IEEE CS 2022 Report

Total Page:16

File Type:pdf, Size:1020Kb

IEEE CS 2022 Report IEEE CS 2022 Report Hasan Alkhatib, Paolo Faraboschi, Eitan Frachtenberg, Hironori Kasahara, Danny Lange, Phil Laplante, Arif Merchant, Dejan Milojicic, and Karsten Schwan with contributions by: Mohammed AlQuraishi, Angela Burgess, David Forsyth, Hiroyasu Iwata, Rick McGeer, and John Walz Preface In 2013-14, nine technical leaders wrote a report, entitled complete and exhaustive, it is inevitable that some technolo- IEEE CS 2022, surveying 23 innovative technologies that gies have been omitted, such as Bitcoin, future transportation, could change the industry by the year 2022. The report and the general notion of what technology contributes to the covers security cross-cutting issues, open intellectual prop- mankind. Our position, as well as the premise that this docu- erty movement, sustainability, massively online open courses, ment brings, is that technology is the enabler. What humanity quantum computing, device and nanotechnology, device takes out of it really depends on human society. and nanotechnology, 3D integrated circuits, multicore, pho- The IEEE CS 2022 report was presented at the Computer So- tonics, universal memory, networking and interconnectivity, ciety of India Congress, at the Information Processing Society software-defined networks, high-performance computing, of Japan (IPSJ) Congress, at the IEEE CS Board of Governors, cloud computing, the Internet of Things, natural user interfac- at the IEEE CS Industrial Advisory Board, and at Belgrade es, 3D printing, big data and analytics, machine learning and Chapter. We received positive feedback and excellent ideas intelligent systems, computer vision and pattern recognition, for improvement. This is a living document, because the tech- life sciences, computational biology and bioinformatics, and nology continuously changes. We intend to use this document robotics for medical care. for the IEEE CS strategic planning that takes place every These technologies, tied into a scenario that we call seam- three years. We hope that the IEEE CS will be able to come up less intelligence, present a view of the future. For each of the with similar reports regularly in the future. 23 technologies, there is a description of the state of the art, I thank Hasan Alkhatib, Paolo Faraboschi, Eitan Frachtenberg, challenges, where we think the technology will go, and its Hironori Kasahara, Danny Lange, Phil Laplante, Arif Merchant, disruption. To confirm the report’s prediction, we surveyed and Karsten Schwan for making this journey to 2022 together. IEEE members about technology drivers and disruptors. We Without their vision, technical knowledge, and creativity, this also tried to predict what kind of society the world would document would not be possible. require with these 23 technologies. Finally, we analyzed the IEEE digital library to better understand the degree to which these technologies are covered today and by which Societies, so that we can make better ties. This document is intended for computer science profession- als, students, and professors, as well as laymen interested Dejan S Milojicic, in technology and technology use. While we tried to be IEEE Computer Society President 2014, February 2014 2 CONTENTS 3 FIGURES Figure 1. Landscape of 23 technologies .........................................7 Figure 18. Coverage of some of the top disruptors Figure 31. The breakdown of networking and in IEEE Libraries by individual societies ...................................118 interconnectivity by sponsoring societies. ............................ 149 Figure 2. IT ecosystem from supply to demand. ........................21 Figure 19. The breakdown of 22 technologies by Figure 32. The breakdown of software-defined Figure 3. Two integration scenarios: a 2.5D component using periodical articles. ............................................................................137 networks by sponsoring societies. ...........................................150 a silicon interposer and a full 3D stack using TSVs. ............34 Figure 20. The breakdown of 22 technologies by Figure 33. The breakdown of HPC by sponsoring Figure 4. An integration scenario combining 2.5D integration sponsoring societies. ..................................................................... 138 societies. ..............................................................................................151 of multiple 3D-stacked components. ........................................35 Figure 21. The breakdown of security cross-cutting Figure 34. The breakdown of cloud computing by Figure 5. Illustration of the severity of the DRAM issues by sponsoring societies. .................................................. 139 sponsoring societies. ..................................................................... 