SlideShare a Scribd company logo
1
Dr. Jeff Daniels
Lockheed Martin Corporation
jeff.daniels@lmco.com
Dr. Ben Amaba
IBM Corporation
baamaba@us.ibm.com
Performance Without Limits 2.0
2
Lockheed Martin Business Areas
MISSION SYSTEMS & TRAINING
• Naval Combat Systems
• Radar and Surveillance Systems
• Aviation Systems
• Training and Logistics Solutions
MISSILES and FIRE CONTROL
• Air and Missile Defense
• Tactical Missiles
• Fire Control
• Combat Maneuver Systems
SPACE SYSTEMS
• Surveillance and Navigation
• Global Communications
• Human Space Flight
• Strategic and Defensive Systems
AERONAUTICS
• Tactical Fighters
• Tactical /Strategic Airlift
• Advanced Development
• Global Sustainment
We Never Forget Who We’re Working For ®
3
Aeronautics Portfolio
F-35 CTOL
UAS F-16
C-130J
P-3
U-2
C-5
T-50
Trainer
F-22
F-35 STOVL
F-35 CV
A13-39529_3
Fighter/TrainerStrike and ISR Air Mobility
4
Research Paper
4
5
Author and technology prognosticator George Gilder has called today’s cloud data
centers ’information factories.” Since the cloud can be viewed in part as representing
the industrialization of IT and the end of the era of artisanal boutiques. Many of
the lessons learned in the evolution of manufacturing are being applied –
consciously or not – via the cloud.
"Make This Your Year to Grow." If you want to grow, you must embrace the
mobile cloud-based world. Even if you merely want to survive, you must be
mobile —both to help customers find you and to run your business….
Rhonda Abrams, Special for USA TODAY 2:03 p.m. EDT May 8, 2015
"It used to take years to grow a business to several million customers – now it can
happen in months.
….
University of California Berkeley, February 10, 2009
Cloud & Mobile technologies changed the world
6
When you send an email with a 1 GB attachment to three people, this
generates an estimated 50GB of stored managed data. Only 25 percent of the
data is unique; 75 percent of stored data is duplicated. You maybe surprised to
learn that 70 percent of the data stored in the world is user initiated; the
remainder is enterprise-generated content.
(Barrie Sosinsky – Cloud Computing Bible)
The cloud affects everyone
CLOUD (Joe Weinman – Cloudonomics)
• Common infrastructure
• Location Independence
• Online accessibility
• Utility Pricing
• On Demand resources
Recognize the explosion of data. Industrial Control Systems on the
Cloud are changing the world.
7
30% of respondents said they didn’t know
enough to know what the barriers are
Question 12: What are
the barriers that prevent
your organization from
using cloud computing
or using cloud
computing more?
(N=9,051)
15
TechSoup.org
Lack of knowledge is the greatest barrier to
leverage the Cloud technology
8
Growth of Connected Devices
The number of cars connected to the Internet worldwide will grow more than six-fold
to 152 million in 2020 from 23 million in 2013. (IHS Automotive)
Consumer Electronics M2M connections will top 7 billion in 2023, generating $700 billion
in annual revenue. Machina Research.
By 2020, there will be over 100 million Internet connected wireless light bulbs and lamps
worldwide up from 2.4 million in 2013. On World
9
Cybersecurity
▪ Enhanced Security
– Bank versus Shoebox
▪ Security is the number one concern preventing going to the cloud
▪ Across all the service and deployment layers
▪ There are economies of scale on security knowledge, design,
implementation and maintenance
- 2013 VSAE Annual Conference
Data are important assets. So is money. Money and other valuables such as jewelry can be kept under
your mattress – a premises solution – or in a bank – a cloud solution. Which has the better security?
The bank can afford stronger security in terms of vaults with foot think hardened steel walls, and can
have a security team made up of security professionals and one or more people on payroll who stay
abreast of new burglary strategies and determine and implement counterstrategies
9
Think Carefully about security!
10
With the explosion of industrial applications, governance
becomes a priority as the overall umbrella with security
How do you manage with a wider product configuration?
Governance
▪ Administration of resources
▪ Configuring resources
▪ Enforcing security
▪ Monitoring operations
▪ Optimizing performance
▪ Provisioning of resources
Choice with consistency, Industrialized hybrid cloud, DevOps Productivity, and Powerful
accessible analytics with cognitive
11
Docker is an open platform for building distributed applications for
developers and system administrators.
Build Ship Run
Anywhere
Any App
Docker Mission
12
The first person to do a spacewalk was
Soviet/Russian Cosmonaut Aleksei Leonov.
On March 18, 1965, he spent 12 minutes
floating in space.
Ed White was the first American to do a
spacewalk. He spent 23 minutes floating in
space.
Eugene Cernan was the last person to walk
on the Moon. Before he left, he spent a
total of 74 hours, 59 minutes, and 40
seconds there from December 11 to
December 14, 1972.
Last Man on the Moon
13
100 Years of Accelerating Tomorrow

