Advances in AI and Security between 2016 and What You Need to Know

Size: px
Start display at page:

Download "Advances in AI and Security between 2016 and What You Need to Know"

Transcription

1 Advances in AI and Security between 2016 and What You Need to Know Course Description July 31, MARYLAND AVENUE, NE SUITE 510 WASHINGTON, DC 20002

2 2 Executive Short Course Overview The Institute for Strategic Analysis (ISA) is an intellectual resource entity for Carnegie Mellon University faculty members who seek to bring their basic research to bear upon matters of national security and national readiness. The institute is supported by four colleges (the College of Engineering, Dietrich College of Humanities and Social Sciences, Heinz College, the School of Computer Science), and the Software Engineering Institute, the university s federally funded research center. Executive education is one of the ways in which ISA seeks to achieve its core objectives. Through innovative one- day courses for defense, diplomatic, and intelligence leaders, ISA has facilitated introductions between government leaders and the Carnegie Mellon University faculty. This has resulted in a sharpened understanding among faculty and academic administrators of military and intelligence priorities and has fostered the creation of an intellectual support network for government officials. These introductions are leading to new collaborations between government officials and academe. Each one- day course includes insights from research that are relevant to cyber security. Additionally, the interdisciplinary nature of the courses makes them pertinent to discussions covering a range of national security crises and threats. Each cohort of attendees includes officials from throughout the federal government, academe, think tanks, and the private sector. Thus, those who participate develop a new network of faculty and researchers as well as professional counterparts with similar national security responsibilities. In July 2017, ISA will offer its first course focused on the latest technology research from Carnegie Mellon University: Advances in AI and Security between 2016 and 2019 What You Need to Know. Course participants will be introduced to technology, tools, and research in security and the artificial intelligence (AI) stack. Each Section in this course serves as use- case presentations that follow will deepen an understanding of AI and its applications by further highlighting AI building blocks applied to specific security challenges. Specifically, participants will see presentations and demos about AI use in voice forensics, cybercrimes, verifying autonomy, human factors in security, data science, and network analytics. This course will prioritize the identification of pathways for further engagement in these issues between government officials and the research communities..

3 3 Agenda 8:30-9:00 am 9:00-9:15 am 9:15-12:15 pm 12:15-12:45 pm 12:45-1:30 pm 1:30-2:15 pm 2:15-2:30 pm 2:30-3:15 pm 3:15-3:30 pm Registration Suite 510 Introduction Conference Rooms 1 and 2, First Floor Kiron Skinner, Director, Institute for Strategic Analysis, Carnegie Mellon University Section 1: Key AI Developments and Trends- - - What You Need to Know Conference Rooms 1 and 2, First Floor Andrew Moore, Dean, School of Computer Science, Carnegie Mellon University Artur Dubrawski, Senior Systems Scientist, The Robotics Institute; Adjunct Professor, Master of Information Systems Management, H. John Heinz III College, Carnegie Mellon University Rita Singh, Senior Systems Scientist, Language Technologies Institute, Carnegie Mellon University Michael Wagner, Senior Commercialization Specialist, The Robotics Institute, Carnegie Mellon University Break for lunch Section 2: Cybercrimes: How They Work and the Technologies that Empower Them Rita Singh, Senior Systems Scientist, Language Technologies Institute, Carnegie Mellon University Section 3: Dynamic Network Analysis for Intelligence & Security Conference Rooms 1 and 2, First Floor Kathleen M. Carley, Professor of Computation, Organization and Society, Institute for Software Research, School of Computer Science; Director, Center for Computations Analysis of Social and Organizational Systems, Carnegie Mellon University Break Section 4: Understanding the Human Factor in Computer Security: Usability Testing with Attack Scenarios Conference Rooms 1 and 2, First Floor Lorrie Cranor, Professor, Computer Science, Engineering and Public Policy; Director, CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University Closing Discussion Conference Rooms 1 and 2, First Floor

4 Kiron Skinner, Director, Institute for Strategic Analysis, Carnegie Mellon University 4

5 5 Course Location and Logistics Date: Monday, July 31, 2017 Time: Course registration begins at 8:30 a.m. The official course runs from 9:00 a.m.- 3:00 p.m Location: The Executive Short Course is hosted in the Carnegie Mellon University Washington, DC, offices, located in the United Methodist Building. The building address is 100 Maryland Avenue NE, Washington, DC, which lies adjacent to both the Supreme Court and Capitol buildings. Registration: To register for the course, please visit the course website: activities/executiveshortcourses/advances- in- ai.html Street Location: 100 Maryland Ave. NE (Directly on the corner of First St. NE & Maryland Ave. NE) Washington, DC Front of building and entrance

6 6 Course Objectives and Descriptions Section 1: Key AI Developments and Trends- - - What You Need to Know Description This presentation will provide participants with a clear understanding of the AI stack. The AI stack provides a detailed introduction to all the components of a modern AI system. Participants will learn what are the recent developments, and what are the big potential disruptions between now and Once equipped with a foundation, participants will then be able to see how these components are integrated to support autonomous systems and cognitive assistance. Finally, the presentation will highlight specific applications to illustrate the power of Deep Learning Systems and how AI capabilities are integrated and applied. Applications Advances in Perception: Video, Acoustic, and Hyperspectral; Advances in Learning: Scaling to trillions of events, Active Learning, Reinforcement Learning, Spatial Learning, and Adversarial Learning; Advances in Planning: Proving AI systems are safe, Developing AI test plans, Game theory (Negotiation, Threats and Deception), Swarm Intelligences; Advances in Autonomy: Behavior- based Control; Advances in Cognitive Assistance: Dialog Systems, Emotional Response, and Brain- Machine.

