This document summarizes a presentation given by Dominique Thomas on opportunities for new business models using grid computing. Some key points discussed include:
- Trends in high performance computing showing increasing demand for more computing power and data storage.
- European projects like BEinGRID and EGEE that are developing grid infrastructure for e-science applications.
- Challenges faced by CGGVeritas in seismic processing like needing more computing power and better management of large datasets and computing resources.
- Potential benefits of adopting grid computing for CGGVeritas including better optimization of IT resources, ability to solve more complex problems, knowledge sharing, and new business opportunities.
Determine the Right Analytic Database: A Survey of New Data Technologiesmark madsen
There has been an explosion in database technology designed to handle big data and deep analytics from both established vendors and startups. This session will provide a quick tour of the primary technology innovations and systems powering the analytic database landscape—from data warehousing appliances and columnar databases to massively parallel processing and in-memory technology. The goal is to help you understand the strengths and limitations of these alternatives and how they are evolving so you can select technology that is best suited to your organization and needs.
Presentation from the O'Reilly Strata conference, February 2011
Currie Munce, VP of HGST, gave the talk at CAISS Annual Conference 2012, as part of the panel discussion: Storage Component Technologies - Enable Big Data and Make Better Cloud Computing.
Determine the Right Analytic Database: A Survey of New Data Technologiesmark madsen
There has been an explosion in database technology designed to handle big data and deep analytics from both established vendors and startups. This session will provide a quick tour of the primary technology innovations and systems powering the analytic database landscape—from data warehousing appliances and columnar databases to massively parallel processing and in-memory technology. The goal is to help you understand the strengths and limitations of these alternatives and how they are evolving so you can select technology that is best suited to your organization and needs.
Presentation from the O'Reilly Strata conference, February 2011
Currie Munce, VP of HGST, gave the talk at CAISS Annual Conference 2012, as part of the panel discussion: Storage Component Technologies - Enable Big Data and Make Better Cloud Computing.
Emulex and the Evaluator Group Present Why I/O is Strategic for Big Data Emulex Corporation
This webcast is the fourth in a series on why I/O is strategic for the data center. John Webster, senior partner at the Evaluator Group, will discuss why I/O is critically important to meet the bandwidth demands of big data deployments. As the data center infrastructure scales upward, so will the need for I/O to scale dynamically to meet these needs.
Nagios Conference 2012 - Dave Josephsen - 2002 called they want there rrd she...Nagios
Dave Josephsen's presentation on using time-series data visualizations with Nagios.
The presentation was given during the Nagios World Conference North America held Sept 25-28th, 2012 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
Un análisis del entorno tecnológico actual y su impacto en la sociedad y en la industria. El caso INTEL es un claro exponente de la evolución digital, la innovación y la evolución de una compañía líder en su sector.
http://bit.ly/igmHCe
GIS in the Rockies Geospatial RevolutionPeter Batty
GIS in the Rockies keynote presentation, September 15 in Loveland, CO. Much common content but slightly longer than the one I gave at NSGIC a couple of days previously.
Tetradyn Law Enforce Introduction11nov08martindudziak
Large presentation on how TETRADYN products and services bring more and better and for less cost to law enforcement and police agencies, for public safety, homeland security, and counterterrorism.
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
What are the opportunities and the challenges offered by emerging modes of technologically-inflected communication and decision-making? What is our role and responsibility as educators and as developers of research and teaching digital infrastructures? What do students need in the 21st century? As education institutions and providers struggle to respond to the first two questions, are we abrogating our responsibility to the last?
In this talk, Matt Ratto will describe some of the opportunities and the challenges we currently face, laying out a model of action for how to potentially address the questions raised above. Core to his thinking are two related points; first that we must help students develop a greater sense of how the informational world and its attendant infrastructures helps shape how and what we think, and second, that a good way to do this is to give students the space to engage in reflexive acts of technological production – what Matt has termed ‘critical making.’ He will provide concrete examples from both his research and his teaching that demonstrate the value and importance of reflexive, hands-on work with digital technologies in helping students develop the critical digital literacy skills they need to function in today’s society.
