Loading…
CloudEXPO 2019 has ended
05 AI | ML | DL | Artificial Intelligence [clear filter]
Monday, June 24
 

11:00am PDT

Can Your Organization Trust Its Machines?
Can Your Organization Trust Its Machines?

Many publications and prognosticators are hailing how AI will revolutionize IT operations. Business leaders are buying in, hoping to reap the benefits of the massive gains in cloud computing power and advanced algorithmic capabilities to support improvements in critical IT operations like threat detection, event management, and configuration management.

But not everyone is eager to hop on the AI train just yet. IT pros have invested time, money, and a ton of effort into their careers and there’s real fear — even if it’s mostly in response to the hype — of eventually being replaced by machines.

Join Jiayi Hoffman, Data Science Architect at OpsRamp, as she provides the tools to dispel this myth in your organization and presents on building a culture of trust around artificial intelligence for IT operations. She'll review key insights and tangible ideas for getting buy-in on your eventual adoption of AIOps, making for a smooth transition to the future.

Speakers
avatar for Jiayi Hoffman

Jiayi Hoffman

Data Science Architect, OpsRamp
Jiayi Hoffman is a Data Science Architect with specialties in machine learning, enterprise architecture, and cloud. Most recently, she architected and designed BMC's Cognitive Service and Chatbot framework. She's served as Principal Product Developer for Remedy, BMC and several s... Read More →



Monday June 24, 2019 11:00am - 11:35am PDT
05 AI | ML | DL | Artificial Intelligence Room 209

11:40am PDT

Bringing AI to Hybrid Cloud Management
Bringing AI to Hybrid Cloud Management

Hybrid cloud management already presents challenges for many IT organizations, from swivel-chair management of point tools and infrastructure, to bridging skills gaps when it comes time to adopt cloud-native technologies. AI can solve some of these challenges through intelligent automation and actionable insights, but how does a company that's just starting its cloud journey make the leap to AIOps?

Speakers
avatar for Varma Kunaparaju

Varma Kunaparaju

Co-Founder and CEO, OpsRamp
Varma is Co-founder and CEO at OpsRamp. Varma has over 20 years of experience in high-technology engineering, and has a proven record of building and delivering enterprise software.



Monday June 24, 2019 11:40am - 12:15pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209

1:55pm PDT

Machine Data is Everywhere! Use it for Testing!
Machine Data is Everywhere! Use it for Testing!

When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the steps so your team's apps not only function but also can be monitored and understood from their machine data when running in production.

Speakers
avatar for Tom Chavez

Tom Chavez

Sr. Marketing Manager, Splunk
Tom Chavez has more than twenty years of experience as a manager and product manager in the software development tools field. Tom works in as senior manager of developer marketing at Splunk. Tom has worked at Apple, Sun, and Intuit, delivering tools for web, Mac, Java, Linux, and... Read More →



Monday June 24, 2019 1:55pm - 2:30pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209

4:00pm PDT

Security Past the Perimeter: An Immune System for the Cloud
Security Past the Perimeter: An Immune System for the Cloud 

In an age of borderless networks, security for the cloud and security for the corporate network can no longer be separated. Security teams are now presented with the challenge of monitoring and controlling access to these cloud environments, at the same time that developers quickly spin up new cloud instances and executives push forwards new initiatives. 
 
The vulnerabilities created by migration to the cloud, such as misconfigurations and compromised credentials, require that security teams take a proactive approach, educating employees about the  risks of human error. Cloud infrastructure and SaaS applications are some of the most notorious network blind spots, and with insider threat posing such a significant risk, visibility has also never been more important — or more difficult. 
 
Powered by AI, Darktrace’s Enterprise Immune System technology is the only solution to offer real-time visibility and insight into all parts of a network, regardless of its configuration. By learning a ‘pattern of life’ for all networks, devices, and users, Darktrace can detect threats as they arise and autonomously respond in real time – all without impacting server performance.  
 
