SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
1	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
State	
  of	
  C4I	
  :	
  Cri.cal	
  Aspects	
  
Computer/Cyber	
  Technologies	
  and	
  Intelligence	
  
The	
  Data	
  Driven	
  Enterprise	
  
Real-­‐Bme	
  insights	
  at	
  scale	
  through	
  closed-­‐loop	
  processes	
  
	
  
Joe	
  WiG	
  
2	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
The	
  role	
  of	
  ‘dataflow’	
  in	
  a	
  Data	
  Driven	
  Enterprise	
  
Collect	
   Process	
   Store/Query	
  
Latency	
  :	
  From	
  sensor	
  to	
  repository	
  (far	
  less	
  than	
  half	
  the	
  story)	
  
3	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Enterprise	
  Dataflow	
  
Different	
  organiza.ons/business	
  units	
  across	
  different	
  geographic	
  loca.ons…	
  
4	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Enterprise	
  Dataflow	
  
Conduc.ng	
  business	
  in	
  different	
  legal	
  and	
  network	
  domains…	
  
5	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Enterprise	
  Dataflow	
  
Opera.ng	
  on	
  very	
  different	
  infrastructure	
  (power,	
  space,	
  cooling)…	
  
6	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Enterprise	
  Dataflow	
  
Capable	
  of	
  different	
  volume,	
  velocity,	
  bandwidth,	
  and	
  latency…	
  
7	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Enterprise	
  Dataflow	
  
Interac.ng	
  with	
  different	
  business	
  partners	
  and	
  customers	
  
8	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Data	
  driven	
  organiza.on	
  or	
  leader…	
  
	
  
	
  
Wants	
  all	
  the	
  data	
  –	
  now	
  
	
  
To	
  understand	
  it	
  all	
  and	
  how	
  it	
  relates	
  
	
  
To	
  beGer	
  inform	
  decisions	
  and	
  decision	
  makers	
  
	
  
To	
  outpace	
  adversaries/compeBtors	
  and	
  maximize	
  value	
  to	
  customers	
  
	
  
	
  
9	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Challenges	
  
Wants	
  all	
  the	
  data	
  –	
  now	
  
•  Bandwidth:	
  Limited,	
  Error	
  prone,	
  expensive	
  
•  Denied	
  access	
  
•  Compliance	
  requirements	
  (legal,	
  policy,	
  geographic	
  restricBons)	
  
•  CompeBng	
  prioriBes	
  (perishable	
  vs	
  delay	
  tolerant)	
  
•  Storage	
  is	
  cheap	
  but	
  rate	
  of	
  data	
  sensing	
  is	
  skyrockeBng	
  
•  Controlling	
  the	
  edge	
  systems	
  
To	
  understand	
  it	
  all	
  and	
  how	
  it	
  relates	
  
To	
  beGer	
  inform	
  decisions	
  and	
  decision	
  makers	
  
To	
  outpace	
  adversaries/compeBtors	
  and	
  maximize	
  value	
  to	
  customers	
  
	
  
10	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Challenges	
  
Wants	
  all	
  the	
  data	
  –	
  now	
  
To	
  understand	
  it	
  all	
  and	
  how	
  it	
  relates	
  
•  Formats/schemas	
  evolve	
  
•  SemanBcs	
  of	
  data	
  evolve	
  
•  Processing	
  bandwidth	
  limits	
  
•  Signal/noise	
  results	
  in	
  inefficient	
  processing	
  
•  Compliance	
  implicaBons	
  of	
  joining	
  data	
  
To	
  beGer	
  inform	
  decisions	
  and	
  decision	
  makers	
  
To	
  outpace	
  adversaries/compeBtors	
  and	
  maximize	
  value	
  to	
  customers	
  
	
  
11	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Challenges	
  
Wants	
  all	
  the	
  data	
  –	
  now.	
  
To	
  understand	
  it	
  all	
  and	
  how	
  it	
  relates	
  
To	
  beGer	
  inform	
  decisions	
  and	
  decision	
  makers	
  
•  How	
  to	
  distribute	
  accumulated	
  context	
  
•  How	
  to	
  track	
  origin	
  of	
  most/least	
  valuable	
  sources	
  
•  Compliance	
  implicaBons	
  of	
  sharing	
  observaBons/insights	
  
To	
  outpace	
  adversaries/compeBtors	
  and	
  maximize	
  value	
  to	
  customers	
  
	
  
12	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Challenges	
  
Wants	
  all	
  the	
  data	
  –	
  now.	
  
