ONTAP 8.2: An IntroductionTechnical Report NetApp Clustered Data ONTAP 8.2: An Introduction
Technical Report NetApp Clustered Data ONTAP 8.2: An Introduction
NetApp
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation new
Jennifer Graham
 
Huawei Symantec Oceanspace N8000 clustered NAS Overview
Huawei Symantec Oceanspace N8000 clustered NAS OverviewHuawei Symantec Oceanspace N8000 clustered NAS Overview
Huawei Symantec Oceanspace N8000 clustered NAS Overview
Utopia Media
 
Storage Cloud and Spectrum presentation
Storage Cloud and Spectrum presentationStorage Cloud and Spectrum presentation
Storage Cloud and Spectrum presentation
Joe Krotz
 
Vnx mr presentation kenny pool
Vnx mr presentation kenny poolVnx mr presentation kenny pool
Vnx mr presentation kenny pool
EMC Nederland
 
Netapp Storage
Netapp StorageNetapp Storage
Netapp Storage
Prime Infoserv
 
Vortrag ralph behrens_ibm-data
Vortrag ralph behrens_ibm-dataVortrag ralph behrens_ibm-data
Vortrag ralph behrens_ibm-data
Aravindharamanan S
 
IBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA DeploymentsIBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA Deployments
Paula Koziol
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introduction
IBM Danmark
 

What's hot (12)

Netapp online training-30Hours Classes, 30Hours Lab,Assignments, Project
Netapp online training-30Hours Classes, 30Hours Lab,Assignments, ProjectNetapp online training-30Hours Classes, 30Hours Lab,Assignments, Project
Netapp online training-30Hours Classes, 30Hours Lab,Assignments, Project
 
All-Flash Versus Hybrid VMware Virtual SAN™: Performance vs. Price
All-Flash Versus Hybrid VMware Virtual SAN™: Performance vs. Price All-Flash Versus Hybrid VMware Virtual SAN™: Performance vs. Price
All-Flash Versus Hybrid VMware Virtual SAN™: Performance vs. Price
 
Data OnTAP Cluster Mode Administrator
Data OnTAP Cluster Mode AdministratorData OnTAP Cluster Mode Administrator
Data OnTAP Cluster Mode Administrator
 
Technical Report NetApp Clustered Data ONTAP 8.2: An Introduction
Technical Report NetApp Clustered Data ONTAP 8.2: An IntroductionTechnical Report NetApp Clustered Data ONTAP 8.2: An Introduction
Technical Report NetApp Clustered Data ONTAP 8.2: An Introduction
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation new
 
Huawei Symantec Oceanspace N8000 clustered NAS Overview
Huawei Symantec Oceanspace N8000 clustered NAS OverviewHuawei Symantec Oceanspace N8000 clustered NAS Overview
Huawei Symantec Oceanspace N8000 clustered NAS Overview
 
Storage Cloud and Spectrum presentation
Storage Cloud and Spectrum presentationStorage Cloud and Spectrum presentation
Storage Cloud and Spectrum presentation
 
Vnx mr presentation kenny pool
Vnx mr presentation kenny poolVnx mr presentation kenny pool
Vnx mr presentation kenny pool
 
Netapp Storage
Netapp StorageNetapp Storage
Netapp Storage
 
Vortrag ralph behrens_ibm-data
Vortrag ralph behrens_ibm-dataVortrag ralph behrens_ibm-data
Vortrag ralph behrens_ibm-data
 
IBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA DeploymentsIBM Storage for SAP HANA Deployments
IBM Storage for SAP HANA Deployments
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introduction
 

Viewers also liked

Discurso político religioso pronunciado por el presbitero Jose María Nava en ...
Discurso político religioso pronunciado por el presbitero Jose María Nava en ...Discurso político religioso pronunciado por el presbitero Jose María Nava en ...
Discurso político religioso pronunciado por el presbitero Jose María Nava en ...
Jhonny Antelo Films
 
Sports england roundtable oct 2015 herts physical activity framework
Sports england roundtable oct 2015 herts physical activity frameworkSports england roundtable oct 2015 herts physical activity framework
Sports england roundtable oct 2015 herts physical activity framework
Professor Jim McManus AFBPsS,FFPH,CSci, FRSB, CPsychol
 
500BurntBridgeReport
500BurntBridgeReport500BurntBridgeReport
500BurntBridgeReportchris benston
 
Digital, Social and Mobile in 2015
Digital, Social and Mobile in 2015Digital, Social and Mobile in 2015
Digital, Social and Mobile in 2015
Can Bakir
 
8 ways to burn your fat
8 ways to burn your fat8 ways to burn your fat
8 ways to burn your fat
Eric Cheung
 
Severo Fernández Alonso: Cuarto aniversario del 28 de noviembre de 1870
Severo Fernández Alonso: Cuarto aniversario del 28 de noviembre de 1870Severo Fernández Alonso: Cuarto aniversario del 28 de noviembre de 1870
Severo Fernández Alonso: Cuarto aniversario del 28 de noviembre de 1870
Jhonny Antelo Films
 
MMS2012-HP VirtualSystem-The Ideal Foundation for a Microsoft Private Cloud
MMS2012-HP VirtualSystem-The Ideal Foundation for a Microsoft Private CloudMMS2012-HP VirtualSystem-The Ideal Foundation for a Microsoft Private Cloud
MMS2012-HP VirtualSystem-The Ideal Foundation for a Microsoft Private CloudHarold Sriver
 
Act 1.8
Act 1.8Act 1.8
Act 1.8
sofi1907
 
Conte nn ido ingles i 90008a 290
Conte nn ido ingles i 90008a 290Conte nn ido ingles i 90008a 290
Conte nn ido ingles i 90008a 290
Cruz_Felipe Rodriguez Pulido
 
