Keynote Speakers
K1: Bill St Arnaud - CANARIE Inc

Bio: Bill St. Arnaud is Chief Research Officer for CANARIE Inc., Canada's Advanced Internet Development Organization. He is involved in various activities related to next generation Internet, cyber-infrastructure and Green Broadband/IT. For more complete details please see his blog

  Title: Saving the Planet at the Speed of Light - How R&E Networks Can Help Reduce Global Warming
Abstract: One of the greatest threats to our future society and economy is global warming.  It is estimated that the ICT industry alone produces as much CO2 as the entire output of the entire aviation industry. University researchers are now an increasingly major contributor to these CO2 emissions because of the demand for new cyber-infrastructure equipment which is essential to the future of scientific discovery. As a result some universities and R&E networks are starting to explore new types of computational and network architectures that not only benefit eScience but also reduces CO2 emissions. Optical high speed research networks and distributed zero carbon cyber-infrastructure data centers with web services and grids will be a critical component of this architecture.  These developments have the potential of creating new revenue opportunities for R&E networks and their associated members through carbon offset trading. Since consumers control or influence 60% of all CO2 emissions, universities and R&E networks can help pioneer programs to encourage students and faculty to reduce their personal carbon footprint through trading “bits and bandwidth for carbon” such as offering free eProducts such as eTextbooks, eMusic etc (which almost have a zero carbon footprint) as a reward mechanism to those who reduce their personal CO2 output in other activities.  Carbon rewards may be more effective than carbon taxes in modifying consumer behaviour.
K2: Lindy McKeown - Glia Pty Ltd

Lindy McKeown

Bio: Lindy McKeown has been developing online learning communities for professional development since 1994 and using computers in education since 1980. Lindy has worked with educational organisations across all the states and territories of Australia, the UK, the USA and New Zealand to integrate technology into professional and corporate learning, academic programs and school education.

In the last 2 years she has specialised in the use of 3D virtual worlds and works extensively in Second Life where she is known as "Decka Mah". She has her own consultancy, Glia Pty. Ltd., specialising in the application of online technologies for professional learning and corporate training and communication. Her current clients include Xerox and the University of Southern Queensland. She is a leader in the use of Action Learning in both face-to-face and online settings.

Lindy is currently completing a Ph.D. conducting ground-breaking research into the design of a purpose-built 3D online virtual world environment for teacher professional development. In recognition of the value of this research to the wider adult learning community, Lindy is the recipient of a Smart State PhD Grant which is helping to support this research. In acknowledgment of her extensive work with educators, Lindy is the 2006 recipient of the state, national and international Outstanding Leader of the Year Award for the use of Information Technology in Education.  She was highly commended in the Queensland Smart State Smart Women Awards in 2007 in the Postgraduate Students - Information and Communication Technology category.

Title: Beyond the Web - Jacked into the mesh through virtual worlds

Abstract: Over the last few years an almost overwhelming number of social networking tools and virtual worlds have emerged not merely technically, but socially into the fabric of the communications mesh. So many devices have joined the desktop and laptop as tools to “jack in”. Social networking has become knowledge networking for professionals and students. It is not uncommon to be simultaneously in multiple places and events and conversations across multiple realities. Networks allow members to do more than just link to their other networks; they have tools to allow direct communication between them. You can merge your collections and communities and input data manually or automatically from phones, sensors, Global Positioning Systems, buildings, cameras, home appliances, PDAs as well as computers. The challenge to the institution or organisation is to safely allow access to virtual worlds that are swiftly becoming essential and continuous elements of the social, educational and professional identity, blurring the distinctions between learning, work and play; physical and virtual; local and remote; reality and imagination.

K3: Amol Mitra - ProCurve Networking by HP
Amol Mitra

Bio: Amol Mitra is ProCurve Networking’s Director of Marketing for Asia Pacific and Japan based in Singapore.  He leads ProCurve’s market development, product marketing, press and analyst relations and marketing communications, and is responsible for the strategy to drive significant growth for ProCurve in the coming years in the world’s fastest growing region.

