Nexus of Science Policy and ICT Policy: Implications and Outcomes - Susan Ba...Cybera Inc.
Susan Baldwin, Executive Director of Compute Canada, presented these slides as part of the Cybera Summit 2010 session "The Nexus of Science Policy and ICT Policy: Implications and Outcomes". For more information, visit http://www.cybera.ca/nexus-science-policy-and-ict-policy-implications-and-outcomes
Virtual Observatories as the Drivers of Space Science - Robert Rankin, Univer...Cybera Inc.
Robert Rankin, Professor of Physics and Astronomy at the University of Alberta, presented these slides as part of the Cybera Summit 2010 session "The Evolution of Collaborative Science." For more information please visit http://www.cybera.ca/evolution-collaborative-science
Wide Area Virtualization: From the Enterprise to the CloudCybera Inc.
DataGardens
Presented at the Cybera/CANARIE National Summit 2009, as part of the session "From iPods to Data Centres: How the Cloud Impacts You." This session showcased a selection of Cybera pilot projects that leverage and demonstrate cloud computing concepts.
Nexus of Science Policy and ICT Policy: Implications and Outcomes - Susan Ba...Cybera Inc.
Susan Baldwin, Executive Director of Compute Canada, presented these slides as part of the Cybera Summit 2010 session "The Nexus of Science Policy and ICT Policy: Implications and Outcomes". For more information, visit http://www.cybera.ca/nexus-science-policy-and-ict-policy-implications-and-outcomes
Virtual Observatories as the Drivers of Space Science - Robert Rankin, Univer...Cybera Inc.
Robert Rankin, Professor of Physics and Astronomy at the University of Alberta, presented these slides as part of the Cybera Summit 2010 session "The Evolution of Collaborative Science." For more information please visit http://www.cybera.ca/evolution-collaborative-science
Wide Area Virtualization: From the Enterprise to the CloudCybera Inc.
DataGardens
Presented at the Cybera/CANARIE National Summit 2009, as part of the session "From iPods to Data Centres: How the Cloud Impacts You." This session showcased a selection of Cybera pilot projects that leverage and demonstrate cloud computing concepts.
Docker containers are a 5-year old project that has revolutionized much of how we build, ship, and run software on servers. Bret will highlight the far-reaching effects of this pivotal technology and how it's blazing a trail for the future of app development and deployment. For those that are already using Docker for development, he'll also highlight some details and decisions you'll need when taking containers into production.
Inside Cisco IT: Secure and Simplified Cloud Services with ACICisco IT
The Cloud is one of the fastest growing solutions today and the significance of the secure multi-tenant data center on business applications is increasing. Cisco IT is building an Application Centric Infrastructure (ACI) for Cloud Computing. An ACI environment requires a holistic approach in managing and orchestrating network, server, storage and application resources within a data center and across multiple data centers. This enables Cisco IT to deliver a secure programmable infrastructure that anticipates application requirements and through policies delivers Software as Service offerings to Cisco Business Units. Cisco IT has been a fundamental driver in building and adapting the suite of management tools needed today to orchestrate data center infrastructure and platforms to deliver business services.
Attendees will learn how Cisco IT is designing next-generation application aware solutions and the new policy models required for this journey. Cisco IT is migrating all traditional applications to a radically simplified compute platform and programmable network. Application Centric Infrastructure will significantly reduce the network complexity and improve security, while reducing application deployment cycles. Cisco IT has aggressively deployed an internal private cloud with the goal of offering all IT services as self-service. Attendees will understand the TCO Cisco IT has achieved building Application Centric Infrastructure along with our existing UCS compute platform. Additionally we will share the experience and lessons learned from our journey transforming applications and platforms to an infrastructure aware architecture.
Session highlights include:
• Cisco IT’s adoption of Application Centric Infrastructure (ACI)
• Application Centric Infrastructure Design
• Nexus 9000
• Unified Compute System
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Improved Application Security
• Reducing data center and network operating costs
• Driving higher utilization of existing servers
• Organizational Alignment
• Application transformation
Big Communications Event, Keynote Communications TrackRon Batra
Focus on Key Technology Trends at BCE, Austin, TX. How Open Source, Big Data, Containers, IOT and Microservices are a catalyst of change, creating a virtuous cycle.