8 tips on your vacation to hawaii
8 tips on your vacation to hawaii8 tips on your vacation to hawaii
8 tips on your vacation to hawaii
Susanna Hall
 
Leitor Honewell Eclipse MS 5145 (MK5145)
Leitor Honewell Eclipse MS 5145 (MK5145)Leitor Honewell Eclipse MS 5145 (MK5145)
Leitor Honewell Eclipse MS 5145 (MK5145)
Bz Tech
 
6 Daily Actions for Prosperity & Productivity
6 Daily Actions for Prosperity & Productivity6 Daily Actions for Prosperity & Productivity
6 Daily Actions for Prosperity & Productivity
Honorée Corder
 

Viewers also liked (13)

Discurso político religioso pronunciado por el presbitero Jose María Nava en ...
Discurso político religioso pronunciado por el presbitero Jose María Nava en ...Discurso político religioso pronunciado por el presbitero Jose María Nava en ...
Discurso político religioso pronunciado por el presbitero Jose María Nava en ...
 
Sports england roundtable oct 2015 herts physical activity framework
Sports england roundtable oct 2015 herts physical activity frameworkSports england roundtable oct 2015 herts physical activity framework
Sports england roundtable oct 2015 herts physical activity framework
 
500BurntBridgeReport
500BurntBridgeReport500BurntBridgeReport
500BurntBridgeReport
 
Digital, Social and Mobile in 2015
Digital, Social and Mobile in 2015Digital, Social and Mobile in 2015
Digital, Social and Mobile in 2015
 
8 ways to burn your fat
8 ways to burn your fat8 ways to burn your fat
8 ways to burn your fat
 
Severo Fernández Alonso: Cuarto aniversario del 28 de noviembre de 1870
Severo Fernández Alonso: Cuarto aniversario del 28 de noviembre de 1870Severo Fernández Alonso: Cuarto aniversario del 28 de noviembre de 1870
Severo Fernández Alonso: Cuarto aniversario del 28 de noviembre de 1870
 
MMS2012-HP VirtualSystem-The Ideal Foundation for a Microsoft Private Cloud
MMS2012-HP VirtualSystem-The Ideal Foundation for a Microsoft Private CloudMMS2012-HP VirtualSystem-The Ideal Foundation for a Microsoft Private Cloud
MMS2012-HP VirtualSystem-The Ideal Foundation for a Microsoft Private Cloud
 
Act 1.8
Act 1.8Act 1.8
Act 1.8
 
test
testtest
test
 
Conte nn ido ingles i 90008a 290
Conte nn ido ingles i 90008a 290Conte nn ido ingles i 90008a 290
Conte nn ido ingles i 90008a 290
 
8 tips on your vacation to hawaii
8 tips on your vacation to hawaii8 tips on your vacation to hawaii
8 tips on your vacation to hawaii
 
Leitor Honewell Eclipse MS 5145 (MK5145)
Leitor Honewell Eclipse MS 5145 (MK5145)Leitor Honewell Eclipse MS 5145 (MK5145)
Leitor Honewell Eclipse MS 5145 (MK5145)
 
6 Daily Actions for Prosperity & Productivity
6 Daily Actions for Prosperity & Productivity6 Daily Actions for Prosperity & Productivity
6 Daily Actions for Prosperity & Productivity
 

Similar to 18th Airborne Big Data Analytics Tech Brief_June 2 2015

Presentation architecting virtualized infrastructure for big data
Presentation   architecting virtualized infrastructure for big dataPresentation   architecting virtualized infrastructure for big data
Presentation architecting virtualized infrastructure for big datasolarisyourep
 
Presentation architecting virtualized infrastructure for big data
Presentation   architecting virtualized infrastructure for big dataPresentation   architecting virtualized infrastructure for big data
Presentation architecting virtualized infrastructure for big data
xKinAnx
 
Mellanox's Technological Advantage
Mellanox's Technological AdvantageMellanox's Technological Advantage
Mellanox's Technological Advantage
Mellanox Technologies
 
Architecting virtualized infrastructure for big data presentation
Architecting virtualized infrastructure for big data presentationArchitecting virtualized infrastructure for big data presentation
Architecting virtualized infrastructure for big data presentationVlad Ponomarev
 
How DBAs can garner the power of the Oracle Public Cloud?
How DBAs can garner the  power of the Oracle Public  Cloud?How DBAs can garner the  power of the Oracle Public  Cloud?
How DBAs can garner the power of the Oracle Public Cloud?
Gustavo Rene Antunez
 
Data core overview - haluk-final
Data core overview - haluk-finalData core overview - haluk-final
Data core overview - haluk-final
Haluk Ulubay
 
Cloud - NDT - Presentation
Cloud - NDT - PresentationCloud - NDT - Presentation
Cloud - NDT - Presentation
Éric Dusablon
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
Cohesive Networks
 
Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16
Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16 Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16
Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16
Jeff Simpson
 
Key Database Criteria for Cloud Applications
Key Database Criteria for Cloud ApplicationsKey Database Criteria for Cloud Applications
Key Database Criteria for Cloud Applications
NuoDB
 
Model-driven Telemetry: The Foundation of Big Data Analytics
Model-driven Telemetry: The Foundation of Big Data AnalyticsModel-driven Telemetry: The Foundation of Big Data Analytics
Model-driven Telemetry: The Foundation of Big Data Analytics
Cisco Canada
 
Dimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution OfferingDimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution Offering
RifaHaryadi
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIs
Cisco DevNet
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...元 黄
 