152 capacitor “trench.” ............................................................................38 Figure 22. The breakdown of open intellectual property Figure 35. The breakdown of IoT by sponsoring Figure 6. Simplified phase-change memory (PCM) cell by sponsoring societies. ...............................................................140 societies. ............................................................................................. 153 and spin-transfer torque (STT) cell. ...........................................39 Figure 23. The breakdown of sustainability by Figure 36. The breakdown of natural user interfaces Figure 7. Simplified memristor (ReRAM) cell. ............................40 sponsoring societies. ......................................................................141 by sponsoring societies. ............................................................... 154 Figure 8. Multicore. many-cores landscape. ..............................44 Figure 24. The breakdown of MOOC by sponsoring Figure 37. The breakdown of 3D printing by Figure 10. Rule-of-thumb of using photonics vs. electronics societies. ............................................................................................. 142 sponsoring societies. ..................................................................... 155 based on distance and required bandwidth ...........................48 Figure 25. The breakdown of quantum computing Figure 38. The breakdown of big data analytics Figure 11. Roadmap of industrial photonics by sponsoring societies. ............................................................... 143 by sponsoring societies. ............................................................... 156 technologies........................................................................................50 Figure 26. The breakdown of device and nano-technology Figure 39. The breakdown of machine learning and Figure 12. A representative switch ASIC pipeline. ...................58 by sponsoring societies. ............................................................... 144 intelligent systems by sponsoring societies. .........................157 Figure 13. High-performance computing. ..................................64 Figure 27. The breakdown of 3D integrated circuits Figure 40. The breakdown of computer vision and Figure 14. Comparing classes of HPC and their by sponsoring societies. ............................................................... 145 pattern analysis by sponsoring societies. ..............................158 feasibility to deliver in the cloud. .................................................65 Figure 28. The breakdown of universal memory Figure 41. The breakdown of life sciences by Figure 15. Comparison of major drivers. ..................................... 113 by sponsoring societies. ............................................................... 146 sponsoring societies. ..................................................................... 159 Figure 16. Comparison of major disruptors. ..............................114 Figure 29. The breakdown of muticore by Figure 42. The breakdown of computational biology sponsoring societies. ......................................................................147 by sponsoring societies. ...............................................................160 Figure 17. Coverage of some of the top drivers in IEEE Libraries by individual societies. ..................................... 117 Figure 30. The breakdown of photonics by Figure 43. The breakdown of robotics in medicine sponsoring societies. ..................................................................... 148 by sponsoring societies. ................................................................161 TABLES Table 1. IEEE SWOT ............................................................................ 122 Table 3. Search keywords summary. ........................................... 135 Table 2. Breakdown of who and how Table 4. Google and IEEE Xplore search will be benefiting from IEEE CS ................................................. 123 results combined ............................................................................. 162 4 CONTENTS 1. INTRODUCTION ......................... 5 1.1 Goals ........................................ 6 1. Introduction 1.2 Target Audience ........................ 6 1.3 Process ..................................... 6 1.4 Technologies Landscape ............ 7 1.5 Document Organization ............. 7 Predicting the future is hard and risky. Predicting to better understand where technologies are going. 2. SEAMLESS INTELLIGENCE the future in the computer industry is even harder The book Innovators Dilemma and its sequels best CONTENTSSCENARIO ................................