Prior to this, Mitra was ProCurve’s Director of Worldwide Product Marketing based in the US. A network protocol (TCP/IP, IPX) expert, Mitra holds several patents on developing cutting edge technology in the network switching area. Mitra has delivered several technology and business achievements including the innovation, introduction and development of several flagship products. He also championed ProCurve’s entry into the wireless and security technology space, as well as helped in developing ProCurve’s 21st century Adaptive Network Vision. Mitra is also instrumental in ProCurve securing the No. 2 position in the enterprise networking switch market. 

Mitra joined HP in 1993 and has more than 15 years of experience in the data networking and network storage industry.  Throughout his career, he has held numerous top-level executive management positions at HP including Product Marketing Manager for HP’s Network Storage Business, R&D Software Development Manager and Asia Pacific Market Development Manager for HP’s data communication business.

He was instrumental in driving revenue and profitability for HP's router and switch businesses. He also led the marketing efforts for HP’s “Storage on Ethernet” initiative while managing a geographically dispersed team of individuals and partners working on the adoption of the iSCSI technology.

Mitra holds a B.S. degree in Computer Science from M.S. University, India; a Masters degree in Computer Science from Purdue University and a M.B.A. from the University of California, Davis.

Title: The Power of an Information Driven Business Organization

Abstract: We are in the midst of a multi-decade transformation in the way business information is recorded and archived.  Information has always represented one of the soft assets of most businesses. Your customer lists, your engineering documentation, your business strategy, your financial reports are all examples of information assets which businesses have used for the last several hundred years. But two vectors of information management have been changing for the last thirty years. In 1977, almost all information assets of modern businesses were in hardcopy format. General ledgers were really books. CRM (customer relationship management) was maintained in a notebook that your sales representatives carried around and your engineering drawings were literally drawings on vellum. In addition, information was costly to acquire and difficult to extract. Research was commissioned on a case by case basis and data was extracted manually by sharp eyed analysts. Needless to say, we have come a long way from that world in 30 years.

Business information is now so ubiquitous, so efficient and accessible that the concept of an Information Driven organization has begun to be formed. In twenty years, businesses will have to demonstrate the characteristics of an information driven organization or they will be unable to compete anywhere, but in the most reclusive markets. 

In this information driven organization, whether you are running a university, a factory, a customer service center or government agency, you and your workforce are supported by efficiently culled and precisely accurate information. And while the standard of efficiency has risen around the globe, it is those businesses that demonstrate leadership by embracing these models which will reap the lion's share of the benefits of this highly competitive vision.

An Information Driven Organization is quite simply an organization where all of the critical processes and measures are instrumented so that important performance information is automatically captured and retained. In addition, this information is effortlessly put into the hands of the key decision makers so they can make precise and rapid decisions which optimize organization productivity. Twenty years from today, the dominant players in universities, factories, customer service and government agencies will be Information Driven Organizations. 

Achieving the goal of becoming an information driven organization should be extremely compelling for any entity.  Because the information driven organization both automates and focuses its data gathering on critical business processes, efficiencies can be realized by streamlining processes and measurement activities. At the same time, when one achieves this objective, the critical information is put instantaneously into the hands of those making key decisions and running fundamental business processes, so unparalleled levels of productivity can be achieved. Decision making is rarely reversed, can be empowered to very low levels in the organization and is consistent from one individual to the next. As an end result, information driven organizations will consistently out perform all competitors despite workforce turn over, changes in business priorities and new market demands.

K4: Thomas DeFanti - University of California, San Diego (UCSD)
Tom DeFanti

Bio: Thomas DeFanti, PhD, is a research scientist at the California Institute for Telecommunications and Information Technology (Calit2) at the University of California, San Diego (UCSD), is a founder and co-director of the Electronic Visualization Laboratory (EVL) at the University of Illinois at Chicago and is co-creator, with Dan Sandin, of the CAVE™ virtual reality theatre.

Tom is principal investigator of the US National Science Foundation's (NSF) International Research Network Connections Program's TransLight/StarLight award, and was previously principal investigator of the NSF-funded EuroLink and STAR TAP/StarLight initiatives. He is also a co-principal investigator of the NSF-funded OptIPuter project. He was one of several American technical advisors to the G7 GIBN activity in 1995, is a founding member of the Global Lambda Integrated Facility (GLIF), is a founding member of CineGrid, and is a member of the GigaPort/SURFnet Scientific Advisory Committee.