More Related Content

Similar to Performance in the Cloud 2.0

SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
Marco Lisi
 
2018 NAMIC Farm Forum
2018 NAMIC Farm Forum2018 NAMIC Farm Forum
2018 NAMIC Farm Forum
Phil Reynolds
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
myehuman
 
Serguei Beloussov - Future of computing
Serguei Beloussov - Future of computingSerguei Beloussov - Future of computing
Serguei Beloussov - Future of computing
Schaffhausen Institute of Technology
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton Ravindran
GSTF
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
Jody Keyser
 
Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and Security
EMC
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
Real-Time Innovations (RTI)
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
Gerardo Pardo-Castellote
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
Gerardo Pardo-Castellote
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
Phil Reynolds
 
Serguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc programSerguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc program
Schaffhausen Institute of Technology
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
Mark Underwood
 
Blueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of ThingsBlueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of Things
Real-Time Innovations (RTI)
 
Cloud Computing In DoD, IDGA Presentation
Cloud Computing In DoD, IDGA PresentationCloud Computing In DoD, IDGA Presentation
Cloud Computing In DoD, IDGA Presentation
GovCloud Network
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
Jan Wiersma
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?
trentlivingston
 
Wireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCornerWireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCorner
Reports Corner
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data
GovLoop
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
The Security of Things Forum
 

Similar to Performance in the Cloud 2.0 (20)

SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMSSECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
SECURITY IN LARGE, STRATEGIC AND COMPLEX SYSTEMS
 
2018 NAMIC Farm Forum
2018 NAMIC Farm Forum2018 NAMIC Farm Forum
2018 NAMIC Farm Forum
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
 
Serguei Beloussov - Future of computing
Serguei Beloussov - Future of computingSerguei Beloussov - Future of computing
Serguei Beloussov - Future of computing
 
Dawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton RavindranDawn of the Intelligence Age by Dr. Anton Ravindran
Dawn of the Intelligence Age by Dr. Anton Ravindran
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Big Data for Defense and Security
Big Data for Defense and SecurityBig Data for Defense and Security
Big Data for Defense and Security
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
Using the Cloud
Using the CloudUsing the Cloud
Using the Cloud
 
Serguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc programSerguei Seloussov - Future of computing and SIT MSc program
Serguei Seloussov - Future of computing and SIT MSc program
 
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
The Quality “Logs”-Jam: Why Alerting for Cybersecurity is Awash with False Po...
 
Blueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of ThingsBlueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of Things
 
Cloud Computing In DoD, IDGA Presentation
Cloud Computing In DoD, IDGA PresentationCloud Computing In DoD, IDGA Presentation
Cloud Computing In DoD, IDGA Presentation
 
Moving enterprise IT to the cloud
Moving enterprise IT to the cloudMoving enterprise IT to the cloud
Moving enterprise IT to the cloud
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?
 
Wireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCornerWireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCorner
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Performance in the Cloud 2.0