To	
  understand	
  it	
  all	
  and	
  how	
  it	
  relates	
  
To	
  beGer	
  inform	
  decisions	
  and	
  decision	
  makers	
  
To	
  outpace	
  adversaries/compeBtors	
  and	
  maximize	
  value	
  to	
  customers	
  
•  How	
  to	
  maximize	
  value	
  of	
  distributed	
  enterprise	
  
•  Ability	
  to	
  redo	
  decisions	
  (what	
  if	
  I	
  took	
  a	
  different	
  path)	
  
•  Ability	
  to	
  interact	
  with	
  live	
  data	
  and	
  systems	
  to	
  effect	
  change	
  
•  Trace	
  acBons	
  to	
  decisions	
  to	
  inputs…	
  
	
  
13	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
‘OODA	
  Loop’	
  –	
  A	
  closed	
  loop	
  system	
  
	
  
	
  
Wants	
  all	
  the	
  data	
  –	
  now	
  
	
  OBSERVE	
  
To	
  understand	
  it	
  all	
  and	
  how	
  it	
  relates	
  
	
  ORIENT	
  
To	
  beGer	
  inform	
  decisions	
  and	
  decision	
  makers	
  
	
  DECIDE	
  
To	
  outpace	
  adversaries/compeBtors	
  and	
  maximize	
  value	
  to	
  customers	
  
	
  ACT	
  
	
  
Page 14 © Hortonworks Inc. 2011 – 2015. All Rights Reserved
It’s not just how quickly you
move data – it’s about how
quickly you can change behavior
and seize new opportunities
15	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
The	
  Data	
  Driven	
  Enterprise	
  –	
  demands	
  a	
  closed	
  loop	
  architecture	
  
§  Constrained	
  
§  High-­‐latency	
  
§  Localized	
  context	
  
§  Hybrid	
  –	
  cloud/on-­‐premises	
  
§  Low-­‐latency	
  
§  Global	
  context	
  
SOURCES	
  
REGIONAL	
  	
  
INFRASTRUCTURE	
  
CORE	
  	
  
INFRASTRUCTURE	
  
16	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Command	
  and	
  Control	
  
§  Constrained	
  
§  High-­‐latency	
  
§  Localized	
  context	
  
§  Hybrid	
  –	
  cloud/on-­‐premises	
  
§  Low-­‐latency	
  
§  Global	
  context	
  
SOURCES	
  
REGIONAL	
  	
  
INFRASTRUCTURE	
  
CORE	
  	
  
INFRASTRUCTURE	
  
Distributed	
  agent	
  
Central	
  control	
  
Mul.-­‐tenant	
  
Interac.ve	
  command	
  and	
  control	
  
17	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Provenance	
  
§  Constrained	
  
§  High-­‐latency	
  
§  Localized	
  context	
  
§  Hybrid	
  –	
  cloud/on-­‐premises	
  
§  Low-­‐latency	
  
§  Global	
  context	
  
SOURCES	
  
REGIONAL	
  	
  
INFRASTRUCTURE	
  
CORE	
  	
  
INFRASTRUCTURE	
  
Origin	
  –	
  a[ribu.on	
  
Replay	
  –	
  recovery	
  
Evolu.on	
  of	
  topologies	
  
Long	
  reten.on	
  
Types	
  of	
  Lineage	
  
•  Event	
  (runBme)	
  
•  ConfiguraBon	
  (design	
  Bme)	
  
18	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
The	
  need	
  for	
  data	
  provenance	
  
For Operators
•  Traceability, lineage
•  Recovery and replay
For Compliance
•  Audit trail
•  Remediation
For Business / Mission
•  Value sources
•  Value IT investment
BEGIN	
  
END	
  
LINEAGE	
  
19	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Security	
  
§  Constrained	
  
§  High-­‐latency	
  
§  Localized	
  context	
  
§  Hybrid	
  –	
  cloud/on-­‐premises	
  
§  Low-­‐latency	
  
§  Global	
  context	
  
SOURCES	
  
REGIONAL	
  	
  
INFRASTRUCTURE	
  
CORE	
  	
  
INFRASTRUCTURE	
  
Sign,	
  encrypt,	
  sta.c	
  
(data	
  and	
  control)	
  
TLS,	
  obfusca.on,	
  dynamic	
  en.tlements	
  
Kerberos,	
  PKI,	
  AD/DS,	
  etc.	
  
