CORPORATE TALK SERIES
Bio: Tendai Gomo has 20 years of experience in technology and is currently a Technology Program Manager for Google Cloud currently responsible for managing over 10 products in Google Cloud Storage. Previously Tendai was an Executive Director at JPMorgan Chase where he was responsible for Cyber Security and Technology Controls for Cloud Technology. Previously Tendai has worked for companies like UBS, Barclays, and Deloitte.
Title of the talk: Building low-level software for high-level function
Abstract: First, in this talk, I will present a personal project designing an application and API for Google Glass. I did this work before I joined Google. Indeed, I sold my software system to a large Software Company. Later on, I joined Google.
In the second part of this talk, I will discuss managing global scope projects and the art and science of software development in and out of the Cloud. This is very germane for managing substantial global projects.
In the third part of this talk, I will connect the dots for global project management. In particular, I will discuss creating habits and feedback loops that enhance productivity. This will be focused on technical projects with technical details on how to leverage the global technological environment.
Michele Lynn-Moore Myauo
Microsoft Corporation, USA
Bio: Michele Lynn-Moore Myauo, Ph.D., is a cybersecurity and IT executive, author, speaker and professor. She is a director of cybersecurity & secure infrastructure services delivery for the global secure infrastructure practice at Microsoft. She previously worked at IBM, where she was service area manager for the operations and supply chain management practice and deputy director of enterprise architecture. She also worked as a professor of engineering management and systems engineering, with a focus on cybersecurity policy and compliance, at The George Washington University in Washington, D.C. Myauo has over 17 yrs. experience leading cybersecurity, systems engineering, and IT services business execution across academia, industry, and many levels of government, including the U.S. intelligence community and federal departments of commerce, defense, energy, state, and homeland security. She holds a doctorate in systems engineering from The George Washington University, a M.S. in industrial and organization psychology from University of Baltimore, and a B.S. in psychology from Bethany College in Bethany, W.Va.
Title of the talk: You are under attack
Abstract: Either you’re under attack and you know it. Or you’re under attack and you don’t know it yet. Most organizations are breached within 24 hours, and attackers lurk in environment for more than a year before detection. As much of our daily interaction now takes place online, criminals increasingly seize the opportunity to launch cyber-attacks.
By 2022, the cybersecurity industry is expected to gross more than $232 billion globally. Cyber- attackers exploit people, processes, and technologies to steal high-value data. Their attacks are complex and costly, and they require rapid and comprehensive counter measures – which in turn require a workforce of great diversity. Demand for cybersecurity professionals is expected to rise to six million worldwide by 2019, with a projected shortfall of 1.5 million.
To withstand increasing and evolving cyber threats, organizations must understand the current and emerging landscape and systematically implement a holistic approach to cybersecurity. This keynote will offer real-world insights on helping global organizations manage cyber risk, recover from cyber-attacks, and mitigate future threats.
Microsoft Corporation, USA
Bio: Hossam Fattah received his Ph.D. in Electrical and Computer Engineering from University of British Columbia, Vancouver, Canada in 2003. In 2000, he received his Masters of Applied Science in Electrical and Computer Engineering from University of Victoria, Victoria, Canada. He completed his B.Sc. degree in Computers and Systems Engineering from AlAzhar University, Cairo, Egypt in 1995.
Between 2004 to 2013, he has been with the academia and industry, including Texas A&M University and Spirent Communications, USA, working on wireless communication technology, cellular systems, and research and development for several networking and wireless standards and protocol stacks including Zigbee, WiFi, WiMax, CDMA, and 3G/4G/5G systems. Since 2013, he has been with Microsoft Corporation, USA, working on different networking products and services for Windows and Cloud networking and technology.
He has contributed to many technical publications in referred conferences, journal, patents, and a Book author. He is a registered Professional Engineer with the Engineers and Geoscientists of British Columbia, Canada.
Title of the talk: Traffic Monitoring in Microsoft Azure Cloud
Abstract: Storing, viewing, and analyzing network flows in a Cloud environment is an important Virtualized Network Function (VNF) for Cloud tenants and users. It is used to store, track, and analyze traffic that belongs to Virtual Networks (VNETs), Virtual Machines (VMs), or Network Interfaces (NICs). It is used for logging ingress and egress IP traffic flows, number of bytes and packets transmitted and received, and network connections. Flow logging is critical for the investigation of firewall functionalities, security incidents, and threat detection. Moreover, it can be used for detecting connection and network anomalies such as connection outages, configuration changes, or malicious activities. Alerts can be fired for any suspicious network activities. Visualization of flows logs provides insights such as who is using a web-service or an application, when customers are logged in and out, and what are the geographical locations where connections are being initiated or terminated. In this Talk, we talk about a VNF in Azure Cloud that details the framework for logging network flows in a Cloud environment. The method aims at accommodating multiple and simulations Cloud tenants and enabling the logging of network flows while at the same time accommodates high incoming rates of flow events and data. One of the major benefits of this flow logging is that it supports high number of flows per second that facilitates flow logging of high traffic volumes. Not only customers can experience higher number of flows logged, but the flow logs are visualized and contain the number of packets and bytes transmitted and received for outbound and inbound flows, respectively.