Presented at Spacewalk 2023
Presented by Christian Posta, solo.io
Title: The Future of Service Mesh
Abstract: Service mesh is a powerful way to solve cross-cutting application-networking concerns, such as load balancing, service resilience, observability, and security. Adopting a mesh for your services can save hundreds of hours of developer time and reduce the burden placed on operations. In this talk we'll explore some common use cases for service mesh, look at some case studies, and then dig into innovation happening in this space such as "sidecar-less" service mesh.
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)Samy Fodil
Webinar recording: https://youtu.be/t30Aa-mq93Q
Do you need to build scalable 5G and IoT applications? Or, maybe distribute the computing required by AR/VR throughout the data path? Perhaps you need to implement Digital Twins? Well you've come to the right place.
Edge Computing is a paradigm that distributes computing and data storage between the Cloud and the users. In fact, the data center infrastructure that sits between you and the Cloud is actually larger than all the Cloud data centers combined. For over two decades, thanks to that Edge infrastructure you've been able to watch videos and smoothly surf the web. Today the "Edge" is powering all the automation around you; for example, smart cities, smart cars, smart factories, etc.
Accelerating Cloud Services and How to Match your Workload to the Right Intel...Amazon Web Services
This presentation will take you through the underlying Intel technologies available in AWS EC2 Instances, what benefits these technologies can provide and how to use these technologies to maximise your use case workloads AWS EC2 Instances provide a wide selection of instance types, optimised to fit a broad and diverse set of use cases, all supported by the latest Intel Xeon processors and technologies providing you with confidence to choose an AWS EC2 instance type that best meet your performance needs for compute intensive, memory intensive, or IOPS intensive applications.
So, if you are interested in how to maximise your existing code optimisations and investments or thinking about migrating workloads to AWS come to this session.
Speaker: Peter Kerney, Lead Enterprise Architect, Cloud, SDI and NFV, Intel
Slides presenting the attractiveness of Eastern Europe for Venture investors and highlighting market opportunities around Big Data, Cloud Computing and Mobile
John Chiappetta prezo on 5G EdgeComputing and IoT and how interdependent they are.
Held Nov 19, 2019 at Milton Education Village Innovation Centre, Milton, Ontario, Canada.
Learn more here: https://siliconhalton.com/event/meetup-119-what-is-5g-and-edge-computing/
SF Big Analytics Meetup - Exact Count Distinct with Apache KylinSamanthaBerlant
With over 450 million customers, Didi (world’s largest rideshare company) conducts complex user behavior analysis on huge datasets daily. Exact Count Distinct is one of Didi’s most critical metrics, but it is known for being computationally heavy and notoriously slow. The difference between exact Count Distinct and approximate Count Distinct can cost Didi millions of dollars. In this talk, Kaige Liu of the Apache Kylin project will explain how Didi uses Apache Kylin to return exact Distinct Count on billions of rows of data with sub-second latency to generate the most accurate picture of its business.
You will also learn about the latest development in modern OLAP technologies. Kaige will share how Didi and Truck Alliance (a truck-hailing company that processes $100 billion worth of goods yearly) use Apache Kylin to power their analytics platforms that allow 100s of analysts to achieve sub-second latency on petabyte-scale data.
An overview of the trends that will forever disrupt and transform the real estate industry. Topics include convergence, #DigitalCeiling, UPoE, Power-over-Ethernet. And how Cisco Canada is reaping the benefits at its new Canadian HQ in Toronto (RBC Waterpark Place) by Oxford Properties.
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
What are the opportunities and the challenges offered by emerging modes of technologically-inflected communication and decision-making? What is our role and responsibility as educators and as developers of research and teaching digital infrastructures? What do students need in the 21st century? As education institutions and providers struggle to respond to the first two questions, are we abrogating our responsibility to the last?
In this talk, Matt Ratto will describe some of the opportunities and the challenges we currently face, laying out a model of action for how to potentially address the questions raised above. Core to his thinking are two related points; first that we must help students develop a greater sense of how the informational world and its attendant infrastructures helps shape how and what we think, and second, that a good way to do this is to give students the space to engage in reflexive acts of technological production – what Matt has termed ‘critical making.’ He will provide concrete examples from both his research and his teaching that demonstrate the value and importance of reflexive, hands-on work with digital technologies in helping students develop the critical digital literacy skills they need to function in today’s society.
Matt Ratto is an Associate Professor in the Faculty of Information at the University of Toronto and directs the Semaphore Research cluster on Inclusive Design, Mobile and Pervasive Computing and, as part of Semaphore, the Critical Making lab.