20	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
The	
  need	
  for	
  fine-­‐grained	
  security	
  and	
  compliance	
  
It’s not enough to say you have
encrypted communications
•  Enterprise authorization
services –entitlements
change often
•  People and systems with
different roles require
difference access levels
•  Tagged/classified data
21	
   ©	
  Hortonworks	
  Inc.	
  2011	
  –	
  2016.	
  All	
  Rights	
  Reserved	
  
Topics	
  to	
  explore	
  further	
  
Ã  Private	
  InformaBon	
  Retrieval	
  (PIR)	
  –	
  Doesn’t	
  this	
  break	
  the	
  provenance	
  trail?	
  
Ã  Role	
  of	
  cryptographically	
  verifiable	
  approaches	
  such	
  as	
  Blockchain	
  
Ã  What	
  standards	
  are	
  needed	
  (provenance,	
  security)?	
  

Mais conteúdo relacionado

Mais procurados

Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MECSabidur Rahman
 
Accelerating HPC with Ethernet
Accelerating HPC with EthernetAccelerating HPC with Ethernet
Accelerating HPC with Ethernetinside-BigData.com
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeAndrew Blades
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud EcosystemLumosNetworks
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud EcosystemLumos Networks
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Real-Time Innovations (RTI)
 
Accelerating Edge Computing Adoption
Accelerating Edge Computing Adoption Accelerating Edge Computing Adoption
Accelerating Edge Computing Adoption Michelle Holley
 
Next-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewNext-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewLaurent Ciavaglia
 
SCF Partners' Day: Operations Overview Including Updates from NGMN, TIA, CTIA...
SCF Partners' Day: Operations Overview Including Updates from NGMN, TIA, CTIA...SCF Partners' Day: Operations Overview Including Updates from NGMN, TIA, CTIA...
SCF Partners' Day: Operations Overview Including Updates from NGMN, TIA, CTIA...Small Cell Forum
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityRed Hat India Pvt. Ltd.
 
De-fogging Edge Computing: Ecosystem, Use-cases, and Opportunities
De-fogging Edge Computing: Ecosystem, Use-cases, and OpportunitiesDe-fogging Edge Computing: Ecosystem, Use-cases, and Opportunities
De-fogging Edge Computing: Ecosystem, Use-cases, and OpportunitiesMichelle Holley
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little ThingsH4Diadmin
 
Framework for the New IP - Phil O'Reilly
Framework for the New IP - Phil O'ReillyFramework for the New IP - Phil O'Reilly
Framework for the New IP - Phil O'Reillyscoopnewsgroup
 
Spr21735 certainty case study slideshare 03 aw
Spr21735 certainty case study slideshare 03 awSpr21735 certainty case study slideshare 03 aw
Spr21735 certainty case study slideshare 03 awSprint Business
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksAerohive Networks
 
Introduction to Rakuten Mobile Virtual Network Operator
Introduction to Rakuten Mobile Virtual Network OperatorIntroduction to Rakuten Mobile Virtual Network Operator
Introduction to Rakuten Mobile Virtual Network OperatorKAILASH CHAUHAN
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersPatrick Lopez
 

Mais procurados (20)

Innovations in Edge Computing and MEC
Innovations in Edge Computing and MECInnovations in Edge Computing and MEC
Innovations in Edge Computing and MEC
 
Accelerating HPC with Ethernet
Accelerating HPC with EthernetAccelerating HPC with Ethernet
Accelerating HPC with Ethernet
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?
 
