The document discusses mobility challenges facing two law enforcement agencies:
1) The agencies need to support a mobile workforce as most work is done in the field and there is a need for real-time information access.
2) This requires new techniques to securely manage an increasing number of mobile devices and evolving work styles.
3) There are challenges around balancing security, functionality and costs when exposing enterprise systems and data to mobile users.
The document discusses a pilot program to deploy iPads and iPhones within the Department of Justice (DOJ) environment. It notes that the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) and U.S. Marshals Service (USMS) have highly mobile workforces that would benefit from increased mobility and productivity. The pilot aims to test usability, functionality, technical obstacles, and costs of deploying mobile devices within the DOJ environment while maintaining device and operating system independence. iOS devices are being tested initially due to their market share, ease of use, and form factor. The solution architecture centers around a secure mobile workforce with access to enterprise and collaboration applications through a centralized device management
ATF & USMS Mobility Pilot AFCEA 17Mar2011Rick Holgate
This document discusses a pilot program to deploy and support iPads/iPhones within the Department of Justice environment. It outlines factors driving mobility within the Bureau of Alcohol, Tobacco, Firearms and Explosives and U.S. Marshals Service, including law enforcement missions conducted away from the office and the need for real-time information. The objectives of the pilot program are to deliver functionality, test use cases, understand technical obstacles, and demonstrate secure device management while maintaining device independence. Core technical objectives include application deployment strategies and device management policies. Scenarios for functional users are also described.
Dell NVIDIA AI Roadshow - South Western OntarioBill Wong
- Artificial intelligence (AI) is mimicking human intelligence through machine algorithms like those used for chess and facial recognition. Machine learning (ML) is a subset of AI that uses algorithms to parse data, learn from data, and make predictions. Deep learning (DL) uses artificial neural networks to develop relationships in data and is used for applications like driverless cars and cybersecurity.
- AI technologies are enabling digital transformation and require infrastructure like edge computing, GPUs, FPGAs, deep learning accelerators, and specialized hardware to power applications of AI, ML, and DL. Dell Technologies provides platforms and solutions to accelerate AI workloads and support digital transformation.
This document summarizes the Industrial Economics and Knowledge Center (IEK) at ITRI. It describes IEK as a cross-disciplinary research unit providing market intelligence, technology trends, and strategic insights. IEK conducts research across various industries and technologies, acting as an industry analyst, consultant, government think tank, and pilot for technology foresight and product strategy. The document provides examples of IEK's industrial analysis and forecasting work.
02 dsp valley p.simkens_internationalization and smart specialization_day 3_s...ClusterExcellence
The DSP Valley cluster in Flanders, Belgium aims to stimulate innovation through partnerships. Its mission is to offer a platform for potential partners to meet, exchange ideas, and help one another by exploiting technological complementarities. The cluster focuses on design of embedded signal processing systems, offering synergies across competencies. It has established partnerships with other European clusters specializing in embedded systems and semiconductor technologies. The cluster also contributes to Flanders' smart specialization strategy for nanotechnologies in health by linking domains like wireless imaging and sound processing to health applications, and connecting design partners with nanotechnology and life sciences platforms.
Protecting Emerging Technology in the World of Internet of Things (IoTs), Art...Essentiality Check
The document discusses challenges for intellectual property counsel in protecting emerging technologies integrated into business products and services. It focuses on challenges for protecting internet of things (IoT) technologies, including artificial intelligence. Key challenges include securing adequate patent protection given that new innovations may automate known processes or apply known techniques. The document also discusses compliance with various standards and regulations for wireless technologies used in IoTs, as well as issues around graphical user interfaces, design patents, and patent eligibility of artificial intelligence inventions.
Securing industrial and smart grid devices in a connected world webinar (final)gretchensimm
The document discusses securing industrial and smart grid devices in a connected world. It outlines Mocana's security products and services for securing smart devices and applications. Recent vulnerabilities in smart grids and industrial systems are highlighted, demonstrating the value of security. Key concerns in smart grids include protecting infrastructure from threats, public safety, and compliance. Security needs include scalable and efficient solutions for resource-constrained devices and encrypting data across the smart grid ecosystem.
The document discusses a pilot program to deploy iPads and iPhones within the Department of Justice (DOJ) environment. It notes that the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) and U.S. Marshals Service (USMS) have highly mobile workforces that would benefit from increased mobility and productivity. The pilot aims to test usability, functionality, technical obstacles, and costs of deploying mobile devices within the DOJ environment while maintaining device and operating system independence. iOS devices are being tested initially due to their market share, ease of use, and form factor. The solution architecture centers around a secure mobile workforce with access to enterprise and collaboration applications through a centralized device management
ATF & USMS Mobility Pilot AFCEA 17Mar2011Rick Holgate
This document discusses a pilot program to deploy and support iPads/iPhones within the Department of Justice environment. It outlines factors driving mobility within the Bureau of Alcohol, Tobacco, Firearms and Explosives and U.S. Marshals Service, including law enforcement missions conducted away from the office and the need for real-time information. The objectives of the pilot program are to deliver functionality, test use cases, understand technical obstacles, and demonstrate secure device management while maintaining device independence. Core technical objectives include application deployment strategies and device management policies. Scenarios for functional users are also described.