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
There is a prevailing belief that users are the weakest link the security chain. In this presentation, Dr. Chiasson discusses how this perspective is inherently counterproductive to achieving increased cyber security and explore alternatives with a higher chance of improving security. Why do users behave insecurely even though most will readily state that security and privacy are important? This talk will cover some of our recent research exploring reasons why users' actions do not necessarily reflect their desire for security and how the configuration of security systems may actually weaken security in practice. She presents her work using eye-tracking to determine how users make phishing determinations, and how we can persuade users to behave more securely through improving their mental models of passwords and by making adjustments to the system configurations.
Docker containers are a 5-year old project that has revolutionized much of how we build, ship, and run software on servers. Bret will highlight the far-reaching effects of this pivotal technology and how it's blazing a trail for the future of app development and deployment. For those that are already using Docker for development, he'll also highlight some details and decisions you'll need when taking containers into production.
Inside Cisco IT: Secure and Simplified Cloud Services with ACICisco IT
The Cloud is one of the fastest growing solutions today and the significance of the secure multi-tenant data center on business applications is increasing. Cisco IT is building an Application Centric Infrastructure (ACI) for Cloud Computing. An ACI environment requires a holistic approach in managing and orchestrating network, server, storage and application resources within a data center and across multiple data centers. This enables Cisco IT to deliver a secure programmable infrastructure that anticipates application requirements and through policies delivers Software as Service offerings to Cisco Business Units. Cisco IT has been a fundamental driver in building and adapting the suite of management tools needed today to orchestrate data center infrastructure and platforms to deliver business services.
Attendees will learn how Cisco IT is designing next-generation application aware solutions and the new policy models required for this journey. Cisco IT is migrating all traditional applications to a radically simplified compute platform and programmable network. Application Centric Infrastructure will significantly reduce the network complexity and improve security, while reducing application deployment cycles. Cisco IT has aggressively deployed an internal private cloud with the goal of offering all IT services as self-service. Attendees will understand the TCO Cisco IT has achieved building Application Centric Infrastructure along with our existing UCS compute platform. Additionally we will share the experience and lessons learned from our journey transforming applications and platforms to an infrastructure aware architecture.
Session highlights include:
• Cisco IT’s adoption of Application Centric Infrastructure (ACI)
• Application Centric Infrastructure Design
• Nexus 9000
• Unified Compute System
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)
• Improved Application Security
• Reducing data center and network operating costs
• Driving higher utilization of existing servers
• Organizational Alignment
• Application transformation
Big Communications Event, Keynote Communications TrackRon Batra
Focus on Key Technology Trends at BCE, Austin, TX. How Open Source, Big Data, Containers, IOT and Microservices are a catalyst of change, creating a virtuous cycle.
Presented at Spacewalk 2023
Presented by Christian Posta, solo.io
Title: The Future of Service Mesh
Abstract: Service mesh is a powerful way to solve cross-cutting application-networking concerns, such as load balancing, service resilience, observability, and security. Adopting a mesh for your services can save hundreds of hours of developer time and reduce the burden placed on operations. In this talk we'll explore some common use cases for service mesh, look at some case studies, and then dig into innovation happening in this space such as "sidecar-less" service mesh.
Connectivity is here (5 g, swarm,...). now, let's build interplanetary apps! (1)Samy Fodil
Webinar recording: https://youtu.be/t30Aa-mq93Q
Do you need to build scalable 5G and IoT applications? Or, maybe distribute the computing required by AR/VR throughout the data path? Perhaps you need to implement Digital Twins? Well you've come to the right place.
Edge Computing is a paradigm that distributes computing and data storage between the Cloud and the users. In fact, the data center infrastructure that sits between you and the Cloud is actually larger than all the Cloud data centers combined. For over two decades, thanks to that Edge infrastructure you've been able to watch videos and smoothly surf the web. Today the "Edge" is powering all the automation around you; for example, smart cities, smart cars, smart factories, etc.
Accelerating Cloud Services and How to Match your Workload to the Right Intel...Amazon Web Services
This presentation will take you through the underlying Intel technologies available in AWS EC2 Instances, what benefits these technologies can provide and how to use these technologies to maximise your use case workloads AWS EC2 Instances provide a wide selection of instance types, optimised to fit a broad and diverse set of use cases, all supported by the latest Intel Xeon processors and technologies providing you with confidence to choose an AWS EC2 instance type that best meet your performance needs for compute intensive, memory intensive, or IOPS intensive applications.
