High-throughput Sequencer Dec 2011 – 758 sequencers Apr 2012 – 823 sequencers Biomedical Research 1 – © 2012 Internet2 Source: Dec.

Slides:



Advertisements
Similar presentations
Training Guide. `
Advertisements

ONE LAPTOP PER CHILD This works are licensed under a Creative Commons Attribution 2.5 License. One Laptop per Child Country Technical Support December.
Overview of Network Management Network Architecture Fault tolerance and Alerts Data Security Performance, SLA Service Provisioning Accounting and Cost.
RESEARCH IT Presentation for the Faculty Senate February 2013 Loretta Early, CIO.
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
CIS 235: Networks Fall, 2007 Western State College Welcome to CIS 235 Computer Networks Fall, 2007 Prof Peterson.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Physical and Hardware Security Chapter 15 Networking Essentials Spring, 2013.
SANS Technology Institute - Candidate for Master of Science Degree Implementing and Automating Critical Control 19: Secure Network Engineering for Next.
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
Current Network Schema Router Internet Switch PC.
Recognition Of Team Science Faculty Appointments, Promotions and Titles at The Geisel School of Medicine at Dartmouth “Recognition by peers as an investigator.
Scientific User Outreach: Challenges and Strategies Lauren Rotman Partnerships and Outreach Lead, ESnet Jason Zurawski Senior Research Engineer, Internet2.
Internet2 Health Sciences Security SIG – Possible Collaborations Jere Retzer, Internet2 Health Sciences Security SIG Chair, August 3,
Science &Research SIG October 3 rd 2912 Jason Zurawski – Senior Research Engineer – Internet2 Office of the
The Research and Education Network: Platform for Innovation Heather Boyles, Next Generation Network Symposium Malaysia 2007-March-15.
LAW ENFORCEMENT IN THE ELECTORAL PROCESS Santiago Villaveces International IDEA.
1 A National Virtual Specimen Database for Early Cancer Detection June 26, 2003 Daniel Crichton NASA Jet Propulsion Laboratory Sean Kelly NASA Jet Propulsion.
Telehealth and Internet2 Terena June The scope of the Internet2 Health Science Initiative includes medical and related biological research, education,
Network Security Principles & Practices By Saadat Malik Cisco Press 2003.
Roadmap & Actions Expert Consultation Health in All Policies.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
GRID ARCHITECTURE Chintan O.Patel. CS 551 Fall 2002 Workshop 1 Software Architectures 2 What is Grid ? "...a flexible, secure, coordinated resource- sharing.
One genome is not enough
Slide 1 Experiences with PerfSONAR and a Control Plane for Software Defined Measurement Yan Luo Department of Electrical and Computer Engineering University.
1 ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING. 2 NEW ATTACK SURFACES DATACENTER CONSOLIDATIONNEW DEVICESBRANCH LOCATIONS.
Clinical Research Informatics at the University of Michigan Daniel Clauw M.D. Professor of Medicine, Division of Rheumatology Assistant Dean for Clinical.
Tuesday 9 September 20141NEMODE Professional Development Workshop, BAM Conference, Belfast Digital Methods as Mainstream Methodology? Helene Snee, Manchester.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
PCI Training for PointOS Resellers PointOS Updated September 28, 2010.
5/18/2006 Department of Technology Services Security Architecture.
Teamplay Connect, compare, collaborate.
Helping Teachers Get IT!. IT is Not Just About Technology Reprinted with special permission of King Features Syndicate Copyright 1999.
Slide 1 UCI Lightpath A Dedicated Network for Research on UCI Campus Jessica Yu Office of Information Technology, UC Irvine NSF PI Workshop 9/29/2015.
 New space  Shared technology staff (with Academic Technology Center)  Train personnel in emergency procedures  Create online instructional procedures.
DNA Sequencing Technology and its Applications in Evolution Research Julie Urban, Ph.D. Assistant Director, Genomics & Microbiology Laboratory NC Museum.
Third Generation Sequencing. Today Illumina – Solexa sequencing technology 454 Life sciences – 454 sequencer Applied Biosystem – SOLiD system Tomorrow.
Beyond Converged Infrastructure: The Next Generation of IT Mark S A Smith
Mary Trauner Senior Research Scientist Georgia Institute of Technology Middleware for Video.
ABOUT INTERNET2 STEPHEN WOLFF CTO Internet2 JUNE 12, 2013.
Securing Big Data is a business imperative. PROTECT BIG DATA
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
1 CONFIDENTIAL Maintainable Apps Apps are for business not for developers JANUARY 1, 2015.
SCALABILITY AND SECURITY Presentation. 01 Scalability.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Technology to Protect Crown Jewels. Purpose This pack draws out extreme examples for protecting the Crown Jewels. The purpose of examining these extremes.
Networks – Network Fundamentals
CompTIA Security+ Study Guide (SY0-401)
Supporting the NRP with a Lean CI Staff
The NSRC cultivates collaboration among a community of peers to build and improve a global Internet that benefits all parties. We facilitate the growth.
Cloud Solutions at UVA CASC Fall Meeting /12/2017.
A Science DMZ in Every Pot?
Cyber Security Types of Threats How an attack happens
Welcome To : Group 1 VC Presentation
CompTIA Security+ Study Guide (SY0-401)
مصطفى فتحى المنظمة العربية للتنمية الادارية
LAN Network Interactions
PRPv1 Discussion topics
Securing and Protecting Citizens' Data
Secure Gateway Today Internet Internet Explorer and ICA MetaFrame
Unit 36: Internet Server Management
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
NTU Presentation Jason Arviso, Director of Information Technology
NTU Presentation Jason Arviso, Director of Information Technology
ITU-T Workshop on Security, Seoul (Korea), May 2002
Center for Clinical and Translational Science
Presentation transcript:

High-throughput Sequencer Dec 2011 – 758 sequencers Apr 2012 – 823 sequencers Biomedical Research 1 – © 2012 Internet2 Source: Dec. 5, 2011http://omicsmaps.com/ Increasing at 25% per year Image: Illumina

Ion Proton Sequencer Democratization of Sequencing 2 – © 2012 Internet2 Handheld USB Sequencer Image: Oxford Nanopore Technologies Image: Life Technologies

Source: L. D. Stein Genome Biol. 11, 207 (2010) Moving beyond Moore’s Law 3 – © 2012 Internet2

Research Centers Who’s Who 4 – © 2012 Internet2 University VP / CIO Medical School CIO Academic Medical Center CIO Cancer Center CIO Genomics Center CIO Who does research involving Big Data? Who does wide area networking? Who talks with whom? Who is responsible for security? Who is collaborative? Who is in charge?

ESnet Science DMZ for Biomedical Researchers 5 – © 2012 Internet2 Sensitive data –PHI –Limited data set –De-identified Security –ACLs in DMZ switch –Server hardening –Firewall issues –Encryption –Best practices guide Source:

What do biomedical researchers need today? Tomorrow? Who are the collaborative early adopters? How can we disseminate best practices? –Training the trainer workshops –Educational materials –Performance monitoring and troubleshooting –ESnet’s Science DMZ architecture –Security recommendations What is unique in the life sciences? –Security Issues –Transport protocols –International collaborations Engaging Biomedical Researchers 6 – © 2012 Internet2