7 7 Presenters Lead: Andrew Moore, Dean, School of Computer Science, Carnegie Mellon University Artur Dubrawski, Senior Systems Scientist, The Robotics Institute; Adjunct Professor, Master of Information Systems Management, H. John Heinz III College, Carnegie Mellon University Rita Singh, Senior Systems Scientist, Language Technologies Institute, Carnegie Mellon University Michael Wagner, Senior Commercialization Specialist, The Robotics Institute, Carnegie Mellon University

8 8 Section 2: Cybercrimes: How they Work and the Technologies that Empower Them Educational objectives Understanding the backdrop of cyber threat intelligence (CTI): cybercrimes, cyber activism and cyber espionage Familiarization with the complete range of cybercrimes today: breadth, depth, variety and categorizations Understanding enough for a basic assay of the internet of things and crimes of the future Understanding the key technologies that allow cybercriminals to hide and cybercrime to become untraceable Monitoring cybercrime evolutions: knowing what to do and where to look Description Cybercrimes are often assigned poetic and colorful descriptions (such as shifting sands of cybercrime ) due to their rapid creation and evolution in today s world. Cyberspace has become the showcase of the dark side of humanity. In cyberspace, human ingenuity in deception is at its primal best. This is because cyberspace affords all the fuel needed for crime to grow unfettered. Criminals can profit enormously, they yield great power and can affect millions of people easily, and they can remain anonymous, thanks to the technologies that host them and enable them. Cybercriminals are also relatively legally immune they often operate across international boundaries so that no laws apply to them and even if they do, the reprisal is unlikely to be swift, punishment is unlikely to be well- defined or even clear in concept, and procedures are likely to take years to resolve due to logistic issues across borders. Not only is the scale of cybercrime increasing exponentially, but also the types of cybercrime that appear over the horizon increase just as fast, and sometimes faster, than the rate at which new technology is introduced into the world. For example, even while we test the practicality of self- driving cars, there are open tutorials on how to break into and take control of self- driving cars remotely. For every useful computing technology, there appear hundreds of new disruptive ones in cyberspace. With the advent of the Internet of Things (IoT), what is coming to us now is touted as nothing short of a tidal wave of cybercrime (another colorful description). There are so many types of cybercrimes around, that just the terminology seems to be impossible to keep up with, let alone being able to make sense of it all, organize it all mentally, and keep up to date with the improvements. This course will sweep through the entire range of cybercrimes as of the first quarter of this year (2017), explaining, familiarizing, and helping organize it all based on devices and human motives. This will include understanding the differences between and the distinguishing hallmarks of cyberterrorism, cyberactivism, cybervandalism, cyberwar etc. It will extend the exposition to the IoT, explaining crimes on the IoT and the broad categories of crimes that are expected to happen in the future. The course will also explain the key technologies that empower cybercrime today where and how do cybercriminals hide, and introduce the technologies that are making them increasingly untraceable. It will explain how some of these technologies such as Cryptocurrency (the financial fuel of the Dark web), TOR (enabling network location anonymity), etc. work. Participants will be practically shown how to access the dark web in a short handholding Section.

9 9 Finally, the course will introduce participants to maps and tools, and resources that can be used regularly to keep up to date with the global cybercrime scenario. All of this will be tied to the traditional tools and terminologies used in Cyber Threat Intelligence (CTI), covering OSINT, HUMINT, assessment of advanced persistent threat (APT) etc. Presenter Rita Singh, Senior Systems Scientist, Language Technologies Institute, Carnegie Mellon University

10 10 Section 3: Dynamic Network Analysis for Intelligence & Security Educational objectives Basic awareness of thinking in networks, key network concepts, and principles Relation of dynamic network analysis to artificial intelligence, specifically machine learning Application to insider threat, and strategic applications of networks Application to social media, and the social- cyber warfare threat Understanding the future potential for dynamic network analytics for intelligence and security Description This course provides an awareness of network thinking both the analytics and the theory. The basic metrics and theories used in network reasoning that have value for intelligence and security are discussed. Key themes include: the assessment of big data, the role of network position and social influence, and the wide range of intelligence and security applications. Unlike traditional social network analysis, modern dynamic network analysis is concerned with big data, high dimensional network data, and tool pipelines that combine text mining, machine learning and network science. In order to accomplish their mission, intelligence agencies, law enforcement agencies and the US military must be able to characterize and reason about the socio- cultural landscape, key individuals and groups. Dynamic Network Analytics (DNA) is an interdisciplinary approach that supports this types of reasoning and enabled its use to support a wide range of operational needs. DNA blends the techniques of graph theory, statistics, machine learning, text mining with organizational theories of structure, and social science theories of power, engagement and communication. DNA and network thinking enable one to understand how the pattern of relations among actors, their environment, and resources influence their operational behavior, and how interventions are likely to change those patterns and so alter behavior. More data is available today to support network thinking than ever before. This data, comes from a variety of sources including humint, sigint, and soc- media int. In this course, we will see how artificial intelligence is starting to be combined with dynamic network analysis to enable the assessment of this new big data in ways that support missions that entail reasoning about human and social behavior. The intellectual framing of the course will be that of Network Science, which studies complex systems in terms of relations. Topics of special concern to intelligence and security will be addressed. Examples will be drawn from social media forensics, social- cyber warfare, identification of power- brokers, network dismantlement, and so forth. Consequently, this course will provide a glimpse of how network science and machine learning have come together to provide new capabilities for identifying, modeling, assessing change in, and forecasting the behavior of individuals, groups and communities. The course will discuss a range of topics including: relative maturity of tools, utilization for social media forensics, covert- group detection, and social- cyber warfare. Presenters Kathleen M. Carley, Professor of Computation, Organization and Society, Institute for Software Research, School of Computer Science; Director, Center for Computational Analysis of Social and Organizational Systems (CASOS), Carnegie Mellon University