Dell NVIDIA AI Roadshow - South Western OntarioBill Wong
- Artificial intelligence (AI) is mimicking human intelligence through machine algorithms like those used for chess and facial recognition. Machine learning (ML) is a subset of AI that uses algorithms to parse data, learn from data, and make predictions. Deep learning (DL) uses artificial neural networks to develop relationships in data and is used for applications like driverless cars and cybersecurity.
- AI technologies are enabling digital transformation and require infrastructure like edge computing, GPUs, FPGAs, deep learning accelerators, and specialized hardware to power applications of AI, ML, and DL. Dell Technologies provides platforms and solutions to accelerate AI workloads and support digital transformation.
This document summarizes the Industrial Economics and Knowledge Center (IEK) at ITRI. It describes IEK as a cross-disciplinary research unit providing market intelligence, technology trends, and strategic insights. IEK conducts research across various industries and technologies, acting as an industry analyst, consultant, government think tank, and pilot for technology foresight and product strategy. The document provides examples of IEK's industrial analysis and forecasting work.
02 dsp valley p.simkens_internationalization and smart specialization_day 3_s...ClusterExcellence
The DSP Valley cluster in Flanders, Belgium aims to stimulate innovation through partnerships. Its mission is to offer a platform for potential partners to meet, exchange ideas, and help one another by exploiting technological complementarities. The cluster focuses on design of embedded signal processing systems, offering synergies across competencies. It has established partnerships with other European clusters specializing in embedded systems and semiconductor technologies. The cluster also contributes to Flanders' smart specialization strategy for nanotechnologies in health by linking domains like wireless imaging and sound processing to health applications, and connecting design partners with nanotechnology and life sciences platforms.
Protecting Emerging Technology in the World of Internet of Things (IoTs), Art...Essentiality Check
The document discusses challenges for intellectual property counsel in protecting emerging technologies integrated into business products and services. It focuses on challenges for protecting internet of things (IoT) technologies, including artificial intelligence. Key challenges include securing adequate patent protection given that new innovations may automate known processes or apply known techniques. The document also discusses compliance with various standards and regulations for wireless technologies used in IoTs, as well as issues around graphical user interfaces, design patents, and patent eligibility of artificial intelligence inventions.
Securing industrial and smart grid devices in a connected world webinar (final)gretchensimm
The document discusses securing industrial and smart grid devices in a connected world. It outlines Mocana's security products and services for securing smart devices and applications. Recent vulnerabilities in smart grids and industrial systems are highlighted, demonstrating the value of security. Key concerns in smart grids include protecting infrastructure from threats, public safety, and compliance. Security needs include scalable and efficient solutions for resource-constrained devices and encrypting data across the smart grid ecosystem.
The document discusses a new managed services offering called SmartCloud from SpiderCloud Wireless that provides indoor 3G and WiFi access as a managed service for enterprises. It allows enterprises to outsource indoor wireless access and mobility management to reduce costs and IT burdens. SmartCloud provides a seamless network experience between enterprise LANs and cellular networks for mobile employees. The system architecture uses scalable radio nodes and services nodes to provide a flexible, mobile network as a service. This allows enterprises to focus on their core business instead of managing complex indoor wireless networks.
The document summarizes Israeli IT market trends from 2003-2010. It provides detailed breakdowns of revenues and market shares for major hardware, software, and services categories. Some key findings are that 2007 marked a shift towards more spending on integration and maintenance compared to new development. It also notes that total vendor revenues are higher than market values due to multi-layered sales partnerships. Major Israeli IT vendors such as HP, IBM, and Matrix had the largest overall market shares across categories.
"Hosted IP Services: Fleeting Fad or Evolving Environment?"John Turner
The document summarizes a presentation on hosted IP services and how they relate to Nicholas Carr's theory that IT no longer provides strategic advantage. It discusses how hosted IP services represent a fundamental shift in the ITC industry by allowing companies to outsource non-core IT functions. Examples are provided of how hosted services can enable business functions like mobility, disaster recovery, and multi-site unification. Early adopters are said to value the cost savings and focus on their core business that hosted services provide.
This document discusses the history and modern approaches to knowledge management systems on the desktop. It traces ideas back to Vannevar Bush's 1945 proposal of the memex device. More recent systems like Doug Engelbart's NLS in the 1960s and Ted Nelson's Xanadu aimed to improve linking and navigation of information. Modern semantic desktops take a layered, modular approach and use ontologies and semantic technologies to unlock and integrate desktop data. They provide services like storage, extraction, annotation and inference to enhance existing applications and help users manage information overload. Evaluation of these systems remains a challenge due to their personal, customized nature.
