Table of contents
  1. Big Data Technology Symposium
    1. Summary
    2. Agenda
    3. Speakers
      1. Scot Atkins
      2. Ryan Barker
      3. Jeff Butler
      4. Cavan Paul Capps
      5. Steven Cooper
      6. Bill Franks
      7. Dion Herbert
      8. Andrew Hunt
      9. Kevin Jones
      10. Ted Malone
      11. Ken Nesbit
      12. Michael Papay
      13. Kshemendra Paul
      14. Dominic Sale
      15. Rita Sallam
      16. Roger Schell
      17. Bill Franks
    4. Congress Recognizes Accumulo as a Successful Open Source Software Project
    5. Breaking Through Big Data Barriers with Cell-Level Security
    6. Speaker Bio for Dominic Sale
    7. Results for #AFCEABIGDATA
    8. Close the Data Science Gap: Discover New Value with Big Analytic Apps
      1. Slide 1 Title
      2. Slide 2 Webcast Logistics
      3. Slide 3 Featured Speakers
      4. Slide 4 The Big Data Science Gap
      5. Slide 5 #BigData
      6. Slide 6 Big Data Definition
      7. Slide 7 Frontier
      8. Slide 8 Big Data is all your data
      9. Slide 9 Utilized Data
      10. Slide 10 Data Value
      11. Slide 11 Big Data Management
      12. Slide 12 Think SPA
      13. Slide 13 Big Data Technology Ecosystem
      14. Slide 14 Big Data Has Momentum
      15. Slide 15 #Business
      16. Slide 16 Big Data Science
      17. Slide 17 Data Science Use Cases
      18. Slide 18 The Right Coupons
      19. Slide 19 Churn
      20. Slide 20 Advice
      21. Slide 21 Disruption
      22. Slide 22 #DataScience
      23. Slide 23 Data Science Needs
      24. Slide 24 Data Science Versus Business Intelligence
      25. Slide 25 Data Scientists Unleash Robot Armies
      26. Slide 26 Data Scientists Use Statistics and Algorithms
      27. Slide 27 Data Science Discovery Lifecycle
      28. Slide 28 Mind The Gaps
      29. Slide 29 Gap 1
      30. Slide 30 Gap 2
      31. Slide 31 Gap 3
      32. Slide 32 Gap 4
      33. Slide 33 Thank you
      34. Slide 34 Teradata Aster
      35. Slide 35 The Big Data Gap
      36. Slide 36 Enterprise Big Data Analytics
      37. Slide 37 Iterative Analytics Accelerates Discovery
      38. Slide 38 Key Reqirements of a Discovery Platform
      39. Slide 39 Aster Discovery Platform
      40. Slide 40 Multi-Genre Analytics
      41. Slide 41 Aster Discovery Platform 5.10
      42. Slide 42 Visual SQL-MapReduce Functions
      43. Slide 43 Additional Features
      44. Slide 44 Use Case
      45. Slide 45 Top 10 Parts Repaired
      46. Slide 46 Proactively Improving Customer Satisfaction
      47. Slide 47 Summary
      48. Slide 48 Big Data Analytics Applicance
      49. Slide 49 For More Information
      50. Slide 50 Q&A + Additional Resources
      51. Slide 51 Q&A Continues - Join our Live TweetChat
  2. NEXT

Big Data Technology Symposium

Last modified
Table of contents
  1. Big Data Technology Symposium
    1. Summary
    2. Agenda
    3. Speakers
      1. Scot Atkins
      2. Ryan Barker
      3. Jeff Butler
      4. Cavan Paul Capps
      5. Steven Cooper
      6. Bill Franks
      7. Dion Herbert
      8. Andrew Hunt
      9. Kevin Jones
      10. Ted Malone
      11. Ken Nesbit
      12. Michael Papay
      13. Kshemendra Paul
      14. Dominic Sale
      15. Rita Sallam
      16. Roger Schell
      17. Bill Franks
    4. Congress Recognizes Accumulo as a Successful Open Source Software Project
    5. Breaking Through Big Data Barriers with Cell-Level Security
    6. Speaker Bio for Dominic Sale
    7. Results for #AFCEABIGDATA
    8. Close the Data Science Gap: Discover New Value with Big Analytic Apps
      1. Slide 1 Title
      2. Slide 2 Webcast Logistics
      3. Slide 3 Featured Speakers
      4. Slide 4 The Big Data Science Gap
      5. Slide 5 #BigData
      6. Slide 6 Big Data Definition
      7. Slide 7 Frontier
      8. Slide 8 Big Data is all your data
      9. Slide 9 Utilized Data
      10. Slide 10 Data Value
      11. Slide 11 Big Data Management
      12. Slide 12 Think SPA
      13. Slide 13 Big Data Technology Ecosystem
      14. Slide 14 Big Data Has Momentum
      15. Slide 15 #Business
      16. Slide 16 Big Data Science
      17. Slide 17 Data Science Use Cases
      18. Slide 18 The Right Coupons
      19. Slide 19 Churn
      20. Slide 20 Advice
      21. Slide 21 Disruption
      22. Slide 22 #DataScience
      23. Slide 23 Data Science Needs
      24. Slide 24 Data Science Versus Business Intelligence
      25. Slide 25 Data Scientists Unleash Robot Armies
      26. Slide 26 Data Scientists Use Statistics and Algorithms
      27. Slide 27 Data Science Discovery Lifecycle
      28. Slide 28 Mind The Gaps
      29. Slide 29 Gap 1
      30. Slide 30 Gap 2
      31. Slide 31 Gap 3
      32. Slide 32 Gap 4
      33. Slide 33 Thank you
      34. Slide 34 Teradata Aster
      35. Slide 35 The Big Data Gap
      36. Slide 36 Enterprise Big Data Analytics
      37. Slide 37 Iterative Analytics Accelerates Discovery
      38. Slide 38 Key Reqirements of a Discovery Platform
      39. Slide 39 Aster Discovery Platform
      40. Slide 40 Multi-Genre Analytics
      41. Slide 41 Aster Discovery Platform 5.10
      42. Slide 42 Visual SQL-MapReduce Functions
      43. Slide 43 Additional Features
      44. Slide 44 Use Case
      45. Slide 45 Top 10 Parts Repaired
      46. Slide 46 Proactively Improving Customer Satisfaction
      47. Slide 47 Summary
      48. Slide 48 Big Data Analytics Applicance
      49. Slide 49 For More Information
      50. Slide 50 Q&A + Additional Resources
      51. Slide 51 Q&A Continues - Join our Live TweetChat
  2. NEXT