MapR 5.2: Getting More Value from the MapR Converged Community Edition
MapR 5.2: Getting More Value from the MapR Converged Community EditionMapR 5.2: Getting More Value from the MapR Converged Community Edition
MapR 5.2: Getting More Value from the MapR Converged Community Edition
MapR Technologies
 
Kaushal Amin & Big 5 IT trends in the world
Kaushal Amin & Big 5 IT trends in the worldKaushal Amin & Big 5 IT trends in the world
Kaushal Amin & Big 5 IT trends in the world
Quang PM
 
Technology Trends and Big Data in 2013-2014
Technology Trends and Big Data in 2013-2014Technology Trends and Big Data in 2013-2014
Technology Trends and Big Data in 2013-2014
KMS Technology
 
Is Your Network Ready?
Is Your Network Ready?Is Your Network Ready?
Is Your Network Ready?
Brocade
 
Ceph@MIMOS: Growing Pains from R&D to Deployment
Ceph@MIMOS: Growing Pains from R&D to DeploymentCeph@MIMOS: Growing Pains from R&D to Deployment
Ceph@MIMOS: Growing Pains from R&D to Deployment
Patrick McGarry
 
Data Storage and Information Management
Data Storage and Information ManagementData Storage and Information Management
Data Storage and Information Management
Christalin Nelson
 

Similar to 18th Airborne Big Data Analytics Tech Brief_June 2 2015 (20)

Presentation architecting virtualized infrastructure for big data
Presentation   architecting virtualized infrastructure for big dataPresentation   architecting virtualized infrastructure for big data
Presentation architecting virtualized infrastructure for big data
 
Presentation architecting virtualized infrastructure for big data
Presentation   architecting virtualized infrastructure for big dataPresentation   architecting virtualized infrastructure for big data
Presentation architecting virtualized infrastructure for big data
 
Mellanox's Technological Advantage
Mellanox's Technological AdvantageMellanox's Technological Advantage
Mellanox's Technological Advantage
 
Architecting virtualized infrastructure for big data presentation
Architecting virtualized infrastructure for big data presentationArchitecting virtualized infrastructure for big data presentation
Architecting virtualized infrastructure for big data presentation
 
How DBAs can garner the power of the Oracle Public Cloud?
How DBAs can garner the  power of the Oracle Public  Cloud?How DBAs can garner the  power of the Oracle Public  Cloud?
How DBAs can garner the power of the Oracle Public Cloud?
 
Data core overview - haluk-final
Data core overview - haluk-finalData core overview - haluk-final
Data core overview - haluk-final
 
Cloud - NDT - Presentation
Cloud - NDT - PresentationCloud - NDT - Presentation
Cloud - NDT - Presentation
 
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 "How overlay networks can make public clouds your global WAN" by Ryan Koop o... "How overlay networks can make public clouds your global WAN" by Ryan Koop o...
"How overlay networks can make public clouds your global WAN" by Ryan Koop o...
 
Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16
Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16 Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16
Jeff Simpson - Cyber Maneuver Warfare and Active Cyber Defense - from ICCWS 16
 
Key Database Criteria for Cloud Applications
Key Database Criteria for Cloud ApplicationsKey Database Criteria for Cloud Applications
Key Database Criteria for Cloud Applications
 
Model-driven Telemetry: The Foundation of Big Data Analytics
Model-driven Telemetry: The Foundation of Big Data AnalyticsModel-driven Telemetry: The Foundation of Big Data Analytics
Model-driven Telemetry: The Foundation of Big Data Analytics
 
Dimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution OfferingDimension Data Cloud Business Unit - Solution Offering
Dimension Data Cloud Business Unit - Solution Offering
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIs
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
 
MapR 5.2: Getting More Value from the MapR Converged Community Edition
MapR 5.2: Getting More Value from the MapR Converged Community EditionMapR 5.2: Getting More Value from the MapR Converged Community Edition
MapR 5.2: Getting More Value from the MapR Converged Community Edition
 
Kaushal Amin & Big 5 IT trends in the world
Kaushal Amin & Big 5 IT trends in the worldKaushal Amin & Big 5 IT trends in the world
Kaushal Amin & Big 5 IT trends in the world
 
Technology Trends and Big Data in 2013-2014
Technology Trends and Big Data in 2013-2014Technology Trends and Big Data in 2013-2014
Technology Trends and Big Data in 2013-2014
 
Is Your Network Ready?
Is Your Network Ready?Is Your Network Ready?
Is Your Network Ready?
 
Ceph@MIMOS: Growing Pains from R&D to Deployment
Ceph@MIMOS: Growing Pains from R&D to DeploymentCeph@MIMOS: Growing Pains from R&D to Deployment
Ceph@MIMOS: Growing Pains from R&D to Deployment
 
Data Storage and Information Management
Data Storage and Information ManagementData Storage and Information Management
Data Storage and Information Management
 