Accelerating Edge Computing Adoption
Accelerating Edge Computing Adoption Accelerating Edge Computing Adoption
Accelerating Edge Computing Adoption
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Next-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside ViewNext-Generation Closed-Loop Automation - an Inside View
Next-Generation Closed-Loop Automation - an Inside View
 
SCF Partners' Day: Operations Overview Including Updates from NGMN, TIA, CTIA...
SCF Partners' Day: Operations Overview Including Updates from NGMN, TIA, CTIA...SCF Partners' Day: Operations Overview Including Updates from NGMN, TIA, CTIA...
SCF Partners' Day: Operations Overview Including Updates from NGMN, TIA, CTIA...
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
 
De-fogging Edge Computing: Ecosystem, Use-cases, and Opportunities
De-fogging Edge Computing: Ecosystem, Use-cases, and OpportunitiesDe-fogging Edge Computing: Ecosystem, Use-cases, and Opportunities
De-fogging Edge Computing: Ecosystem, Use-cases, and Opportunities
 
Big Crypto for Little Things
Big Crypto for Little ThingsBig Crypto for Little Things
Big Crypto for Little Things
 
Framework for the New IP - Phil O'Reilly
Framework for the New IP - Phil O'ReillyFramework for the New IP - Phil O'Reilly
Framework for the New IP - Phil O'Reilly
 
Spr21735 certainty case study slideshare 03 aw
Spr21735 certainty case study slideshare 03 awSpr21735 certainty case study slideshare 03 aw
Spr21735 certainty case study slideshare 03 aw
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
 
SME WLAN 1-28-15
SME WLAN 1-28-15SME WLAN 1-28-15
SME WLAN 1-28-15
 
Introduction to Rakuten Mobile Virtual Network Operator
Introduction to Rakuten Mobile Virtual Network OperatorIntroduction to Rakuten Mobile Virtual Network Operator
Introduction to Rakuten Mobile Virtual Network Operator
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalers
 

Destaque

The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...AFCEA International
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
 
Industry Panel: Cyber Convergence - Where Do We Go From Here? TechNet Augusta...
Industry Panel: Cyber Convergence - Where Do We Go From Here? TechNet Augusta...Industry Panel: Cyber Convergence - Where Do We Go From Here? TechNet Augusta...
Industry Panel: Cyber Convergence - Where Do We Go From Here? TechNet Augusta...AFCEA International
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015AFCEA International
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015AFCEA International
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015AFCEA International
 
How To Build An Innovation Lab
How To Build An Innovation LabHow To Build An Innovation Lab
How To Build An Innovation LabPaul Taylor
 

Destaque (17)

The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...The Capabilities and Innovations of Joint Communications Support Element (JCS...
The Capabilities and Innovations of Joint Communications Support Element (JCS...
 
Steve Rieber
Steve RieberSteve Rieber
Steve Rieber
 
Major Steven Nielson
Major Steven NielsonMajor Steven Nielson
Major Steven Nielson
 
Ben Gibson
Ben GibsonBen Gibson
Ben Gibson
 
Lin Wells
Lin WellsLin Wells
Lin Wells
 
Bob Gourley
Bob GourleyBob Gourley
Bob Gourley
 
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
William Halal
William HalalWilliam Halal
William Halal
 
Industry Panel: Cyber Convergence - Where Do We Go From Here? TechNet Augusta...
Industry Panel: Cyber Convergence - Where Do We Go From Here? TechNet Augusta...Industry Panel: Cyber Convergence - Where Do We Go From Here? TechNet Augusta...
Industry Panel: Cyber Convergence - Where Do We Go From Here? TechNet Augusta...
 
Tod Levitt
Tod LevittTod Levitt
Tod Levitt
 
Lt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, JrLt Gen Arnold W. Bunch, Jr
Lt Gen Arnold W. Bunch, Jr
 
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015
 
Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015Network Convergence: TechNet Augusta 2015
Network Convergence: TechNet Augusta 2015
 
Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015Cyber Commandant Presentation: TechNet Augusta 2015
Cyber Commandant Presentation: TechNet Augusta 2015
 
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
Cyber CoE Doctrine Plan for 2025: TechNet Augusta 2015
 
How To Build An Innovation Lab
How To Build An Innovation LabHow To Build An Innovation Lab
How To Build An Innovation Lab
 