  1. Big Data Technology Symposium
    1. Summary
    2. Agenda
    3. Speakers
      1. Scot Atkins
      2. Ryan Barker
      3. Jeff Butler
      4. Cavan Paul Capps
      5. Steven Cooper
      6. Bill Franks
      7. Dion Herbert
      8. Andrew Hunt
      9. Kevin Jones
      10. Ted Malone
      11. Ken Nesbit
      12. Michael Papay
      13. Kshemendra Paul
      14. Dominic Sale
      15. Rita Sallam
      16. Roger Schell
      17. Bill Franks
    4. Congress Recognizes Accumulo as a Successful Open Source Software Project
    5. Breaking Through Big Data Barriers with Cell-Level Security
    6. Speaker Bio for Dominic Sale
    7. Results for #AFCEABIGDATA
    8. Close the Data Science Gap: Discover New Value with Big Analytic Apps
      1. Slide 1 Title
      2. Slide 2 Webcast Logistics
      3. Slide 3 Featured Speakers
      4. Slide 4 The Big Data Science Gap
      5. Slide 5 #BigData
      6. Slide 6 Big Data Definition
      7. Slide 7 Frontier
      8. Slide 8 Big Data is all your data
      9. Slide 9 Utilized Data
      10. Slide 10 Data Value
      11. Slide 11 Big Data Management
      12. Slide 12 Think SPA
      13. Slide 13 Big Data Technology Ecosystem
      14. Slide 14 Big Data Has Momentum
      15. Slide 15 #Business
      16. Slide 16 Big Data Science
      17. Slide 17 Data Science Use Cases
      18. Slide 18 The Right Coupons
      19. Slide 19 Churn
      20. Slide 20 Advice
      21. Slide 21 Disruption
      22. Slide 22 #DataScience
      23. Slide 23 Data Science Needs
      24. Slide 24 Data Science Versus Business Intelligence
      25. Slide 25 Data Scientists Unleash Robot Armies
      26. Slide 26 Data Scientists Use Statistics and Algorithms
      27. Slide 27 Data Science Discovery Lifecycle
      28. Slide 28 Mind The Gaps
      29. Slide 29 Gap 1
      30. Slide 30 Gap 2
      31. Slide 31 Gap 3
      32. Slide 32 Gap 4
      33. Slide 33 Thank you
      34. Slide 34 Teradata Aster
      35. Slide 35 The Big Data Gap
      36. Slide 36 Enterprise Big Data Analytics
      37. Slide 37 Iterative Analytics Accelerates Discovery
      38. Slide 38 Key Reqirements of a Discovery Platform
      39. Slide 39 Aster Discovery Platform
      40. Slide 40 Multi-Genre Analytics
      41. Slide 41 Aster Discovery Platform 5.10
      42. Slide 42 Visual SQL-MapReduce Functions
      43. Slide 43 Additional Features
      44. Slide 44 Use Case
      45. Slide 45 Top 10 Parts Repaired
      46. Slide 46 Proactively Improving Customer Satisfaction
      47. Slide 47 Summary
      48. Slide 48 Big Data Analytics Applicance
      49. Slide 49 For More Information
      50. Slide 50 Q&A + Additional Resources
      51. Slide 51 Q&A Continues - Join our Live TweetChat
  2. NEXT

Big Data Technology Symposium

Summary

Source: https://www.signup4.net/public/ap.as...BIGD25E&OID=50

Informative links:
The Data Exchange Toolkit (will be mentioned by Kshemendra Paul)
National Strategy for Information Sharing and Safeguarding (Kshemendra Paul's blog)

Big data projects are found all around us, and many of us have one attached to our hand all day. Apple’s personal assistant technology, Siri, began as a big data project in the Pentagon laboratory, priding itself on the ability to collect, store, analyze and disseminate practically any data you throw at it – structured or unstructured. But Siri isn’t the only government big data project that has recently gained traction. Last March, the White House announced that the federal government would be contributing $200 million to support its Big Data Initiative, which promotes big data projects and technologies. 

Through the implementation of big data programs, agencies are looking to increase efficiencies and productivity, make faster and more informed decisions, and protect national security. The Big Data Technology Symposium will create a business case for pilot programs, looking at the complete lifecycle of big data – collection, storage, analysis and taking action. 

Join AFCEA Bethesda and speakers from leading federal agencies on March 12, 2013 at the JW Marriott in Washington, DC for a look at the business case surrounding big data projects and the resources, scientists, analysts and technology needed to complete them.
 
Attendees will learn:
  • How big data can help prevent improper payments
  • How to use big data and analytics to identify cyber threats
  • Recommendations for starting and leveraging big data solutions
  • Case studies and examples of pilot programs implemented across the federal space

Continuing Education Credits (.4)

AFCEA Bethesda will be providing Continuing Education Credits to all symposium attendees from the Graduate School USA. The Graduate School USA is an independent, educational, not-for-profit institution with a rich history that spans nine decades. By providing challenging education and training opportunities to aspiring and seasoned professionals, the Graduate School USA prepares individuals to enter and advance in careers in government, as well as related pursuits with private and not-for-profit organizations. The Graduate School USA's range of programs and services includes continuing education, academic programs, career development and certificate programs—all designed to service the needs of organizations and individuals in both government and the private sector.

 
According to Deltek research, Federal government demand for big data solutions is growing. By 2017, spending levels are expected to steadily increase from $4.9 billion to approximately $7.2 billion. Download Deltek’s free report summary.

Agenda

Source: https://www.signup4.net/public/ap.as...IGD25E&OID=147

Tuesday, March 12, 2013
JW Marriott in Washington, DC

 

 6:45 AM – 7:00 AM  Symposium Registration and Check-in
 7:00 AM – 7:45 AM Networking Breakfast
 7:45 AM – 7:55 AM
Welcome Remarks
  • Harold Youra, VP, Technology Symposium, AFCEA Bethesda Chapter
  • Bill Franks, Chief Analytics Officer, Global Alliances, Teradata Corporation
 7:55 AM – 8:25 AM
Government Keynote: Leveraging Big Data to Drive Government Efficiencies
  • Dominic Sale, Senior Policy Analyst, Office of E-Government and Information Technology, Office of Management and Budget
 8:25 AM – 8:30 AM Introduction Remarks
 8:30 AM – 9:00 AM Marketplace Keynote: Big Data Outlook 2013 and Beyond
  • Rita Sallam, Research Vice President, Gartner
 9:00 AM – 9:55 AM Panel 1: Making the Business Case for a Big Data Pilot Program
With so much data arriving and in storage, how do technology leaders and data scientists generate internal support and funding to invest in larger Big Data initiatives? How do agencies architect the people, processes, and technology required for Big Data to achieve the desired business outcomes? This panel will discuss building the business case for implementing Big Data programs. Panelists will discuss the following business case elements including:
  • Support and Strategy
  • Analytic and Subject Matter Enablers
  • Underlying Infrastructure and IT Skills