Tom has served as an officer of the ACM SIGGRAPH organization and has been very active in ACM SIGGRAPH and ACM/IEEE Supercomputing conferences. He also co-created and co-chaired the international grid (iGrid) Workshops. In recognition of his services to UIC and the community at large, DeFanti was recognized as an ACM Fellow in 1994, and is the recipient of the 1988 ACM Outstanding Contribution Award, the 1989 UIC University Scholar Award, and the 2000 ACM SIGGRAPH Outstanding Service Award.
Title: The UCSD/Calit2 GreenLight Project
Abstract: The Information Technology (IT) industry has recently been estimated to have the same carbon footprint (that is, energy consumption) as the airline industry.  Airlines have invested heavily for decades in more efficient engines, lighter airplanes and optimized scheduling to save energy consumption. Meanwhile, the energy usage per compute server rack has grown from about 2 KW/rack in 2000 to an estimated 30 KW/rack in 2010, to the point where the cooling and power issues are now a major factor in system design.  In the last several years, the IT industry has begun to develop new strategies for “greening” traditional data centers, yet the physical reality of modern campus CyberInfrastructure (CI) is a complex network of ad hoc and sub-optimal energy environments in departmental facilities. But because the value of computational and data-intensive approaches to research is increasingly embraced, this number of departmental facilities is swelling fast and creating campus-wide crises of space, power, and cooling. 

The UCSD GreenLight Project will enable 5 communities of application scientists, drawn from metagenomics, ocean observing, microscopy, bioinformatics, and the digital media, to come to understand, through instrumentation, how to measure and then minimize energy consumption, to make use of novel energy/cooling sources coming online at UCSD, and employ middleware that automates optimal choice of compute/power strategies. This will enable domain application researchers to continue to exploit the exponential improvements in silicon technology, and compete globally. The GreenLight Project is being led by the California Institute for Telecommunications and Information Technology (Calit2).

Computing clusters, truthfully inconvenient and energy-inefficient as now found in users’ labs, can be resituated in pre-fabricated campus “machine rooms” where detailed measurements of energy efficiency can be made, but with the clusters still operated by their virtual “owners” remotely from their labs. Unfortunately, almost nothing is known about how to make these shared virtual clusters energy efficient, since there has been no financial motivation to do so. How can better power efficiency configurations and deeper architectures be researched and discovered? What can/should one teach the next generation of engineers who must scale from an education in Computer Science (CS) to a deep understanding in engineering physics, or vice-versa? As a step, a full-scale virtualized device, the GreenLight Instrument, will be developed to measure, monitor, and make publicly available, via service-oriented architecture methodology, real-time sensor outputs, thus allowing researchers anywhere to study the energy cost of at-scale scientific computing.

This Instrument will enable an experienced team of CS researchers to make deep and quantitative explorations in advanced computer architectures, including alternative circuit fabrics such as Field-Programmable Gate Arrays, direct-graph execution machines, graphics processors, solid-state disks, and photonic networking. The enabled computing and systems research will yield new quantitative data to support engineering judgments on comparative “computational work per watt” across full-scale applications running on at-scale computing platforms. This will help re-define fundamentals of systems engineering for green CI, a transformative concept. Because key private sector CI providers are also involved, the Instrument will also have a direct impact on commercial components of the nation’s CI. The GreenLight Instrument will produce new data, available to everyone on-line and archived, to enable deep investigation into energy efficient computing and storage for the next decade and beyond.

The keynote will also discuss UCSD’s plans for a megawatt-scale solar energy facility and an initial study of La Jolla underwater trench that suggests a seawater cooling system could produce savings of $4M/yr and 100 million gallons of fresh water per year. These initiatives, coupled with the GreenLight Instrument, will help reduce the expanding carbon footprint of computation at UCSD.
K5: Jean Turgeon - Nortel
Jean Turgeon

Bio: Jean Turgeon has 23 years of experience with inter-networking designs and implementation with both global service providers and Enterprise customers. Jean has also completed his Executive MBA at the University of Ottawa to add to his vast experience and current qualifications.