Matt Ratto is an Associate Professor in the Faculty of Information at the University of Toronto and directs the Semaphore Research cluster on Inclusive Design, Mobile and Pervasive Computing and, as part of Semaphore, the Critical Making lab.
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
There is a prevailing belief that users are the weakest link the security chain. In this presentation, Dr. Chiasson discusses how this perspective is inherently counterproductive to achieving increased cyber security and explore alternatives with a higher chance of improving security. Why do users behave insecurely even though most will readily state that security and privacy are important? This talk will cover some of our recent research exploring reasons why users' actions do not necessarily reflect their desire for security and how the configuration of security systems may actually weaken security in practice. She presents her work using eye-tracking to determine how users make phishing determinations, and how we can persuade users to behave more securely through improving their mental models of passwords and by making adjustments to the system configurations.
Emulex and the Evaluator Group Present Why I/O is Strategic for Big Data Emulex Corporation
This webcast is the fourth in a series on why I/O is strategic for the data center. John Webster, senior partner at the Evaluator Group, will discuss why I/O is critically important to meet the bandwidth demands of big data deployments. As the data center infrastructure scales upward, so will the need for I/O to scale dynamically to meet these needs.
Nagios Conference 2012 - Dave Josephsen - 2002 called they want there rrd she...Nagios
Dave Josephsen's presentation on using time-series data visualizations with Nagios.
The presentation was given during the Nagios World Conference North America held Sept 25-28th, 2012 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
Un análisis del entorno tecnológico actual y su impacto en la sociedad y en la industria. El caso INTEL es un claro exponente de la evolución digital, la innovación y la evolución de una compañía líder en su sector.
http://bit.ly/igmHCe
GIS in the Rockies Geospatial RevolutionPeter Batty
GIS in the Rockies keynote presentation, September 15 in Loveland, CO. Much common content but slightly longer than the one I gave at NSGIC a couple of days previously.
Tetradyn Law Enforce Introduction11nov08martindudziak
Large presentation on how TETRADYN products and services bring more and better and for less cost to law enforcement and police agencies, for public safety, homeland security, and counterterrorism.
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
What are the opportunities and the challenges offered by emerging modes of technologically-inflected communication and decision-making? What is our role and responsibility as educators and as developers of research and teaching digital infrastructures? What do students need in the 21st century? As education institutions and providers struggle to respond to the first two questions, are we abrogating our responsibility to the last?
In this talk, Matt Ratto will describe some of the opportunities and the challenges we currently face, laying out a model of action for how to potentially address the questions raised above. Core to his thinking are two related points; first that we must help students develop a greater sense of how the informational world and its attendant infrastructures helps shape how and what we think, and second, that a good way to do this is to give students the space to engage in reflexive acts of technological production – what Matt has termed ‘critical making.’ He will provide concrete examples from both his research and his teaching that demonstrate the value and importance of reflexive, hands-on work with digital technologies in helping students develop the critical digital literacy skills they need to function in today’s society.
Matt Ratto is an Associate Professor in the Faculty of Information at the University of Toronto and directs the Semaphore Research cluster on Inclusive Design, Mobile and Pervasive Computing and, as part of Semaphore, the Critical Making lab.
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
There is a prevailing belief that users are the weakest link the security chain. In this presentation, Dr. Chiasson discusses how this perspective is inherently counterproductive to achieving increased cyber security and explore alternatives with a higher chance of improving security. Why do users behave insecurely even though most will readily state that security and privacy are important? This talk will cover some of our recent research exploring reasons why users' actions do not necessarily reflect their desire for security and how the configuration of security systems may actually weaken security in practice. She presents her work using eye-tracking to determine how users make phishing determinations, and how we can persuade users to behave more securely through improving their mental models of passwords and by making adjustments to the system configurations.
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
Serious threats to private and governmental organizations do not only come from the outside world, but also come from within. Some employees and contractors with legitimate access to buildings, networks, assets and information deliberately misuse their priviledged access to cause harm to their organization. What are the reasons behind their actions? Is it debts, greed, ideology, disgruntlement, or divided loyalty?
Regardless of their motivations or vulnerabilities, traitors have very similar types of personality and display a certain pattern of behaviours before committing an insider incident. As a prevention measure, it is vital that organizations and employees understand, recognize and detect the common indicators of insider threat. Would you recognize the signs?