In this session, learn: 
  • How AI and machine learning are automating advanced threat detection across today’s borderless networks
  • Why AI-driven visibility of both physical and virtual environments allow you to preempt emerging situations by autonomously responding in real time
  • How a proactive approach to cloud security, including communication amongst employees, clear policies, and early threat detection can help to secure Cloud environments
  • What smart prioritization and visualization of threats mean for resource allocation and lower risk

Speakers
avatar for Michael Bush

Michael Bush

Field Director, Darktrace
Michael Bush is a Field Director at Darktrace, the world’s leading AI company for cyber security, where he works with organizations across industries and scale. Examples include financial institutions ranging from credit unions to private banks with multiple billions of assets under... Read More →



Monday June 24, 2019 4:00pm - 4:35pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209

4:40pm PDT

The First Robot Astronaut: Advancing the Practical Application of AI
The First Robot Astronaut: Advancing the Practical Application of AI

What will it take for you to trust an AI robot? According to IBM Research, “As AI advances, and humans and AI systems increasingly work together, it is essential that we trust the output of these systems to formulate our decisions.” Aboard the International Space Station (ISS), the German Space Agency and Airbus added a new member to the crew named CIMON (Crew Interactive MObile CompanioN), the first AI robot to orbit space. This presentation will overview the experiences in launching and implementing project CIMON as well as the findings about the interactions between astronaut and AI robot. Come and learn how the first robot astronaut is advancing the practical application of AI.

Speakers
avatar for Rene Bostic

Rene Bostic

Technical VP of Innovation and New Technologies, IBM
René Bostic is the Technical Vice President of Innovation and New Technologies for IBM Cloud. She is an expert in cloud computing, DevOps and emerging cloud technologies to include Blockchain. Cloud Expo named René a faculty member for both their 2017 & 2018 Conferences. In addition... Read More →



Monday June 24, 2019 4:40pm - 5:15pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209
 
Tuesday, June 25
 

8:30am PDT

AI/ML Driven Transformation of Supply Chain and Retail Use Cases
AI/ML Driven Transformation of Supply Chain and Retail Use Cases

Mobile and digital technologies (barcode, handheld scanners, RFID) have ushered in efficiency and optimization of supply chain processes. AI and ML technologies offer unprecedented capabilities to fully automate or augment human decision-making for achieving higher level of operational efficiency and business agility. This session will discuss applying AI/ML to business use cases in supply chain, retail and customer experience.

Speakers
avatar for Logan Vadivelu

Logan Vadivelu

Cloud Architect, Google
Logan is a seasoned technology thought leader with over two decades of international and US experience in driving clients success with adopting emerging technologies. Presently, he focuses on AI/ML, Big Data Analytics and IoT in a multi and hybrid-cloud architecture. As a trusted... Read More →



Tuesday June 25, 2019 8:30am - 9:05am PDT
05 AI | ML | DL | Artificial Intelligence Room 209

3:40pm PDT

Leveraging AI for Video Summarization
Leveraging AI for Video Summarization

With digital video content creation going viral and assuming the bulk of Internet traffic, how can the deluge of video content be analyzed effectively to derive insights and ROI? After all, video is not only huge in size, but it is complex given various visual, audio and temporal elements. Video summarization (a mechanism for generating a short video summary via key frame analysis or video skimming) has become a popular research topic industry-wide and across academia. Video thumbnail generation and summarization has been developed for years, but deep learning and reinforcement learning is changing the landscape and emerging as the winner for optimal frame selection. Recent advances in Generative Adversarial Networks (GANs) are improving the quality, aesthetics and relevancy of the frames to represent the original videos. Attendees will gain an understanding of the various challenges facing the industry today, emerging AI-powered solutions around video summarization and how unsupervised learning can help deliver video content understanding.


Speakers
avatar for Divya Jain

Divya Jain

CEO/Founder, 24Notion
Divya Jain is an industry-recognized product and technology leader in machine learning and AI, with 15+ years of experience at various startups and Fortune 500 companies. She is currently the director of machine learning and platform engineering at Adobe. Previously, Divya was a research... Read More →



Tuesday June 25, 2019 3:40pm - 4:15pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209

4:20pm PDT

Autonomous RPA Cloud Robotic Process Automation
Autonomous RPA Cloud Robotic Process Automation

Ever thought about API-driven service desk solution that can provide conversational driven workflow automation for Cloud and IT to bring exceptional customer experience!  Wait no more, In this presentation we will showcase AI-driven Cloud-native RPA that is helping 3rd party apps and ecosystem.

Come and learn how customers are benefiting from adopting this solution to increase productivity and reduce overall TCO!  