NORONESC is an IT consultancy firm founded in 1997 located in Portugal that specializes in implementing and integrating Oracle technology solutions. It is an Oracle Certified Partner that works with clients to support their strategic decisions and implement Oracle products like E-Business Suite. NORONESC provides Oracle consulting expertise and ensures customers are successful in achieving their business goals through maximizing the return on their Oracle investments. The company focuses on delivering innovative Oracle-based solutions across various phases of projects from planning to optimization.
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...Till Riedel
The document discusses using web service gateways and code generation for sustainable IoT system development. It motivates applying IoT in industrial environments using heterogeneous nodes like RFID and wireless sensor networks. It proposes using web services as a common language for the IoT due to benefits like loose coupling, message orientation, and support in many programming languages. The document presents an approach using web service discovery, device profiling, and declarative mappings to generate gateways that integrate different IoT platforms and protocols as web services. This allows capturing IoT applications and enabling different hardware platforms through a common development process.
Six steps to survive and thrive with a mobile workforceInka Traktman
Six steps that help IT manage endpoint devices in light of mobility and BYOD
This webinar outlines some of the considerations global enterprises are faced with when it comes to remote workforces.
Endpoint Management
The document discusses the importance of systems of record for businesses. It notes that systems of record are highly structured, transactional, reliable, and core to the business. In contrast, systems of engagement are loosely structured, quick to adapt, conversational, and at the edge of the business. The document advocates developing a strategy to modernize applications and transition to newer architectures like cloud, while ensuring systems of record still meet business needs as engagement systems evolve.
This document discusses how telecom companies can leverage artificial intelligence and analytics to drive digital transformation. It identifies key opportunities for AI including improving the customer experience, fraud mitigation, and predictive maintenance. It then outlines the components of a telecom data lake that can support these advanced analytics initiatives. Examples of AI use cases for different telecom business functions like marketing, network operations, and security are also provided. The document argues that a data lake platform optimized for analytics can help telecom companies achieve business and innovation goals through improved operations, new revenue streams, and lower costs.
Leveraging information from federated sources through IBM Jazz for Service Ma...Icaro Tech
Learn how to Empower Your Service Management Team with Data from Federated Sources Using IBM Jazz for Service Management.
This content was originaly presented at IBM PULSE 2013 Conference, in Las Vegas - NV.
Speakers:
Fernando Moraes, R&D Manager, Ícaro Technologies
Chris Lazzaro, IBM
-> Watch Advanced Dashboards 2.0 demo: federated, dynamic integration with information providros, using OSLC http://youtu.be/BO-_0X58Nyo
More information: http://smconnect.net/jazzsm
Orange Legal Technologies provides electronic discovery services including collection, analysis, processing, review, and production of electronic documents and data. It has a proprietary web-accessible platform called OneO that integrates these services, allowing clients to analyze, process, and review data online from a centralized repository. The company has over 40 of the top 200 US law firms as clients and offices in 4 locations, led by an experienced management team with over 136 combined years in the industry.
The document discusses the MobiLife project, which aims to develop new mobile applications and services with context-awareness and multi-modal interfaces. It focuses on developing applications that are self-aware of the user's local environment and automatic device configuration, group-aware of context and presence, and world-aware to support seamless access across domains. Examples provided include applications that track a user's context, plan family activities using location awareness, monitor health with a heart sensor, and schedule group activities. Business models for these applications may include subsidies, advertising, premium services, or new roles for context and trust providers. Open issues discussed include addressing privacy across physical, decisional and proprietary contexts and managing identity and anonymity with data protection laws
Syslog Technologies is a technology solutions and services provider founded in 2005. It has over 8 years of experience providing customized IT solutions, development and education services, and staffing to various industries. It offers training programs conducted by industry experts on topics such as cloud computing, networking security, mobile computing, and wireless sensor networks. The company aims to train and place students and professionals through both academic projects and industry-oriented training.
The document discusses how the desktop environment is changing with new technologies like virtual desktop infrastructure (VDI), application streaming, and thin clients. It also covers strategic changes like curated computing models and how brain interfaces may replace keyboards and mice by 2020. Finally, it addresses deployment options and new delivery models for IT like public, private, and hybrid clouds.
The document discusses secure mobility initiatives at the Bureau of Alcohol, Tobacco, Firearms & Explosives (ATF) and the US Marshals Service (USMS). It outlines factors driving increased mobility needs, including law enforcement missions requiring field work, emergencies, and demand for real-time data. Trends include reducing personnel and traditional office seats while increasing telework and mobile devices. Key priorities are supporting the mobile workforce, integrating mission data across systems, and refining infrastructure to maximize efficiency. Challenges include securing devices in changing environments and incorporating mobility cost-effectively.