Speakers:

  • Moderator: Ryan Barker, Senior Director, Data Analytics, Guident
  • Cavan Paul Capps, Chief, TheDataWeb Applications Branch, Data Integration Division, Census Bureau,Department of Commerce
  • Steven Cooper, Executive Director, Law Enforcement Information Sharing Initiative PMO, Immigration and Customs Enforcement, Department of Homeland Security
  • Ken Nesbit, Associate Chief Information Officer, Infrastructure Operations, Department of the Treasury
  • Kshemendra Paul, Program Manager, Information Sharing Environment, Office of the Director of National Intelligence
 9:55 AM – 10:15 AM Networking Break
 10:15 AM – 11:10 AM Panel 2: Fraud, Waste and Abuse — Leveraging Big Data to Prevent Improper Payments
In fiscal year 2012, agencies lost nearly $108 billion through improper payments. With spending cuts a certainty for the federal government, agencies can no longer afford to lose billions of dollars a year in tax, healthcare, social security, or other government programs to fraud, waste and abuse. By collecting, tagging, and analyzing huge amounts of purchase data, agencies and contractors can uncover duplicative payments, overpayments and fictitious vendors. When accurate information about federal spending is encoded using consistent data standards and combined on a Big Data platform, improper payments can be exposed. This session will discuss the processes, tools and technologies available to prevent improper payments using big data. 
  • Current measures being taken across agencies to prevent fraud, waste and abuse
  • Real-time analytics of many data sources, structured and unstructured
  • How agencies improve information accuracy through big data analytics
Speaker:
  • Moderator: Ted Malone, Solutions Architect, Data and Cloud, Microsoft Federal
  • Scot Atkins, Program Manager, Supercomputing and Revenue Protection, United States Postal Service
  • Jeff Butler, Director, Research Databases, Internal Revenue Service, Department of the Treasury
  • Kevin Jones, Executive Director, Do Not Pay Business Center, Department of the Treasury
 11:10 AM – 11:30 AM Networking Break
 11:30 AM – 12:25 PM Panel 3: Cyber Security — How Agencies Use Big Data to Identify Threats
The influx of disruptive technologies being deployed across federal civilian, DOD and the IC, such as cloud computing, social media, mobile devices, and C4ISR capabilities, bring with them a host of vulnerabilities. To mitigate cyber threats, agencies require continuous monitoring, which in turn increases the amount of cyber data collected and the need for secure, robust and scalable storage capability – dynamically scaling to fully utilize all the resources available in a secure manner to reduce the risks. This panel will discuss how government agencies are managing cyber data in new and innovative ways to improve situational awareness, identify vulnerabilities, and make strategic and operational decisions. 
  • How big data security platforms can detect cyber threats early
  • How to use existing data sets and analytics to identify pattern recognition, event correlation and intrusion detection
  • How can agencies use near-real-time data to provide actionable intelligence
Speakers:
  • Moderator: Michael Papay, Vice President and Chief Information Security Officer, Northrop Grumman Information Systems
  • Dion Herbert, Deputy, Bureau of Diplomatic Security, Office of Computer Security, Enterprise Security Services, Department of State
  • Andrew Hunt, Information Security Researcher, MITRE Corporation
  • Roger Schell, Senior Computer Scientist, University of Southern California
 12:25 PM – 12:30 PM Closing Remarks
   

Speakers

Source: https://www.signup4.net/public/ap.as...IGD25E&OID=148

Scot Atkins

Program Manager, Supercomputing and Revenue Protection, United States Postal Service

Scot Atkins currently works for the US Postal Service as a Program Manager for Supercomputing and Revenue Protection and holds a degree in Mathematics and Physics. Scot has been with the USPS for 19 years and previously served with the US Army as a Special Operations R&D/Test Officer and Pilot for 10 years. Supercomputing and Special Operations have represented the cutting edge in requirements and creative innovation while Revenue Protection and Special Operations have represented the challenge of protecting against persistent threat. Scot has combined these nearly 30 years of experience to provide state-of-the-art IT architecture solutions to what may arguably be one of the world’s most voluminous real-time transactional data problems by creating the largest known in-memory database (>8TB) coupled with transactional database record ingest rates exceeding 1.5 million records ingested per second per 16 core blade. These cutting-edge approaches to large volume data solutions has allowed the US Postal Service to protect revenue by performing real-time interception of insufficient and fraudulent postage, both time and geographically disperse, over billions of events per day.

Ryan Barker

Senior Director, Data Analytics, Guident

Barker

 
Ryan Barker is a Senior Director in Guident’s Data Analytics Division and leader of their Big Data practice. For 17 years, he has led the delivery of data management and analytic solutions for Fortune 500 and federal government agencies. Mr. Barker has provided guidance to executives in the commercial and public sectors to develop strategies and deploy solutions that enable effective use of data to drive better decision making. During his tenure, he has led full life-cycle, enterprise-wide Data Management, Business Intelligence, Data Warehousing, systems integration, and ERP implementations. He has also presented at various national conferences on a wide-range of Business Intelligence and Data Warehousing topics. Prior to Guident, Mr. Barker held management roles at PwC and IBM.

Jeff Butler

Director, Research Databases, Internal Revenue Service, Department of the Treasury  

JeffButler
 
Jeff Butler is Director of Research Databases in the IRS Research, Analysis, and Statistics organization and manages the IRS’ largest analytic data environment.  Prior to returning to the IRS in 2004, he was Associate Director, Office of Statistical Computing in the Bureau of Transportation Statistics. He has 25 years of experience in data mining, statistical computing, and data warehousing. Jeff holds a B.A and M.A. in Economics and has completed work toward a M.S. in Statistics.