Mario Vachon is an Insider Threat Security Specialist with the RCMP Departmental Security Branch.
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCybera Inc.
Canada allocates a substantial amount of public funding to research, which is a critical factor in ensuring we remain innovative and competitive. Increasingly this funding is geared to the support and development of digital research infrastructure (DRI), including the underlying networks and the associated data acquisition, storage, analysis and visualization. In order to maximize the benefits of increasingly complex DRI and the research it facilitates, it is important to make sure data is properly stewarded, accessible and reusable. By adopting appropriate approaches to research data management we are better positioned to respond to challenges, such as effectively measuring research impacts, and ensuring the reproducibility, privacy, and security of research outputs.
Research Data Canada (RDC) is a member-driven organization committed to developing a sustainable approach to research data management, one based on interoperability and best practices. This session will provide an update on the efforts of RDC and partner organizations, including: CANARIE, Compute Canada, CARL Portage Network, CASRAI, the TriAgencies, and the Leadership Council for Digital Infrastructure. Intersections with international activities and projects will also be highlighted. These efforts are ultimately designed to faciliate a cohesive national approach to research data management, and one based on a clearly articulated vision for supporting innovation and discovery in Canada.
Mark Leggott is the Executive Director of Research Data Canada.
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCybera Inc.
The Internet has revolutionized how — and how much — each of us can know. Our digital tools put the knowledge of the world at our fingertips — and soon, maybe, right into our heads. But what kinds of of knowledge do our devices give us, and how are they reshaping and challenging the role that education and libraries should play in our lives?
This talk was delivered by Michael Patrick Lynch, professor of philosophy at the University of Connecticut, where he directs the university’s Humanities Institute.
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
Although there is no well-established definition of big data, its main characteristic is its sheer volume. Large volumes of data are generated by people (e.g., via social media) and by technology, including sensors (e.g., cameras, microphones), trackers (e.g., RFID tags, web surfing behavior) and other devices (e.g., mobile phones, wearables for self-surveillance/quantified self), whether or not they are connected to the Internet of Things. However, the large volumes of data needed to capitalize on the benefits of big data can to some extent also be established by the reuse of existing data, a source that is sometimes overlooked.
Data can be reused for purposes similar to that for which it was initially collected, but also beyond these purposes. Similarly, data can be reused in its original context, but also beyond this context. However, such repurposing and recontextualizing of data may lead to privacy issues. For instance, data reuse may lead to issues regarding informed consent and informational self-determination. When the data is used for profiling and other types of predictive analytics, also issues regarding stigmatization and discrimination may arise. This presentation by Bart Custers, Head of Research, eLaw – Center for Law and Digital Technologies at Leiden University, The Netherlands, focuses on the privacy issues of big data sharing and reuse and how these issues could be addressed.
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cybera Inc.
Stephen Childs was hired by the University of Calgary to develop an individual-level predictive model mapping students' decisions to attend the University. In his experience, the higher education sector was slow to use all the data it has available, but this is now changing.
As interest in making use of organizational data grows, staff must consider how these models will be used, and any problems that could arise. When individual predictions become the basis for decisions, how do we ensure our algorithms don't make existing problems worse? A framework for handling these issues now will let organizations handle these issues in a way that is consistent with their values.
Given the culture of today's institutions, and the success of predictive analytics in other fields, there is no doubt that these tools will be used. These techniques can improve student success and the competitiveness of educational organizations, but the benefits should not be gained at the expense of individuals within the system. This talk will propose a set of best practices for using institutional data for predictive modelling to address equity, privacy and other concerns. We must start thinking of this now, before other practices become entrenched.
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cybera Inc.
Canada’s National Research and Education Network, like other ultra-speed research networks, has evolved to transfer massive amounts of data at 100Gbps and beyond. But with the volume of data traffic growing at more than 50% per year, the ability to move increasing volumes of data is challenging. What are the kinds of applications in research and education that are driving this growth? What are the implications of the coming data tsunami on our communication networks? And what happens to network economics to keep up with the demand? CANARIE’s Chief Technology Officer, Mark Wolff, explores these topics and offer insights into how the NREN will evolve to continue to meet the unique needs of Canada’s research and education community.