11 11 Section 4: Understanding the Human Factor in Computer Security: Usability Testing with Attack Scenarios Educational Objectives Learn why security user studies are important when designing and evaluating secure systems. Learn about several strategies for conducting security user studies. Learn to be critical of usability claims made and ask questions about what user studies were conducted to support these claims. Description Many computer security incidents are caused by human error or attackers exploiting human vulnerabilities rather than bugs in computer code. A growing body of security research is now focused on understanding the human element in computer security, and designing secure systems that people can use without error. User studies are critical to understanding how users perceive and interact with security and privacy software and features. While it is important that users be able to configure and use security tools when they are not at risk, it is even more important that the tools continue to protect users during an attack. Conducting user studies in the presence of (simulated) risk is complicated. We would like to observe how users behave when they are actually at risk, but at the same time we cannot harm user study participants or subject them to increased risk. Often the risky situations we are interested in occur relatively infrequently in the real world, and thus can be difficult to observe in the wild. Researchers use a variety of strategies to overcome these challenges and place participants in situations where they will believe their security or privacy is at risk, without subjecting them to increases in actual harm. In some studies, researchers recruit participants to perform real tasks not directly related to security so that they can observe how participants respond to simulated security- related prompts or cues that occur while users are focused on primary tasks. In other studies, researchers create a hypothetical scenario and try to get participants sufficiently engaged in it that they will be motivated to avoid simulated harm. Sometimes researchers have the opportunity to observe real, rather than simulated attacks, although these opportunities are usually difficult to come by. Researchers can monitor real world user behavior over long periods of time (in public or with permission of participants) and observe ho users respond to risks that occur naturally, without researcher intervention. This section will motivate the importance of security user studies and introduce a number of user study approaches used at the CyLab Usable Privacy and Security Lab at Carnegie Mellon University. Presenters Lorrie Cranor, Professor, Computer Science, Engineering and Public Policy; Director, CyLab Usable Privacy and Security Laboratory, Carnegie Mellon University faith- cranor.html

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Research Supervisor: Minoru Etoh (Professor, Open and Transdisciplinary Research Initiatives, Osaka University)

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

MENA-ECA-APAC NETWORK MEETINGS, 2017

MENA-ECA-APAC NETWORK MEETINGS, 2017 MENA-ECA-APAC NETWORK MEETINGS, 2017 INNOVATION AND DISRUPTIVE TECHNOLOGY Sleem Hasan, Founder and CEO, Privity November 15, 2017 "Technology is the ONLY discipline I have identified that has the ability

More information

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of

More information

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals

IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska. Call for Participation and Proposals IEEE IoT Vertical and Topical Summit - Anchorage September 18th-20th, 2017 Anchorage, Alaska Call for Participation and Proposals With its dispersed population, cultural diversity, vast area, varied geography,

More information

The Future is Now: Are you ready? Brian David

The Future is Now: Are you ready? Brian David The Future is Now: Are you ready? Brian David Johnson @BDJFuturist Age 13 Who am I? Age 13 Who am I? Who am I? Nerd! Age 13 In the next 10 years 2020 and Beyond Desktops Laptops Large Tablets Smartphone

More information

457 APR The Fourth Medium to Long-term Plan has started. No.

457 APR The Fourth Medium to Long-term Plan has started. No. 457 APR 2016 No. The Fourth Medium to Long-term Plan has started We are sorry to inform you that this April 2016 issue will be the final one to be distributed in printed materials. It would be appreciated

More information

WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN ( )

WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN ( ) WFEO STANDING COMMITTEE ON ENGINEERING FOR INNOVATIVE TECHNOLOGY (WFEO-CEIT) STRATEGIC PLAN (2016-2019) Hosted by The China Association for Science and Technology March, 2016 WFEO-CEIT STRATEGIC PLAN (2016-2019)

More information

Future of New Capabilities

Future of New Capabilities Future of New Capabilities Mr. Dale Ormond, Principal Director for Research, Assistant Secretary of Defense (Research & Engineering) DoD Science and Technology Vision Sustaining U.S. technological superiority,

More information

Creating a Public Safety Ecosystem

Creating a Public Safety Ecosystem Creating a Public Safety Ecosystem Synchronizing Human and Digital Intelligence Contents Topics Page Introduction... Secure Data Access and Sharing... The Increasing Role of Citizen Involvement... Social

More information

Human Centered Production in Cyber- Physical Production Systems. Case study Croatia

Human Centered Production in Cyber- Physical Production Systems. Case study Croatia Human Centered Production in Cyber- Physical Production Systems Case study Croatia Prof. Ivica Veža Faculty of Electrical Engineering, Mechnical Engineering and Naval Architecture FESB, University of Split,

More information

DoD Research and Engineering Enterprise

DoD Research and Engineering Enterprise DoD Research and Engineering Enterprise 18 th Annual National Defense Industrial Association Science & Emerging Technology Conference April 18, 2017 Mary J. Miller Acting Assistant Secretary of Defense

More information

TABLE OF CONTENTS OUR MISSION OUR MEMBERS OUR PLAN C_TEC S PRIORITIES WORDSMITH + BLACKSMITH

TABLE OF CONTENTS OUR MISSION OUR MEMBERS OUR PLAN C_TEC S PRIORITIES WORDSMITH + BLACKSMITH PROGRAM OVERVIEW TABLE OF CONTENTS OUR MISSION OUR MEMBERS OUR PLAN C_TEC S PRIORITIES WORDSMITH + BLACKSMITH 02 03 04 05 07 1 WHERE ENTREPRENEURS AND POLICY LEADERS COME TOGETHER. BUSINESS INSPIRES AND