So, if you are interested in how to maximise your existing code optimisations and investments or thinking about migrating workloads to AWS come to this session.
Speaker: Peter Kerney, Lead Enterprise Architect, Cloud, SDI and NFV, Intel
Slides presenting the attractiveness of Eastern Europe for Venture investors and highlighting market opportunities around Big Data, Cloud Computing and Mobile
John Chiappetta prezo on 5G EdgeComputing and IoT and how interdependent they are.
Held Nov 19, 2019 at Milton Education Village Innovation Centre, Milton, Ontario, Canada.
Learn more here: https://siliconhalton.com/event/meetup-119-what-is-5g-and-edge-computing/
SF Big Analytics Meetup - Exact Count Distinct with Apache KylinSamanthaBerlant
With over 450 million customers, Didi (world’s largest rideshare company) conducts complex user behavior analysis on huge datasets daily. Exact Count Distinct is one of Didi’s most critical metrics, but it is known for being computationally heavy and notoriously slow. The difference between exact Count Distinct and approximate Count Distinct can cost Didi millions of dollars. In this talk, Kaige Liu of the Apache Kylin project will explain how Didi uses Apache Kylin to return exact Distinct Count on billions of rows of data with sub-second latency to generate the most accurate picture of its business.
You will also learn about the latest development in modern OLAP technologies. Kaige will share how Didi and Truck Alliance (a truck-hailing company that processes $100 billion worth of goods yearly) use Apache Kylin to power their analytics platforms that allow 100s of analysts to achieve sub-second latency on petabyte-scale data.
An overview of the trends that will forever disrupt and transform the real estate industry. Topics include convergence, #DigitalCeiling, UPoE, Power-over-Ethernet. And how Cisco Canada is reaping the benefits at its new Canadian HQ in Toronto (RBC Waterpark Place) by Oxford Properties.
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
What are the opportunities and the challenges offered by emerging modes of technologically-inflected communication and decision-making? What is our role and responsibility as educators and as developers of research and teaching digital infrastructures? What do students need in the 21st century? As education institutions and providers struggle to respond to the first two questions, are we abrogating our responsibility to the last?
In this talk, Matt Ratto will describe some of the opportunities and the challenges we currently face, laying out a model of action for how to potentially address the questions raised above. Core to his thinking are two related points; first that we must help students develop a greater sense of how the informational world and its attendant infrastructures helps shape how and what we think, and second, that a good way to do this is to give students the space to engage in reflexive acts of technological production – what Matt has termed ‘critical making.’ He will provide concrete examples from both his research and his teaching that demonstrate the value and importance of reflexive, hands-on work with digital technologies in helping students develop the critical digital literacy skills they need to function in today’s society.
Matt Ratto is an Associate Professor in the Faculty of Information at the University of Toronto and directs the Semaphore Research cluster on Inclusive Design, Mobile and Pervasive Computing and, as part of Semaphore, the Critical Making lab.
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
There is a prevailing belief that users are the weakest link the security chain. In this presentation, Dr. Chiasson discusses how this perspective is inherently counterproductive to achieving increased cyber security and explore alternatives with a higher chance of improving security. Why do users behave insecurely even though most will readily state that security and privacy are important? This talk will cover some of our recent research exploring reasons why users' actions do not necessarily reflect their desire for security and how the configuration of security systems may actually weaken security in practice. She presents her work using eye-tracking to determine how users make phishing determinations, and how we can persuade users to behave more securely through improving their mental models of passwords and by making adjustments to the system configurations.
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
Serious threats to private and governmental organizations do not only come from the outside world, but also come from within. Some employees and contractors with legitimate access to buildings, networks, assets and information deliberately misuse their priviledged access to cause harm to their organization. What are the reasons behind their actions? Is it debts, greed, ideology, disgruntlement, or divided loyalty?
Regardless of their motivations or vulnerabilities, traitors have very similar types of personality and display a certain pattern of behaviours before committing an insider incident. As a prevention measure, it is vital that organizations and employees understand, recognize and detect the common indicators of insider threat. Would you recognize the signs?
Mario Vachon is an Insider Threat Security Specialist with the RCMP Departmental Security Branch.
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCybera Inc.