Cavan Paul Capps

Chief, The DataWeb Applications Branch, Data Integration Division, Census Bureau, Department of Commerce

  capps

Cavan Capps has worked for the last thirty years specializing in computer architecture for analytics. In the private sector he worked in econometric forecasting before focusing systems development and architecture for the Army Research Institute, Mathematica, the Bureau of Labor Statistics and the U.S. Bureau of the Census. At BLS, Mr. Capps lead the effort to downsize statistical processing systems from mainframes to distributed networks. Before tasked to lead the U.S. Census’s Bureau effort on big data, Mr. Capps designed and lead the development of the DataWeb to access and provide descriptive analytics from distributed data collections through a single set of interfaces. The system is now providing the API access to the collections of data the Census Bureau. Currently Mr. Capps is leading the effort to implement cost effective big data processing at the U.S. Census Bureau. 

Steven Cooper

Executive Director, Law Enforcement Information Sharing Initiative PMO, Immigration and Customs Enforcement, Department of Homeland Security

 Cooper

Mr. Steven W. Cooper has over 25 years experience in Law Enforcement. He currently serves as the Executive Director of the Department of Homeland Security (DHS) Law Enforcement Information Sharing Initiative (LEISI). In this role, Mr. Cooper manages and directs investigative and programmatic resources to develop an agile information saring capability for law enforcement information sharing across the Department to secure the Homeland. Mr. Cooper is an advocate within the Department and its components to instill information sharing into the culture as well as providing leadership in resolving policy issues and developing approaches to overcome barriers in information sharing.

Mr. Cooper provides oversight and administration of the LEISI program, including program management and oversight policy, strategy, planning and budgeting. He provides leadership and direction on the protocols and outreach used in law enforcement information sharing initiatives. Mr. Cooper also is the Product Owner for the development of ICE’s new Case Management – Modernization system. In this role, he provides oversight of the effort to develop a modernized case management system to meet the needs of the current and future ICE agent workforce, including the integration of field agents into the development effort and the use of new methodologies.  

Bill Franks

Chief Analytics Officer, Global Alliances, Teradata Corporation

BillFranks

Bill Franks is Chief Analytics Officer for Teradata's global alliance programs, providing insight on trends in the Advanced Analytics space and helping clients understand how Teradata and its analytic partners can support their efforts. In addition, Bill is a faculty member of the International Institute for Analytics and the author of the book Taming The Big Data Tidal Wave (John Wiley & Sons, Inc., April, 2012). He is also an active speaker and blogger. Bill's focus has always been to help translate complex analytics into terms that business users can understand and to then help an organization implement the results effectively within their processes. His work has spanned clients in a variety of industries for companies ranging in size from Fortune 100 companies to small non-profit organizations.

Dion Herbert

Deputy, Bureau of Diplomatic Security, Office of Computer Security, Enterprise Security Services, Department of State

Herbert

Over his 20 year career at the Department of State, Dion L. Herbert has been a valued enterprise contributor. Through his leadership, he has helped deploy many new technologies to include Internet VPN’s, enterprise access controls, and patch management scoring.


As the Deputy Mr. Herbert reviews and implements new and existing cyber security tools at a value of over $10 Million. He is also responsible for assessing technology and consulting on methods to enable it in support of the business goals and objectives in support of 80,000 plus users. 

Recently, his vision has moved the Department to a higher standard for data detection and correlation through implementation of the next generation of packet capture, context monitoring, data loss discovery, and event correlation technologies. His expertise also guided the Department’s implementation of the development of its Cyber Security Segment Architecture. Mr. Herbert continues to look for ways to enable business through the use of Mobile and Cloud security methods and technologies. He recently served on a mobile computing panel discussing threats and implementation strategies. Through his communications with many manufacturers, he helps drive industry to provide forward thinking solutions. Mr. Herbert also received the Cyber 4 Award in 2011 which recognized four leaders who exemplify excellence in government cyber security through their contributions to programs that address cyber security challenges and protect our nation’s data and systems. 

Prior to the Department of State, Mr. Herbert served 5 years in the U.S. Air Force supporting telecommunications security.

Andrew Hunt

Information Security Researcher, MITRE Corporation
Andrew Hunt is an Information Security Researcher at MITRE Corporation with more than fourteen years of experience working in the defense, health care, and energy industries. He is a certified incident responder, forensics practitioner, and malware reverse engineer. His research includes “Visualizing the Hosting Patterns of Modern Cybercriminals” and “Multimedia over Coaxial Alliance (MoCA): Operation and Security Posture,” as well as projects in non-attributable open-source data collection, Android malware and forensics, deployable sensor data collection over unreliable communications links, and large-scale CND data analytics. Andrew contributed to the Passive DNS Tool Project and established training programs in memory forensics and log data analysis. He is a regular presenter, with speaking engagements at George Mason University, Brigham Young University-Hawaii, Shakacon, ISSA Hawaii, and ISSA National Capital Region. Andrew devotes his spare time to traveling with his family, introducing his children to new cultures and experiences.

Kevin Jones

Executive Director, Do Not Pay Business Center, Department of the Treasury
 
Jones

Kevin R. Jones is the Executive Director of the Do Not Pay Business Center within the Department of the Treasury, Bureau of the Public Debt. The center addresses the federal government’s $115 billion improper payments problem by offering a centralized shared service that includes on-line and batch queries, continuous monitoring, and data analytics services to states and federal agencies seeking to verify eligibility for payment.


Mr. Jones has extensive experience in architecting, engineering, and managing large governmental financial systems, including major Treasury programs such as the Invoice Processing Platform and Pay.gov. He served as a Division Information Officer and Security Architect. Before his work at Treasury, Mr. Jones was a Senior Principal Information Security Engineer at MITRE and Mitretek Systems.

Mr. Jones holds the Project Management Professional certification as well as a NSA certification in the InfoSec Assessment Methodology; he graduated with honors from Williams College and holds Master’s degrees in information security (Eastern Michigan University) and management (Lesley College).

Ted Malone

Solutions Architect, Data and Cloud, Microsoft Federal

  malone

Ted is the Big Data Architecture lead for Microsoft Federal and is based in Colorado Springs, CO. In this role, he engages with Microsoft’s Federal customers to evangelize the Microsoft Big Data Analytics story and to educate them on new and exciting ways to gain insight from both unstructured and structured data within their environments.

Prior to joining Microsoft, Ted was a Software Architect in the Chief Technology Officer’s office for EMC, where he led the design and development of enterprise storage management solutions that leverage Big Data and complex Business Intelligence technologies.

Ken Nesbit

Associate Chief Information Officer, Infrastructure Operations, Department of the Treasury

Nesbit

Ken Nesbit currently serves as Treasury Associate Chief Information Officer (ACIO) for Infrastructure Operations (IO).  In this role, Ken is responsible for providing “effective, secure, and highly reliable computing services, for Treasury Departmental offices. He is also responsible for the policy, operations, and oversight of a wide range of telecommunications services for Treasury offices and Bureaus. This includes voice services, voice-conferencing, video-conferencing, and local and wide area network data services. 