Recommended publications
  • Iot Mag April May 2017.Qxp Layout 1
    IoT Now: ISSN 2397-2793 APRIL/MAY 2017 • VOLUME 7 • ISSUE 2 TALKING HEADS Aeris CTO explains why IoT needs and deserves to have security by design INSIDE: The Enterprise Buyer's Guide – Which IoT Platform 2017 SECURE IoT SMART ENERGY INDUSTRIAL IoT TRANSPORT IoT GLOBAL NETWORK How to address the New efficiency for living, The new interconnected Connections for a Log on at growing threat. See our working and playing. manufacturing environment. moving industry. www.iotglobalnetwork.com Analyst Report at See our Analyst Report at See our Analyst Report at Read our exclusive Analyst to discover our new portal for www.iot-now.com www.iot-now.com www.iot-now.com Report inside this issue products, services and insight PLUS: 18 PAGE TRANSPORT INSIGHT REPORT: Unlimit CEO says IoT success in India means focusing on the long tail • HMS Industrial Networks on why it's time to skip the scary stories and focus on what's needed to secure manufacturing IoT • Geolocation in the Port of Barcelona with Actility • AT&T on why IoT platforms must address organisations’ different needs for functionality• Inside Digicel's deployment of Stream Technologies' IoT-X platform with added Starhome Mach technologies in 33 M2M markets • How Vodafone connectivity helps precision manufacturer ensure maximum uptime for machines • News at www.iot-now.com Get to market faster with IoT services 7RƫQGRXWPRUHQRNLDFRPLRW CONTENTS IoT NOW 10 ANALYST 27 TALKING HEADS REPORT 16 50 SECURITY IoT PLATFORMS INTERVIEW TO WATCH IN THIS ISSUE 20 CASE STUDY 58 COMPANY PROFILE Inside Actility,
    [Show full text]
  • Accelerated AC Contingency Calculation on Commodity Multi
    1 Accelerated AC Contingency Calculation on Commodity Multi-core SIMD CPUs Tao Cui, Student Member, IEEE, Rui Yang, Student Member, IEEE, Gabriela Hug, Member, IEEE, Franz Franchetti, Member, IEEE Abstract—Multi-core CPUs with multiple levels of parallelism In the computing industry, the performance capability of (i.e. data level, instruction level and task/core level) have become the computing platform has been growing rapidly in the last the mainstream CPUs for commodity computing systems. Based several decades at a roughly exponential rate [3]. The recent on the multi-core CPUs, in this paper we developed a high performance computing framework for AC contingency calcula- mainstream commodity CPUs enable us to build inexpensive tion (ACCC) to fully utilize the computing power of commodity computing systems with similar computational power as the systems for online and real time applications. Using Woodbury supercomputers just ten years ago. However, these advances in matrix identity based compensation method, we transform and hardware performance result from the increasing complexity pack multiple contingency cases of different outages into a of the computer architecture and they actually increase the dif- fine grained vectorized data parallel programming model. We implement the data parallel programming model using SIMD ficulty of fully utilizing the available computational power for instruction extension on x86 CPUs, therefore, fully taking advan- a specific application [4]. This paper focuses on fully utilizing tages of the CPU core with SIMD floating point capability. We the computing power of modern CPUs by code optimization also implement a thread pool scheduler for ACCC on multi-core and parallelization for specific hardware, enabling the real- CPUs which automatically balances the computing loads across time complete ACCC application for practical power grids on CPU cores to fully utilize the multi-core capability.
    [Show full text]
  • Extended Resources
    Generalization & Democratization of Artificial Intelligence & Machine Learning Extended Resources 1. This TEDxTalk, given by Dr. Ben Goertzel, illustrates some of the most pressing issues of artificial intelligence in today’s world. Dr. Goertzel, CEO of SingularityNET, details the importance of advancing and improving the human experience through a decentralized platform of artificial agents which may ultimately lead to the “singularity” of artificial general intelligence. 2. https://www.youtube.com/watch?v=r4manxX5U-0 3. Fig. 1.1: Agent Interaction. Montes, G. A., & Goertzel, B. (2019). Retrieved October 7, 2020. 4. Fig 1.2: Silo Based Decision Tree Model. Schofield, M., & Thielscher, M., (2019). Retrieved October 15, 2020. 5. Fig 1.3: Conceptual Model For Simulated Recall. Nadji-Tehrani, M., & Eslami, A. (2020). Retrieved October 15, 2020. 6. Fig. 1.4: Basic Neural Network. Zhou, V. (2019, March 3). Retrieved October, 13, 2020. 7. Another TEDxTalk, given by Karen Hao, details the catastrophic effects of artificial intelligence including: deep fakes, job-search discrimination, facial recognition, etc. Hao details the historical success of the improvement in car safety through the adoption and regulation of seatbelts and uses this example to show how the development of AI is outpacing its regulation. Hao proposes that regulation and the evaluation of the technology's impact should happen before the technology is released instead of after. a. https://www.youtube.com/watch?v=D28aL_5LH2Q 8. Podcast conversation discussing artificial general intelligence between Dr. Lex Fridman (MIT) and Dr. Ilya Sutskever (OpenAI). The discussion is around the current AI technologies that have seen advancements toward and possible next steps of technology needed to achieve AGI.