More information

President Barack Obama The White House Washington, DC June 19, Dear Mr. President,

President Barack Obama The White House Washington, DC June 19, Dear Mr. President, President Barack Obama The White House Washington, DC 20502 June 19, 2014 Dear Mr. President, We are pleased to send you this report, which provides a summary of five regional workshops held across the

More information

Technology Leadership Course Descriptions

Technology Leadership Course Descriptions ENG BE 700 A1 Advanced Biomedical Design and Development (two semesters, eight credits) Significant advances in medical technology require a profound understanding of clinical needs, the engineering skills

More information

Emerging technology. Presentation by Dr Sudheer Singh Parwana 17th January 2019

Emerging technology. Presentation by Dr Sudheer Singh Parwana 17th January 2019 Emerging technology Presentation by Dr Sudheer Singh Parwana 17th January 2019 Mega trends 5 global shifts changing the way we live and do business Rapid urbanisation Today, more than half the world s

More information

Executive Summary. Chapter 1. Overview of Control

Executive Summary. Chapter 1. Overview of Control Chapter 1 Executive Summary Rapid advances in computing, communications, and sensing technology offer unprecedented opportunities for the field of control to expand its contributions to the economic and

More information

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection

Committee on the Internal Market and Consumer Protection. of the Committee on the Internal Market and Consumer Protection European Parliament 2014-2019 Committee on the Internal Market and Consumer Protection 2018/2088(INI) 7.12.2018 OPINION of the Committee on the Internal Market and Consumer Protection for the Committee

More information

DoD Research and Engineering Enterprise

DoD Research and Engineering Enterprise DoD Research and Engineering Enterprise 16 th U.S. Sweden Defense Industry Conference May 10, 2017 Mary J. Miller Acting Assistant Secretary of Defense for Research and Engineering 1526 Technology Transforming

More information

ADM-9-03:OT:RR:RD:TC H ARU DEPARTMENT OF HOMELAND SECURITY. U.S. Customs and Border Protection. [Docket No.

ADM-9-03:OT:RR:RD:TC H ARU DEPARTMENT OF HOMELAND SECURITY. U.S. Customs and Border Protection. [Docket No. This document is scheduled to be published in the Federal Register on 12/21/2018 and available online at https://federalregister.gov/d/2018-27716, and on govinfo.gov 9111-14 ADM-9-03:OT:RR:RD:TC H298350

More information

Front Digital page Strategy and Leadership

Front Digital page Strategy and Leadership Front Digital page Strategy and Leadership Who am I? Prof. Dr. Bob de Wit What concerns me? - How to best lead a firm - How to design the strategy process - How to best govern a country - How to adapt

More information

Executive Summary. The process. Intended use

Executive Summary. The process. Intended use ASIS Scouting the Future Summary: Terror attacks, data breaches, ransomware there is constant need for security, but the form it takes is evolving in the face of new technological capabilities and social

More information

Technology Roadmapping. Lesson 3

Technology Roadmapping. Lesson 3 Technology Roadmapping Lesson 3 Leadership in Science & Technology Management Mission Vision Strategy Goals/ Implementation Strategy Roadmap Creation Portfolios Portfolio Roadmap Creation Project Prioritization

More information

Fujitsu, SMU, and A*STAR collaborate on traffic management technologies with the Maritime and Port Authority of Singapore

Fujitsu, SMU, and A*STAR collaborate on traffic management technologies with the Maritime and Port Authority of Singapore Fujitsu Limited Agency for Science, Technology and Research (A*STAR) Singapore Management University April 16, 2018 Fujitsu, SMU, and A*STAR collaborate on traffic management technologies with the Maritime

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

Future of Financing. For more information visit ifrc.org/s2030

Future of Financing. For more information visit ifrc.org/s2030 Future of Financing The gap between humanitarian and development needs and financing is growing, yet largely we still rely on just a few traditional sources of funding. How do we mobilize alternate sources

More information

Empirical Research on Systems Thinking and Practice in the Engineering Enterprise

Empirical Research on Systems Thinking and Practice in the Engineering Enterprise Empirical Research on Systems Thinking and Practice in the Engineering Enterprise Donna H. Rhodes Caroline T. Lamb Deborah J. Nightingale Massachusetts Institute of Technology April 2008 Topics Research

More information

OECD WORK ON ARTIFICIAL INTELLIGENCE

OECD WORK ON ARTIFICIAL INTELLIGENCE OECD Global Parliamentary Network October 10, 2018 OECD WORK ON ARTIFICIAL INTELLIGENCE Karine Perset, Nobu Nishigata, Directorate for Science, Technology and Innovation ai@oecd.org http://oe.cd/ai OECD

More information

Executive Master in Digital Transformation & Innovation Leadership Digital up-skilling to transform and lead in business.

Executive Master in Digital Transformation & Innovation Leadership Digital up-skilling to transform and lead in business. Executive Master in Digital Transformation & Innovation Leadership Digital up-skilling to transform and lead in business. Executive Master in Digital Transformation & Innovation Leadership format start

More information

A FORWARD- LOOKING VIEW on how analytics will solve some pressing business, consumer and social insight problems.

A FORWARD- LOOKING VIEW on how analytics will solve some pressing business, consumer and social insight problems. A FORWARD- LOOKING VIEW on how analytics will solve some pressing business, consumer and social insight problems. Prabir Sen, Chief Management Scientist, Accenture Adjunct Professor SMU psen@smu.edu.sg

More information

Digital Transformation. A Game Changer. How Does the Digital Transformation Affect Informatics as a Scientific Discipline?