Semelhante a Data Driven Enterprise Closed Loop Architecture

HDF: Hortonworks DataFlow: Technical Workshop
HDF: Hortonworks DataFlow: Technical WorkshopHDF: Hortonworks DataFlow: Technical Workshop
HDF: Hortonworks DataFlow: Technical WorkshopHortonworks
 
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFi
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFiTaking DataFlow Management to the Edge with Apache NiFi/MiNiFi
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFiBryan Bende
 
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big Data
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big DataHortonworks DataFlow & Apache Nifi @Oslo Hadoop Big Data
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big DataMats Johansson
 
Hortonworks - IBM Cognitive - The Future of Data Science
Hortonworks - IBM Cognitive - The Future of Data ScienceHortonworks - IBM Cognitive - The Future of Data Science
Hortonworks - IBM Cognitive - The Future of Data ScienceThiago Santiago
 
Beyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFiBeyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFiIsheeta Sanghi
 
Apache NiFi - Flow Based Programming Meetup
Apache NiFi - Flow Based Programming MeetupApache NiFi - Flow Based Programming Meetup
Apache NiFi - Flow Based Programming MeetupJoseph Witt
 
BigData Techcon - Beyond Messaging with Apache NiFi
BigData Techcon - Beyond Messaging with Apache NiFiBigData Techcon - Beyond Messaging with Apache NiFi
BigData Techcon - Beyond Messaging with Apache NiFiAldrin Piri
 
Data on the Move - DataCon DC
Data on the Move - DataCon DCData on the Move - DataCon DC
Data on the Move - DataCon DCJoseph Witt
 
Apache NiFi Toronto Meetup
Apache NiFi Toronto MeetupApache NiFi Toronto Meetup
Apache NiFi Toronto MeetupHortonworks
 
Design Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDesign Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDataWorks Summit
 
Design Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDesign Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDataWorks Summit
 
Hortonworks Data in Motion Webinar Series - Part 1
Hortonworks Data in Motion Webinar Series - Part 1Hortonworks Data in Motion Webinar Series - Part 1
Hortonworks Data in Motion Webinar Series - Part 1Hortonworks
 
Harnessing Data-in-Motion with HDF 2.0, introduction to Apache NIFI/MINIFI
Harnessing Data-in-Motion with HDF 2.0, introduction to Apache NIFI/MINIFIHarnessing Data-in-Motion with HDF 2.0, introduction to Apache NIFI/MINIFI
Harnessing Data-in-Motion with HDF 2.0, introduction to Apache NIFI/MINIFIHaimo Liu
 
HDF Powered by Apache NiFi Introduction
HDF Powered by Apache NiFi IntroductionHDF Powered by Apache NiFi Introduction
HDF Powered by Apache NiFi IntroductionMilind Pandit
 
How to Secure your Data Lake
How to Secure your Data LakeHow to Secure your Data Lake
How to Secure your Data LakeSarah Story
 
Data in Motion - Data at Rest - Hortonworks a Modern Architecture
Data in Motion - Data at Rest - Hortonworks a Modern ArchitectureData in Motion - Data at Rest - Hortonworks a Modern Architecture
Data in Motion - Data at Rest - Hortonworks a Modern ArchitectureMats Johansson
 
Big Data in Financial Services
Big Data in Financial ServicesBig Data in Financial Services
Big Data in Financial ServicesEikos Partners
 

Semelhante a Data Driven Enterprise Closed Loop Architecture (20)

HDF: Hortonworks DataFlow: Technical Workshop
HDF: Hortonworks DataFlow: Technical WorkshopHDF: Hortonworks DataFlow: Technical Workshop
HDF: Hortonworks DataFlow: Technical Workshop
 
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFi
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFiTaking DataFlow Management to the Edge with Apache NiFi/MiNiFi
Taking DataFlow Management to the Edge with Apache NiFi/MiNiFi
 
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big Data
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big DataHortonworks DataFlow & Apache Nifi @Oslo Hadoop Big Data
Hortonworks DataFlow & Apache Nifi @Oslo Hadoop Big Data
 
Containers and Big Data
Containers and Big Data Containers and Big Data
Containers and Big Data
 