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCybera Inc.
The City of Calgary is responsible for providing municipal services to 1.1 million people and 16,000 employees with more than 700 sites and critical infrastructure units. The municipal services represent a $60B asset base including water and wastewater treatment plants, light rapid transit, emergency services, roads and recreation facilities, and has revenue and procurement streams of $4.0B annually. During his tenure, Owen Key, Chief Security Officer and the Chief Information Officer for the City, has implemented enterprise systems for CCTV, access and ID control, physical security information management systems, and has responsibility for information security.
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cybera Inc.
The law has long struggled to keep pace with the rapid change that comes with the Internet and new technologies. From the cross-border challenges posed by a global network to the privacy implications of big data, law and policy simply cannot move at “Internet speed.” Yet despite the difficulties, politicians and policy makers increasingly find themselves at the heart of emerging policy issues, asked to address the balance between privacy and surveillance, the competing copyright interests of creators and users, and the market structure for network providers and disruptive competitors. This keynote talk will explore the emerging law and policy challenges, highlighting how all Internet users have the opportunity to help shape the digital policy landscape. Dr. Michael Geist is a law professor at the University of Ottawa where he holds the Canada Research Chair in Internet and E-commerce Law.
As institutions start to delve into the staff / student / consumer data they have been storing for years, new questions are emerging about the repercussions of using this data. How will it be analyzed? Who is doing the analysis? And what steps should be taken to protect user’s privacy?
Historically, the University of Alberta lacked a centrally managed repository for reporting data, resulting in inconsistency and disparity in access for units across campus. Meaningful and actionable reports were limited, and only focused on the interests and goals of the few units with data analysts who could synthesize the information.
Over the last couple of years, the University of Alberta has undertaken major changes in how information is managed and utilized. At the forefront of this change has been an increased interest in supporting the development of analytics and supporting tools. Beginning with the implementation of a centrally managed data warehouse with self-service capabilities, and the introduction of cloud services with business process analysis tools, the University is just starting down the road of big data.
This presentation explores opportunities and challenges for the University of Alberta in utilizing big data.
Predicting the Future With Microsoft BingCybera Inc.
The next generation of data scientists will be asked to build predictive models that can extract inferences from very large datasets which are unobservable at the surface, even to the best domain experts. Microsoft has access to some truly large data sets, web and search data from the Bing search engine and social data through collaborations with Twitter. In this talk, we show you how a small team of data scientists used this data to build the Bing Predicts engine — a collection of machine learnt predictive models that is beating industry experts at predicting the outcome of events like the Super Bowl, the Oscars, elections and referendums and even breakthroughs in health sciences. The talk will also give a preview of how organizations can adopt a big data mindset to generate and experiment with large data sets and to make amazing predictions using their own data.
Analytics 101: How to not fail at analyticsCybera Inc.
"Data Scientist" is perhaps the hottest job title of recent years. But what is a data scientist? What does a data scientist actually do? And where can they be found? In this talk, presenter Daniel Haight describes the benefits of analytics to decision-making, and explores the characteristics of successful organizations that have fostered their own team of data scientists.
The MOOC movement is only four years old, but has already had a tremendous impact on teaching and learning. While the some of the original hype surrounding MOOCs has not been realized, the reality is that they are here for good and are influencing institutional thinking. This talk will discuss the past, present and future of MOOCs.
While the use of online instructional technologies allows the presentation of theoretical science materials, how do we deal with the fact that such courses often include hands-on labs? Laboratory simulations can only provide a solution for online students in a limited and often artificial way. Nearly 20 years ago, Athabasca University developed a solution to the problem of students having to travel to complete their lab work. Emerging technologies at the time allowed for quantitative physics labs to be sent to students as a small kit. The physics initiative was so successful, with over 5,000 students served, that it was picked up in other fields at Athabasca University.
Over the years, such material has become cheaper, easier to use, and more integrated with modern computers. Athabasca is now pioneering ways to put real labs directly onto the internet. In this session, the methods used to make real lab experiences available to online students will be discussed, and some of them demonstrated.
