research in the computing industry
Post on 18-Oct-2014
569 views
DESCRIPTION
This presentation was used in a Talk that I gave in First CSE Festival at KUET in 2012 This talk covered "Research in the Computing Industry" to inspire students of the undergrad program and to familiarize them with research in the industry.TRANSCRIPT
Khan M Nafee M Sadh Software Engineer, Samsung Bangladesh R&D Center Ltd.
Research in the Computing Industry
what industry is dreaming and how we can march
Research in the Computing Industry nafSadh
Standardization issue of Cloud computing
Too many standardization approaches!
Establishes a
transport
mechanism for
moving virtual
machines from
one hosted
platform to
another
CPIP: Met standard with
profiles for existing and in
progress cloud
computing standards in
areas such
as applications, portability,
and management.
SIIF: Establishes the
characteristics necessary
to
create cloud
interoperability and
federation
Provides
standardization for
client interactions with
cloud-based storage,
cloud data
management, and
cloud-to-cloud
storage interactions.
Develop APIs for
cloud management
tasks. APIs
enable interfacing
between IaaS cloud
implementations.
iD Cloud focuses on
security issues such as
identity
management and
vulnerability mitigation.
Symptoms Automation
Framework establishes
communications so that
cloud providers
understand
consumer requirements.
Open
Virtualization
Format (OVF)
CPIP
SIIF
Cloud Data
Management
Interface
(CDMI)
Open Cloud
Computing
Interface
(OCCI)
IDCCloud Technical
Committee
Symptoms
Automation
Framework Technical
Committee
Research in the Computing Industry nafSadh
Big data analysis
Watson (IBM)
Social trend Language aided
services robots
analysis
human talks to machine
Natural language processing
Research in the Computing Industry nafSadh
Trust and Security
/Eligibility /Uniqueness /Accuracy
/Soundness /Privacy /Fairness
/Transparency /Robustness
/Uncoercibility /Receipt-freeness
/Verifiability
Research in the Computing Industry nafSadh
Trust and Security
Researchers have proposed multiple solutions to cross-
site scripting, but vulnerabilities continue to exist in
many Web applications due to developers’ lack of
understanding of the problem and their unfamiliarity
with current defenses’ strengths and limitations.
Research in the Computing Industry nafSadh
Trust and Security
Voting codes, risk analysis, and election forensics can
help the public build and maintain trust in an Internet
voting system by assuring that it meets important
security and privacy requirements.
Research in the Computing Industry nafSadh
Trust and Security
Context-aware security systems identify the
circumstances under which users are trying to access a
network and what they want to do with the data they
want to obtain. The system then handles the
transaction in accordance with the host organization’s
security policies.
Research in the Computing Industry nafSadh
Trust and Security
/Traditional security techniques often don’t work well
Research in the Computing Industry nafSadh
Trust and Security
/The attacks on CAs are now serving as a catalyst for
rethinking Internet security.
Research in the Computing Industry nafSadh
Trust and Security
/Security, data protection, trust management,
authentication, and authorization are crucial assets in
the Internet of Services. Online testing enhances
trustworthiness among federated services that are
often independently developed, deployed, and
maintained.
Research in the Computing Industry nafSadh
/In-car interactive system. The system uses a depth camera to detect complex gestures, making it
possible for the driver to execute multiple tasks simultaneously with one gesture.
Research in the Computing Industry nafSadh
Brain Computer interface
electrocorticography (ECoG), intracortical electrodes (ICE), functional near-infrared spectroscopy (fNIRS), functional magnetic resonance imaging (fMRI), magnetoencephalography (MEG), electroencephalography (EEG)
Research in the Computing Industry nafSadh
/HCI system of using computer-generated electrical stimulation to control muscles /Can be used to
teach and train
Research in the Computing Industry nafSadh
Human Ear Recognition biometric
//morphological components of ear
helix rim, lobule, antihelix, concha, tragus, antitragus, crus of helix, triangular fossa, and incisure intertragica
Research in the Computing Industry nafSadh
Computational insight for business and organizations
/Traders increasingly use automated
systems for one or more stages of the
trading process, yet the secrecy and
complexity of the algorithms prompt
providing an overview of how these
systems work.
Research in the Computing Industry nafSadh
Computational insight for business and organizations
/HCI system of using computer-generated electrical stimulation to control muscles /Can be used to
teach and train
Research in the Computing Industry nafSadh
Computational insight for business and organizations
Process mining techniques enable process-
centric analytics through automated process
discovery, conformance checking, and model
enhancement.
Research in the Computing Industry nafSadh
Software
#online test for services //Authentication in Service Federations /* Security, data protection, trust management, authentication, and authorization are crucial assets in the Internet of Services. Online testing enhances trustworthiness among federated services that are often independently developed, deployed, and maintained */
Research in the Computing Industry nafSadh
Software
#Buffer-Overflow Vulnerabilities //exploits /* Buffer-overflow exploits */ /* function activation record exploits*/ /* Pointer subterfuge exploits*/ /* Heap-based exploits*/ //defending against it /* defensive coding */ /* runtime instrumentation */ /* Static code analysis */ /* Combined static and dynamic code analysis */
Research in the Computing Industry nafSadh
Software
#S/W for infrastructure /* Infrastructure software needs more stringent correctness, reliability, efficiency, and maintainability requirements than nonessential applications. This implies greater emphasis on up-front design, static structure enforced by a type system, compact data structures, simplified code structure, and improved tool support.*/
//programming techniques /* compute less */ /* access memory less */ /* practice type rich programming */ /* use libraries */ /* prefer highly structured code */
Research in the Computing Industry nafSadh
#Runtime Variability //The Promise and Challenge /* Runtime variability offers a good choice for many systems that experience dynamic changes in their quality and context */
Software
Research in the Computing Industry nafSadh
Software Engineering
//theory for practitioners /* Applying scientific theories to create, analyze, and
justify methods and techniques is essential to move
something from craft to engineering */
/* As long as theoreticians do not take into account issues from practice, their work will not be very helpful from a pragmatic viewpoint and will not find an immediate road into practice. */
Research in the Computing Industry nafSadh
Software Engineering
//for embedded systems /* designing for change */
/* fault tolerance */
/* autonomy */
Research in the Computing Industry nafSadh
Software Engineering
//for Services and Cloud /* Service-oriented software engineering incorporates
the best features of both the services and cloud
computing paradigms, offering many advantages for
software development and applications, but also
exacerbating old concerns.*/
/* Because users’ businesses rely heavily on third-party service providers, there are serious concerns about how threats to service reliability and availability could affect a service and consequently a cloud user’s business.*/
Research in the Computing Industry nafSadh
Visible Light Communication
In search for better ways to Tx data, researchers turned to long discussed: visible light communications
under the hood
advantages
/security /energy efficiency /wider spectrum
more capacity