    [Show full text]
  • CMMN Modeling of the Risk Management Process Extended Abstract
    CMMN modeling of the risk management process Extended abstract Tiago Barros Ferreira Instituto Superior Técnico [email protected] ABSTRACT Enterprise Risk Management (ERM) is thus a very important activity to support the Risk management is a development activity and achievement of the organizations' goals. increasingly plays a crucial role in Risk management is defined as “coordinated organization´s management. Being very activities to direct and control an organization valuable for organizations, they develop and with regard to risk” [1]. ERM, as a risk implement enterprise risk management management activity, comprises the strategies that improve their business model identification of the potential events in the whole and bring them better results. Enterprise risk organization that can affect the objectives, the management strategies are based on the respective risk appetite, and thus, with implementation of a risk management process reasonable assurance, the fulfillment of the and supporting structure. Together, this process organization's goals [2]. and structure form a framework. ISO 31000 Many organizations nowadays have their standard is currently the main global reference risk management framework, including framework for risk management, proposing the activities to identify their risks, and their general principles and guidelines for risk prevention measures, documented. To this end, management, regardless of context. The most [1] is at this moment the main reference for risk recent revision of the standard ISO 31000:2018 management frameworks, proposing the [1] depicts the process of risk management as general principles and guidelines for risk a case rather than a sequential process. To that management, regardless of their context.
    [Show full text]
  • Deliverable D7.5: Standards and Methodologies Big Data Guidance
    Project acronym: BYTE Project title: Big data roadmap and cross-disciplinarY community for addressing socieTal Externalities Grant number: 619551 Programme: Seventh Framework Programme for ICT Objective: ICT-2013.4.2 Scalable data analytics Contract type: Co-ordination and Support Action Start date of project: 01 March 2014 Duration: 36 months Website: www.byte-project.eu Deliverable D7.5: Standards and methodologies big data guidance Author(s): Jarl Magnusson, DNV GL AS Erik Stensrud, DNV GL AS Tore Hartvigsen, DNV GL AS Lorenzo Bigagli, National Research Council of Italy Dissemination level: Public Deliverable type: Final Version: 1.1 Submission date: 26 July 2017 Table of Contents Preface ......................................................................................................................................... 3 Task 7.5 Description ............................................................................................................... 3 Executive summary ..................................................................................................................... 4 1 Introduction ......................................................................................................................... 5 2 Big Data Standards Organizations ...................................................................................... 6 3 Big Data Standards ............................................................................................................. 8 4 Big Data Quality Standards .............................................................................................
    [Show full text]
  • A Quick Guide to Responsive Web Development Using Bootstrap 3
    STEP BY STEP BOOTSTRAP 3: A QUICK GUIDE TO RESPONSIVE WEB DEVELOPMENT USING BOOTSTRAP 3 Author: Riwanto Megosinarso Number of Pages: 236 pages Published Date: 22 May 2014 Publisher: Createspace Independent Publishing Platform Publication Country: United States Language: English ISBN: 9781499655629 DOWNLOAD: STEP BY STEP BOOTSTRAP 3: A QUICK GUIDE TO RESPONSIVE WEB DEVELOPMENT USING BOOTSTRAP 3 Step by Step Bootstrap 3: A Quick Guide to Responsive Web Development Using Bootstrap 3 PDF Book Written by a team of noted teaching experts led by award-winning Texas-based author Dr. Today we knowthat many other factors in?uence the well- functioning of a computer system. Rossi, M. Answers to selected exercises and a list of commonly used words are provided at the back of the book. He demonstrates how the most dynamic and effective people - from CEOs to film-makers to software entrepreneurs - deploy them. The chapters in this volume illustrate how learning scientists, assessment experts, learning technologists, and domain experts can work together in an integrated effort to develop learning environments centered on challenge-based instruction, with major support from technology. This continues to be the only book that brings together all of the steps involved in communicating findings based on multivariate analysis - finding data, creating variables, estimating statistical models, calculating overall effects, organizing ideas, designing tables and charts, and writing prose - in a single volume. Step by Step Bootstrap 3: A Quick Guide to Responsive Web Development Using Bootstrap 3 Writer The Dreams Our Stuff is Made Of: How Science Fiction conquered the WorldAdvance Praise ""What a treasure house is this book.