Ken held a number of Executive Level positions at the IRS prior to joining the Treasury CIO organization.  He served as the Director, Requirements and Demand Management, where he was responsible for managing all of the IRS IT demand, providing business analysis requirements engineering support, assistive technology support, 508 compliance agency guidance, dissemination of employee directives and internal communications support. He also served as the Director, e-File Systems in the ACIO Applications Development, Submission Processing Domain. There, he was responsible for supporting electronic filing systems, including new development, operations and maintenance work for the Modernized e-File (MeF) system and operations and maintenance for legacy systems, electronic and management filing systems and the Filing Information Returns Electronically system. 

Prior to joining the IRS, Ken served 20 years in the U.S. Air Force, working as an air traffic controller in complex radar and tower facilities. 

Michael Papay

Vice President and Chief Information Security Officer, Northrop Grumman Information Systems  

papay

Michael Papay is vice president of Information Security and Cyber Initiatives for Northrop Grumman’s Information Systems sector. He leads the company’s cyber strategy development to advance the company’s leadership role in the cybersecurity community. Dr. Papay also serves as Northrop Grumman’s chief information security officer, delivering Northrop Grumman’s internal information security program. In this role, he is responsible for strategy and vision for the company’s global computer and network information security systems; defining companywide policies for information security; and enhancing the security of Northrop Grumman’s products, services and infrastructures. 

Dr. Papay has 26 years of experience with Northrop Grumman developing engineering solutions for the Department of Defense and intelligence community, including intercontinental ballistic missiles; missile defense systems; command and control systems; networking solutions; satellite and ground systems; airborne intelligence, surveillance and reconnaissance platforms; modeling and simulation programs; and military training tools. 

In a recent role, Dr. Papay was the director of Engineering Strategy, responsible for developing and executing the engineering strategy for the sector and driving the evolution of the sector’s engineering processes to ensure that priority wins and strategic programs were well engineered. In addition, he had responsibility for leading the Future Technical Leaders program, the Systems Engineering Associates (SEA) program and the Technical Fellows program, the IS sector’s premier technical talent acquisition and retention programs. 

Prior to joining the IS sector’s Engineering organization, Dr. Papay was the director of Engineering on the Joint National Integration Center Research and Development contract and program manager on the Distributed Mission Training program, two successful, long-running sector programs. In addition to his tenure on these programs, he led the architecture, design and development of major engineering solutions addressing some of the company’s most challenging engineering programs and captures. Dr. Papay is a nationally recognized expert in the modeling and simulation (M&S) field. He has written numerous papers, managed large programs, developed coursework and contributes to the congressional M&S caucus. He served on the 2012 Homeland Security Advisory Council’s Task Force on Cyber Skills and he is also on the Advisory Board for the George Mason University Volgenau School of Engineering.

Dr. Papay has a bachelor’s degree and a doctorate in aerospace engineering from Virginia Tech, and is a graduate of the SEA program.

Kshemendra Paul

Program Manager, Information Sharing Environment, Office of the Director of National Intelligence

Paul

President Obama appointed Kshemendra Paul as the Program Manager for the Information Sharing Environment (PM-ISE) in July 2010. The PM-ISE is the national office for responsible information sharing. In this role, Paul works closely with federal, state, local, and tribal partners – as well as with the private sector and international allies – to lead responsible information sharing policy and strategy to enhance national security.  

Prior to his appointment, Paul served as the Federal Chief Architect in the Office of Management and Budget where he led federal enterprise architecture activities. His tenure spanned two administrations, 4 budgets and an $80 billion portfolio. In 2005, Paul began his federal service as the Chief Architect at the Department of Justice. He has been recognized for his work by his peers, which includes Federal Computer Week as one of the Federal 100 in 2006 and 2009 and by Computer World as one of the Premier 100 in 2008.

Dominic Sale

Senior Policy Analyst, Office of E-Government and Information Technology, Office of Management and Budget  

DominicSale

Rita Sallam

Research Vice President, Gartner

RitaSallam

Rita Sallam is a Research Vice President at Gartner, where she focuses on business intelligence (BI) and analytics. This includes writing about and advising organizations on market trends, vendors and best practices. Of particular interest is advanced analytics on diverse data and decision management and optimization including collaborative decision making, which is the convergence of technologies that improve the quality and transparency of decisions.


Mrs. Sallam joined Gartner in 2008 with almost 20 years of experience in the enterprise software market. Before that, she spent 10 years with Oracle, delivering role-based competitive intelligence and strategic analysis on BI, data warehousing, data integration and master data management markets to sales, development, product strategy and senior management. Prior to that, she led business planning, fundraising and strategy development for two middleware startups and was a management/strategy consultant for Arthur D. Little.

Roger Schell

Senior Computer Scientist, University of Southern California
 
Dr. Roger R. Schell is internationally recognized as a major contributor to the advancement of computer security concepts and the overall definition of network security. Dr. Schell was the founding Deputy Director of the National Computer Security Center. For his work there, he is regarded as the father of the Trusted Computer System Evaluation Criteria (TCSEC or Orange Book) – historically the most widely used international security standard for trusted systems and networks. He was also a major contributor to the TCSEC’s Trusted Network Interpretation (TNI or Red Book). The NIST and NSA have recognized Dr. Schell with the National Computer System Security Award, the nation's highest honor in the information security field.

Dr. Schell co-founded Gemini Computers where he architected Gemini's GEMSOS security kernel and GTNP network processor, both of which were evaluated at TCSEC Class A1.

He originated several key modern security design and evaluation techniques and holds patents in the areas of cryptography, authentication and trusted workstation. During five years at Novell he delivered significant new security capabilities with every NetWare release. NetWare is the only system ever evaluated as a secure TCSEC Class C2 network. He managed the successful development and delivery of security for several Novell releases of network software products including an integral PKI, an international crypto API and an authentication service with exposed SSL capability. 

Dr. Schell has supported government and industry in the assessment of security vulnerabilities in both commercial products and special implementations. In the US government, he participated in Tiger Team penetration tests of several commercial and security enhanced operating systems and networks for various government activities including the Defense Intelligence Agency, the U. S. Air Force, the Office of the Joint Chiefs of Staff, and the Central Intelligence Agency. His research report while at the Air War College, entitled “Computer Security: The Achilles’ Heel of the Electronics Air Force?” was published in the Air University Review , and he co-authored “Multics Security Evaluation: Vulnerability Analysis” for the USAF Electronic Systems Division. These two papers are still referred to as the classic and seminal paper on information warfare, system penetration, and malicious software. 