The document discusses how digital disruption is transforming industries and forcing companies to become digital leaders. It describes the characteristics of digital leaders as converting data into value, combining digital forces like cloud, mobile and data, and building open ecosystems. The document advocates that to support a digital business strategy and close the gap between strategy and execution, companies need a digital business platform to provide functions like marketing cloud, mobile development tools, analytics services, and big data solutions.
A presentation explaining how Finnish industry looks at Industrial Internet, how it differs from the German Industrie 4.0. Players in the IoT game. Is the position of traditional industrial companies threatened by new comers like Google.
Comilion aims to create the first crowd-sourcing platform for mobile app vulnerability assessment and dynamic app permission management. The founders have extensive experience in cyber security and IT management. Comilion's technology will offer app risk evaluation and recommendations to help secure private and work data on devices in BYOD environments. The company is seeking $1M to launch consumer and enterprise products and establish partnerships with mobile device management providers.
The document summarizes information from the Cyber Defense Initiative Conference 2011, which was held on March 20-21, 2012 in Bangkok, Thailand. The conference focused on security and privacy challenges in the digital world. It included discussions on topics like the ASEAN ICT workforce, cloud computing readiness scores, security threats, and the need for training in new skills like cloud security. The document concludes that consumerization is changing security needs and that certifications will remain important for information security professionals.
This document discusses Oracle's focus on and strategy for the embedded software market. It notes that Oracle offers a full range of embeddable databases and products to provide flexibility for developers. The embedded software license distribution agreement details the application that embeds Oracle technology. Oracle addresses the needs of customers across industries like mobile devices, telecom, manufacturing, and more through its embedded platform and databases.
The document discusses a new managed services offering called SmartCloud from SpiderCloud Wireless that provides indoor 3G and WiFi access as a managed service for enterprises. It allows enterprises to outsource indoor wireless access and mobility management to reduce costs and IT burdens. SmartCloud provides a seamless network experience between enterprise LANs and cellular networks for mobile employees. The system architecture uses scalable radio nodes and services nodes to provide a flexible, mobile network as a service. This allows enterprises to focus on their core business instead of managing complex indoor wireless networks.
The document summarizes Israeli IT market trends from 2003-2010. It provides detailed breakdowns of revenues and market shares for major hardware, software, and services categories. Some key findings are that 2007 marked a shift towards more spending on integration and maintenance compared to new development. It also notes that total vendor revenues are higher than market values due to multi-layered sales partnerships. Major Israeli IT vendors such as HP, IBM, and Matrix had the largest overall market shares across categories.
"Hosted IP Services: Fleeting Fad or Evolving Environment?"John Turner
The document summarizes a presentation on hosted IP services and how they relate to Nicholas Carr's theory that IT no longer provides strategic advantage. It discusses how hosted IP services represent a fundamental shift in the ITC industry by allowing companies to outsource non-core IT functions. Examples are provided of how hosted services can enable business functions like mobility, disaster recovery, and multi-site unification. Early adopters are said to value the cost savings and focus on their core business that hosted services provide.
This document discusses the history and modern approaches to knowledge management systems on the desktop. It traces ideas back to Vannevar Bush's 1945 proposal of the memex device. More recent systems like Doug Engelbart's NLS in the 1960s and Ted Nelson's Xanadu aimed to improve linking and navigation of information. Modern semantic desktops take a layered, modular approach and use ontologies and semantic technologies to unlock and integrate desktop data. They provide services like storage, extraction, annotation and inference to enhance existing applications and help users manage information overload. Evaluation of these systems remains a challenge due to their personal, customized nature.
NORONESC is an IT consultancy firm founded in 1997 located in Portugal that specializes in implementing and integrating Oracle technology solutions. It is an Oracle Certified Partner that works with clients to support their strategic decisions and implement Oracle products like E-Business Suite. NORONESC provides Oracle consulting expertise and ensures customers are successful in achieving their business goals through maximizing the return on their Oracle investments. The company focuses on delivering innovative Oracle-based solutions across various phases of projects from planning to optimization.
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...Till Riedel
The document discusses using web service gateways and code generation for sustainable IoT system development. It motivates applying IoT in industrial environments using heterogeneous nodes like RFID and wireless sensor networks. It proposes using web services as a common language for the IoT due to benefits like loose coupling, message orientation, and support in many programming languages. The document presents an approach using web service discovery, device profiling, and declarative mappings to generate gateways that integrate different IoT platforms and protocols as web services. This allows capturing IoT applications and enabling different hardware platforms through a common development process.
Six steps to survive and thrive with a mobile workforceInka Traktman
Six steps that help IT manage endpoint devices in light of mobility and BYOD
This webinar outlines some of the considerations global enterprises are faced with when it comes to remote workforces.