Canadian municipalities are making great strides when it comes to sharing their data in fun, interactive ways. In this session, presenters will look at cities that are using their data to create useful apps and services for citizens; and describe how all community leaders can get involved to make their municipality more open and accessible.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges. This session will offer insights into best practices for healthcare analytics programs, as well as use cases that demonstrate the potential benefits that can be realized through this work.
Checking in on Healthcare Data AnalyticsCybera Inc.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges.
Open access and open data: international trends and strategic contextCybera Inc.
Governments around the world fund billions of dollars in research every year. Ensuring that the results of research are available to the public, other researchers and industry has become an important underlying value in order to maximize the impact of our publicly funded research. This session will discuss what’s driving the trend towards greater openness and provide an overview of international developments that will help put Canada’s activities into context.
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Unveiling the Secrets How Does Generative AI Work.pdfSam H
At its core, generative artificial intelligence relies on the concept of generative models, which serve as engines that churn out entirely new data resembling their training data. It is like a sculptor who has studied so many forms found in nature and then uses this knowledge to create sculptures from his imagination that have never been seen before anywhere else. If taken to cyberspace, gans work almost the same way.
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
Grote partijen zijn al een tijdje onderweg met retail media. Ondertussen worden in dit domein ook de kansen zichtbaar voor andere spelers in de markt. Maar met die kansen ontstaan ook vragen: Zelf retail media worden of erop adverteren? In welke fase van de funnel past het en hoe integreer je het in een mediaplan? Wat is nu precies het verschil met marketplaces en Programmatic ads? In dit half uur beslechten we de dilemma's en krijg je antwoorden op wanneer het voor jou tijd is om de volgende stap te zetten.
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
Explore our most comprehensive guide on lookback analysis at SafePaaS, covering access governance and how it can transform modern ERP audits. Browse now!
Buy Verified PayPal Account | Buy Google 5 Star Reviewsusawebmarket
Buy Verified PayPal Account
Looking to buy verified PayPal accounts? Discover 7 expert tips for safely purchasing a verified PayPal account in 2024. Ensure security and reliability for your transactions.
PayPal Services Features-
🟢 Email Access
🟢 Bank Added
🟢 Card Verified
🟢 Full SSN Provided
🟢 Phone Number Access
🟢 Driving License Copy
🟢 Fasted Delivery
Client Satisfaction is Our First priority. Our services is very appropriate to buy. We assume that the first-rate way to purchase our offerings is to order on the website. If you have any worry in our cooperation usually You can order us on Skype or Telegram.
24/7 Hours Reply/Please Contact
usawebmarketEmail: support@usawebmarket.com
Skype: usawebmarket
Telegram: @usawebmarket
WhatsApp: +1(218) 203-5951
USA WEB MARKET is the Best Verified PayPal, Payoneer, Cash App, Skrill, Neteller, Stripe Account and SEO, SMM Service provider.100%Satisfection granted.100% replacement Granted.
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Grid: New Business Opportunities?
1. GRID: new business opportunities?
Dominique Thomas
Software Development Manager
Processing & Imaging Product Line – R&D
Compagnie Generale de Geophysique Veritas
(CGGVeritas)
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 1
2. Evolution to the Grid
€€€€
€€€
€€
€
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 2
3. The Grid Dream
G
Mobile R Supercomputer, PC-Cluster
Access I
D
M
I
Desktop D
D Data Storage, Sensors,
L Experiments
E
W
A
R
Visualizing E
Internet, Networks
Analogy with the electrical supply network
Geographically distant resources
Secure environment
“Coordinated resources sharing and problem solving in dynamic,
multi-institutional virtual organization” – Ian Foster 2001
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 3
4. Outline
HPC trends
European Projects:
BEinGRID, EGEE, GEANT2
CGGVeritas Challenges
Cluster to Grid Computing
EGEODE
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 4
6. Exponential Growth
Optical Fibre Gilder’s Law
Performance per Dollar Spent
Doubling Time (bits per second) bandwidth
(months)
(32X in 4 yrs)
9 12 18
Data Storage
(bits per sq. inch)
Storage Law
(16X in 4yrs)
Chip capacity
(# transistors)
Moore’s Law
procesing
power
0 1 2 3 4 5
(5X in 4yrs)
