Iveta Topalova, Microsoft/IJIS Institute John Daugherty, CIO Montana DOC.

Slides:



Advertisements
Similar presentations
Cloud Communications Ecosystem Panel Alan Bugos, Vice President of Technology October 15th, 2013.
Advertisements

The Internet of Riedwaan Bassadien Platform Strategy Manager Microsoft Everything Your things.
Kansas Gov Cloud update. Thank You! Recently we have all been through 2 studies. One performed by EMC and the other by IBM Both vendors commented on the.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
1 3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
What SMS means for an Operator’s relationship with the CAA
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
Smart Integrated Infrastructure The Progression of Smart Grid Presentation to National League of Cities Martin G. Travers – President, Telecommunications.
Machine-to-Machine (M2M) Communication
Smart Cities & Smart Utility
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
What is Business Intelligence? Business intelligence (BI) –Range of applications, practices, and technologies for the extraction, translation, integration,
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
Effectively Explaining the Cloud to Your Colleagues.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
Ch. 1. The Third ICT Wave The Third ICT Wave.
Javier Gil Arenales Data, a critical resource for Smarter cities.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
APC InfraStruxure TM Central Smart Plug-In for HP Operations Manager Manage Power, Cooling, Security, Environment, Rack Access and Physical Layer Infrastructure.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
IoT, Big Data and Emerging Technologies
By Sommer, Gunreben, Feller, Kohn, Mifdaoui, SaB, & Scharf Presented by Isaac Hatton.
IntelliSense.io Beyond the hype - Real World Applications / Solutions of Internet of Things.
Understanding the Human Network Martin Kruger LCDR Jodie Gooby November 2008.
Marv Adams Chief Information Officer November 29, 2001.
Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Empowering Smart Machines.
IoT Primer Stephen Bates | Energy Huntsville: Tues 15 Dec
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
Internet of Things in Industries
Module 9 Planning and Implementing Monitoring and Maintenance.
1 IoT for Smart Cities Where we are at and where we could be Olga Cavalli CCAT LAT Argentina Forum on "Powering Smart Sustainable Cities With the Internet.
CONTENT FOCUS FOCUS INTRODUCTION INTRODUCTION COMPONENTS COMPONENTS TYPES OF GESTURES TYPES OF GESTURES ADVANTAGES ADVANTAGES CHALLENGES CHALLENGES REFERENCE.
TOP 10 TECHNOLOGY INITIATIVES Robert G Parker July 12, 2013.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
Jan 2016 IES SF | What’s Next Enlighted. Designed to Change Everything.
Internet of Things Business Case Template. Powered by InfoTech, provided by Atlantic BT Summarize the business case for analyzing the Internet of Things.
® Capacity Development & Knowledge Frameworks Denise McKenzie Open Geospatial Consortium 22 April 2016 Addis Ababa, Ethiopia.
State of IoT Gary Audin Delphi, Inc.
Innovative ICT Building a Better Smart City. Agenda 1. Why focus on Smart City 2. What is a Smart City 3. References.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Energy Management Solution
How Machine Learning & Analytics Saved 1 Billion kWh
Empowering smart cities with connected lighting
IoT Business Maturity Model 1. Operational efficiency
STRIDE to a secure Smart Grid in a hybrid cloud
TRAFFICBRIDGE OVERVIEW
TECHNOLOGY GUIDE THREE
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Top 10 Strategic Technology Trends for 2013
M2M Revolution Turning Potential into Profit Menelaos Ioannidis
Vonage use of Cloud-based Communication
Content Access Solution (CAS)
Energy Management Solution
Introduction to Cloud Computing
TECHNOLOGY GUIDE THREE
High Secured Inter-Cloud Connectivity via Public Networks
Healthcare Speaker notes:
Top 10 Strategic Technology Trends for 2013
Digitalization of Manufacturing
Industry 4.0 and Cognitive Manufacturing Oct 2018
TrinityIoT Premises Monitoring.
Maintaining order and safety in a city is no small task
Introduction to Cloud Computing
Sachiko A. Kuwabara, PhD, MA
Utilizing the Network Edge
TECHNOLOGY GUIDE THREE
Presentation transcript:

Iveta Topalova, Microsoft/IJIS Institute John Daugherty, CIO Montana DOC

The Internet of Corrections Things is an exciting emerging technology that has the potential for improving corrections and saving lives. Our panel will focus on the key benefits and challenges of leveraging ubiquitous networks of wearable and non-wearable sensors in corrections.