18th Airborne Big Data Analytics Tech Brief_June 2 2015

  • 1. XVIIIth Airborne Corps - Enterprise Data Management John Welby, CEO & Chief Strategist/Warfighter-Support, LLC john@warfighter-support.com Mobile: +1 919/247.7891 ****** Warfighter-Support, LLC Confidential*******9/29/2016 1
  • 2. Agenda • The “New Data World” • Current Systems (Discuss) • Define Types of Storage • Big Data Analytics (BDA) Primer • BDA for Strategic, Operations & Tactical Intelligence • Components of BDA/Enterprise Data Management ****** Warfighter-Support, LLC Confidential*******9/29/2016 2
  • 3. Army Challenges • Policy • Laws • Culture • Access to Resources from Secure Mobile Devices ****** Warfighter-Support, LLC Confidential*******9/29/2016 3
  • 4. Project Goals & Background • Design, test and implement a common user experience across echelons, formations and phases [integrate w/ SOCOM’s TACLAN] • Solutions for supporting smaller combat teams • Extend services to tactical edge [integrate w/ Digital Edge program] • Deploy Small Teams Anywhere in the World in Austere Environments • Self-Defending Networks • Everything into the Cloud ****** Warfighter-Support, LLC Confidential*******9/29/2016 4
  • 5. Project Optimization w/ MAPR • Most Reliable Hadoop Solution • Unique Globalization Architecture • Scales in size for very large data center deployment [CENTCOM] to smaller deployments [FOB] to very small [Forward Deployed Personnel] • Information is available to harness, store, analyze and use to increase mission performance • “The Perfect Big Data Platform” • Hadoop / NoSQL / SQL-on-Hadoop ****** Warfighter-Support, LLC Confidential*******9/29/2016 5
  • 6. Project Goals & Background • Network-Enable: • 24/7 Situational Awareness • Reachback • “Project, People, & Technology” • Ramp Up to Support the Warfighter • Codify Home Station Missions • Moving Mobility Down to the Field (e.g. A/D running in vehicles) • Level of Acceptable Risk Assessments • Always ON Global Infrastructure • Theater Intelligence Command  (6) Combatant Commander  Intel feeds to Home • Military Utility or Internet of Things (IoT) – sensors on everything (vehicles/facilities/soldiers ****** Warfighter-Support, LLC Confidential*******9/29/2016 6
  • 7. System Requirements (per XVIIIth) Current Tactical Field Communications Kit Upgrade Req’s More powerful / additional capabilities Lighter (current system approx. 500lbs) Support up to 20 paratroopers Satellite communications LMR voice Active Directory Email Storage Self-Contained Power ****** Warfighter-Support, LLC Confidential*******9/29/2016 7
  • 8. Types of Storage Definition of Terms Benefits to XVIIIth Airborne Questions to Ask ****** Warfighter-Support, LLC Confidential*******9/29/2016 8
  • 9. “Hot” / “Warm” / “Cold” Storage • Hot storage is storage used for frequently accessed data that can be accessed very quickly. An example is Flash Array Storage. • Warm storage is storage with medium IOPS & medium BW such as hard disk drives. • Cold storage is storage used for infrequently accessed data. An example is magnetic tape. ****** Warfighter-Support, LLC Confidential*******9/29/2016 9
  • 10. What is Big Data? ****** Warfighter-Support, LLC Confidential*******9/29/2016 10
  • 11. Big Data is… • Big data is a broad term for data sets so large or complex that traditional data processing applications are inadequate. Challenges include analysis, capture, curation, search, sharing, storage, transfer, visualization, and information privacy. The term often refers simply to the use of predictive analytics or other certain advanced methods to extract value from data, and seldom to a particular size of data set. Source: Wikipedia ****** Warfighter-Support, LLC Confidential*******9/29/2016 11
  • 12. Big Data Analytics • The Army, like any other entity, generates terabytes & petabytes of data daily. • U.S. intelligence agencies and the military are increasingly leveraging analytics platforms based on machine learning to sift through data sources like social media. In the vernacular of the Pentagon, these efforts are generally referred to as open source intelligence initiatives. • U.S. intelligence community is spending billions of dollars on geospatial intelligence ****** Warfighter-Support, LLC Confidential*******9/29/2016 12
  • 13. Machine Data (aka log data) Intelligence Data • Full-Motion Drop-Zone Video • Video Analytics • Logs • Image Processing • Geo-Spatial Processing • Graph Analytics • Text Processing • Sentiment Analysis “Maintenance” Data • Hardware & Software Inventory • Software Version • Patch Updates • End-of-Life Information • Supply Levels • Vehicle Maintenance Records • Compliance Information ****** Warfighter-Support, LLC Confidential*******9/29/2016 13
  • 14. Gleaning Strategic, Operational & Tactical Intelligence from Machine Data • One of the biggest challenges for intelligence analysts is the soaring volume of unstructured open source data as the bad guys resort to Facebook and Twitter to communicate and recruit. • Employ Splunk, MAPR on Cisco UCS to store, analyze, package and disseminate timely, actionable intel to Commanders. ****** Warfighter-Support, LLC Confidential*******9/29/2016 14
  • 15. Benefits of Next Generation Army Network • Turn data into actionable information – unified, timely information and predictions • Assure the 18th’s creed, “America’s Contingency, Anywhere in 18 hours” is fulfilled with maximum impact, consistency, transparency, reliability and effectiveness • Focus resources intelligently by putting them in the right place, on the right day and at the right time • Results rigorously measured and commanders held accountable for their performance • More effectively interface with Allies and Conventional Forces Some info on following slides taken from CW5 Rick Pina’s Keynote Address at WWT Geek Day (May 2015) ****** Warfighter-Support, LLC Confidential*******9/29/2016 15
  • 16. Benefits of Next Generation Army Network • Create “Commanders Risk Reduction Dashboard” • consolidate info from multiple Army databases • Soldiers can’t move if “at risk1” • Company & Battalion Commanders (28 feeds) • Cyber Network Security • capture every packet and analyze later • Tactical Operational Center (TOC) • Mobile applications reside in TOC • Secure delivery of mobile applications • Working with DISA on Army App Store (DISA has its own App Store) ****** Warfighter-Support, LLC Confidential*******9/29/2016 16