Canada allocates a substantial amount of public funding to research, which is a critical factor in ensuring we remain innovative and competitive. Increasingly this funding is geared to the support and development of digital research infrastructure (DRI), including the underlying networks and the associated data acquisition, storage, analysis and visualization. In order to maximize the benefits of increasingly complex DRI and the research it facilitates, it is important to make sure data is properly stewarded, accessible and reusable. By adopting appropriate approaches to research data management we are better positioned to respond to challenges, such as effectively measuring research impacts, and ensuring the reproducibility, privacy, and security of research outputs.
Research Data Canada (RDC) is a member-driven organization committed to developing a sustainable approach to research data management, one based on interoperability and best practices. This session will provide an update on the efforts of RDC and partner organizations, including: CANARIE, Compute Canada, CARL Portage Network, CASRAI, the TriAgencies, and the Leadership Council for Digital Infrastructure. Intersections with international activities and projects will also be highlighted. These efforts are ultimately designed to faciliate a cohesive national approach to research data management, and one based on a clearly articulated vision for supporting innovation and discovery in Canada.
Mark Leggott is the Executive Director of Research Data Canada.
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCybera Inc.
The Internet has revolutionized how — and how much — each of us can know. Our digital tools put the knowledge of the world at our fingertips — and soon, maybe, right into our heads. But what kinds of of knowledge do our devices give us, and how are they reshaping and challenging the role that education and libraries should play in our lives?
This talk was delivered by Michael Patrick Lynch, professor of philosophy at the University of Connecticut, where he directs the university’s Humanities Institute.
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
Although there is no well-established definition of big data, its main characteristic is its sheer volume. Large volumes of data are generated by people (e.g., via social media) and by technology, including sensors (e.g., cameras, microphones), trackers (e.g., RFID tags, web surfing behavior) and other devices (e.g., mobile phones, wearables for self-surveillance/quantified self), whether or not they are connected to the Internet of Things. However, the large volumes of data needed to capitalize on the benefits of big data can to some extent also be established by the reuse of existing data, a source that is sometimes overlooked.
Data can be reused for purposes similar to that for which it was initially collected, but also beyond these purposes. Similarly, data can be reused in its original context, but also beyond this context. However, such repurposing and recontextualizing of data may lead to privacy issues. For instance, data reuse may lead to issues regarding informed consent and informational self-determination. When the data is used for profiling and other types of predictive analytics, also issues regarding stigmatization and discrimination may arise. This presentation by Bart Custers, Head of Research, eLaw – Center for Law and Digital Technologies at Leiden University, The Netherlands, focuses on the privacy issues of big data sharing and reuse and how these issues could be addressed.
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cybera Inc.
Stephen Childs was hired by the University of Calgary to develop an individual-level predictive model mapping students' decisions to attend the University. In his experience, the higher education sector was slow to use all the data it has available, but this is now changing.
As interest in making use of organizational data grows, staff must consider how these models will be used, and any problems that could arise. When individual predictions become the basis for decisions, how do we ensure our algorithms don't make existing problems worse? A framework for handling these issues now will let organizations handle these issues in a way that is consistent with their values.
Given the culture of today's institutions, and the success of predictive analytics in other fields, there is no doubt that these tools will be used. These techniques can improve student success and the competitiveness of educational organizations, but the benefits should not be gained at the expense of individuals within the system. This talk will propose a set of best practices for using institutional data for predictive modelling to address equity, privacy and other concerns. We must start thinking of this now, before other practices become entrenched.
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cybera Inc.
Canada’s National Research and Education Network, like other ultra-speed research networks, has evolved to transfer massive amounts of data at 100Gbps and beyond. But with the volume of data traffic growing at more than 50% per year, the ability to move increasing volumes of data is challenging. What are the kinds of applications in research and education that are driving this growth? What are the implications of the coming data tsunami on our communication networks? And what happens to network economics to keep up with the demand? CANARIE’s Chief Technology Officer, Mark Wolff, explores these topics and offer insights into how the NREN will evolve to continue to meet the unique needs of Canada’s research and education community.
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCybera Inc.
The City of Calgary is responsible for providing municipal services to 1.1 million people and 16,000 employees with more than 700 sites and critical infrastructure units. The municipal services represent a $60B asset base including water and wastewater treatment plants, light rapid transit, emergency services, roads and recreation facilities, and has revenue and procurement streams of $4.0B annually. During his tenure, Owen Key, Chief Security Officer and the Chief Information Officer for the City, has implemented enterprise systems for CCTV, access and ID control, physical security information management systems, and has responsibility for information security.