Introduction What is the Internet of Things A Practitioner's Perspective

A new ecology of data assets is emerging that provides the means for secure and trustworthy communications and for entirely new solution-sets related to the digital identity of people, devices and institutions. World Economic Forum

“ ” DEVICES THAT COLLECT AND TRANSMIT DATA VIA THE INTERNET Source: Forbes

,000,000,000 1,000,000, ,000,000 10,000,000 1,000, ,000 10,000 1,000 Transistors Moore’s Law Metcalfe‘s Law And more importantly: what can you do by combining and analyzing signals from all of these IoT devices? Koomey’s Law 1.E+14 1.E+12 1.E+10 1.E+08 1.E+06 1.E+04 1.E+02 1.E+00 Computations per KWh

ConnectivityDataAnalyticsThings

Collect and secure large amounts of data from your assets in the cloud for analysis Monitor and track the health of these assets to assure reliability and reduce costs Connect disparate assets to increase situational awareness and improve response Things

Create operational intelligence to improve efficiency and decision making Create insights for the right people at the right time to access and act on Analyze data from multiple sources in near real time to increase correctional staff safety and aide in decision- making Things

Leverage machine learning to understand trends and influence policy Apply historical data to new problems to successfully predict future behavior and trends Convert the raw data from your “things” into actionable insights and results. Things

Data Corrections Staff Need Cameras, Video, Audio surveillance Special Population Management Cell Phone Detectors Offenders on Parole (ankle bracelets, bands) *OZY: Could a Sensor Solve Our Prison Suicide Problem

150 K Search and Query per day* Correctional Video and Audio Data Collected per day* Medical/ Biometric Device Data per day * GPS Monitoring Data per day* *Theoretical Data.

SCALABILITY PROVEN METHODOLOGY CONNECTION LEVERAGE CLOUD SERVICES STANDARDS DEVELOPMENT SECURITY

IoT Sweet Spot $1000 PCs $400 Phones IoT capabilities are primarily value-add to other primary capabilities Legacy devices are used or when new devices are added budget is an important consideration Tiny devices make awfully vulnerable network servers Cost Computational Capabilities Memory/Storage Capacity Energy Consumption/Source $1 Sensor $ Server Component Quality

1. Draw an application diagram and then decompose the architecture 2 Assign the STRIDE mnemonic to each element in the diagram 3 Determine the risk 4 Chose mitigations (or not!) The threat modeling process STRIDE S –>Spoofing Identity T –>Tampering R –>Repudiation I –>Information Disclosure D –>Denial of Service E –>Elevation of Privilege

Generate new insights to create new business value Combine the data which is already collected Expand by adding new devices, new services, new data Utilize services and the cloud as a jump-start Start by connecting the already existing devices

The Internet of Corrections Things Practitioner’s Perspective

Enabling IoT for Corrections: As-Is Environment Sensor ‘Things’ - vendor proprietary device 23 Corrections Operations Center Correction/Parole Officer Booking Management Proprietary Format 1 Proprietary Format 2 Proprietary Format 3 Proprietary Format 4 Proprietary Format 5

Enabling IoT for Corrections: To-Be Environment Sensor ‘Things’ - proprietary device / format 24 Correctional Operations Center Next Generation Corrections/Parole Data Driven Corrections Management Sensor Catalog Open Std

Copyright © 2015 Open Geospatial Consortium Mutual aid agreements are in place for information sharing and support “Things” are accessible in the personal area network zone

Credit and thanks for this presentation: – CTA – Forbes – IBM – IJIS – Microsoft – OGC – OZY

Iveta Topalova, John Daugherty, Montana