  • 17. Benefits of Next Generation Army Network • DISA is partnering with Army and Air Force to change the way DoD secures and protects information networks • Firewall/Intrusion Detection/Enterprise Management/VRF/Big Data Analytics • Partner with and take advantage of DISA’s upgrade of DISN: • Global Infrastructure – 100Gb Fiber • All Installations = 10Gb connections • Major Installations = 20Gb connections • Security Upgrades/Consolidation w/ Joint Regional Security Stacks [JRSS] • 25 Top-Level Architecture [TLA] Stacks (* future, now approx. 1000 stacks) ****** Warfighter-Support, LLC Confidential*******9/29/2016 17
  • 18. Benefits of Next Generation Army Network • Big Data Support Down-Range [adding additional capabilities leveraging existing infrastructure] • Commercial Satellites • Wideband Satellites • Line-of-Sight Microwave • Distributed Nodes • 4G Wireless ****** Warfighter-Support, LLC Confidential*******9/29/2016 18
  • 19. Questions to Ask • What Army programs are already in play / can we leverage? • Collaborate with partners that have performed in the past [IGOV] • Where is XVIIIth/Army in current program lifecycle? • What is the key mission challenge(s) to solve? • What if the XVIIIth had access to data it currently cannot access? • What “other” data will enhance XVIIIth’s mission? • What existing capabilities do we have now? • What is the state of my data, the data I want to “predict” from? ****** Warfighter-Support, LLC Confidential*******9/29/2016 19
  • 20. Questions to Ask • What do we get for the cost, what do we need? [Spend more $$$ for pre-packaged or build what you need] ****** Warfighter-Support, LLC Confidential*******9/29/2016 20 ADVANTAGE DIS-ADVANTAGE COMMENT Pre-Packaged End-to- End Solution More $$$ Requires fewer in- house resources & expertise A Platform for Building Less $$$ More Flexibility Requires resources to build & customize More legwork but you are not paying for stuff you don’t need
  • 21. How Do We Harness BDA? • Turn data into actionable information – unified, timely information and predictions • Help missions to have greater impact, consistency, transparency, reliability and effectiveness ****** Warfighter-Support, LLC Confidential*******9/29/2016 21
  • 22. Enterprise Data Management Components Cisco UCS Hadoop MapR Splunk ****** Warfighter-Support, LLC Confidential*******9/29/2016 22
  • 23. Cisco UCS Reference Architecture • UCS C220/C240 M4 Servers • Nexus 2232 Fabric Extenders • UCS 6200 Series Fabric Interconnect ****** Warfighter-Support, LLC Confidential*******9/29/2016 23
  • 24. MapR Technologies, Inc. • MapR Distribution is the combination of a tremendous amount of innovation in which MapR participates as part of the Apache Open Source Community along with MapR’s innovative data platform and management control system. ****** Warfighter-Support, LLC Confidential*******9/29/2016 24
  • 25. MapR Improvements hadoop Distributed File System • Many limitations with HDFS • Java Virtual Machine (JVM) issues • Single point-of-failure • Read-and-Append only file systems (not R/W) MapR-FS • Native NFS support – any application that can read/write to an NFS mount can plug into this architecture • No single point-of-failure (C++) • Application data is automatically replicated ****** Warfighter-Support, LLC Confidential*******9/29/2016 25
  • 26. MapR Security • Pluggable security model • Linux pluggable authentication modules (PAMs) • Kerberos is an option1 1Not optimal for long-running jobs ****** Warfighter-Support, LLC Confidential*******9/29/2016 26
  • 27. MapR – Zeta Application Architecture • Simplifies • Data Protection Schemes • How to Backup Data • Failure Recovery • Running Multiple Instances of Software • Better hardware utilization = lower OpEx • Google runs on a Zeta Architecture (over 2 Billion container deployments/week) ****** Warfighter-Support, LLC Confidential*******9/29/2016 27
  • 28. MapR and hadoop • MapR works with and adopts open-source community developments into an integrated solution offering • hadoop is a scalable centralized data hub / distribution solution • Runs same problem on multiple computers • Uses new more flexible tools and existing tools ****** Warfighter-Support, LLC Confidential*******9/29/2016 28
  • 29. Benefits of MapR and hadoop • Faster time-to-value • Smaller hardware footprint (COTS hardware) • Reliability • Real snapshots for data versioning, data protection & mirroring (DR) • hadoop is a scalable centralized data hub • Runs work/same problem on multiple computers • Uses new more flexible tools and existing tools ****** Warfighter-Support, LLC Confidential*******9/29/2016 29
  • 30. MapR • “Traditional” Data Warehouse accepts: • SQL data • MapR w/ hadoop: • SQL • Machine-learned data • Video Analytic data • Relational Schemas • Files • Logs • Click Streams • Geo-Spatial data • Sentiment Analysis • WASP scanner data • KACE inventory data ****** Warfighter-Support, LLC Confidential*******9/29/2016 30
  • 31. This architecture allows scaling up to Google’s level. ****** Warfighter-Support, LLC Confidential******* Google’s Example 9/29/2016 31
  • 32. MapR and Big Data Analytics in Action ****** Warfighter-Support, LLC Confidential*******9/29/2016 32
  • 33. ****** Warfighter-Support, LLC Confidential******* AADHAAR In the course of attaining the milestone of 600 million users, the Aadhaar technology backend has become the largest biometric identity repository in the world and the first to provide an online, anytime anywhere, multi-factor authentication service. A strong technology foundation based on open architecture enabled the rapid evolution of the Aadhaar system. It was important to document all aspects of Aadhaar technology and make it available in public domain. The three white papers published by the UIDAI Technology Centre fulfill this need. 9/29/2016 33
  • 34. A partnership model – UIDAI approach leverages the existing infrastructure of government and private agencies across India. The UIDAI is the regulatory authority managing a Central Identity Data Repository (CIDR), which will issue Aadhaar numbers, update resident information, and authenticate the identity of residents as required. UIDAI partners with agencies such as central and state departments who are the 'Registrars' for the UIDAI. Registrars conduct the enrollment camps using UIDAI software and procedures, upload the encrypted enrolment data to the CIDR to de-duplicate resident information, and help seed the Aadhaar number into their beneficiary databases. ****** Warfighter-Support, LLC Confidential******* AADHAAR Strategy 9/29/2016 34