Digital Transformation. A Game Changer. How Does the Digital Transformation Affect Informatics as a Scientific Discipline? Digital Transformation A Game Changer How Does the Digital Transformation Affect Informatics as a Scientific Discipline? Manfred Broy Technische Universität München Institut for Informatics ... the change

More information

INTEL INNOVATION GENERATION

INTEL INNOVATION GENERATION INTEL INNOVATION GENERATION Overview Intel was founded by inventors, and the company s continued existence depends on innovation. We recognize that the health of local economies including those where our

More information

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy 11 BI TRENDS FOR 2018 Data De-silofication: The Secret to Success in the Analytics Economy De-silofication What is it? Many successful companies today have found their own ways of connecting data, people,

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

Gartner s Top 10 Strategic Technology Trends for 2018

Gartner s Top 10 Strategic Technology Trends for 2018 Gartner s Top 10 Strategic Technology Trends for 2018 How do designers make cars safer? They treat them like a school of fish. Safe Swarm, recently unveiled by Honda, uses vehicle-to-vehicle communication

More information

Emerging Transportation Technology Strategic Plan for the St. Louis Region Project Summary June 28, 2017

Emerging Transportation Technology Strategic Plan for the St. Louis Region Project Summary June 28, 2017 Emerging Transportation Technology Strategic Plan for the St. Louis Region Project Summary June 28, 2017 Prepared for: East West Gateway Council of Governments Background. Motivation Process to Create

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

the Companies and Intellectual Property Commission of South Africa (CIPC)

the Companies and Intellectual Property Commission of South Africa (CIPC) organized by the Companies and Intellectual Property Commission of South Africa (CIPC) the World Intellectual Property Organization (WIPO) the International Criminal Police Organization (INTERPOL) the

More information

ServDes Service Design Proof of Concept

ServDes Service Design Proof of Concept ServDes.2018 - Service Design Proof of Concept Call for Papers Politecnico di Milano, Milano 18 th -20 th, June 2018 http://www.servdes.org/ We are pleased to announce that the call for papers for the

More information

Our Corporate Strategy Digital

Our Corporate Strategy Digital Our Corporate Strategy Digital Proposed Content for Discussion 9 May 2016 CLASSIFIED IN CONFIDENCE INLAND REVENUE HIGHLY PROTECTED Draft v0.2a 1 Digital: Executive Summary What is our strategic digital

More information

Service Science: A Key Driver of 21st Century Prosperity

Service Science: A Key Driver of 21st Century Prosperity Service Science: A Key Driver of 21st Century Prosperity Dr. Bill Hefley Carnegie Mellon University The Information Technology and Innovation Foundation Washington, DC April 9, 2008 Topics Why a focus

More information

Framework Programme 7

Framework Programme 7 Framework Programme 7 1 Joining the EU programmes as a Belarusian 1. Introduction to the Framework Programme 7 2. Focus on evaluation issues + exercise 3. Strategies for Belarusian organisations + exercise

More information

Responsible AI & National AI Strategies

Responsible AI & National AI Strategies Responsible AI & National AI Strategies European Union Commission Dr. Anand S. Rao Global Artificial Intelligence Lead Today s discussion 01 02 Opportunities in Artificial Intelligence Risks of Artificial

More information

TECHNOLOGY, MIND & SOCIETY

TECHNOLOGY, MIND & SOCIETY MEDIA KIT TECHNOLOGY, MIND & SOCIETY AN APA CONFERENCE OCTOBER 3-5, 2019 WASHINGTON, DC GRAND HYATT AN APA CONFERENCE TMS.APA.ORG In 2018, the American Psychological Association hosted the inaugural Technology,

More information

Challenges and Opportunities in the Changing Science & Technology Landscape

Challenges and Opportunities in the Changing Science & Technology Landscape Challenges and Opportunities in the Changing Science & Technology Landscape (Capability Gap Changing Surprises Avoidance and Exploitation) Dr. Don Wyma Director for Scientific & Technical Intelligence

More information

Toward Objective Global Privacy Standards. Ari Schwartz Senior Internet Policy Advisor

Toward Objective Global Privacy Standards. Ari Schwartz Senior Internet Policy Advisor Toward Objective Global Privacy Standards Ari Schwartz Senior Internet Policy Advisor Summary Technical standards offer a new ability to support the important public policy goal of better protecting privacy.

More information

UIDP26 Conference Agenda. Monday, April 16, Tuesday, April 17, 2017

UIDP26 Conference Agenda. Monday, April 16, Tuesday, April 17, 2017 As of 1/30/2018 and subject to change All events at Cisco Systems, unless otherwise noted. Monday, April 16, 2018 11:30 AM 5:30 PM Workshop Check-In and Registration LUNCH ON YOUR OWN 1:30 PM 5:30 PM UIDP

More information

TECHNOLOGY MIND & SOCIETY

TECHNOLOGY MIND & SOCIETY MEDIA KIT TECHNOLOGY MIND & SOCIETY AN APA CONFERENCE OCTOBER 3-5, 2019 WASHINGTON, DC GRAND HYATT In 2018, the American Psychological Association hosted the inaugural Technology, Mind, and Society Conference

More information

Information Sociology

Information Sociology Information Sociology Educational Objectives: 1. To nurture qualified experts in the information society; 2. To widen a sociological global perspective;. To foster community leaders based on Christianity.

More information

ZoneFox Augmented Intelligence (A.I.)