    [Show full text]
  • EMSCLOUD - an Evaluative Model of Cloud Services Cloud Service Management
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/277022271 EMSCLOUD - An evaluative model of cloud services cloud service management Conference Paper · May 2015 DOI: 10.1109/INTECH.2015.7173479 CITATION READS 1 146 2 authors, including: Mehran Misaghi Sociedade Educacional de Santa Catarina (… 56 PUBLICATIONS 14 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, Available from: Mehran Misaghi letting you access and read them immediately. Retrieved on: 05 July 2016 Fifth international conference on Innovative Computing Technology (INTECH 2015) EMSCLOUD – An Evaluative Model of Cloud Services Cloud service management Leila Regina Techio Mehran Misaghi Post-Graduate Program in Production Engineering Post-Graduate Program in Production Engineering UNISOCIESC UNISOCIESC Joinville – SC, Brazil Joinville – SC, Brazil [email protected] [email protected] Abstract— Cloud computing is considered a paradigm both data repository. There are challenges to be overcome in technology and business. Its widespread adoption is an relation to internal and external risks related to information increasingly effective trend. However, the lack of quality metrics security area, such as virtualization, SLA (Service Level and audit of services offered in the cloud slows its use, and it Agreement), reliability, availability, privacy and integrity [2]. stimulates the increase in focused discussions with the adaptation of existing standards in management services for cloud services The benefits presented by cloud computing, such as offered. This article describes the EMSCloud, that is an Evaluative Model of Cloud Services following interoperability increased scalability, high performance, high availability and standards, risk management and audit of cloud IT services.
    [Show full text]
  • International Standard Iso 19600:2014(E)
    This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-918326 INTERNATIONAL ISO STANDARD 19600 First edition 2014-12-15 Compliance management systems — Guidelines Systèmes de management de la conformité — Lignes directrices Reference number ISO 19600:2014(E) © ISO 2014 This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-918326 ISO 19600:2014(E) COPYRIGHT PROTECTED DOCUMENT © ISO 2014 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of the requester. ISOTel. copyright+ 41 22 749 office 01 11 Case postale 56 • CH-1211 Geneva 20 FaxWeb + www.iso.org 41 22 749 09 47 E-mail [email protected] Published in Switzerland ii © ISO 2014 – All rights reserved This preview is downloaded from www.sis.se. Buy the entire standard via https://www.sis.se/std-918326 ISO 19600:2014(E) Contents Page Foreword ........................................................................................................................................................................................................................................iv Introduction ..................................................................................................................................................................................................................................v
    [Show full text]
  • Master Glossary
    Master Glossary Term Definition Course Appearances 12-Factor App Design A methodology for building modern, scalable, maintainable software-as-a-service Continuous Delivery applications. Architecture 2-Factor or 2-Step Two-Factor Authentication, also known as 2FA or TFA or Two-Step Authentication is DevSecOps Engineering Authentication when a user provides two authentication factors; usually firstly a password and then a second layer of verification such as a code texted to their device, shared secret, physical token or biometrics. A/B Testing Deploy different versions of an EUT to different customers and let the customer Continuous Delivery feedback determine which is best. Architecture A3 Problem Solving A structured problem-solving approach that uses a lean tool called the A3 DevOps Foundation Problem-Solving Report. The term "A3" represents the paper size historically used for the report (a size roughly equivalent to 11" x 17"). Acceptance of a The "A" in the Magic Equation that represents acceptance by stakeholders. DevOps Leader Solution Access Management Granting an authenticated identity access to an authorized resource (e.g., data, DevSecOps Engineering service, environment) based on defined criteria (e.g., a mapped role), while preventing an unauthorized identity access to a resource. Access Provisioning Access provisioning is the process of coordinating the creation of user accounts, e-mail DevSecOps Engineering authorizations in the form of rules and roles, and other tasks such as provisioning of physical resources associated with enabling new users to systems or environments. Administration Testing The purpose of the test is to determine if an End User Test (EUT) is able to process Continuous Delivery administration tasks as expected.