Hortonworks - IBM Cognitive - The Future of Data Science
Hortonworks - IBM Cognitive - The Future of Data ScienceHortonworks - IBM Cognitive - The Future of Data Science
Hortonworks - IBM Cognitive - The Future of Data Science
 
Beyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFiBeyond Messaging Enterprise Dataflow powered by Apache NiFi
Beyond Messaging Enterprise Dataflow powered by Apache NiFi
 
Apache NiFi - Flow Based Programming Meetup
Apache NiFi - Flow Based Programming MeetupApache NiFi - Flow Based Programming Meetup
Apache NiFi - Flow Based Programming Meetup
 
BigData Techcon - Beyond Messaging with Apache NiFi
BigData Techcon - Beyond Messaging with Apache NiFiBigData Techcon - Beyond Messaging with Apache NiFi
BigData Techcon - Beyond Messaging with Apache NiFi
 
Data on the Move - DataCon DC
Data on the Move - DataCon DCData on the Move - DataCon DC
Data on the Move - DataCon DC
 
Apache NiFi Toronto Meetup
Apache NiFi Toronto MeetupApache NiFi Toronto Meetup
Apache NiFi Toronto Meetup
 
Design Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDesign Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data Analytics
 
Design Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data AnalyticsDesign Patterns For Real Time Streaming Data Analytics
Design Patterns For Real Time Streaming Data Analytics
 
Hortonworks Data in Motion Webinar Series - Part 1
Hortonworks Data in Motion Webinar Series - Part 1Hortonworks Data in Motion Webinar Series - Part 1
Hortonworks Data in Motion Webinar Series - Part 1
 
Harnessing Data-in-Motion with HDF 2.0, introduction to Apache NIFI/MINIFI
Harnessing Data-in-Motion with HDF 2.0, introduction to Apache NIFI/MINIFIHarnessing Data-in-Motion with HDF 2.0, introduction to Apache NIFI/MINIFI
Harnessing Data-in-Motion with HDF 2.0, introduction to Apache NIFI/MINIFI
 
HDF Powered by Apache NiFi Introduction
HDF Powered by Apache NiFi IntroductionHDF Powered by Apache NiFi Introduction
HDF Powered by Apache NiFi Introduction
 
How to Secure your Data Lake
How to Secure your Data LakeHow to Secure your Data Lake
How to Secure your Data Lake
 
How to secure your data lake
How to secure your data lakeHow to secure your data lake
How to secure your data lake
 
Data in Motion - Data at Rest - Hortonworks a Modern Architecture
Data in Motion - Data at Rest - Hortonworks a Modern ArchitectureData in Motion - Data at Rest - Hortonworks a Modern Architecture
Data in Motion - Data at Rest - Hortonworks a Modern Architecture
 
Containers and Big Data
Containers and Big DataContainers and Big Data
Containers and Big Data
 
Big Data in Financial Services
Big Data in Financial ServicesBig Data in Financial Services
Big Data in Financial Services
 

Mais de AFCEA International

AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA International
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015AFCEA International
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015AFCEA International
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015AFCEA International
 
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015AFCEA International
 
Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015AFCEA International
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015AFCEA International
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015AFCEA International
 
The VetSuccess Immersion Academy: TechNet Augusta 2015
The VetSuccess Immersion Academy: TechNet Augusta 2015The VetSuccess Immersion Academy: TechNet Augusta 2015
The VetSuccess Immersion Academy: TechNet Augusta 2015AFCEA International
 
Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...AFCEA International
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015AFCEA International
 
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...AFCEA International
 
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...AFCEA International
 
Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015AFCEA International
 

Mais de AFCEA International (15)

AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA Defense Health Agency (DHA) Brainstorming Session Notes
AFCEA Defense Health Agency (DHA) Brainstorming Session Notes
 
Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015Secure Optical LAN: TechNet Augusta 2015
Secure Optical LAN: TechNet Augusta 2015
 
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015IPv6 Security Challenges: TechNet Augusta 2015
IPv6 Security Challenges: TechNet Augusta 2015
 
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
Rapid Infusion of Lessons Learned Across the DOTMLPF: TechNet Augusta 2015
 
Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015Tactical Radio Update: TechNet Augusta 2015
Tactical Radio Update: TechNet Augusta 2015
 
Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015Next-Generation Network Security: TechNet Augusta 2015
Next-Generation Network Security: TechNet Augusta 2015
 
Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015Cyber Situational Awareness: TechNet Augusta 2015
Cyber Situational Awareness: TechNet Augusta 2015
 
The VetSuccess Immersion Academy: TechNet Augusta 2015
The VetSuccess Immersion Academy: TechNet Augusta 2015The VetSuccess Immersion Academy: TechNet Augusta 2015
The VetSuccess Immersion Academy: TechNet Augusta 2015
 
Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...Defending Your Base of Operations: How Industrial Control Systems are Being T...
Defending Your Base of Operations: How Industrial Control Systems are Being T...
 
Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015Cyber Operations in Smart Megacities: TechNet Augusta 2015
Cyber Operations in Smart Megacities: TechNet Augusta 2015
 
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
Leading Soldiers in High-Tech Environments: CSM Harris Keynote at TechNet Aug...
 
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...
 
Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015Signal Commandant Presentation: TechNet Augusta 2015
Signal Commandant Presentation: TechNet Augusta 2015
 

Último

Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Call Girls in Nagpur High Profile
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29JSchaus & Associates
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.Christina Parmionova
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...nservice241
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...tanu pandey
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxaaryamanorathofficia
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Último (20)

Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...Top Rated  Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
Top Rated Pune Call Girls Hadapsar ⟟ 6297143586 ⟟ Call Me For Genuine Sex Se...
 
Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...Call On 6297143586  Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
Call On 6297143586 Yerwada Call Girls In All Pune 24/7 Provide Call With Bes...
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
EDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptxEDUROOT SME_ Performance upto March-2024.pptx
EDUROOT SME_ Performance upto March-2024.pptx
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Dapodi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
 