ZoneFox Augmented Intelligence (A.I.) WHITEPAPER ZoneFox Augmented Intelligence (A.I.) Empowering the Super-Human Element in Your Security Team Introduction In 1997 Gary Kasperov, the chess Grandmaster, was beaten by a computer. Deep Blue,

More information

Sustainable Society Network+ Research Call

Sustainable Society Network+ Research Call Sustainable Society Network+ Research Call Call for Pilot Studies and Challenge Fellowships Closing date: 17:00 on 31 st October2012 Summary Applicants are invited to apply for short- term pilot study

More information

KÜNSTLICHE INTELLIGENZ JOBKILLER VON MORGEN?

KÜNSTLICHE INTELLIGENZ JOBKILLER VON MORGEN? KÜNSTLICHE INTELLIGENZ JOBKILLER VON MORGEN? Marc Stampfli https://www.linkedin.com/in/marcstampfli/ https://twitter.com/marc_stampfli E-Mail: mstampfli@nvidia.com INTELLIGENT ROBOTS AND SMART MACHINES

More information

How can boards tackle the Essential Eight and other emerging technologies?

How can boards tackle the Essential Eight and other emerging technologies? How can boards tackle the Essential Eight and other emerging technologies? are transforming companies. What should your board know about them? Companies are looking at the next generation of digital technologies

More information

Application of AI Technology to Industrial Revolution

Application of AI Technology to Industrial Revolution Application of AI Technology to Industrial Revolution By Dr. Suchai Thanawastien 1. What is AI? Artificial Intelligence or AI is a branch of computer science that tries to emulate the capabilities of learning,

More information

COURSE 2. Mechanical Engineering at MIT

COURSE 2. Mechanical Engineering at MIT COURSE 2 Mechanical Engineering at MIT The Department of Mechanical Engineering MechE embodies the Massachusetts Institute of Technology s motto mens et manus, mind and hand as well as heart by combining

More information

Secure Societies. Pauli Stigell, Pekka Rantala

Secure Societies. Pauli Stigell, Pekka Rantala Secure Societies Pauli Stigell, Pekka Rantala Security Union Security research is on the rise in conventional and cyber fields. Finns have a relatively good record in this programme and the programme s

More information

THEME 4 Creating Innovative Approaches to Local and Global Challenges

THEME 4 Creating Innovative Approaches to Local and Global Challenges THEME 4 Creating Innovative Approaches to Local and Global Challenges 33 Embracing complex issues with a critical and creative eye is central to Tufts place in the world, and marshaling our own complexity

More information

Report to Congress regarding the Terrorism Information Awareness Program

Report to Congress regarding the Terrorism Information Awareness Program Report to Congress regarding the Terrorism Information Awareness Program In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, 111(b) Executive Summary May 20, 2003

More information

Aviation Data Symposium June 2018 Berlin, Germany

Aviation Data Symposium June 2018 Berlin, Germany Aviation Data Symposium 19-20 June 2018 Berlin, Germany The second edition of IATA Aviation Data Symposium (ADS) will take place on 19 20 June 2018 at the InterContinental Hotel in Berlin, Germany. Harness

More information

Neuroforensics: Exploring the Legal Implications of Emerging Neurotechnologies A Workshop

Neuroforensics: Exploring the Legal Implications of Emerging Neurotechnologies A Workshop In collaboration with the Committee on Science, Technology, and Law Background: Neuroforensics: Exploring the Legal Implications of Emerging Neurotechnologies A Workshop March 6, 2018 Keck Center of the

More information

Technology Management

Technology Management Institut für betriebswirtschaftliches Management im Fachbereich Chemie und Pharmazie Marius Chofor Asaba Schedule Thursday, 5th July 10:30 12:30: Lecture Introductionto andforesight 12:30 13:30: Lunch

More information

2018 NISO Calendar of Educational Events

2018 NISO Calendar of Educational Events 2018 NISO Calendar of Educational Events January January 10 - Webinar -- Annotation Practices and Tools in a Digital Environment Annotation tools can be of tremendous value to students and to scholars.

More information

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence

Our position. ICDPPC declaration on ethics and data protection in artificial intelligence ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure

More information

Project Libra. Optimizing Individual and Public Interests in Information Technology

Project Libra. Optimizing Individual and Public Interests in Information Technology Project Libra Optimizing Individual and Public Interests in Information Technology 2 0 0 4 The RAND Corporation is a nonprofit research organization providing objective analysis and effective solutions

More information

Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies

Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies Book section Original citation: Mansell, Robin and Collins, Brian S. (2005) Introduction: Trust and crime in information

More information

Overview. Karen Lightman. Executive Director, Metro21: Smart Cities Institute

Overview. Karen Lightman. Executive Director, Metro21: Smart Cities Institute Overview Karen Lightman Executive Director, Metro21: Smart Cities Institute Mission Develop 21st century solutions to the challenges facing metropolitan regions. Metro21 Quick Facts Formed in 2014, Metro21

More information

IN INTELLIGENCE THE ROLE OF OPEN SOURCES. January 15, by Dr. John NOMIKOS, Director of Research, ISRIA. Athens, GREECE.