Prior to joining Nortel via the Bay Networks acquisition, he was at Ameridata & Bell Technical services as a Senior Network Architect and Advanced Technical Instructor. Jean has experience in Research and development, marketing, support, training, sales and management. His recent activities at Nortel as part of the Enterprise CTO office have been focusing on working closely with product development teams and global customers in delivering highly reliable, scalable and secure Enterprise converged solutions.


Abstract: The intense power requirements needed to run and cool datacenters now account for almost a quarter of global carbon dioxide emissions from ICT, according to analyst firm Gartner

Reducing energy consumption is an objective on business managers’ agendas around the globe. But what is the best way to start? In this presentation, we aim to give education decision-makers an understanding of possible new lower cost designs for the data center in addition to reducing energy consumption and BTU emissions while meeting your new data center network requirements such as resiliency and security.

Let’s begin with a simple example that has been validated in a third-party lab that gives substance to the claim Nortel has made — that achieving energy efficiency is as easy as changing a light bulb  without compromising your business requirements. 

By implementing basic energy consumption models Education IT professionals are able to achieve energy reductions of up to 50 percent following the recommended model.
K6: Bill Caelli - International Information Security Consultants

Bio: Professor Bill Caelli, AO has over 45 years experience in the ICT industry in Australia and globally. This has included over 35 years in all aspects of information security. He has worked with large international IT companies, national and international public and private sector clients and with universities as a leading academic including as the head of the School of Data Communications at QUT for many years. This was a pioneering activity in data network education and research. He was the Founding Director of QUT’s Information Security Research Centre (now incorporated into QUT’s Information Security Institute). He founded ERACOM Pty Ltd in 1979 and led it to international success in information/network security. He was made an officer in the Order of Australia in 2003.

Title: Do You Know and Trust Your Name in Cyberspace?


The naming of cats is a difficult matter,
It isn't just one of your holiday games;
You may think at first I'm mad as a hatter
When I tell you a cat must have three different names.
T S Eliot (1888-1965)

In cyberspace the identity of any entity, human or computer, and its verification by relying parties is critical. At one “end” of the line a verifier, such as a network server, attempts to authenticate a claim of identity from a “client”, another system or a human user. The verifier, or “server”, may depend upon a human claimant, for example, using one or more of the usual three identity parameters: the “what you know, possess or are” tests. Moreover, that human user is really just authorising a computer process to act for him or her! At the other “end”, that same “client”, and that could be a human or any automated process, must check that the verifier or “server” is what is expected, e.g. the system at the address that has been connected to is verifiably correct. The two parties have participated in a game of mutual claim of identity and verification of claim, if they can.

In a technical sense, there are now two distinct factors emerging that severely disrupt this process. For the first factor the client fears the threat of “identity theft” from unsafe use of a computer system attached to the global Internet.  Simultaneously the server cannot rely upon any claims made. For example, social networking has completely rendered the “what you know” test virtually useless. Passwords, PINs, “question and answer” sessions with family or business “secrets” and the like are no longer valid as human users simply give up all aspects of their lives to online systems and services in cyberspace for anyone to examine and use. Moreover, that “channel” between the claimant and verifier, which by definition must be totally trusted, is now broken as the end user employs a hopelessly compromised workstation, or the like to make any claim.

With the second factor the claimant, human or machine, has depended upon some naming and addressing system within the global Internet to make connection. This is now almost universally done in cyberspace via the DNS, or “Domain Name System”. However, the reliability and security of this system has been challenged not only at its roots but also in its practical usage on a day to day basis. DNS “cache poisoning” is a reality and the client just cannot be sure that a sought address and connection is valid.  The situation is radically different to the earlier “circuit switching” environment with trusted telephone “exchanges”. The secure version of DNS, so-called DNSSec, has simply not gained widespread usage even with IPv6 networks, while clients depend upon URLs in all forms for reliable connection, even if those URLs, have been obtained via untrusted services, such as by use of a “search engine”. 

New paradigms are needed for both the “client” and the “server”.  The real security problems are in the “nodes” that serve cyberspace, rather than in the “wires” themselves. Computer operating systems, such as “Secure Linux (SELinux)”, from the USA’s National Security Agency or NSA, now incorporated into a number of Linux distributions, point the way forward with enforced and reliable “labelling” of all entities involved.