Speakers
avatar for Somya Kapoor

Somya Kapoor

Head of Product, Stealth Startup, Aisera
Somya Kapoor is an experienced entrepreneur with an end-to-end experience in Enterprise Software. Her experience spans across building products within the machine learning and predictive analytics space and delivering them to market both at SAP and Servicenow. At Servicenow she led... Read More →



Tuesday June 25, 2019 4:20pm - 4:55pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209

5:00pm PDT

Machine Learning CI/CD Using Jupyter Notebook and Serverless Functions
Machine Learning CI/CD Using Jupyter Notebook and Serverless Functions

Deploying machine learning models from training to production requires companies to deal with the complexity of moving workloads through different pipelines and re-writing code from scratch.

Yaron Haviv will explain how to automatically transfer models from Jupyter notebook to scale-out serverless functions for event-driven and real-time applications. He will also address versioning challenges, showing how serverless functions can enable developers to update machine learning models and code together as a single versioned entity. Participants will learn how to work with a continuous development and deployment pipeline through a deep walkthrough and interactive demos.

Speakers
avatar for Yaron Haviv

Yaron Haviv

CTO, Iguazio
Yaron Haviv is a serial entrepreneur who has deep technological experience in the fields of ML, big data, cloud, storage and networking. Prior to Iguazio, Yaron was the Vice President of Datacenter Solutions at Mellanox, where he led technology innovation, software development and... Read More →


Tuesday June 25, 2019 5:00pm - 5:35pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209

5:40pm PDT

Machine Learning for Anyone and Everyone
Machine Learning for Anyone and Everyone

This session provides a fun and simple way to introduce Machine Leaning to anyone and everyone. Together we would solve a machine learning problem and find an easy way to be able to do machine learning without even coding.



Speakers
avatar for Raju Shreewastava

Raju Shreewastava

CEO, Big Data Trunk
Raju Shreewastava is the founder of Big data Trunk(www.BigDataTrunk.com, a Big Data & Analytics, Machine Learning Training and consulting firm with offices in the United States. Former Big data and Business Intelligence for Autodesk (BI/DW/ODS, Big Data, and Enterprise Architecture... Read More →



Tuesday June 25, 2019 5:40pm - 6:15pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209
 
Wednesday, June 26
 

8:30am PDT

Lifting the Fog from the Public Cloud: Using Cloud Activity Logs and Decoys to Secure Cloud-Resident Data
Lifting the Fog from the Public Cloud: Using Cloud Activity Logs and Decoys to Secure Cloud-Resident Data

Businesses are moving data to the cloud faster than they can secure it, creating significant security risks. This presentation will show how cloud data loss risk monitoring and deception technology can close the security gaps in public file sharing clouds.Introduction:

The asymmetry of attacker and defender in cybersecurity is well known. This is exacerbated by enterprise digital transformation initiatives, pushing volumes of corporate data into public clouds faster than businesses can protect them. According to a new report by ESG, almost one-quarter (24%) of respondents said that more than 40% of their corporate data resides on public cloud services today. This is expected to more than double to 58% of organizations within 24 months. But this quest to reap the benefits of the cloud -- productivity, better collaboration, and lower costs -- has come at a great price, lack of visibility and control, and hence, increased risk in losing sensitive corporate data.
More than 40% of data stored in public clouds is considered “Sensitive.” Yet, three-quarters of respondents to ESG’s survey believe that at least 20% of their public cloud data is insufficiently secured, and 50% of all respondents said they have lost cloud-resident data. Protecting digitally-stored and shared data, revealing attackers and uncovering identities remain vexing problems for security teams. Cloud data loss risk monitoring and deception techniques are uniquely positioned for the task of increasing visibility and regaining control.

How We Got Here:

This presentation will explore the three major contributing factors driving the loss of data from a public cloud share (Microsoft OneDrive, Google Drive, etc.), and share some real-world examples of these types of data losses, as well as the impact on a company’s bottom line when sensitive data is stolen or leaked. These three contributors are:
Security policy violations
Stolen or “borrowed” access credentials (Masqueraders)
BYOD/Shadow IT

Next, we will walk through the security risks that are specific to sharing data in the cloud, even with legitimate users, such as link sharing, misconfiguration of security settings, etc. The very act of sharing links to files stored in a public cloud puts them at risk. Just recently, data from more than 90 companies was exposed through Box accounts due to employees sharing web links. Some of the companies whose data was exposed included Apple, the Discovery Channel, Herbalife, Schneider Electric, and even Box itself.