Consultant Member, Oracle, USA
Bio: Alexander Podelko has specialized in performance since 1997, working as a performance engineer and architect for several companies. Currently, he is Consulting Member of Technical Staff at Oracle, responsible for performance testing and optimization of Enterprise Performance Management and Business Intelligence (a.k.a. Hyperion) products.
Alexander periodically talks and writes about performance-related topics, advocating tearing down silo walls between different groups of performance professionals. His collection of performance-related links and documents (including his recent articles and presentations) can be found at http://www.alexanderpodelko.com. Alexander blogs at http://alexanderpodelko.com/blog and can be found on Twitter as @apodelko. He currently serves as a director for the Computer Measurement Group (CMG, http://cmg.org), an organization of performance and capacity planning professionals.
Alexander received his Ph.D. in Computer Science from Gubkin University and his MBA from Bellevue University.
Title of the talk: Internet of Things: Performance, Capacity, and Scalability Aspects
Abstract: According to an independent global survey of 800 CIOs, 74% of IT leaders are concerned that Internet of Things (IoT) performance problems could directly impact business operations and significantly damage revenues. IoT brings in a unique combination of challenges, including increased complexity, limited visibility, and data explosion. While IoT systems are very diverse and it is difficult to provide generic recommendations, in this session we will consider some typical issues and approaches for every stage of system's lifecycle – design, development, testing, and operations.
Adept Reality, USA
Bio: Hugh Seaton has spent his career involved in the creation and marketing of new technologies. From novel steel wire in southern Taiwan to flat screens at Philips, Walkman at Sony and online services at AOL, and now AI powered talent development at Aquinas Learning, Hugh has driven innovation and adoption for over 20 years. Since returning from China in 2012, Hugh has led creation and execution of 20+ hackathons, and created conferences in Connecticut & New York City. His most recent passion project is the creation of a world class AR cloud in Stamford, CT. Hugh is graduate of Columbia Business School, writing his graduate thesis on diffusion of innovations.
Title of the talk: Unfinished Gateways: Mobile & Wearable Devices In the ARCloud
Abstract: The world is becoming increasingly instrumented, modeled and represented digitally. The growth of IoT across urban and industrial landscapes, combined with emergence of augmented reality systems capable of representing those dataflows in real time against a fully modeled digital twin of the real world, represents a step change in how we can interact with the world and its data flows. How this is coming together, the progress and opportunities it presents for new areas of research and commercial growth will all be explored through the aperture of the mobile & wearable devices that make it all accessible. Specific topics will include the ARCloud, Natural Language Processing, Computer Vision and hardware present & near future.
Head Of Research at Comet.ml, USA
Bio: Douglas Blank is the head of research at Comet ML, a machine learning experiment management platform that makes machine learning experiments easy to run, visualize, understand, and reproduce. He is also a Professor Emeritus of Computer Science at Bryn Mawr College where he’s taught for eighteen years. Professor Blank's core research area is in machine learning where he explored deep learning on robots in order for them to develop artificial intelligence through experience.
Title of the talk: Software Engineering for Machine Learning
Abstract: Software engineering is a well-established field with many best-practices. However, many of the best practices and methodologies of software engineering principles don’t apply to machine learning (ML) and data science. ML can be used to solve problems very different from that of software engineering. For example, rather than relying on human-designed specifications, ML can solve problems by merely seeing examples of solutions. This has huge implications throughout the software industry. Concepts such as software security, quality assurance, maintenance, and team organization need to be restructured in order to be applied to ML. This talk will explore some of the issues in designing software engineering for machine learning.
Founder, PreviewLabs Inc., USA
Bio: Bernard Near the end of 2009, Bernard decided to combine his passion for game design and game programming by starting the first company dedicated to the development of prototypes using game technology: PreviewLabs.
PreviewLabs turns ideas into interactive prototypes, allowing its clients to evaluate concepts early on. This service enables them to explore more different concepts and ultimately helps them to be more successful developing new products.
In the first nine years of PreviewLabs, Bernard oversaw the development of prototypes for over 200 different concepts, for clients including Walt Disney Imagineering and Yale University, but also a large amount of startups seeking to develop new products.
Title of the talk: Rapid Prototyping for IoT and Augmented Reality
Abstract: When a new technology or medium comes up, some interesting challenges present themselves when developing new applications. For instance, how do you find the best way of using the new technology for your needs? How do you effectively pitch your ideas? And what are effective ways to study the feasibility for your target audience?
|Full Paper Submission:||14th August 2019|
|Acceptance Notification:||29th August 2019|
|Final Paper Submission:||30th September 2019|
|Early Bird Registration:||30th September 2019|
|Presentation Submission:||1st October 2019|
|Conference:||10th-12th October 2019|
• Conference Proceedings will be submitted for publication at IEEE Xplore Digital Library
• Conference Record No 47517
•Best Paper Award will be given for each track
• There will be two workshops on- i. Data Analysis and ii. IoT Workshop - Concepts to Implementation on 12th October 2019
• Conference Organising committee also invites proposals for Workshop/Tutorials on different fields.
•Conference Organising Committee invites proposals for ‘Call for demonstrations’.Visit the call for papers tab for details.