In industry, Dr. Schell has been a member of the Black Forest Group, an IT consortium for major enterprises. And as an independent information security consultant to major enterprises, he defined PKI architectures and high assurance approaches to address business needs for regulatory compliance, trust relationships and liability allocation. Dr. Schell is frequently called upon to publicly address network security issues. He has more than 60 publications and has served as referee/reviewer for various conferences and journals.

Dr. Schell received a Ph.D. in Computer Science from the MIT, an M.S.E.E. from Washington State, and a B.S.E.E. from Montana State, and was an Associate Professor of Computer Science at the Naval Postgraduate School.

Dr. Schell is currently a Senior Computer Scientist with the University of Southern California and was one of the initial eleven inductees into the National Cyber Security Hall of Fame last October in Washington, D.C.
Bill Franks

Bill Franks is Chief Analytics Officer for Teradata’s global alliance programs, providing insight on trends in the Advanced Analytics space and helping clients understand how Teradata and its analytic partners can support their efforts.  Bill also oversees the Business Analytic Innovation Center, which is jointly sponsored by Teradata and SAS and focuses on helping clients pursue innovative analytics.  In addition, Bill works to help determine the right strategies and positioning for Teradata in the advanced analytics space.

Bill is the author of the book Taming The Big Data Tidal Wave (John Wiley & Sons, Inc., April, 2012. http://www.tamingthebigdatatidalwave.com/).  In the book, he applies his two decades of experience working with clients on large-scale analytics initiatives to outline what it takes to succeed in today’s world of big data and analytics.  Bill is also a faculty member of the International Institute for Analytics, which was founded by leading analytics expert Tom Davenport.  Bill is an active speaker and blogger.  His blog can be found at the following address: http://iianalytics.com/category/faculty-blogs/bill-franks/

Bill’s focus has always been to help translate complex analytics into terms that business users can understand and to then help an organization implement the results effectively within their processes.  His work has spanned clients in a variety of industries for companies ranging in size from Fortune 100 companies to small non-profit organizations.

Bill earned a Bachelor’s degree in Applied Statistics from Virginia Tech and a Master’s degree in Applied Statistics from North Carolina State University.

Congress Recognizes Accumulo as a Successful Open Source Software Project

Source: http://sqrrl.com/congress-recognizes...tware-project/

Yesterday the President of the United States signed the 2013 National Defense Authorization Act (NDAA).

image

sqrrl and our friends worked effectively with Congressional leaders to change language that would have attempted to limit the use of Apache Accumulo within the Department of Defense. In the end Congress rightfully recognized Accumulo as a successful open source project and as an example of the best of government innovation. This marked a significant victory for open source software.

Accumulo is proven to address the confluence of challenges faced by those hoping to take advantage of Big Data: security, scalability, and analytic adaptability. These unique strengths resolve some of the technical limitations of existing Big Data technologies and also enable our direct efforts to build analytic applications that solve the pressing issues of our time.

We applaud the efforts of all who have contributed to bring about this successful result and look forward to working further to advance open source software.

image

Breaking Through Big Data Barriers with Cell-Level Security

Source: http://blog.sqrrl.com/post/351435672...ith-cell-level

sqrrl enables organizations to securely leverage all of their data and build powerful real-time Big Data applications using Apache Accumulo.  These applications are applicable to a wide range of industries, including finance, healthcare, energy, consumer Internet, and government.Solutions in these industries demand fine-grained access controls that promote data integration and sharing without impacting performance or analytic adaptability. 

Apache Accumulo (supported by sqrrl) is the only non-relational database with cell-level security, and it provides organizations with entirely new Big Data capabilities.  These capabilities include:  

  • Secure information sharing. Organizations can integrate disparate data sets and user communities within a single data store, being assured that only authorized users can access appropriate data. This allows for improved sharing of information within and across organizations.
  • Deeper analytical insights. By increasing the amount of data available to analysts, and breaking down barriers around crude security schemes, organizations can conduct analyses that previously were not possible.
  • Simplified application development environment and greater analytic innovation. Organizations no longer need to fracture data across many databases. Apache Accumulo can serve as a central data store that securely feeds data to hundreds if not thousands of applications.

Other databases have explored the concept of data-centric security through table, document, column, and row-level restrictions, but these are not sufficient approaches.

Table or Document-level security is a blunt-force security approach that requires locking down an entire document or table that may hold a variety of differently data types.  

Column-level security is only sufficient when the data schema is static, well known, and aligned with security concerns.

Row-level security can sometimes account for variations in accessibility of data from different sources, but breaks down when a single record conveys multiple levels of information or tables become more complicated than simple event logs.

Cell-level security introduces a powerful orthogonal dimension, supporting data-centric security independent of table design.  

Using Apache Accumulo, data providers can finely control data through simple, explicit encoding of existing policies and requirements.  We have found that this model is an infinitely extensible language that effectively and efficiently scales to tera- and petabyte amounts of data.

Cell-level security opens up new possibilities within the Big Data and Hadoop ecosystem.  Using Apache Accumulo, organizations are no longer constrained by security and privacy requirements in conducting Big Data analytics.  With Accumulo, organizations can move past the concern that NoSQL = No Security.

Speaker Bio for Dominic Sale

Source: http://cpicconference.com/about-cpic...-dominic-sale/

My Note: Introduced as Chief of Data Analytics & Reporting and said new Digital Government Strategy is "treating all content as data."

DominicSale.jpg

Dominic Sale joined OMB’s Office of E-Government and Information Technology in 2008 as a portfolio manager for several government-wide IT initiatives.  At OMB, Dominic played a lead role in implementing and operating major initiatives such as the IT Dashboard, and he is currently heavily involved in implementing the Federal CIO’s 25-Point IT Management Reforms.  Prior to arriving at OMB, Dominic began his Federal career as a program analyst in the OCIO at the Department of Transportation.  In his prior life as a contractor at both BAE Systems and BearingPoint, Dominic managed EA, capital planning and security initiatives at DOL, NLRB, FDA, and Census.  He has also worked on a variety of federal programs, at agencies such as the IRS, US Postal Service, US Mint, US Patent and Trademark Office, and the National Park Service.