Number of Years
Triumph of Light – Scientific American. George Stix
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 6
9. Lost in transition ?
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 9
10. Grid Technology Adoption Life-cycle
The Chasm
Main Street
Initial Market
BEinGRID bowling
Grid
Science
Computing
The tornado
Next Generation Grid
Enterprise Applications
Grid Enterprise
Service Oriented The Bowling Infrastructure
Utility for the Alley (on-demand)
Niche
Knowledge Marketing
Economy
Early Early Late Laggards
Innovators Adopters Majority Majority (skeptics)
(visionaries) (pragmatics) (conservatives)
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 10
11. BEinGRID: Business Experiment in Grid
BE1 - Computational Fluid Dynamics and Computer Aid Design
BE2 - Movie Post-Production Workflow
BE3 - Visualisation and Virtual Reality
BE4 - Financial Portfolio Management
BE5 - Retail Management
BE6 - Groundwater Modeling
BE7 - Earth Observation
BE8 - Integration of Engineering and Business Processes in Metal Forming
BE9 - Distributed Online Gaming
BE10 - Collaborative Environment in the Supply Chain Management for Pharmaceutics
BE11 - Risk Management in Finance
BE12 - Sales Management System
BE13 - Textile Grid Portal
BE14 - New Product & Process Development
BE15 - Data Recovery Service
BE16 - Ship Building
BE17 - Logistics & Distribution Optimisation
BE18 - Seismic Processing and Reservoir Simulation
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 11
12. BEinGRID Logistics
MultiMedia Experiments
by sectors
SP
SP Finance
Experiments Oil & Gas Automotive
by technology
Chemistry
Integrator End-
User
SP
Service
Provider
Retailing
Business Experiment
Value Chain
Aerospace SP
SP Textile
Engineering
Ship Environmental
Building Science Government - Public
service
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 12
13. BEinGRID Approach
BE1 BE2 BE3 BE4 BE5 BE18
Trust & Security ...
Architecture & Interop
Technical
cross
activities Service & Data Mgt
.
.
.
VO Management
Repository
Market Study
Business
cross Business Modeling
activities .
.
.
Dissem. & Exploitation
Mdw-1 Mdw -2 Mdw -n
Selected branches: GTv4, UNICORE/GS, g-Lite, GRIA, WS-*
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 13
14. Grid Technology Adoption Life-cycle
The Chasm
Main Street
Initial Market
BEinGRID bowling
Grid
Science
Computing
The tornado
Next Generation Grid
Enterprise Applications
Grid Enterprise
Service Oriented The Bowling Infrastructure
Utility for the Alley (on-demand)
Niche
Knowledge Marketing
Economy
Early Early Late Laggards
Innovators Adopters Majority Majority (skeptics)
(visionaries) (pragmatics) (conservatives)
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 14
15. Grids for Science
Grids provide access to:
Very large data collections
Terascale computing resources
High performance visualisation
Connected by high-bandwidth networks
Grids support global collaborations enabled by the
internet
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 15
16. The European e-Infrastructure
EGEE: Enabling Grid for E-sciencE
GEANT2 Network Collaboration
Operations, Support and
• To underpin European science and
technology in the service of society
• To link with and build on
– National, regional and
Pan-European Grid
international initiatives
• To foster international cooperation
training
– both in the creation and the use
of the e-infrastructure
• One of the largest worldwide Network infrastructure
grid infrastructure to date linking resource centres
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 16
17. EGEE worldwide cooperation
In ~80 countries in 2008
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 17
19. 1 TByte between 2 points
Line type Bandwidth Duration
theoretical
Internet 2Mb/s 45 days
100Mb/s 22 hours
1Gb/s 2.2 hours
Experimental Best in France 10Gb/s 13 minutes
Carriocas 40Gb/s 3.3 minutes
Line type Bandwidth Actual Duration
actual
EGEE- 2Mb/s 1.8Mb/s 49 days
CGGVeritas
Marseille-Lyon 2.5Gb/s shared 88Mb/s 1 day
CGGVeritas 100Mb/s 41Mb/s ! 2 days
CERN-Caltech One stream (2006) 2,38Gb/s 1 hour
(10000km) Multiple streams 5,44 Gb/s 30mn
(2003)
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 19
20. EGEE: Enabling Grid for E-sciencE
240 sites/ 45 countries
~40000 CPUs / 5 PBytes
200 VOs
Sep 07
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 20
21. EGEE in motion
24/7 available, secure access
Generic grid, multiples local scheduler supported
Data storage and replication mechanism
1000 persons/60 middleware developers
Open source