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cybera Inc.
The law has long struggled to keep pace with the rapid change that comes with the Internet and new technologies. From the cross-border challenges posed by a global network to the privacy implications of big data, law and policy simply cannot move at “Internet speed.” Yet despite the difficulties, politicians and policy makers increasingly find themselves at the heart of emerging policy issues, asked to address the balance between privacy and surveillance, the competing copyright interests of creators and users, and the market structure for network providers and disruptive competitors. This keynote talk will explore the emerging law and policy challenges, highlighting how all Internet users have the opportunity to help shape the digital policy landscape. Dr. Michael Geist is a law professor at the University of Ottawa where he holds the Canada Research Chair in Internet and E-commerce Law.
As institutions start to delve into the staff / student / consumer data they have been storing for years, new questions are emerging about the repercussions of using this data. How will it be analyzed? Who is doing the analysis? And what steps should be taken to protect user’s privacy?
Historically, the University of Alberta lacked a centrally managed repository for reporting data, resulting in inconsistency and disparity in access for units across campus. Meaningful and actionable reports were limited, and only focused on the interests and goals of the few units with data analysts who could synthesize the information.
Over the last couple of years, the University of Alberta has undertaken major changes in how information is managed and utilized. At the forefront of this change has been an increased interest in supporting the development of analytics and supporting tools. Beginning with the implementation of a centrally managed data warehouse with self-service capabilities, and the introduction of cloud services with business process analysis tools, the University is just starting down the road of big data.
This presentation explores opportunities and challenges for the University of Alberta in utilizing big data.
Predicting the Future With Microsoft BingCybera Inc.
The next generation of data scientists will be asked to build predictive models that can extract inferences from very large datasets which are unobservable at the surface, even to the best domain experts. Microsoft has access to some truly large data sets, web and search data from the Bing search engine and social data through collaborations with Twitter. In this talk, we show you how a small team of data scientists used this data to build the Bing Predicts engine — a collection of machine learnt predictive models that is beating industry experts at predicting the outcome of events like the Super Bowl, the Oscars, elections and referendums and even breakthroughs in health sciences. The talk will also give a preview of how organizations can adopt a big data mindset to generate and experiment with large data sets and to make amazing predictions using their own data.
Analytics 101: How to not fail at analyticsCybera Inc.
"Data Scientist" is perhaps the hottest job title of recent years. But what is a data scientist? What does a data scientist actually do? And where can they be found? In this talk, presenter Daniel Haight describes the benefits of analytics to decision-making, and explores the characteristics of successful organizations that have fostered their own team of data scientists.
The MOOC movement is only four years old, but has already had a tremendous impact on teaching and learning. While the some of the original hype surrounding MOOCs has not been realized, the reality is that they are here for good and are influencing institutional thinking. This talk will discuss the past, present and future of MOOCs.
While the use of online instructional technologies allows the presentation of theoretical science materials, how do we deal with the fact that such courses often include hands-on labs? Laboratory simulations can only provide a solution for online students in a limited and often artificial way. Nearly 20 years ago, Athabasca University developed a solution to the problem of students having to travel to complete their lab work. Emerging technologies at the time allowed for quantitative physics labs to be sent to students as a small kit. The physics initiative was so successful, with over 5,000 students served, that it was picked up in other fields at Athabasca University.
Over the years, such material has become cheaper, easier to use, and more integrated with modern computers. Athabasca is now pioneering ways to put real labs directly onto the internet. In this session, the methods used to make real lab experiences available to online students will be discussed, and some of them demonstrated.
Canadian municipalities are making great strides when it comes to sharing their data in fun, interactive ways. In this session, presenters will look at cities that are using their data to create useful apps and services for citizens; and describe how all community leaders can get involved to make their municipality more open and accessible.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges. This session will offer insights into best practices for healthcare analytics programs, as well as use cases that demonstrate the potential benefits that can be realized through this work.
Checking in on Healthcare Data AnalyticsCybera Inc.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges.
Open access and open data: international trends and strategic contextCybera Inc.