Results for #AFCEABIGDATA

Source: https://twitter.com/search/realtime?...GDATA&src=hash

Tweets Top / All / People you follow

  1.  Like to see more statistics and visualizations in Bill Frank's book than just on page 214, like: 

  2.  Kshemendar Paul mentioned this report, but not NIEM, so here are both as "all content as data": 

  3.  Rita Sallam omitted Gartner Says Big Data Makes Organizations Smarter, But Open Data Makes Them Richer: 

  4.  Dominic Sale introduced as Chief of Data Analytics & Reporting: Digital Government Strategy is "treating all content as data"

  5. From the mail to McDonald’s:  is all around us -- FCW  /X4DyCg  

  6.   Speakers agree, real issues are governance and process. That applies not just to Big Data.

  7.  Dion Herbert, State - find ways to get people to talk to map the processes and shorten the analyst process. Hire well!

  8.  security has been an afterthought. Tools are trying to catch up.

  9.  Michael Papay moderating the CyberSecurity panel. This is a great interactive panel! 

     
     
     
    Reply to 
     
     
    Image will appear as a link
  10. RT  Jeff Butler - work force issues are big challenges. Need skills in pre-processing, computational logistics, etc.

  11.  people problem, process problem, not just a technology problem.

  12. Picking up a lot of useful background info at the big data tech symposium. .

  13.  Jeff Butler - work force issues are big challenges. Need skills in pre-processing, computational logistics, etc.

  14. IRS talent is critically important and desperately needed, skills of the past 20 years will be less relevant over the next 20 

  15.  USPS is working with 400 billion records

  16.  Scott Atkins, USPS - Supercomputing is about density. Looking at how to move data more efficiently, important.

  17. USPS the cloud offers "entry level supercomputing" previously unavailable 

  18.  Kevin Jones, do not pay - working on how to analyze results sooner

  19.  Jeff Butler - vast amount of data, working from recovery to prevention.

  20. Ted Malone, ; Kevin Jones,  Scot Atkins, USPS; Jeff Butler, IRS talk fraud at  

  21.  want to do some Analytics on understating income/overstating deductions. Skills need to change. Prevention is becoming bigger

  22. IRS New, multi stage models focused on preventing improper payments in advance, not just detecting after the fact 

  23. Jeff Butler: "The next 5-10 years the rate of data will grow the fastest in unstructured environments.." 

  24.  Jeff Butler, IRS, deal with fraud working with structures data, but working towards integrating unstructured data.

  25. Treasury Do Not Pay Program: Figuring out the concept of operations is the hard part, finding the technology is the easy part 

  26.  Scott Atkins, USPS - need to track mail mail from inception to delivery, making sure each piece has the right postage

  27. RT : Well articulated governance model and requirements key to getting  projects off the ground.  

  28. Working towards a best of breed approach across Treasury to keep from building a bunch of one-offs 

  29. Avoid dis-economies of scale, build organic systems, adaptive over time, takes input from everyone 

  30. Well articulated governance model and requirements key to getting  projects off the ground. 

  31. Steve Cooper of DHS, ICE: We're implementing the Natl Strategy for Info Sharing & Safeguarding. Mission to share responsibly. 

  32. The panel on Business Case for Big Data is fantastic. Good info all around! 

  33. RT : Do you need a Ferrari to drive your granddaughter 1 mile down the road? It's not always about cost or capability. 

  34. Do you need a  to drive your grand-daughter one mile down the road? It's not always about cost or capability. 

  35. Ken Nesbit: "How do you get elasticity in Gov [with Big Data]? Build business case large and then start small." 

  36. Steve Cooper: "Gov is dealing with an explosion of data...need to identify what is the relevant data we need to focus on.." 

  37. Steven cooper : DHS ICE - may not need more data but need to know what is the relevant data that I already have 

  38. Steve Cooper of DHS, ICE: We're implementing the Natl Strategy for Info Sharing & Safeguarding. Mission to share responsibly. 

  39. ISE PM Paul: Info is a nat'l asset that needs to be safeguarded, shared, and reused. 

  40. Ken Nesbit: "Treasury has both a Closed and Enterprise structure for Big Data.." 

  41. Great panel #1: Census, Treasury, ISE, DHS ICE  

     
     
    Reply to 
     
     
    Image will appear as a link
  42. "What's the definition of Big data? Who cares! It's what you do with it that really matters." - 

  43. Great turnout at the  event!

  44.  Thank u for hosting Gartner! Grt program around piloting big data analytics, cyber security, fraud! Look frwd to white paprs!

  45. BigData Technology has arrived - Dominic Sale from OMB  

  46. Dominic Sale, OMB, eGov office: We need to incentivize data sharing not data hoarding 

  47. Dominic Sale, OMB: The Administration has made unlocking the power of data a priority  

  48. Dominic S: "There are three types of data collections: admin. function data, business related output, and IT related data.." 

  49. Great talk by Rita Sallam of Gartner at  including using big data to identify "Youth at Risk Index" in Pinellas County

  50. Dominic Sale: "Government is swimming in data..." 

  51. Is the Dos Equis guy the most interesting man in the world ? Or is it Harold Youra? Thanks for all you do for AFCEA Harold 

  52. . before embarking on a big data journey need to ask--are you prepared to hear the truth? 

  53. R. Sallam: "Evolution of deriving value from big data: educate, explore, engage and execute.." 

  54. R. Sallam: "When talking about the consumer, privacy, governance and security are paramount."

  55.  Internet of people, things, ideas and data 

  56.  bill franks of Teradata did a nice job resetting big data expectations

  57. R. Sallam: "Personal analytics is a way to empower people to manage their heath-care, while also managing cost.." 

  58. Definition of Big Data = "Who Cares" 

  59. . consumerization of analytics has enabled adoption and drives a $12B market in data analysis 

  60. . big data offers the promise of making new connections, finding new networks--of people, of ideas, of trends 

  61. . don't chase big data, identify your business proposition first then go get the data 

  62.  What's the definition of big data? Who cares! It's what you do with it that matters. 

  63. B. Franks: "Don't focus on what Bid Data is or isn't, focus on what it can do for you.." 

  64. Looking forward to a morning engaging in and learning about  for CGI! 

  65. Sponsoring AFCEA Bethesda's 2nd Big Data Technology Symposium (@ JW Marriott Hotel)  

  66. Kickoff to  conference featuring keynote with 

  67. Great turn out this morning for the symposia! 

  68. Looking for recommendations for starting and leveraging  solutions? Join us on 3/12! Sign up:  

  69. Looking for recommendations for starting and leveraging  solutions? Join us on 3/12! Sign up:  

  70. Our Big Data Symposium is coming up soon on 3/12  Sign up here:  

  71. Registration open for our Big Data Symposium on 3/12/13!  

  72. Who is pumped for our  breakfast next Thurs 12/15? We are! Sign up! 

Close the Data Science Gap: Discover New Value with Big Analytic Apps

This presentation began on March 13, 2013 at 10:00 AM Pacific Daylight Time.
    