  • 1. 1 Dr. Jeff Daniels Lockheed Martin Corporation jeff.daniels@lmco.com Dr. Ben Amaba IBM Corporation baamaba@us.ibm.com Performance Without Limits 2.0
  • 2. 2 Lockheed Martin Business Areas MISSION SYSTEMS & TRAINING • Naval Combat Systems • Radar and Surveillance Systems • Aviation Systems • Training and Logistics Solutions MISSILES and FIRE CONTROL • Air and Missile Defense • Tactical Missiles • Fire Control • Combat Maneuver Systems SPACE SYSTEMS • Surveillance and Navigation • Global Communications • Human Space Flight • Strategic and Defensive Systems AERONAUTICS • Tactical Fighters • Tactical /Strategic Airlift • Advanced Development • Global Sustainment We Never Forget Who We’re Working For ®
  • 3. 3 Aeronautics Portfolio F-35 CTOL UAS F-16 C-130J P-3 U-2 C-5 T-50 Trainer F-22 F-35 STOVL F-35 CV A13-39529_3 Fighter/TrainerStrike and ISR Air Mobility
  • 5. 5 Author and technology prognosticator George Gilder has called today’s cloud data centers ’information factories.” Since the cloud can be viewed in part as representing the industrialization of IT and the end of the era of artisanal boutiques. Many of the lessons learned in the evolution of manufacturing are being applied – consciously or not – via the cloud. "Make This Your Year to Grow." If you want to grow, you must embrace the mobile cloud-based world. Even if you merely want to survive, you must be mobile —both to help customers find you and to run your business…. Rhonda Abrams, Special for USA TODAY 2:03 p.m. EDT May 8, 2015 "It used to take years to grow a business to several million customers – now it can happen in months. …. University of California Berkeley, February 10, 2009 Cloud & Mobile technologies changed the world
  • 6. 6 When you send an email with a 1 GB attachment to three people, this generates an estimated 50GB of stored managed data. Only 25 percent of the data is unique; 75 percent of stored data is duplicated. You maybe surprised to learn that 70 percent of the data stored in the world is user initiated; the remainder is enterprise-generated content. (Barrie Sosinsky – Cloud Computing Bible) The cloud affects everyone CLOUD (Joe Weinman – Cloudonomics) • Common infrastructure • Location Independence • Online accessibility • Utility Pricing • On Demand resources Recognize the explosion of data. Industrial Control Systems on the Cloud are changing the world.
  • 7. 7 30% of respondents said they didn’t know enough to know what the barriers are Question 12: What are the barriers that prevent your organization from using cloud computing or using cloud computing more? (N=9,051) 15 TechSoup.org Lack of knowledge is the greatest barrier to leverage the Cloud technology
  • 8. 8 Growth of Connected Devices The number of cars connected to the Internet worldwide will grow more than six-fold to 152 million in 2020 from 23 million in 2013. (IHS Automotive) Consumer Electronics M2M connections will top 7 billion in 2023, generating $700 billion in annual revenue. Machina Research. By 2020, there will be over 100 million Internet connected wireless light bulbs and lamps worldwide up from 2.4 million in 2013. On World
  • 9. 9 Cybersecurity ▪ Enhanced Security – Bank versus Shoebox ▪ Security is the number one concern preventing going to the cloud ▪ Across all the service and deployment layers ▪ There are economies of scale on security knowledge, design, implementation and maintenance - 2013 VSAE Annual Conference Data are important assets. So is money. Money and other valuables such as jewelry can be kept under your mattress – a premises solution – or in a bank – a cloud solution. Which has the better security? The bank can afford stronger security in terms of vaults with foot think hardened steel walls, and can have a security team made up of security professionals and one or more people on payroll who stay abreast of new burglary strategies and determine and implement counterstrategies 9 Think Carefully about security!
  • 10. 10 With the explosion of industrial applications, governance becomes a priority as the overall umbrella with security How do you manage with a wider product configuration? Governance ▪ Administration of resources ▪ Configuring resources ▪ Enforcing security ▪ Monitoring operations ▪ Optimizing performance ▪ Provisioning of resources Choice with consistency, Industrialized hybrid cloud, DevOps Productivity, and Powerful accessible analytics with cognitive
  • 11. 11 Docker is an open platform for building distributed applications for developers and system administrators. Build Ship Run Anywhere Any App Docker Mission
  • 12. 12 The first person to do a spacewalk was Soviet/Russian Cosmonaut Aleksei Leonov. On March 18, 1965, he spent 12 minutes floating in space. Ed White was the first American to do a spacewalk. He spent 23 minutes floating in space. Eugene Cernan was the last person to walk on the Moon. Before he left, he spent a total of 74 hours, 59 minutes, and 40 seconds there from December 11 to December 14, 1972. Last Man on the Moon
  • 13. 13 100 Years of Accelerating Tomorrow