IN INTELLIGENCE THE ROLE OF OPEN SOURCES. January 15, by Dr. John NOMIKOS, Director of Research, ISRIA. Athens, GREECE. ISRIA Spotting Dangers, Watching the World www.isria.com THE ROLE OF OPEN SOURCES IN INTELLIGENCE January 15, 2006 by Dr. John NOMIKOS, Director of Research, ISRIA Athens, GREECE. As the threat that was

More information

Overview: Emerging Technologies and Issues

Overview: Emerging Technologies and Issues Overview: Emerging Technologies and Issues Marie Sicat Introduction to the Course on Digital Commerce and Emerging Technologies DiploFoundation, UNCTAD, CUTS, ITC, GIP UNCTAD E-commerce Week (18 April

More information

OVERVIEW OF ARTIFICIAL INTELLIGENCE (AI) TECHNOLOGIES. Presented by: WTI

OVERVIEW OF ARTIFICIAL INTELLIGENCE (AI) TECHNOLOGIES. Presented by: WTI OVERVIEW OF ARTIFICIAL INTELLIGENCE (AI) TECHNOLOGIES Presented by: WTI www.wti-solutions.com 703.286.2416 LEGAL DISCLAIMER The entire contents of this informational publication is protected by the copyright

More information

IN A DIGITALLY DISRUPTED AGE DIGITAL PUBLIC SAFETY SUMMIT LONDON FEBRUARY 2017

IN A DIGITALLY DISRUPTED AGE DIGITAL PUBLIC SAFETY SUMMIT LONDON FEBRUARY 2017 PUBLIC SAFETY IN A DIGITALLY DISRUPTED AGE DIGITAL PUBLIC SAFETY SUMMIT LONDON FEBRUARY 2017 In February 2017, 60 public safety leaders, academics and industry thought leaders including senior representatives

More information

The Seven Megatrends of Cambric

The Seven Megatrends of Cambric The Seven Megatrends of Cambric Bob Gourley, Partner, Cognitio May 18, 2016 Bob.gourley@cognitiocorp.com How we think. About This Presentation Ø What if you could know everything about the future of IT

More information

DIGITAL TECHNOLOGY, ECONOMIC DIVERSIFICATION AND STRUCTURAL TRANSFORMATION XIAOLAN FU OXFORD UNIVERSITY

DIGITAL TECHNOLOGY, ECONOMIC DIVERSIFICATION AND STRUCTURAL TRANSFORMATION XIAOLAN FU OXFORD UNIVERSITY DIGITAL TECHNOLOGY, ECONOMIC DIVERSIFICATION AND STRUCTURAL TRANSFORMATION XIAOLAN FU OXFORD UNIVERSITY EXPONENTIAL TECHNOLOGICAL CHANGE ARTIFICIAL INTELLIGENCE Alpha Go Driverless car, ROBOTICS Smart

More information

The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017

The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017 The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems Overview June, 2017 @johnchavens Ethically Aligned Design A Vision for Prioritizing Human Wellbeing

More information

Remote, Connected and Savvy! June 2017

Remote, Connected and Savvy! June 2017 Forum VI Remote, Connected and Savvy! SPONSORSHIP PACKAGE Fremantle, WA 21-23 June 2017 Indigenous Focus Day 21 June 2017 B4BA Forum 22-23 June 2017 Forum VI Sponsorship Packages $15,000+ $7,000+ $4,000+

More information

HOMELAND SECURITY & EMERGENCY MANAGEMENT (HSEM)

HOMELAND SECURITY & EMERGENCY MANAGEMENT (HSEM) Homeland Security & Emergency Management (HSEM) 1 HOMELAND SECURITY & EMERGENCY MANAGEMENT (HSEM) HSEM 501 CRITICAL ISSUES IN This course reintroduces the homeland security professional to the wicked problems

More information

National approach to artificial intelligence

National approach to artificial intelligence National approach to artificial intelligence Illustrations: Itziar Castany Ramirez Production: Ministry of Enterprise and Innovation Article no: N2018.36 Contents National approach to artificial intelligence

More information

The A.I. Revolution Begins With Augmented Intelligence. White Paper January 2018

The A.I. Revolution Begins With Augmented Intelligence. White Paper January 2018 White Paper January 2018 The A.I. Revolution Begins With Augmented Intelligence Steve Davis, Chief Technology Officer Aimee Lessard, Chief Analytics Officer 53% of companies believe that augmented intelligence

More information

Front Digital page Strategy and leadership

Front Digital page Strategy and leadership Front Digital page Strategy and leadership Who am I? Prof. Dr. Bob de Wit What concerns me? - How to best lead a firm - How to design the strategy process - How to best govern a country - How to adapt

More information

Public Discussion. January 10, :00 a.m. to 1:15 p.m. EST. #NASEMscicomm. Division of Behavioral and Social Sciences and Education

Public Discussion. January 10, :00 a.m. to 1:15 p.m. EST. #NASEMscicomm. Division of Behavioral and Social Sciences and Education Public Discussion January 10, 2017 11:00 a.m. to 1:15 p.m. EST #NASEMscicomm Division of Behavioral and Social Sciences and Education Sponsors Committee on the Science of Science Communication: A Research

More information

FACTORS INFLUENCING THE EFFECTIVENESS OF TECHNOLOGY TRANSFER

FACTORS INFLUENCING THE EFFECTIVENESS OF TECHNOLOGY TRANSFER FACTORS INFLUENCING THE EFFECTIVENESS OF TECHNOLOGY TRANSFER Barriers to technology transfer There are a number of barriers which must be overcome in successfully transferring technology from the Federal

More information

2018 Research Campaign Descriptions Additional Information Can Be Found at

2018 Research Campaign Descriptions Additional Information Can Be Found at 2018 Research Campaign Descriptions Additional Information Can Be Found at https://www.arl.army.mil/opencampus/ Analysis & Assessment Premier provider of land forces engineering analyses and assessment

More information

Challenges to human dignity from developments in AI

Challenges to human dignity from developments in AI Challenges to human dignity from developments in AI Thomas G. Dietterich Distinguished Professor (Emeritus) Oregon State University Corvallis, OR USA Outline What is Artificial Intelligence? Near-Term

