Mark Alan UnderwoodSynchrony Financial · Information Security
Mark Alan Underwood
About
16
Publications
22,916
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
199
Citations
Publications
Publications (16)
Implementations of metadata tend to favor centralized, static metadata. This depiction is at variance with the past decade of focus on big data, cloud native architectures and streaming platforms. Big data velocity can demand a correspondingly dynamic view of metadata. These trends, which include DevOps, CI/CD, DataOps and data fabric, are surveyed...
This paper describes IEEE P7001, a new draft standard on transparency of autonomous systems 1 . In the paper, we outline the development and structure of the draft standard. We present the rationale for transparency as a measurable, testable property. We outline five stakeholder groups: users, the general public and bystanders, safety certification...
DevOps is a cultural change for team members. However it is often forgotten that management concepts throughout the Software Development Life Cycle (SDLC) must also change. Organization level adoption of DevOps is required in order to support the process of culture change. Processes required to support DevOps should be divided into Organisational a...
The knowledge pipeline needs to be established to constantly generate content that captures not only the know-how of cross-domain aspects, but also know why. Know-why is important for the employees to get clarity and facilitate the creation of trust amongst employees to foster collaboration. In such environment organization experience a high degree...
Ontologies and related reasoning systems are key to the facilitation of semantic integration and interoperability. But several key questions are involved. How do we define the tools, methodologies and frameworks which support this interoperability? What is required to achieve optimal performance across applications and domains? How do we frame the...
Intranets are almost as old as the concept of a web site. More than twenty-five years ago the text Business Data Communications closed with a discussion of intranets (Stallings, 1990). Underlying technology improvements in intranets have been incremental; intranets were never seen as killer developments. Yet the popularity of Online Social Networks...
Some Internet of Things (IoT) subsystems will be far less robust than others. Systems that rely on these sensors require considerable knowledge about the sensors, their calibration, test conditions, manufacturers' recommended maintenance procedures. Despite the drive toward increased dataset variety, and while Big Data has had a correspondingly lar...
This paper is co-authored by an informal group of experts from a broad range of backgrounds all of whom are active in standards groups, consortia and/or alliances in the Internet of Things (IoT) space.
The ambition is to create mindshare on approaches to semantic interoperability and to actively encourage consensus building on what the co-authors r...
Effective, less costly just-in-time workplace courseware remains elusive. Given limited instructional design resources, alternatives integrated with day-to-day knowledge work processes hold promise. An innovative approach incorporates Domain Specific Language (DSL) technologies to harness already available enterprise design, production, planning, E...
Error messages matter. They can be public as this photo by Christopher Kimball shows. A reliance on search engines within developer communities reveals an interesting fact: phrases associated with common error conditions are frequently submitted to a search engine for lookup. In fact, entire web sites are devoted to performing root cause analysis f...
There has been increased awareness in recent years of the high cost of non-hardware items in the Federal ADP budget in contrast with decreasing costs for much of the hardware. More attention is being given to software development costs, systems design practices, automatic program testing, and the like. Particular commercial and military systems eff...
By definition, network defenders must prepare for the latest attacks on the latest software running on the newest network topologies. Network product lifecycles shorten, and simulations are expected to incorporate the latest devices, protocols, and network management tools. This has been the authors' experience with SimBLEND, a 3D game-based framew...
Questions
Questions (2)
I work in related SDOs
Background on the proposal from the NYT story: http://nyti.ms/1aJQqWp