Up to 100,000 jobs a day,
More than 1 million jobs per month
Global scheduling
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 21
22. Grid Applications
High Energy Physics (analysising the
results from particle collisions )
Medical/Healthcare (imaging, diagnosis
and treatment )
Bioinformatics (study of the human
genome and proteome to understand
genetic diseases)
Nanotechnology (design of new
materials from the molecular scale)
Engineering (design optimization,
simulation, failure analysis and remote
Instrument access and control)
Natural Resources and the
Environment (weather forecasting,
earth observation, modeling and
prediction of complex systems)
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 22
23. High-end example: The LHC Experiments
ATLAS CMS
~6-8 PetaBytes / year
~108 events/year
~103 batch and interactive users
LHCb
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 23
24. Just a comparison…
6-8 Petabytes 5 times the
˜10.000.000 CD-ROM Eiffel Tower
˜1500 m
Produced each year
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 24
25. Grid Applications: Earth Observation
ENVISAT
• 3500 Meuro programme cost
• Launched on February 28, 2002
• 10 instruments on board
• 200 Mbps data rate to ground
• 400 Tbytes data archived/year
• 10+ dedicated facilities in Europe
• ~700 approved science user projects
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 25
26. Earth Science Requirements
First guess Optimal Global, regional, local multi-
re
Trajectory
Coupled
interdisciplinary
mo
sp
he
disciplinary applications
processes Large historical distributed
At
Complex Noisy archives
Cryosphere data observations
analysis Near real-time access to
Biosphere data
n
ea
Integrate different data
Oc
sources
Science, institutional and
industrial communities
Models to provide long term
Sub-surface trends and forecast
complex
modelling Complex
web of
sensor System-level science
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 26
28. CGGVeritas is the world’s leading international
pure-play geophysical company delivering a wide
range of technologies, services and equipment to
its broad base of customers mainly throughout the
global oil and gas industry
Focused on Performance . Passion for Innovation . Powered by People . Delivered with Integrity
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 28
29. CGGVeritas in the Oil & Gas Industry
Reservoir services
Spec data
Processing
(software, site design
& services)
Acquisition
(equipment & services)
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 29
30. Data Processing & Imaging
Stavanger
Oslo Oslo
Calgary
Aberdeen
London Moscow
Crawley Assen
Paris Vienna
Milan
Pau
Houston
Tripoli Abu Dhabi
Cairo
Villahermosa MuscatMumbaï
Caracas
Lagos Kuala Lumpur
Maracaibo / PLCruz
Port Harcourt Singapore
Jakarta
Luanda
Rio
Perth
Buenos Aires
28 Open Centres
15 Single-Client Dedicated Centres
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 30
31. Worldwide R&D
London Tyumen
Calgary
Brno
Paris
Houston
Mumbai
Mexico
Singapore
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 31
32. Challenges (1): Computing power
CGGVeritas Gflops evolution vs Moore law
1000000
100000
Gflops (logarithmic scale)
10000
Gflops@CGGVeritas
Moore (vector)
1000 Moore (numa)
Moore (cluster)
Gflops trend
100
10
1
1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 32
33. Storage and Computing
1 Pflops in 2009?
400+ TFlops in 2007
8 PBytes of disc
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 33
34. Challenges (2): Technology based strategy
Technical excellence
Research – Innovation – Industrialization
Looking for Talents with strong scientific background
Collaboration with Research Labs
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 34
35. Cluster to Grid Computing
More Computing&Storage resources to solve
complex problems such as full wave equation in complex
earth models
To optimize IT infrastructure
Load balancing between Processing Centres
Smoothing peaks of production (up to 100 TFlops)
Service continuity
Better fault tolerant system and applications
To share and acquire knowledge
Best practices and programming models
Attract and keep talents (researchers)
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 35
36. Business value
Short term
Ability to reach new customers:
SMEs and middle size National Oil&Gas Companies
Innovative and simple route for R-I collaboration
Longer term
Leading Edge technology => competitive advantage
Lehman Brothers & Smith Barney
Capital Expenditures
G$ Exploration & Dev.