Governments around the world fund billions of dollars in research every year. Ensuring that the results of research are available to the public, other researchers and industry has become an important underlying value in order to maximize the impact of our publicly funded research. This session will discuss what’s driving the trend towards greater openness and provide an overview of international developments that will help put Canada’s activities into context.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
2. CI 2.0 Powering Web 2.0 and Beyond OUTLINE
• Globalization
• Cyberinfrastructure in Alberta
• Cybera Inc.
• Pilot Projects
• Examples of Cyberinfrastructure
• CI Summit
3. CI 2.0 Powering Web 2.0 and Beyond
• Struggling gold company went
to the masses and open-
sourced a site
• Mass collaboration found
more gold that company
could in previous proprietary
attempts
• Gave away data and got back
Wikinomics a $ 9 billion company
4. CI 2.0 Powering Web 2.0 and Beyond Finding Steve Fosset
Artificial
Artificial Intelligence
13. CI 2.0 Powering Web 2.0 and Beyond Overnight...
Almost overnight business became:
– Turbo-charged
– Technology-enabled
– Flatter
– Value-add focused
– Networked
– Virtual
14. CI 2.0 Powering Web 2.0 and Beyond Business...
Business...
• Leverages change
• Leverages technology
• Develops based on core competencies and
functions
• Partners to add value to customer experience
15. CI 2.0 Powering Web 2.0 and Beyond Business...
Business Requires Infrastructure
16. CI 2.0 Powering Web 2.0 and Beyond Business...
Infrastructure...
is changing
17. CI 2.0 Powering Web 2.0 and Beyond Supply Chain
“Location” is often
becoming less and
less relevant in the
supply chain
18. CI 2.0 Powering Web 2.0 and Beyond Value Chain
Business relies on infrastructure to move raw
materials to higher value states.
e.g. logistics, arts, equities, manufacturing
31. CI 2.0 Powering Web 2.0 and Beyond GLOBALIZATION
Third generation fiber optics
can now...
...carry 10 trillion bits per second
over a single strand of fiber
33. CI 2.0 Powering Web 2.0 and Beyond CYBERINFRASTRUCTURE
CI 1.0
34. CI 2.0 Powering Web 2.0 and Beyond CYBERINFRASTRUCTURE
Integration,
convergence,
sharing, publishing,
personalization,
communication,
collaboration,
virtualization
CI 2.0
41. CI 2.0 Powering Web 2.0 and Beyond CI Examples
Impacts, issues, problems, solutions given various
examples and stated business problems
42. CI 2.0 Powering Web 2.0 and Beyond
• Film and tape video editing was physical until 80’s
• Computers first controlled VCR’s starting in 80’s
• Complex programs with huge local storage requirements
in the 90’s
• Simple programs and huge local storage in 1998
• YouTube - video recorded, edited, stored, delivered and
processed directly from a lens on a cell phone or
computer
43. CI 2.0 Powering Web 2.0 and Beyond Google Docs
Software program
delivered as a webservice
Word, Excel, PPT
Storage and processing in
the cloud
Compute and licencing
costs go down
Collaboration improved
44. CI 2.0 Powering Web 2.0 and Beyond Amazon
• Simple Storage Service
• Elastic Compute Cloud
• What is the performance for specific applications? Will I save
money?
• Will it work for my business?
• Are there other options?
• Is it secure?
45. CI 2.0 Powering Web 2.0 and Beyond EBAY
• 200 million registered users
• 104 million items for sale
• 1.2 billion page views/day
• Thousands of servers
• Built own CI
• Not everybody has eBay like requirements, but even a
small infrastructure may be waste of resources
46. CI 2.0 Powering Web 2.0 and Beyond Happy Feet
Lord of the Rings surplus
processors created New
Zealand Super Computer
Centre (NZSC)
NZSC opened Texas office with
oil and gas company Stillwater
Indian seismic processing
company partnership that will
rent out surplus to ‘Bollywood’
movie companies
54. CI 2.0 Powering Web 2.0 and Beyond CI IN OIL & GAS
• Tradition in simulation, modelling, super computing
and even distributed computing.
• Technology assisted Exxon to drill more than double
original estimates from North Sea.