Endpoint Management
The document discusses the importance of systems of record for businesses. It notes that systems of record are highly structured, transactional, reliable, and core to the business. In contrast, systems of engagement are loosely structured, quick to adapt, conversational, and at the edge of the business. The document advocates developing a strategy to modernize applications and transition to newer architectures like cloud, while ensuring systems of record still meet business needs as engagement systems evolve.
This document discusses how telecom companies can leverage artificial intelligence and analytics to drive digital transformation. It identifies key opportunities for AI including improving the customer experience, fraud mitigation, and predictive maintenance. It then outlines the components of a telecom data lake that can support these advanced analytics initiatives. Examples of AI use cases for different telecom business functions like marketing, network operations, and security are also provided. The document argues that a data lake platform optimized for analytics can help telecom companies achieve business and innovation goals through improved operations, new revenue streams, and lower costs.
Leveraging information from federated sources through IBM Jazz for Service Ma...Icaro Tech
Learn how to Empower Your Service Management Team with Data from Federated Sources Using IBM Jazz for Service Management.
This content was originaly presented at IBM PULSE 2013 Conference, in Las Vegas - NV.
Speakers:
Fernando Moraes, R&D Manager, Ícaro Technologies
Chris Lazzaro, IBM
-> Watch Advanced Dashboards 2.0 demo: federated, dynamic integration with information providros, using OSLC http://youtu.be/BO-_0X58Nyo
More information: http://smconnect.net/jazzsm
Orange Legal Technologies provides electronic discovery services including collection, analysis, processing, review, and production of electronic documents and data. It has a proprietary web-accessible platform called OneO that integrates these services, allowing clients to analyze, process, and review data online from a centralized repository. The company has over 40 of the top 200 US law firms as clients and offices in 4 locations, led by an experienced management team with over 136 combined years in the industry.
The document discusses the MobiLife project, which aims to develop new mobile applications and services with context-awareness and multi-modal interfaces. It focuses on developing applications that are self-aware of the user's local environment and automatic device configuration, group-aware of context and presence, and world-aware to support seamless access across domains. Examples provided include applications that track a user's context, plan family activities using location awareness, monitor health with a heart sensor, and schedule group activities. Business models for these applications may include subsidies, advertising, premium services, or new roles for context and trust providers. Open issues discussed include addressing privacy across physical, decisional and proprietary contexts and managing identity and anonymity with data protection laws
Syslog Technologies is a technology solutions and services provider founded in 2005. It has over 8 years of experience providing customized IT solutions, development and education services, and staffing to various industries. It offers training programs conducted by industry experts on topics such as cloud computing, networking security, mobile computing, and wireless sensor networks. The company aims to train and place students and professionals through both academic projects and industry-oriented training.
The document discusses how the desktop environment is changing with new technologies like virtual desktop infrastructure (VDI), application streaming, and thin clients. It also covers strategic changes like curated computing models and how brain interfaces may replace keyboards and mice by 2020. Finally, it addresses deployment options and new delivery models for IT like public, private, and hybrid clouds.
The document discusses secure mobility initiatives at the Bureau of Alcohol, Tobacco, Firearms & Explosives (ATF) and the US Marshals Service (USMS). It outlines factors driving increased mobility needs, including law enforcement missions requiring field work, emergencies, and demand for real-time data. Trends include reducing personnel and traditional office seats while increasing telework and mobile devices. Key priorities are supporting the mobile workforce, integrating mission data across systems, and refining infrastructure to maximize efficiency. Challenges include securing devices in changing environments and incorporating mobility cost-effectively.
The document discusses how digital disruption is transforming industries and forcing companies to become digital leaders. It describes the characteristics of digital leaders as converting data into value, combining digital forces like cloud, mobile and data, and building open ecosystems. The document advocates that to support a digital business strategy and close the gap between strategy and execution, companies need a digital business platform to provide functions like marketing cloud, mobile development tools, analytics services, and big data solutions.
A presentation explaining how Finnish industry looks at Industrial Internet, how it differs from the German Industrie 4.0. Players in the IoT game. Is the position of traditional industrial companies threatened by new comers like Google.
Comilion aims to create the first crowd-sourcing platform for mobile app vulnerability assessment and dynamic app permission management. The founders have extensive experience in cyber security and IT management. Comilion's technology will offer app risk evaluation and recommendations to help secure private and work data on devices in BYOD environments. The company is seeking $1M to launch consumer and enterprise products and establish partnerships with mobile device management providers.
The document summarizes information from the Cyber Defense Initiative Conference 2011, which was held on March 20-21, 2012 in Bangkok, Thailand. The conference focused on security and privacy challenges in the digital world. It included discussions on topics like the ASEAN ICT workforce, cloud computing readiness scores, security threats, and the need for training in new skills like cloud security. The document concludes that consumerization is changing security needs and that certifications will remain important for information security professionals.