    [Show full text]
  • Mitcnc Tech Conference 
    MIT CLUB OF NORTHERN CALIFORNIA MENS ET MANUS + MACHINES The Future of AI MITCNC TECH CONFERENCE REDWOOD CITY – MARCH , CONFERENCE DETAILS www.mitcnc.org/techconference2017 Discover The Untapped Opportunities of Applied AI AI trailblazers, machine learning experts, forward thinking uncover AI's limitations and untapped opportunities and executives, data scientists, and product and engineering anticipate how AI will change the business landscape. innovators will gather at the MITCNC The Future of AI Conference – Mens Et Manus + Machines – (Mind Don’t miss this business changing opportunity to connect and Hands + Machines) to share how to build with 500 AI founders, execs, and decision makers over an real-world AI solutions as well as discuss the impact of AI action-packed day of unparalleled networking, learning in our society and life. from those who’ve really done it, and of course, great food, generously poured drinks, and plenty of fun. Underneath all the AI hype, real breakthroughs are happening allowing AI developers to create solutions We hope you can join us at the MITCNC The Future of AI which are predictive of the needs of its users. AI and be inspired to make AI work for your business. capabilities are growing at exponential rates. We'd love to see you The MITCNC The Future of AI Conference is where cutting-edge science meets new business implementation. It's a deep dive into emerging AI techniques and technologies with a focus on how to use it in real-world implementations. You'll dissect case studies, delve into the latest
    [Show full text]
  • Chaos in Innovation and Ai
    CHAOS IN INNOVATION AND AI NEXT CHAPTER: THE AGE OF THE BOLD ONES Andreas Sjöström, CTO Digital Advisory Services Your innovation partner Next chapter: The bold ones The bold ones learn fearlessly 4 Children Sleeping Room @ #HACKFORSWEDEN Innovation is uncertainty Most are overweighted in horizon 1 From bell to shark fin: Threat and opportunity Open innovation. Open APIs. Ecosystems. Startups. Where’s the idea? What is it? Does it actually work? Chaos vs order GO Value Ideation Refinement/ Incubation Portfolio of selection future options Chaos vs order Operations Innovation Performance engine Dedicated team Efficient Unregulated Routines & rules Experiments Rational decisions Bold ideas Calculated results Unpredictable outcomes Aimed at guarding the status quo Constantly challenging the status quo Short-term goals Long-term goals Driven by the belief that current Driven by the belief that current operations keep the company alive operations will not fuel growth forever Managing fundamental tensions New types of tests Where to innovate: Design thinking and ecosystems Inspiration Book Airport Onboard Destination Platform eats product for breakfast Book flight Contextual baggage info Flight status Proactive notifications Boarding pass Seat reminder Chatbot @ SAS Biohacking Experimenting, Proof Test Smoke Test, Wow Test Two faces of AI: AI in testing. Testing AI. A human hiding behind the system “Does the system seem to be very reasonable? Does it almost seem like there’s a human hiding behind the system, interacting with me and making me feel comfortable? I get this sense that the system knows a lot about what I want and helps me get the thing that I want.
    [Show full text]
  • The Venue Join Us Hear from Infrastructure Insiders Such As
    20 September 2018 | San Francisco, California, USA IEEE Infrastructure Conference Gain insight and inspiration to think, or re-think, your Hear from infrastructure in sessions guided by and in discussion with Infrastructure foremost experts across the technology industry. Insiders such as... Join us as we discuss big picture questions to give you overall, forward thinking insight, as well as operational nuts & bolts for maximizing your infrastructure, such as: Danny Lange | Unity Technologies » Understanding the evolving role of AI to automate, address complex Vice President of AI and Machine challenges, and improve overall productivity and customer experience Learning » Leveraging systems, services design, and operational management in scale Benjamin Treynor Sloss | Google » Managing failures and lessons learned using real-world scenarios Vice President of Engineering and examples » Assessing trust models in your system paradigms » Addressing the engineering culture and customer experience Let's learn from each other, tell our stories, and create a The Venue community and network that we can trust and reach out to when needed. Step away from your daily routine and join us at San What Makes this Conference Different Francisco’s Terra Gallery for the day. The open space encourages » Designed for and by practitioners, with speakers who have all led, managed or built large infrastructures themselves collaboration and networking, while also inspiring innovation. » An intimate, neutral environment for networking and learning with leaders from top technology companies Terra Gallery » Convened by IEEE, the world's largest technical professional association 51 Harrison Street dedicated to advancing technology for the benefit of humanity San Francisco, CA 94105 Topics include: » Artificial Intelligence & Machine Learning » Storage & Data » Micro-services & Programming Models Join Us » Security & Trust » Linux & System Management Registration is open for » Scalability & Reliability 2018 IEEE Infrastructure.
    [Show full text]