Decoys and Document Behavior Monitoring

The inability to detect and understand modern attacker-type breaches has created new interest in deception technology. This presentation will provide a clearer definition of deception technology: what it is, and what it is not. Deception technology is not “hacking back.”

The use of strategically distributed decoys enables organizations to leverage counterfeit resources for the attacker to find, setting alluring traps by placing beacons in phony but highly convincing documents. These documents offer the benefit of low false positives (legitimate users have no reason to be in contact with decoys), and because they are in-line, they take up very little bandwidth. When a decoy is breached, the security team can choose to let the attacker continue while they watch, which aids in the development of intelligence about specific attack vectors, and attackers’ ultimate goals. The goal is to create enough doubt within the hacker that they’ve stolen anything of real value, that they decide to back out of the cloud environment and move on. This is very different from the “eye for an eye” mentality many associate with “hacking back.” No systems are penetrated or destroyed; instead, the purpose is to gather information on the intruder to turn over to law enforcement.
Deception technology in the form of decoys can aid forensics and response investigations and mitigation capabilities, allowing organizations to actively defend their infrastructure within their own environment and making it easier to investigate, contain, and engage with intruders.

How do cloud activity logs and decoys work together? It’s a two-pronged approach:

Monitoring and tracking documents. By applying a layer of security at the document level to files stored in the public cloud, security operations teams can know, in real time, when documents have been opened, modified, downloaded, and shared to other users – and even the physical locations of the recipients of these shared documents can usually be determined. Defenders can analyze cloud activity logs to determine the extent of the problem. Cloud log analytics can alert personnel to possibly misconfigured cloud share access controls, or user security violations.
Active defense decoys. Using highly realistic but fake documents, security professionals can “set traps” for would-be cybercriminals (both internal and external). Strategically placing decoy documents within the public cloud share uses proven techniques to detect adversaries earlier in the lifecycle of an attack. By staging decoys within the operational network, security professionals gain the same benefits of honeynets, but without the hassle of managing and deploying phony networks.

Decoys strategically placed within the operational networks avoids the risk that attackers will not penetrate a honeynet.

When executed properly, an active defense strategy changes the asymmetry of cybersecurity, giving defenders the advantage.

Real-world examples of active defense decoys:

Ransomware Attacker Revealed. A large telecom company experienced a ransomware attack that seemingly utilized portions of the NSA leaked malware. Post-attack forensics determined that the adversary had penetrated the organization through a vulnerable set-top box, which then allowed the attacker to riffle through the organization’s folders and directories and encrypt the data on a corporate server. Identifying this attacker, thwarting the attack in its final stages and not paying the ransom became a top priority. In order to receive the ransom in bitcoin, communication between attacker and target was conducted via the Tor chat protocol. The telecom company claimed that it had paid the bitcoin ransom, but in actuality it had not. Instead, the company’s CISO used a decoy document disguised as a bitcoin payment page. The attacker received the confirmation page over Tor and proceeded to open and review the document on his phone. The decoy triggered an alert upon opening, and conveyed geofencing and telemetry insights that allowed the security team to reveal the attacker via his phone service provider.

A Greedy Insider’s Plans Are Foiled. A large enterprise experienced a stock-tampering case that demonstrated a financial fraud attack. The company was suspicious that a rogue insider had been accessing confidential files about the company’s financial performance, and illegally benefiting from inside knowledge of an impending acquisition. It was clear that the insider was leaking and manipulating news about the target company to affect its market valuation. Decoy documents containing compelling information about the target company were strategically placed in file shares. One of the documents was later opened externally at the home of the alleged inside attacker, triggering an alert, surfacing his identity and providing proof for law enforcement. The FBI then did its duty.

