Heilmeier's catechism http://en.wikipedia.org/wiki/George_H._Heilmeier To evaluate research activities at Darpa, Heilmeier formulated a set of questions.

Slides:



Advertisements
Similar presentations
MOHAMMAD QAHIR WARDAK LEGAL & LICENSING MANAGER AFGHANISTAN TELECOM REGULATORY AUTHORITY (ATRA) Introduction to Voice over Internet Protocol (VoIP)
Advertisements

VET – Vetting Commodity IT Software and Firmware
VoIP - Australian Regulatory Practice and Directions Duncan MacAuslan Task Coordinator - VoIP ITP Training September 2006.
Doc.: IEEE /1078r0 SubmissionBill Carney (Texas Instruments)Slide 1 Wi-Fi Alliance Liaison Report September 15, 2004 Bill Carney Wi-Fi Alliance.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
© 2009 Avaya Inc. All rights reserved. Page 1 AT&T Mobile Extension with Avaya one-X Mobile.
David Waitt Kate Disney 2008 April Digitizing An Analog World.
Project Concept Form Engaging with Zeteo Tech, LLC Principal Investigator: Campus Address: Telephone: Other Team Members:
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
UMTS / 3G Wireless ENGR 475 – Telecommunications November 7, 2006 Harding University Jonathan White.
Project Selection and Needs Identification updated: 8/30/2010.
GRADUATING PROJECT ORIENTATION BY Professor Muhammad Arshad Malik
IP Telephony (Article Presentation) by Samir Goswami Source: Rivier College, CS699 Professional Seminar.
Mar Dependable Embedded System -- Ying Shi Robustness.
Ceng 764 Wireless Communications & Networks
1 © 2004 Cisco Systems, Inc. All rights reserved. Total Conversation through ITU-T & IETF Standards: Sign, Type, and Speak – You Decide Paul E. Jones Cisco.
By the end of this chapter, you should:  Have an understanding of the types of projects electrical and computer engineers undertake.  Understand and.
XLR8 XLR8 to the Future today. Mission Statement We make EVERY EFFORT to ENCOURAGE, EQUIP AND EDUCATE our clients, EMPOWERING them and ENABLING their.
Voice & Data Convergence Network Services January 11, 2001.
Uday O. Ali Pabrai, CISSP, CHSS Chief executive, HIPAA Academy Health care & HIPAA Security Remediation.
 Design creates a new artifact (system, component or process) to meet a given need.  Broad Classifications ◦ Creative Designs – the first PDAs ◦ Variant.
Voice over IP Spring LNA Meeting April 1, What is Voice over IP? n A technology for transporting integrated digital voice, video and data over IP.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID CCNP Updates September, 2006 Snezhy Neshkova Technical.
Writing… and Coding CSE/ISE 300 Spring 2011 Tony Scarlatos.
The Process of Writing CSE/ISE 300 Spring 2011 Tony Scarlatos.
Confidential and proprietary material for authorized Verizon Wireless personnel only. Use, disclosure or distribution of this material is not permitted.
GSC-8123 SOURCE:TIA TITLE:Compendium of Internet Protocol (IP)-related Work Activities within the Telecommunications Industry Association (TIA) AGENDA.
1 BBTelsys and Secure SIP Calling Providing Solutions that Work in the Real World.
Suws.susu.org September 2011 Southampton University Wireless Society.
Session border controllers
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Intelligence Advanced Research Projects Activity (IARPA) Dr. Edward Baranoski September 2009.
Turning technology into cash What’s Hot and What’s Not in Global Start-up Trends Mike Holt
4/24/20071 Convergence of Communication Technologies and Strategies for Higher Ed Tim Callahan University of Michigan 4/24/2007.
CS 525 – Network Security Literature Reviews, LaTeX, and Starting a Proposal.
Secure Systems Research Group - FAU Patterns for Wireless Web Services Nelly Delessy January 19, 2006.
Project Selection And Needs Identification
1 Presentation_ID Mobile Wireless Internet Forum (MWIF)
IPv6 Summit - June 2003 IPv6 And Cellular Telephony Phil Karn VP Technology Qualcomm, Inc 26 June 2003.
Identifying Research Problems Michael D. Ernst IMDEA Software Institute and University of Washington Workshop at UPM.
Consumer Protection Definition. 1 Current General Frameworks For CP. 2 Gaps/Risk areas in current Frameworks. 3 Consumer Protection Pillars. 4 NGN/Convergence.
Monday, February 6 th, 2012 Lecture #1 Sue Moon and Heather Haitao Zheng WST 560 Mobile Web and Applications
BMTS 242: Computer and Systems Introduction to BMTS 242 Yousef Alharbi Website
Applications of 5G technology The future of technology New revolution of networking.
ITExpo January 24, 2006 Networks C OGNITRONICS Network Media Servers Conferencing and Collaboration Mike Keefe CTO Presented by.
1 Schematic of Fluid-Thermal-Structural-Interactions (FTSI) Response Prediction of Compliant Structures in Hypersonic Flow Jack J. McNamara --- FA
1 Item 3 - Research and Development of High Security Remote Authentication Technology Item 3 - Research and Development of High Security Remote Authentication.
Joshua Browning Casey Hughes Deandra Tart.  My research paper was about skate boarding safety. The main goal was to establish the statistics of injuries.
740: Computer Architecture Project Proposal and Topics Prof. Onur Mutlu Carnegie Mellon University Fall 2013.
Quality of (Mobile & Fixed) Network & Services reporting for Quarter
FIRST YEAR ASSISTANT PROFESSOR WORKSHOP ALUMNI CENTER BALLROOM MAY 5, 2016 Finding Funding Beth Hodges Director, Office of Proposal Development.
Advancing National Wireless Capability Date: March 22, 2016 Wireless Test Bed & Wireless National User Facility Paul Titus Department Manager, Communications.
For more course visit NTC 362 Entire Course NTC 362 Week 1 DQs NTC 362 Week 1 Tele- communications Evolution Timeline NTC 362 Week 2.
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
CS6501/ECE6501 IoT Sensors and Systems
Managing the Project Lifecycle
VoIP Plans: H.323, SIP and ENUM
Technical writing and choosing research projects
Mobile Handset Networking Overview
Networking Technology and Systems
Chapter 8 Mobile Computing and Commerce
ECE 492 Project Research Proposal
TTA activities and Future Direction
Mobile Commerce and Ubiquitous Computing
With specific reference to the proposal submitted for AI
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Prime Applicant – Project Title
The Past, Present and Future of Connectivity in Shropshire and Beyond.
Presentation transcript:

Heilmeier's catechism http://en.wikipedia.org/wiki/George_H._Heilmeier To evaluate research activities at Darpa, Heilmeier formulated a set of questions that so well expresses the fundamentals of his beliefs that he seriously refers to it as his "catechism." He later taught it to his research "novitiates" at Texas Instruments and now enforces its use at Bellcore. Like a preflight checklist, his catechism provides a routine for safely and successfully launching a research project: What are you trying to do? Articulate your objectives using absolutely no jargon. How is it done today, and what are the limitations of current practice? What's new in your approach and why do you think it will be successful? Who cares? If you're successful, what difference will it make? What are the risks and the payoffs? How much will it cost? How long will it take? What are the midterm and final "exams" to check for success? Heilmeier attributes much of his success to his imposition of a disciplined thought process on project management. It allowed him to curb and clarify both the enthusiasms of his researchers and the resource demands of his managers. "Profession/Profile: George H. Heilmeier" article by Joshua Shapiro in “IEEE Spectrum” 1994 June, as summarized at http://www.rdrop.com/~cary/html/creed.html#Heilmeier

What are you trying to do? Build a secure, wireless VOIP phone

Cellphones use phone network How is it done today, and what are the limitations of current practice? Cellphones use phone network Circuit-switched Limited B/W Do not provide end-to-end encryption

What’s new in your approach, and why do you think it will be successful? Use end-to-end cryptography between 802.11-equipped microprocessors embedded in a “handset” Widespread deployment of 802.11

Who cares? If you’re successful, what difference will it make? People interested in mobile telephones with high privacy and low cost of service Convergence towards IP bearer service

How much will it cost? How long will it take? Parts cost ca. $1000 (in 2001) Open source software (e.g., Blowfish) 9 month (senior design…)

What are the risks? Too much work, e.g., unavailable SW or components Not enough time Team capabilities Technical risks

What are the midterm and final “exams” to check for success? Establish basic connection with software December Phone-phone call in April Win Senior Design contest!

RESULTS! “Secure Wireless Voice over IP”, M. DeYoung, N. Henke, G. Wai won award in SEAS ‘02 senior design; “Rethinking Mobile Telephony with the IMP” published w/Smith in ‘04!