  • 35. • Process to ensure no duplicates – Registrars send the applicant's encrypted data packet to the UIDAI data centers for de-duplication. Aadhaar enrollment system performs a search on key demographic fields and on the biometrics for each new enrolment, to ensure uniqueness. • Process to keep data up to date – Incentives in the Aadhaar system are aligned towards a self-cleaning mechanism. The existing patchwork of multiple databases in India gives individuals the incentive to provide different personal information to different agencies. Since de-duplication in the Aadhaar system ensures that residents have only one chance to be in the database, individuals are incentivized to provide accurate data. This incentive becomes especially powerful as benefits and entitlements are linked to the Aadhaar number. Regular usage of identity across many services naturally incentivizes the resident to keep Aadhaar system up to date. ****** Warfighter-Support, LLC Confidential******* AADHAAR Strategy 9/29/2016 35
  • 36. • Online authentication – UIDAI offers a strong form of online authentication. When residents wanting to avail a service require identity/address verification, agencies can compare demographic and biometric information of the resident with the record stored in the central database. • Technology undergirds the UIDAI system – Technology systems have a major role across the UIDAI infrastructure. Large scale biometric de- duplication, online authentication, data security, analytics, etc require well designed, secure, and scalable systems. ****** Warfighter-Support, LLC Confidential******* AADHAAR Strategy 9/29/2016 36
  • 37. Splunk ****** Warfighter-Support, LLC Confidential*******9/29/2016 37
  • 38. ****** Warfighter-Support, LLC Confidential******* GPS, RFID, Hypervisor, Web Servers, Email, Messaging, Clickstreams, Mobile, Telephony, IVR, Databases Report and analyze Custom dashboards Monitor and alert Ad hoc search Real-time Machine Data Sensors, Telematics, Storage, Servers, Security devices, Desktops, CDRs Developer Platform External Lookups Troop/Supply/ Geo-Spatial Info Network Segments / Honeypots Data stores Splunk, The Platform For Machine Data 9/29/2016 38
  • 39. Splunk App for Enterprise Security Pre-built searches, alerts, reports, dashboards, threat intel feeds, workflow Incident Investigations & Management 39 Dashboards and Reports Statistical Outliers Asset and Identity Aware 9/29/2016 ****** Warfighter-Support, LLC Confidential******* 39
  • 40. Splunk • Provides a More Complete View of Threat Landscape • US Army Authorized Splunk with Certificate of Networthiness (CoN) • Real-time search and analysis of terabytes of data across the Army’s IT infrastructure. • Patented Time-Services Indexing Technology (borrowed from MapReduce1) • The Army and approximately 70% of all US federal agencies rely on Splunk for real-time visibility of their IT data for security, compliance and application availability • Splunk App for FISMA • Used by the DOJ and NASA 1Please reference Appendix for MapReduce information. ****** Warfighter-Support, LLC Confidential*******9/29/2016 40
  • 41. Splunk on SIPR • Army Enterprise Certificate of Net Worthiness • Networthiness Certification applies to all organizations fielding, using, or managing ISs on the Army Enterprise Architecture/LandWarNet (LWN), to include Commercial Off-the-Shelf (COTS) and Government Off-the- Shelf (GOTS). • In accordance with AR 25-1, paragraph 6-8 activities must obtain a Certificate of Networthiness (CoN) before they connect hardware/software to the LWN. • Therefore, Splunk does not need to go through JITC. • Over 50 U.S. Army customers using Splunk ****** Warfighter-Support, LLC Confidential*******9/29/2016 41
  • 42. Splunk FISMA App1 42 42 1Based on NIST 800-53 Rev 3 9/29/2016 ****** Warfighter-Support, LLC Confidential*******
  • 43. Licensing Splunk • Based on how much [new] data Splunk indexes in a 24-hr period • Data is ingested into Splunk once and goes against data licensed; Data indexing, manipulation and modeling thereafter is unlimited. There is only one charge per unit of data. • Overages do not “turn off” your system. • License Enforcement (30-day period) • 1st overage  message to admin • 2nd overage  message to admin • 3rd overage  message to admin • 4th overage  message to admin • 5th overage  correlator is turned off • Contact Splunk Account Manager or Systems Engineer to get a “reset key.” No charge, the intent is to spur a conversation between 18th Airborne and Splunk regarding capacity planning. • Theoretically, can exceed license 48x/year w/out contacting Splunk. ****** Warfighter-Support, LLC Confidential*******9/29/2016 43
  • 44. Leidos • Information Dominance / Command and Control • Consistently ranked among the top federal systems integration contractors, Leidos is the company that "pulls it all together" for U.S. forces and allies. As the lead integrator for the Global Command and Control System (GCCS), for example, we help give warfighters an integrated picture of the battlespace and commanders greater capability to deploy a U.S. fighting force around the globe at any time and provide it with the information and direction to complete its mission. • As the military's key command, control, computing, communications, and intelligence (C4I) system, the GCCS uses the Defense Information Infrastructure Common Operating Environment (DII COE) to support joint warfighting needs. Helping to ensure that C4I maintains its pace with technology, Leidos leads several significant projects to bring leading edge DII COE-compliant technologies to the GCCS community. These include Defense Advanced Research Projects Agency (DARPA) efforts supporting senior levels of command, such as the National Command Authority and Joint Staff, down through Joint Task Force Commanders and service components, such as the Marine Corps' Chemical/Biological Warfare Incident Response Force. ****** Warfighter-Support, LLC Confidential*******9/29/2016 44
  • 45. Wrapping it Up… ****** Warfighter-Support, LLC Confidential*******9/29/2016 45