Speakers
avatar for Salvatore Stolfo

Salvatore Stolfo

Founder and Chief Technology Officer, Allure Security
Dr. Salvatore Stolfo is a people-person, which makes him unique in a field where folks focus on making machines. As professor of artificial intelligence and computer science at Columbia University since 1979, Dr. Stolfo has spent his entire career figuring out how people think, and... Read More →



Wednesday June 26, 2019 8:30am - 9:05am PDT
05 AI | ML | DL | Artificial Intelligence Room 209

3:40pm PDT

Artificial Intelligence: The Good. The Bad, and The Ugly
Artificial Intelligence: The Good. The Bad, and The Ugly

Artificial intelligence, machine learning, neural networks. We're in the midst of a wave of excitement around AI such as hasn't been seen for a few decades. But those previous periods of inflated expectations led to troughs of disappointment. This time is (mostly) different.

Applications of AI such as predictive analytics are already decreasing costs and improving reliability of industrial machinery. Pattern recognition can equal or exceed the ability of human experts in some domains. It's developing into an increasingly commercially important technology area. (Although it's also easy to look at wins in specific domains and generalize to an overly-optimistic view of AI writ large.)

In this session, Red Hat Technology Evangelist for Emerging Technology Gordon Haff will examine the AI landscape and identify those domains and approaches that have seen genuine advance and why. He'll also discuss some of the specific ways in which both organizations and individuals are getting up to speed with AI today.

Speakers
avatar for Gordon Haff

Gordon Haff

Principal, BitMasons
Gordon Haff is Principal Analyst at BitMasons where he writes and consults with an emphasis on open source and computing infrastructure. At Red Hat, he worked on market insights and portfolio architectures and wrote about tech, trends, and their business impact. His books include... Read More →



Wednesday June 26, 2019 3:40pm - 4:15pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209

4:20pm PDT

Cloud Machine Learning Simplifies The Complex
Cloud Machine Learning Simplifies The Complex

The vast majority of organizations today are in the earliest stages of AI initiatives and this shift will be dramatic as more enterprises move forward in the AI journey. Although companies are at different stages of this journey, most agree that finding or developing analytic talent is a key concern and bottleneck for doing more. What if your business could take advantage of the most advanced ML/AI models without the huge upfront time and investment inherent in building an internal ML/AI data scientist team?

In this presentation, I will introduce the pros and cons of three pathways: 1. Utilize prepackage ML APIs, 2. Customizable AutoML, 3. Training your your ML models specifically tailored to your business needs. To win with Cloud ML, you will need to know how to choose a right approach in a quicker time frame and without significant investment.

TAKEAWAYS

1. Understand what is Machine Learning
2. Identify what are the challenges on current ML process.
3. Know the pros and cons of three pathways for implementing ML: ML infrastructure Prepackge ML API AutoML
4. Learn from customers ML use cases.
5. Understand how are you going to adopt ML today by choosing the right tool.

Speakers
avatar for Elliott Ning

Elliott Ning

Cloud Customer Advisor, Google
As the technical advisor of Google for customer cloud solutions, Elliott Ning is passionate about analyzing and solving key customers technological problems in machine learning, analytics and infrastructure to bring business opportunity into reality. Previously, Elliott worked with... Read More →



Wednesday June 26, 2019 4:20pm - 4:55pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209

5:00pm PDT

Model Governance in the Enterprise
Model Governance in the Enterprise

Datatron is bringing fundamental change to machine learning Model Governance with automation and efficiency. Fortune 500 companies endure the drudgery of ML models in production, as auditing, reporting, and compliance processes are manual and time-consuming. Datatron’s Model Governance platform is the solution: It includes model deployment, model monitoring, and model management, and grants users total control over the behavior of their ML models by automating the entire operationalization process. One use case involves helping companies smoothly and carefully migrate from obsolete SAS to modern open-source models, which have been gaining in popularity. Multiple models can be monitored simultaneously, while keeping redundant models in shadow mode. The Datatron platform has figured out the solution at scale (TB) by employing user-friendly UI, and calculates the metrics necessary to measure AI risk for traffic and behavior of models. It can be scaled for online and offline processing.

Speakers
avatar for Lalit Sirsikar

Lalit Sirsikar

Staff Machine Learning Engineer, Datatron Technologies
Lalit Sirsikar is Datatron’s Staff Machine Learning Engineer and was one of the first engineers on the team. His work has proved instrumental to the company’s product development.Lalit worked on the pricing model solution for one of Datatron’s early customers and wrote more... Read More →



Wednesday June 26, 2019 5:00pm - 5:35pm PDT
05 AI | ML | DL | Artificial Intelligence Room 209
 
Filter sessions
Apply filters to sessions.