• Virtual drilling using central control centres, data
visualization, and sensors
• mPower, Eclipse, Star Reservoir Simulation Tools
55. CI 2.0 Powering Web 2.0 and Beyond CI IN OIL & GAS
Main Applications
• Seismic Processing
• Reservoir Modeling
• Visualization
• Risk Management for Utilities
• Energy Trading
• IT Optimization
56. CI 2.0 Powering Web 2.0 and Beyond CI IN OIL & GAS
Business Drivers
• Increasing efficiency and addressing skills shortages
• Handling more complex simulations, models and
analysis
• Addressing the issues of ‘more difficult’ exploration
(e.g. Tar Sands terrain modeling)
• Maximizing reserves and longevity sources
• Improving collaboration
• Cycles in exploration
57. CI 2.0 Powering Web 2.0 and Beyond WEATHER CHANNEL
Weather Channel is using
clusters and remote
instrumentation to deliver
services
– 1.9 million data sources
– billions of calculations
required to predict
specific weather
conditions
60. CI 2.0 Powering Web 2.0 and Beyond
CI ALLOWS...
Team rather than individual
Iterative rather than finished
Network based rather than locational
Managed complexity rather than imposed simplicity
Security and control; Access rather than ownership
Operating costs rather than capital costs
64. CI 2.0 Powering Web 2.0 and Beyond CYBERA MEMBERS
• Two industry members on Board
• Investors in CI and Cybera
• Help to guide vision and direction
• Improved opportunities for
collaboration
• Increased human resource and
technical capacity
• Increased access to users, decision-
makers, and CI resources
65. CI 2.0 Powering Web 2.0 and Beyond PILOT PROJECTS
GeoChronos - Dr. Arturo Sanchez
Research: Impacts of land use/cover change on biodiversity
loss and habitat fragmentation
Cyberinfrastructure: Automate manual tasks in retrieving,
processing and graphing remote sensing data
Increased Productivity: Graphs created in 1-2 weeks from 2-4
months
Deferred Operating: Additional staff not needed to create
graphs
66. CI 2.0 Powering Web 2.0 and Beyond PILOT PROJECTS
EcoSys Experiment Engine - Dr. Robert Grant
Research: Monitoring carbon exchange to model climate change
and study resource management.
Cyberinfrastructure: Improve workflow and automate computation.
Deferred Operating: saving $50,000 a year by removing the need
for a programmer.
Deferred Capital: Increase machine usage.
67. CI 2.0 Powering Web 2.0 and Beyond Action Items
Need cyberinfrastructure?
1. Engage in a pilot project
2. Become a Cybera member
3. Join us at the CI Summit
68. CI 2.0 Powering Web 2.0 and Beyond Industry Pilot Projects
• Impact industry in Alberta government
priority areas of ICT, Life Sciences, Energy
and Nanotechnology
• Looking for return on technology investment
improvements
• Looking for new ways to reach customers
• Extend benefits to others
• Advancing state-of-art
69. CI 2.0 Powering Web 2.0 and Beyond Industry Pilot Projects
How can Cybera help your business?
1. Cybera can supply or facilitate access to a quot;test-bedquot; for
CI developments.
2. Cybera can connect you with CI technical experts
3. Cybera can arrange access to CI resources, such as
HPC, high-speed networks, middle-ware development
4. Cybera can provide financial support for CI development
70. october 11 - 12, 2007 banff, ab
CYBERINFRASTRUCTURE SUMMIT:
Innovation at Work
presented by:
Discover how international colleagues in research and industry are using
new technologies to tackle science and business challenges, increase
return-on-technology investments, and change the way they do business.
Join Cybera for a showcase of ‘Innovation at Work’.
KEYNOTE SPEAKERS:
Geoffrey Fox PANEL SESSIONS:
Vice-President E-Science, Open Grid
Forum • CI: Helping Push Research
Boundaries
Nancy Wilkins-Diehr
TeraGrid, Area Director for Science
Gateways • Solving Business Challenges
with CI
Dominique Thomas
Software Development Manager, • CI At Work In Alberta
CGGVeritas
Victor Spigelman
SOA Business Development
Executive, IBM VENUE:
Fairmont Banff Springs Hotel
405 Spray Avenue -- Banff, AB
T: 1-800-257-7544
E: banffsprings@fairmont.com
TO REGISTER:
To register, or for more information
on the schedule, invited speakers, *There are a block of rooms set aside at
and Summit activities, please visit: the hotel for overnight guests. To take
advantage of this conference rate, please
state you are with the Cybera group.
www.cybera.ca
71. CI 2.0 Powering Web 2.0 and Beyond Contact
Trevor Doerksen
Cybera Inc.
403-668-7039
trevord@cybera.ca