  • 46. The Solution • Cisco UCS is the hardware platform • MapR – “hadoop in a box” w/ Zeta architecture • Hadoop [can be used to] provide the file system and programming platform. • Splunk is the “search engine on steroids.” • Splunk and MapR “make Hadoop easier.” • Overcomes the Big Data skills gap ****** Warfighter-Support, LLC Confidential*******9/29/2016 46
  • 47. Use Cases Combat & Command • Timely & Applicable Intel for cutting orders • Policies • Blend troop movement w/ SitReps, historical intel, Sat images, UAV data and provide to commanders on a single pane of glass Company • True Numbers • Data Validity • Add Info ****** Warfighter-Support, LLC Confidential*******9/29/2016 47
  • 48. Wrapping it up… • Big Data Analytics will enable the 18th Airborne Corps to gather, store, analyze machine data efficiently and effectively to increase mission success and potentially save lives. • Machine data such as UAV images, HUMINT and social media data is stored in a Cloudera Enterprise Hub, extracted into Splunk [or Hadoop], Transformed in Splunk [or Hadoop], and searched [by Splunk] and presented in a usable form that becomes actionable intelligence. ****** Warfighter-Support, LLC Confidential*******9/29/2016 48
  • 49. Thank You! ****** Warfighter-Support, LLC Confidential*******9/29/2016 49
  • 50. Additional Technologies • LISP – Locator ID Separation Protocol • “MAC in MAC” routing • Natively supports Equal Cost Multi-Path routing (Dijkstra’s SPF algorithm) • Alternative to running Spanning Tree • IS-IS for Layer 2 switching – computes SPT • Splits Locator info from Identifier • Locator  Endpoint ID  Overlay ****** Warfighter-Support, LLC Confidential*******9/29/2016 50
  • 51. Locator/ID Split and LISP • Addresses today combine location and identity semantics in a single 32-bit or 128-bit number • Separating Location and Identity changes this… • Provide a clear separation at the Network Layer between what we are looking for vs. how best to get there • Translation vs. Tunneling is a key question • Network Layer Identifier: WHO you are in the network • long-term binding to the thing that they name, does not change often at all • Network Layer Locator: WHERE you are in the network • Think of the source and destination “addresses” used in routing and forwarding • WHERE you are can change WHO you are should be the same ****** Warfighter-Support, LLC Confidential*******9/29/2016 51
  • 52. Appendix ****** Warfighter-Support, LLC Confidential*******9/29/2016 52
  • 53. Training Requirements ****** Warfighter-Support, LLC Confidential*******9/29/2016 53
  • 54. Training Recommendations - Splunk Function Course Title Education /Experience Delivery Duration (hours) Administrator For Splunk Administrators Some college preferred/some network administration experience preferred eLearning/WBT/ Instructor-led 51.5 Architect For Splunk Architects Associates Degree, Network/Programming experience eLearning/WBT/ Instructor-led 78.5 Info Sec For Enterprise Security Customers Associates Degree, Network/Security/Programming experience eLearning/WBT/ Instructor-led 83.5 ****** Warfighter-Support, LLC Confidential*******9/29/2016 54
  • 55. Training Recommendations - MapR Function Course Title Education /Experience Delivery Duration (hours) Administrator Some college preferred/some network administration experience preferred eLearning/WBT/ Instructor-led Architect Associates Degree, Network/Programming experience eLearning/WBT/ Instructor-led Info Sec Associates Degree, Network/Security/Programming experience eLearning/WBT/ Instructor-led ****** Warfighter-Support, LLC Confidential*******9/29/2016 55
  • 56. ****** Warfighter-Support, LLC Confidential*******9/29/2016 56
  • 57. Digital Forensic Tools ****** Warfighter-Support, LLC Confidential*******9/29/2016 57
  • 58. Digital Forensic Tools • Dshell – Army internal analysis framework using Python running on Linux. • Purpose – help analysts investigate compromises within their environments • Cisco’s OpenSOC Security Analytics Framework. • Designed to consume and monitor massive amounts of network traffic and machine “exhaust” data of a Data Center. • Network analysis plug-in available to analyze network traffic at multiple layers of the OSI stack. ****** Warfighter-Support, LLC Confidential*******9/29/2016 58
  • 59. Digital Forensic Tools • AccessData’s Forensic Toolkit (FTK) • Support for Microsoft’s Volume Shadow Copy (VSC) • Retrieve metadata for deleted files • Chronology of how documents, user activity, programs changed over time • Geomapping – data virtualization feature Use Case: • Retrieving information after a disk has been wiped clean by an anti- forensics tool • After cleaning the HD showed no evidence of the proprietary data • Examining VSCs allowed recovery of destroyed Registry files that proved the proprietary data had been accessed ****** Warfighter-Support, LLC Confidential*******9/29/2016 59
  • 60. Hadoop’s MapReduce Technology ****** Warfighter-Support, LLC Confidential******* • Hadoop MapReduce is a software framework for easily writing applications which process vast amounts of data (multi-terabyte data-sets) in-parallel on large clusters (thousands of nodes) of commodity hardware in a reliable, fault-tolerant manner. • A MapReduce job usually splits the input data-set into independent chunks which are processed by the map tasks in a completely parallel manner. The framework sorts the outputs of the maps, which are then input to the reduce tasks. Typically both the input and the output of the job are stored in a file- system. The framework takes care of scheduling tasks, monitoring them and re-executes the failed tasks. 9/29/2016 60
  • 61. Hadoop • A Distributed, Fault-Tolerant Framework for Storing and Analyzing Data. Composed of: 1. Hadoop File System (HDFS) 2. MapReduce Application Engine / Programming Framework • Allows code to be written that Hadoop can process in a massively parallel way. • Very broadly distributed, very efficient programming and storage of LARGE datasets. • Hadoop does the heavy-lifting and batch processing of the MASSIVE amounts of data. ****** Warfighter-Support, LLC Confidential*******9/29/2016 61
  • 62. Big Data Extract, Transform & Load (ETL) KACE Inventory Data WASP Scanner Data ****** Warfighter-Support, LLC Confidential*******9/29/2016 62