This document discusses Oracle's focus on and strategy for the embedded software market. It notes that Oracle offers a full range of embeddable databases and products to provide flexibility for developers. The embedded software license distribution agreement details the application that embeds Oracle technology. Oracle addresses the needs of customers across industries like mobile devices, telecom, manufacturing, and more through its embedded platform and databases.
The document discusses reshaping IT infrastructure to balance cost, risk, value, innovation and growth. It advocates developing a flexible infrastructure using two levers: 1) a flexible IT architecture based on virtualization, automation, and standards and 2) flexible IT sourcing through a combination of owned, external and hybrid cloud options. The document provides examples of how organizations can start reshaping their IT infrastructure through experimental usage of cloud services and by beginning with non-critical areas.
Most of the best technological innovation these days is coming from the mobile, cloud and consumer spaces, and few businesses can afford to opt-out from the benefits of mobility, agility, relationships, productivity, and economies of scale that they create. Individuals use ever wider variety of devices and self-provisioned consumer services to enrich daily activities, improve relationships and leverage collective information. While mobile apps are becoming the norm, signals of social apps are already increasing. The new IT guidelines are design for mobile, design for cloud, design for unstructured, design for social – and design for business context. How do you ensure your enterprise applications deliver enough knowledge-worker value? How much freedom should employees be given over technology choice? How to avoid governance becoming prohibitive and not agile enough to deal with the growing demands from users? How will a digitally connected world impact your business transactions, conversation and relationships? How would being “always on” change the way you and your customers organize and shorten decision cycles?
The document discusses Zenprise, a mobile device management solution. It summarizes Zenprise's offerings which include mobile management software, a cloud-based offering, and complete management of all major mobile device platforms. It also describes Zenprise's differentiated approach of providing security at all layers including the device, applications, network, and data layers. Finally, it provides examples of how Zenprise works and customer case studies.
The document discusses the mobile device management solution Zenprise. It summarizes that Zenprise offers complete management of mobile devices including iPhone, iPad, Android, Windows Mobile and Blackberry. It protects data at all layers from the device to applications to network to data. Some key features highlighted include dynamic defense at the device layer, mobile app tunnels at the application layer, and mobile security intelligence at the network layer. The document also provides case studies of aerospace and telecommunications companies that use Zenprise and discusses how Zenprise provides scalable solutions both on-premise and in the cloud.
This document summarizes a presentation by Thanachart Numnonda, the director of Software Park Thailand, about technology trends and the future vision and mission of Software Park Thailand. It discusses how emerging technologies like cloud computing, mobile applications, and social media present opportunities for Software Park Thailand to become a platform and community on the internet rather than being location-based. The presentation envisions Software Park Thailand strengthening the local software industry through initiatives like a mobile/cloud development space, software marketplace, and technology transfer programs, while positioning itself and local companies to succeed in an increasingly globalized and technology-driven business environment.
This document summarizes a presentation by Thanachart Numnonda, the director of Software Park Thailand, about technology trends and the future vision and mission of Software Park Thailand. It discusses how emerging technologies like cloud computing, mobile applications, and social media present opportunities for Software Park Thailand to become a platform and community on the internet rather than being location-based. The presentation envisions Software Park Thailand strengthening the software industry through initiatives like a mobile/cloud development space, software marketplace, and technology transfer programs, to help position Thailand to succeed in the new technology landscape.
Kevin Talbot has over 30 years of experience as a project manager, group manager, and product design engineer. He has worked on over 60 projects across various industries including medical devices, consumer electronics, and the military. Some of his most notable projects include developing a sleep monitoring device and obtaining FDA approval, leading the engineering of an assisted exercise machine, and managing projects for a research company developing technologies to treat PTSD.
This document summarizes Orange County's high technology sector, particularly the modeling, simulation, and training (MS&T) industry. It finds that Orange County has strengths in several high-tech industries like commercial machinery and data processing. The MS&T industry is a major part of the local economy but hard to define using standard industry codes. Most MS&T companies cluster near the University of Central Florida and support national security. The document concludes technological innovation will be important for the local economy and bioscience may also play a larger role.
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...Cloudera, Inc.
Security in a distributed environment is a growing concern for most industries. Few face security challenges like the Defense Community, who must balance complex security constraints with timeliness and accuracy. We propose to briefly discuss the security paradigms defined in DCID 6/3 by NSA for secure storage and access of data (the “Protection Level” system). In addition, we will describe the implications of each level on the Hadoop architecture and various patterns organizations can implement to meet these requirements within the Hadoop ecosystem. We conclude with our “wish list” of features essential to meet the federal security requirements.