Association for the Study of Peak Oil & Gas 250
215 G$
191 G$
200
166 G$
2015-2025
150
100
50
0
2003 2004 2005 (e)
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 36
37. Innovation
Pre-competitive research: experiment
Develop and share technical expertise
Assess maturity of technology for operational / business
projects
Feedback from Industry to Research
eInfrastructure: the foundation
Real scale, production-quality Grid
Network
Computing resources
Middleware
IT administration
Experiment with the future
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 37
38. Innovation and Business? EGEODE initiative
Collaboration Research - Industry
EGEODE V.O. (Expanding Geosciences On Demand)
Share Hardware and state of the art Software (Geocluster®)
WITHOUT software and IT administration
overhead
eInfrastructure for Research: EGEE (gLite)
Performances, IT adm, Training
Open to any Public-Private Lab
eInfrastructure for Business: CGGVeritas (gLite)+partners
Security, confidentiality, reliability
More effective worldwide collaboration R-R-I
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 38
39. EGEODE Portal
EGEODE VO
Portal
SDS grid ETools GCT
BEinGRID
Production
GRID DEV
Collaborative Middleware GGS
EGEE
Operating System
Hardware
Network
Slide 39
40. EGEODE
With EGEODE:
Any Geophysicist can process Any data
from Anywhere at Anytime
AAA enabled
(Authentication, Authorization and Accounting) 7/24/365
(dynamic upgrade)
VO centric (Virtual Organisation)
Remote center
Client location Referenced in the Grid File System
Home Copy (GridFTP), Replication,…
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 40
41. EGEODE : Example of seismic processing workflow
•Velocity •Time •Depth
•Pre-processing •Reservoir
•Analysis •Imaging •Imaging
•(1D, 2D) •Geophysics
•(1D,2D,3D) •(3D) •(3D)
•Rock properties
•Run on EGEODE
•3D seismic •Velocity model •Structural model
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 41
42. Production
Remote processing from small dedicated centers
Collaborative session with the client
Remote Internship with University
Intranet remote processing with Pau, Moscow, Oslo
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 42
43. New Business Opportunities
Business Model
1. Sell Computing-On-Demand (COD) services
– Value chain
CGGVeritas
Grid Grid Grid
Component Resource Operator User
Provider Provider
2. Provide EGEODE services to SMEs using a WEB
portal
– Value chain
BE18 Association (CGGVeritas, TNO, NICE, Petrosoft)
Grid Grid Solution
Grid Access
Component Resource (Service) User
Provider Provider Operator Provider Provider
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 43
44. Business Aspects
Business Plan
1. Computing-On-Demand services
Sell unused compute resources through a COD service
– Market: O&G companies
~9500 O&G Companies
– Success factors:
Low and simple pricing strategy
IT resources optimization and High availability
Increased business flexibility
More reactive to the market shifts and greater market penetration
Rapid decision-making
NO demand from large organizations to offload to someone else’s
No need for interoperation between them
Demand is coming from SMEs
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 44
45. Business Aspects
Business Plan
2. Expanding-Geosciences-On-Demand (EGEODE)
services
– Market: small O&G structures
1035 O&G companies in EU CGGVeritas market
93% are SMEs; 63% < 10 employees High Tech.,
Large studies
Research labs
Very small projects of large companies EGEODE market
– Success factors:
Conventional, smalll
Simplified administration and IT resources optimization
Capacity to meet market shifts and increase business flexibility
Cost-effective and fast data processing
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 45
46. Summary Grid
Cooperation with EGEE and BEinGRID:
learn and experiment
Innovation creates Business Value
Collaboration Public-Private Research is a must
EGEODE : an enabler …
EGEE : http://www.eu-egee.org
EGEODE : http://www.egeode.org
CGGVeritas : http://www.cggveritas.com
October 12, 2007 - D Thomas CyberInfrastructure Summit, Banff, ab Slide 46