Editor's Notes

  1. Geospatial intelligence, GEOINT (GEOspatial INTelligence) is intelligence about the human activity on earth derived from the exploitation and analysis of imagery and geospatial information that describes, assesses, and visually depicts physical features and geographically referenced activities on the Earth. GEOINT consists of imagery, imagery intelligence (IMINT) and geospatial information.
  2. FISMA – Federal Information Security Management Act NIST – National Institute of Science & Technology
  3. Pluggable security model is required because applications come in many varieties, and do not implement the same security model. Kerberos is an option but not optimal for long-running jobs. Kerberos /ˈkərbərəs/ is a computer network authentication protocol which works on the basis of 'tickets' to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication.[1] Kerberos uses UDP port 88 by default.
  4. Pluggable security model is required because applications come in many varieties, and do not implement the same security model. Kerberos is an option but not optimal for long-running jobs. Kerberos /ˈkərbərəs/ is a computer network authentication protocol which works on the basis of 'tickets' to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication.[1] Kerberos uses UDP port 88 by default.
  5. FISMA – Federal Information Security Management Act NIST – National Institute of Science & Technology
  6. Over 45 pre-built searches 37 predefined dashboards 160 reports Supporting common security metrics
  7. FISMA – Federal Information Security Management Act NIST – National Institute of Science & Technology
  8. FISMA – Federal Information Security Management Act NIST – National Institute of Science & Technology Jon Scazato / AM, Splunk knows Tom Neff, CHESS Program Director (GS-15)
  9. Built by a Splunk Federal SE and free on Splunk Apps as “community supported”. Maps back to NIST 800-53. NOTE – As of May 2013 this App is a bit out of date as it reference NIST 800-53 Revision 3. The current Revision is 4. The FISMA app is a set of searches and views which can be used to audit NIST 800-53 compliance. This app does not provide data inputs, extractions, or tags itself. This app is a "framework" which is dependent on the Common Information Model event typing and tagging being provided by external add-ons. The app can be utilized to integrate any relevant data sources if the CIM fields and tagging match. Each control has it's own Help link which describes the required tags and fields for the view. Technology Add-ons such as the Splunk for Windows technology add-on and the Splunk for Unix and Linux technology add-on are examples of two such supporting add-ons which should be used in conjunction with the FISMA app. Please contact fed@splunk.com if you require additional Technology Add-ons which are not available on Splunk base.
  10. FISMA – Federal Information Security Management Act NIST – National Institute of Science & Technology
  11. FISMA – Federal Information Security Management Act NIST – National Institute of Science & Technology
  12. FISMA – Federal Information Security Management Act NIST – National Institute of Science & Technology “hadoop in a box” is MapR Zeta Architecture in a brief case. (Jim Scott / MapR is working with Air Force Special Ops Command)
  13. FISMA – Federal Information Security Management Act NIST – National Institute of Science & Technology
  14. FISMA – Federal Information Security Management Act NIST – National Institute of Science & Technology
  15. FISMA – Federal Information Security Management Act NIST – National Institute of Science & Technology
  16. “After CCleaner was run, the hard drive showed no evidence of the proprietary data we were looking for. After examining the VSCs, we were able to recover destroyed Registry files that proved the proprietary data had been accessed on that computer. The VSCs showed a ‘snapshot-in-time’ of when these files were active on the hard drive and when they were deleted,” said Broom. In addition to retrieving metadata for deleted files, VSC analysis with FTK provides a point-in-time history that serves as a chronology of how documents, user activity, programs and other artifacts have changed over time. For example, this could reveal relevant evidence that resided in a document at some point in the past but was intentionally changed and would not be recoverable any other way – a major stumbling block in digital investigations. The latest version of FTK also includes evidence geomapping, a new data visualization feature, which allows investigators to see on a map the geographic location of evidence items containing geocoded information. 
  17. “After CCleaner was run, the hard drive showed no evidence of the proprietary data we were looking for. After examining the VSCs, we were able to recover destroyed Registry files that proved the proprietary data had been accessed on that computer. The VSCs showed a ‘snapshot-in-time’ of when these files were active on the hard drive and when they were deleted,” said Broom. In addition to retrieving metadata for deleted files, VSC analysis with FTK provides a point-in-time history that serves as a chronology of how documents, user activity, programs and other artifacts have changed over time. For example, this could reveal relevant evidence that resided in a document at some point in the past but was intentionally changed and would not be recoverable any other way – a major stumbling block in digital investigations. The latest version of FTK also includes evidence geomapping, a new data visualization feature, which allows investigators to see on a map the geographic location of evidence items containing geocoded information. 
  18. Discuss NY Times newspaper editor example: What if you were asked to count the number of ocurrences of the words “a”, “an”, “and”, “for”, etc. How long would it take you to search the Sunday edition of the NY Times? A long time But, what if: Asked 99 people to help you and each was given a subsection of the paper. This would drastically decrease the time to perform the search.