Enabling the workforce of the future Aug2015Rick Holgate
The document discusses how the work environment has changed from employer-provided equipment used only within the office to personal devices and connectivity everywhere. It provides an overview of how the Bureau of Alcohol, Tobacco, Firearms & Explosives has transitioned to a more mobile workforce through the adoption of device-agnostic applications and mobile platforms. While there are still obstacles around security, infrastructure, and culture change, the increased mobility has improved productivity and resilience. The presentation also touches on considerations around cloud services, social media strategy, and preparing for an increasingly younger workforce.
ACT-IAC Rocky Mountain chapter - July 31 2014Rick Holgate
This document summarizes an event discussing advancing government through collaboration. It outlines the President's Management Agenda focusing on customer service, smarter IT delivery, and deploying a world-class workforce. It discusses perspectives from the Office of Management and Budget on viewing technology strategically and taking smart risks. Key initiatives to reform federal IT are outlined aiming to balance efficiency and effectiveness. The role of ACT-IAC in supporting smarter IT delivery through various frameworks and engagements is also summarized.
The document discusses customer centricity at the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). It notes that ATF has a diversity of internal and external customers with evolving expectations around mobility, cloud services, and accessibility. It outlines ATF's efforts to meet these expectations through mobility applications, cloud-based email and collaboration, refreshing user devices, externally facing services, and a next-generation case management system. It also provides some lessons learned around customer engagement, finding champions, communication during change, and adopting versus building new systems.
Mobile Work Exchange Fall Town Hall Meeting, 12Sep13Rick Holgate
The document summarizes a fall town hall meeting on mobile work exchange hosted by Rick Holgate from the Bureau of Alcohol, Tobacco, Firearms & Explosives. It discusses the potential for increased productivity and cost savings from telework estimated at nearly $14 billion per year. It outlines priorities around digital government strategies and open data policies. The document also covers challenges around security, infrastructure readiness and cultural acceptance but emphasizes the opportunities that increased mobility, connectivity and smart devices present for improved government services.
The Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) has over 200 years of history regulating firearms, alcohol and tobacco. It has evolved from the Department of the Treasury to the Department of Justice. ATF's mission is to reduce violent crime through enforcement and public safety services. It has over 5,000 employees across the United States and other countries. ATF focuses on priorities like strengthening firearms trafficking intelligence and dismantling criminal organizations that use firearms. It operates laboratories, training centers, and provides services like firearms tracing and the National Integrated Ballistics Information Network. ATF is working to modernize systems and support a mobile workforce within resource constraints.
SafeGov Cloud and Law Enforcement event - 31Jan13Rick Holgate
The Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) is transitioning to using cloud email and collaboration services provided by Microsoft Office 365. This will provide improved capabilities, availability, and pricing compared to the on-premises system. Key challenges include completing required background investigations for Microsoft staff supporting the system and integrating the new identity management, archival, and security systems. The transition involves piloting the new services before a full bureau-wide migration. The goal is to provide more cost-effective services while establishing a model that can be adopted by other government agencies.
Making mobility work for government -- practical applications 19 Jul 2012Rick Holgate
This document discusses the practical applications of mobility for government agencies. It notes that mobile device usage is growing rapidly and that mobility can enable employees to work more productively and recapture hours each week. However, security is seen as the main barrier to greater mobility. The document then outlines ATF's plans to develop its first mobile app for explosives incident reporting and discusses some of the challenges around balancing security and functionality for mobile users. It concludes by highlighting upcoming guidance from DHS and NIST on securing and managing mobile devices.
Advanced mobility dialog - outcomes and next steps aug2011Rick Holgate
The document summarizes a working group discussion on advancing mobility in the federal government. Key topics discussed included app ecosystems, security, human capital, and IT infrastructure challenges posed by increased mobility. Common themes that emerged were the need for information sharing of best practices and reusable solutions, reference architectures and security frameworks, and policies to support a mobile workforce and "mobile-first" approaches to citizen services. Next steps proposed were to inform relevant groups like the ACT-IAC and establish ongoing information sharing mechanisms to continue progressing mobility efforts across the government.
Sustaining the next generation federal worker aug 18 2011Rick Holgate
This document discusses factors driving mobility for the next generation of federal workers, including the need for real-time information access in the field, increasing telework, and leveraging consumer devices. It outlines challenges and objectives for an ATF/USMS pilot program testing the use of mobile devices for work. The core issues discussed are balancing security with functionality and usability across personal and enterprise devices and applications. The document predicts a future mix of user devices and services that leverages employee-owned devices for work alongside virtual desktop solutions, with tighter security management and lower costs. It argues that mobility is disruptive but essential for the next generation of IT infrastructure.
ATF Overview of Programs and Priorities (AFCEA Tech Cmte, 18 Nov10)Rick Holgate
The document provides an overview of the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) including its mission, history, organization, initiatives, and priorities. It discusses the ATF strategic plan, key programs like Project Gunrunner and the National Integrated Ballistic Information Network (NIBIN). It also summarizes the Office of Science and Technology (OST) organization, strategic goals, and initiatives to support mobility and integrate mission data.