More information

EVERGREEN IV: YEAR 2 SUMMARY

EVERGREEN IV: YEAR 2 SUMMARY United States Coast Guard Headquarters Office of Strategic Analysis 9/1/ UNITED STATES COAST GUARD Emerging Policy Staff Evergreen Foresight Program The Program Evergreen is a continuous cycle of strategic

More information

Assessing and Integrating Emerging Technologies

Assessing and Integrating Emerging Technologies Assessing and Integrating Emerging Technologies TENICA s 2018 Enterprise Innovation Symposium Georgia Tech Global Learning Center Wednesday, May 2, 2018 Richard Domikis Chief Engineer Intelligence & Cyber

More information

Engineering Autonomy

Engineering Autonomy Engineering Autonomy Mr. Robert Gold Director, Engineering Enterprise Office of the Deputy Assistant Secretary of Defense for Systems Engineering 20th Annual NDIA Systems Engineering Conference Springfield,

More information

Safety and Security. Pieter van Gelder. KIVI Jaarccongres 30 November 2016

Safety and Security. Pieter van Gelder. KIVI Jaarccongres 30 November 2016 Safety and Security Pieter van Gelder Professor of Safety Science and TU Safety and Security Institute KIVI Jaarccongres 30 November 2016 1/50 Outline The setting Innovations in monitoring of, and dealing

More information

Keywords: Multi-robot adversarial environments, real-time autonomous robots

Keywords: Multi-robot adversarial environments, real-time autonomous robots ROBOT SOCCER: A MULTI-ROBOT CHALLENGE EXTENDED ABSTRACT Manuela M. Veloso School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213, USA veloso@cs.cmu.edu Abstract Robot soccer opened

More information

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF EXECUTIVE SUMMARY St. Louis Region Emerging Transportation Technology Strategic Plan June 2017 Prepared for East-West Gateway Council of Governments by ICF Introduction 1 ACKNOWLEDGEMENTS This document

More information

To the Front Lines of Digital Transformation

To the Front Lines of Digital Transformation To the Front Lines of Digital Transformation Seeing the Heretofore Unseen Future Tips for Digital Transformation The Fujitsu Digital Transformation Center (DTC) is a co-creation workshop space that empowers

More information

ACTIVITIES1. Future Vision for a Super Smart Society that Leads to Collaborative Creation Toward an Era that Draws People and Technology Together

ACTIVITIES1. Future Vision for a Super Smart Society that Leads to Collaborative Creation Toward an Era that Draws People and Technology Together ACTIVITIES1 Future Vision for a Super Smart Society that Leads to Collaborative Creation Toward an Era that Draws People and Technology Together Measures to strengthen various scientific technologies are

More information

UN-GGIM Future Trends in Geospatial Information Management 1

UN-GGIM Future Trends in Geospatial Information Management 1 UNITED NATIONS SECRETARIAT ESA/STAT/AC.279/P5 Department of Economic and Social Affairs October 2013 Statistics Division English only United Nations Expert Group on the Integration of Statistical and Geospatial

More information

Brief to the. Senate Standing Committee on Social Affairs, Science and Technology. Dr. Eliot A. Phillipson President and CEO

Brief to the. Senate Standing Committee on Social Affairs, Science and Technology. Dr. Eliot A. Phillipson President and CEO Brief to the Senate Standing Committee on Social Affairs, Science and Technology Dr. Eliot A. Phillipson President and CEO June 14, 2010 Table of Contents Role of the Canada Foundation for Innovation (CFI)...1

More information

DOWNLOAD OR READ : TECHNOLOGIES OF CONSUMER LABOR PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : TECHNOLOGIES OF CONSUMER LABOR PDF EBOOK EPUB MOBI DOWNLOAD OR READ : TECHNOLOGIES OF CONSUMER LABOR PDF EBOOK EPUB MOBI Page 1 Page 2 technologies of consumer labor technologies of consumer labor pdf technologies of consumer labor U.S. Bureau of Labor

More information

Digital Disruption Thrive or Survive. Devendra Dhawale, August 10, 2018

Digital Disruption Thrive or Survive. Devendra Dhawale, August 10, 2018 Digital Disruption Thrive or Survive Devendra Dhawale, August 10, 2018 To disrupt is to exist 72% of CEOs say that rather than waiting to be disrupted by competitors, their organization is actively disrupting

More information

CPE/CSC 580: Intelligent Agents

CPE/CSC 580: Intelligent Agents CPE/CSC 580: Intelligent Agents Franz J. Kurfess Computer Science Department California Polytechnic State University San Luis Obispo, CA, U.S.A. 1 Course Overview Introduction Intelligent Agent, Multi-Agent

More information

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview

Challenging the Situational Awareness on the Sea from Sensors to Analytics. Programme Overview Challenging the Situational Awareness on the Sea from Sensors to Analytics New technologies for data gathering, dissemination, sharing and analytics in the Mediterranean theatre Programme Overview The

More information

Towards a Magna Carta for Data

Towards a Magna Carta for Data Towards a Magna Carta for Data Expert Opinion Piece: Engineering and Computer Science Committee February 2017 Expert Opinion Piece: Engineering and Computer Science Committee Context Big Data is a frontier

More information

Are your company and board ready for digital transformation?

Are your company and board ready for digital transformation? August 2017 Are your company and board ready for digital transformation? Going digital means change. Having the right skills is a critical part of the process. As overseers of company strategy, the board

More information

Master in Computer Science & Business Technology Your gateway to build the tech of the future

Master in Computer Science & Business Technology Your gateway to build the tech of the future Master in Computer Science & Business Technology Your gateway to build the tech of the future Master in Computer Science & Business Technology format start date language duration Full-Time September English

More information