Join Mike Gualtieri, Principal Analyst at Forrester Research and Tasso Argyros, Co-President of Teradata Aster in this 60-minute webcast as they discuss trends, technologies and how to turn big data & apache Hadoop into actionable insights.

We encourage you to participate in our 60 minute Tweetchat Q&A session just after this webcast by following along on http://www.twitter.com using hashtag #TDLive, or on TweetChat at: http://tweetchat.com/room/TDLive.

http://spotfire.tibco.com/about-us/n...-teradata.aspx

http://www.asterdata.com/resources/w...ight-brain.php
http://www.asterdata.com/downloads/
http://www.asterdata.com/blog/2013/0...uce-functions/
http://www.asterdata.com/resources/v...ualization.php
https://wcc.on24.com/event/58/34/00/...13th_final.pdf

Thank you for attending Close the Data Science Gap: Discover New Value with Big Analytic Apps. This webcast is now OnDemand, should you like to view it again.

Use the link below to enter the webcast at any time.

WEBCAST LINK:  http://w.on24.com/r.htm?e=583400&s=1&k=4EB0CA7864AE90B9B3EA00E4EE1B600C
EMAIL:  bniemann@cox.net

Also available in the webcast console "Resources Folder":

·         PDF of the webcast presentation

·         Demo (4 min): Teradata Aster Discovery Platform - Data Acquisition Through Visualization

·         Datasheet: Teradata Aster Discovery Portfolio

·         Blog: Introducing In-Database Visual MapReduce Functions

·         Free Trial Download: Aster Express

·         Datasheet: Teradata Aster Big Analytics Appliance

·         The Bloor Group Briefing Room – 60 min OnDemand webcast: Left Brain, Right Brain: How to Unify Enterprise Analytics

Slide 1 Title

ClosetheDataScienceGapSlide1.png

Slide 2 Webcast Logistics

ClosetheDataScienceGapSlide2.png

Slide 3 Featured Speakers

ClosetheDataScienceGapSlide3.png

Slide 4 The Big Data Science Gap

ClosetheDataScienceGapSlide4.png

Slide 5 #BigData

ClosetheDataScienceGapSlide5.png

Slide 6 Big Data Definition

ClosetheDataScienceGapSlide6.png

Slide 7 Frontier

ClosetheDataScienceGapSlide7.gif

Slide 8 Big Data is all your data

ClosetheDataScienceGapSlide8.png

Slide 9 Utilized Data

ClosetheDataScienceGapSlide9.png

Slide 10 Data Value

ClosetheDataScienceGapSlide10.png

Slide 11 Big Data Management

ClosetheDataScienceGapSlide11.png

Slide 12 Think SPA

ClosetheDataScienceGapSlide12.png

Slide 13 Big Data Technology Ecosystem

ClosetheDataScienceGapSlide13.png

Slide 14 Big Data Has Momentum

ClosetheDataScienceGapSlide14.png

Slide 15 #Business

ClosetheDataScienceGapSlide15.png

Slide 16 Big Data Science

ClosetheDataScienceGapSlide16.png

Slide 17 Data Science Use Cases

ClosetheDataScienceGapSlide17.png

Slide 18 The Right Coupons

ClosetheDataScienceGapSlide18.png

Slide 19 Churn

ClosetheDataScienceGapSlide19.png

Slide 20 Advice

ClosetheDataScienceGapSlide20.png

Slide 21 Disruption

ClosetheDataScienceGapSlide21.png

Slide 22 #DataScienceClosetheDataScienceGapSlide22.png

Slide 23 Data Science Needs

ClosetheDataScienceGapSlide23.png

Slide 24 Data Science Versus Business Intelligence

ClosetheDataScienceGapSlide24.png

Slide 25 Data Scientists Unleash Robot Armies

ClosetheDataScienceGapSlide25.png

Slide 26 Data Scientists Use Statistics and Algorithms

ClosetheDataScienceGapSlide26.png

Slide 27 Data Science Discovery Lifecycle

ClosetheDataScienceGapSlide27.png

Slide 28 Mind The Gaps

ClosetheDataScienceGapSlide28.png

Slide 29 Gap 1

ClosetheDataScienceGapSlide29.gif

Slide 30 Gap 2

ClosetheDataScienceGapSlide30.png

Slide 31 Gap 3

ClosetheDataScienceGapSlide31.png

Slide 32 Gap 4

ClosetheDataScienceGapSlide32.png

Slide 33 Thank you

ClosetheDataScienceGapSlide33.png

Slide 34 Teradata Aster

ClosetheDataScienceGapSlide34.png

Slide 35 The Big Data Gap

ClosetheDataScienceGapSlide35.png

Slide 36 Enterprise Big Data Analytics

ClosetheDataScienceGapSlide36.png

Slide 37 Iterative Analytics Accelerates Discovery

ClosetheDataScienceGapSlide37.png

Slide 38 Key Reqirements of a Discovery Platform

ClosetheDataScienceGapSlide38.png

Slide 39 Aster Discovery Platform

ClosetheDataScienceGapSlide39.png

Slide 40 Multi-Genre Analytics

ClosetheDataScienceGapSlide40.png

Slide 41 Aster Discovery Platform 5.10

ClosetheDataScienceGapSlide41.png

Slide 42 Visual SQL-MapReduce Functions

ClosetheDataScienceGapSlide42.png

Slide 43 Additional Features

ClosetheDataScienceGapSlide43.png

Slide 44 Use Case

ClosetheDataScienceGapSlide44.png

Slide 45 Top 10 Parts Repaired

ClosetheDataScienceGapSlide45.png

Slide 46 Proactively Improving Customer Satisfaction

ClosetheDataScienceGapSlide46.png

Slide 47 Summary

ClosetheDataScienceGapSlide47.png

Slide 48 Big Data Analytics Applicance

ClosetheDataScienceGapSlide48.png

Slide 49 For More Information

http://www.asterdata.com

ClosetheDataScienceGapSlide49.png

Slide 51 Q&A Continues - Join our Live TweetChat

ClosetheDataScienceGapSlide51.png

NEXT

Page statistics
2158 view(s) and 7 edit(s)
Social share
Share this page?

Tags

This page has no custom tags.
This page has no classifications.

Comments

You must to post a comment.

Attachments