Overview of OST Information Technology Programs March 2011Rick Holgate
This document provides an overview of the Office of Science and Technology (OST) IT programs at the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF). It outlines the OST organizational structure and leadership. It also discusses OST strategic goals, priorities, and critical initiatives to support ATF's mobile workforce and integrate mission data. The document presents a multi-year IT roadmap and describes plans to evolve services and infrastructure to increase efficiency while supporting ATF's unique national services.
Overview of OST Information Technology Programs March 2011
Good Mobility Forum 12Oct2011
1. Office of Science and Technology
Supporting the Mobile
Federal Workforce
Rick Holgate
Assistant Director for Science & Technology / CIO
Good Technology Public Sector Mobility Summit
October 12, 2011
2. Office of Science and Technology
Factors Driving Mobility at ATF & USMS
(& for the Next-Generation Federal Worker)
• Law enforcement and regulatory missions
– Most work happens away from the office
– Productivity enhancement
• Emergent situations
– Special operations, major events, ESF 13, COOP/DR, …
• Increasing demand for real-time information
– “Knowing what we know”
• Telework / real estate costs
• Predominantly controlled unclassified information
12 October 2011 innovative applications of science and technology 2
3. Office of Science and Technology
ATF Organizational Snapshot
(round numbers)
Personnel Mobile Data Devices
200
750
iOS
12,000 Contractors / 12,000
Task Force
10,000 Officers / Others 10,000 4,000 Cell phones
Other
8,000 8,000
Professional BlackBerries
1,200
2,400 Staff
6,000 6,000
Industry
Cellular
4,000 1,738 Operations 4,000 Broadband
806 Investigators 6,500
2,000 Special Agents 2,000 Laptops
2,560 (w/secure
- - WiFi)
How do we simplify this and make it more cost-effective?
12 October 2011 innovative applications of science and technology 3
4. Office of Science and Technology
Challenges
Rapidly changing and escalating expectations of users for
availability, usability, and functionality in mobile environments
Need for new techniques and technologies
to secure and manage such devices
Evolving workforces and work styles
Need to incorporate increasing mobility
into a cost-effective portfolio of user equipment
Potential impacts of combined personal and business usage
of such devices
12 October 2011 innovative applications of science and technology 4
5. Office of Science and Technology
Core Issues to be Solved
12 October 2011 innovative applications of science and technology 5
6. Office of Science and Technology
Security and Functionality:
Risk vs. Reward
Scope and
complexity
of security
Access to (enterprise, device) functionality
12 October 2011 innovative applications of science and technology 6
7. Office of Science and Technology
Competing Models
Personal use Personal use
Enterprise apps/data Enterprise apps/data/device
• Convenient, flexible, “BYO” • Enterprise-managed device
• “Simple” security, policies • More complex security,
• Limited enterprise policies
functionality • Rich enterprise functionality,
constrained personal use
12 October 2011 innovative applications of science and technology 7
8. Office of Science and Technology
Exposing Enterprise Functionality
to Mobile Users
Virtualization
Legacy
Thick-Client
Apps
“Light” Custom Mobile Apps
Enterprise Expose through Commercial Apps Mobile
Services (BI, content management, VoIP, …) Users
Rebuild/Re-skin for Mobile Devices
Enterprise
Web Apps
“Light” Custom Mobile Apps
12 October 2011 innovative applications of science and technology 8
9. Office of Science and Technology
Application Deployment Strategies
Training and Reference Soft Token for Two-
Materials Factor Authentication
(internal content
management)
Enterprise Data:
Business Intelligence
Enterprise Apps:
• NFOCIS (ATF case
management) VPN for Enterprise
• JDIS (USMS) Access
• MS Office
• Content repository
Sandboxed Access to
Enterprise Productivity
Document Authoring, (Exchange, etc.),
Collaboration using Internal Web Apps
Enterprise Content: (ATFWeb, HRConnect)
• WebDAV
• Enterprise Content
Management System
• IDEA/MyFX (?) VoIP/Phone Integration
12 October 2011 innovative applications of science and technology 9
10. Office of Science and Technology
Application Deployment Strategies
Collaboration
Personal accounts (?)
Gmail, Yahoo, Hotmail
Dictation for
integration with
productivity apps
Personal applications
(?)
Video surveillance and
evidence management
(Provided as a cloud-
based service) External Web Apps:
• WebTA
• learnATF/learnDOJ
• eTrace
12 October 2011 innovative applications of science and technology 10
11. Office of Science and Technology
Mobility is Disruptive
• Consumer technology outpacing enterprise
comfort
• Traditional models and mentality cannot hold
• Mobility is the next generation of IT infrastructure
delivery
– Not a passing fad or a separate “project”
• Many grass roots efforts across the federal
space
– Risk of divergent approaches
– Value of the collective federal enterprise
12 October 2011 innovative applications of science and technology 11