Data Driven Enterprise Closed Loop Architecture

  • 1. 1   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   State  of  C4I  :  Cri.cal  Aspects   Computer/Cyber  Technologies  and  Intelligence   The  Data  Driven  Enterprise   Real-­‐Bme  insights  at  scale  through  closed-­‐loop  processes     Joe  WiG  
  • 2. 2   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   The  role  of  ‘dataflow’  in  a  Data  Driven  Enterprise   Collect   Process   Store/Query   Latency  :  From  sensor  to  repository  (far  less  than  half  the  story)  
  • 3. 3   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Enterprise  Dataflow   Different  organiza.ons/business  units  across  different  geographic  loca.ons…  
  • 4. 4   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Enterprise  Dataflow   Conduc.ng  business  in  different  legal  and  network  domains…  
  • 5. 5   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Enterprise  Dataflow   Opera.ng  on  very  different  infrastructure  (power,  space,  cooling)…  
  • 6. 6   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Enterprise  Dataflow   Capable  of  different  volume,  velocity,  bandwidth,  and  latency…  
  • 7. 7   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Enterprise  Dataflow   Interac.ng  with  different  business  partners  and  customers  
  • 8. 8   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Data  driven  organiza.on  or  leader…       Wants  all  the  data  –  now     To  understand  it  all  and  how  it  relates     To  beGer  inform  decisions  and  decision  makers     To  outpace  adversaries/compeBtors  and  maximize  value  to  customers      
  • 9. 9   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Challenges   Wants  all  the  data  –  now   •  Bandwidth:  Limited,  Error  prone,  expensive   •  Denied  access   •  Compliance  requirements  (legal,  policy,  geographic  restricBons)   •  CompeBng  prioriBes  (perishable  vs  delay  tolerant)   •  Storage  is  cheap  but  rate  of  data  sensing  is  skyrockeBng   •  Controlling  the  edge  systems   To  understand  it  all  and  how  it  relates   To  beGer  inform  decisions  and  decision  makers   To  outpace  adversaries/compeBtors  and  maximize  value  to  customers    
  • 10. 10   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Challenges   Wants  all  the  data  –  now   To  understand  it  all  and  how  it  relates   •  Formats/schemas  evolve   •  SemanBcs  of  data  evolve   •  Processing  bandwidth  limits   •  Signal/noise  results  in  inefficient  processing   •  Compliance  implicaBons  of  joining  data   To  beGer  inform  decisions  and  decision  makers   To  outpace  adversaries/compeBtors  and  maximize  value  to  customers    
  • 11. 11   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Challenges   Wants  all  the  data  –  now.   To  understand  it  all  and  how  it  relates   To  beGer  inform  decisions  and  decision  makers   •  How  to  distribute  accumulated  context   •  How  to  track  origin  of  most/least  valuable  sources   •  Compliance  implicaBons  of  sharing  observaBons/insights   To  outpace  adversaries/compeBtors  and  maximize  value  to  customers    
  • 12. 12   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Challenges   Wants  all  the  data  –  now.   To  understand  it  all  and  how  it  relates   To  beGer  inform  decisions  and  decision  makers   To  outpace  adversaries/compeBtors  and  maximize  value  to  customers   •  How  to  maximize  value  of  distributed  enterprise   •  Ability  to  redo  decisions  (what  if  I  took  a  different  path)   •  Ability  to  interact  with  live  data  and  systems  to  effect  change   •  Trace  acBons  to  decisions  to  inputs…    
  • 13. 13   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   ‘OODA  Loop’  –  A  closed  loop  system       Wants  all  the  data  –  now    OBSERVE   To  understand  it  all  and  how  it  relates    ORIENT   To  beGer  inform  decisions  and  decision  makers    DECIDE   To  outpace  adversaries/compeBtors  and  maximize  value  to  customers    ACT    
  • 14. Page 14 © Hortonworks Inc. 2011 – 2015. All Rights Reserved It’s not just how quickly you move data – it’s about how quickly you can change behavior and seize new opportunities
  • 15. 15   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   The  Data  Driven  Enterprise  –  demands  a  closed  loop  architecture   §  Constrained   §  High-­‐latency   §  Localized  context   §  Hybrid  –  cloud/on-­‐premises   §  Low-­‐latency   §  Global  context   SOURCES   REGIONAL     INFRASTRUCTURE   CORE     INFRASTRUCTURE  
  • 16. 16   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Command  and  Control   §  Constrained   §  High-­‐latency   §  Localized  context   §  Hybrid  –  cloud/on-­‐premises   §  Low-­‐latency   §  Global  context   SOURCES   REGIONAL     INFRASTRUCTURE   CORE     INFRASTRUCTURE   Distributed  agent   Central  control   Mul.-­‐tenant   Interac.ve  command  and  control  
  • 17. 17   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Provenance   §  Constrained   §  High-­‐latency   §  Localized  context   §  Hybrid  –  cloud/on-­‐premises   §  Low-­‐latency   §  Global  context   SOURCES   REGIONAL     INFRASTRUCTURE   CORE     INFRASTRUCTURE   Origin  –  a[ribu.on   Replay  –  recovery   Evolu.on  of  topologies   Long  reten.on   Types  of  Lineage   •  Event  (runBme)   •  ConfiguraBon  (design  Bme)  
  • 18. 18   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   The  need  for  data  provenance   For Operators •  Traceability, lineage •  Recovery and replay For Compliance •  Audit trail •  Remediation For Business / Mission •  Value sources •  Value IT investment BEGIN   END   LINEAGE  
  • 19. 19   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Security   §  Constrained   §  High-­‐latency   §  Localized  context   §  Hybrid  –  cloud/on-­‐premises   §  Low-­‐latency   §  Global  context   SOURCES   REGIONAL     INFRASTRUCTURE   CORE     INFRASTRUCTURE   Sign,  encrypt,  sta.c   (data  and  control)   TLS,  obfusca.on,  dynamic  en.tlements   Kerberos,  PKI,  AD/DS,  etc.  
  • 20. 20   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   The  need  for  fine-­‐grained  security  and  compliance   It’s not enough to say you have encrypted communications •  Enterprise authorization services –entitlements change often •  People and systems with different roles require difference access levels •  Tagged/classified data
  • 21. 21   ©  Hortonworks  Inc.  2011  –  2016.  All  Rights  Reserved   Topics  to  explore  further   Ã  Private  InformaBon  Retrieval  (PIR)  –  Doesn’t  this  break  the  provenance  trail?   Ã  Role  of  cryptographically  verifiable  approaches  such  as  Blockchain   Ã  What  standards  are  needed  (provenance,  security)?