The Ninth China big data technology conference was held in Beijing in December 2015 10-12. 16 sub forum contains database, the depth of learning, recommendation systems, security and other six major technology forum, finance, manufacturing industry, transportation, travel, Internet, medical and health, education and other 7 Application Forum and the three hot issues forum. [detailed]
Promote the development of large data platform to drive industry ecology, the depth of the analysis to promote the application of large data intelligence, visualization to promote the popularization of large data. Data management authority and data sovereignty concern, the Internet, finance, health to maintain heat, smart city, enterprise data, industrial data is a new growth point. Open source, evaluation, competition spawned a healthy talent and technology ecology, but the big data security and privacy worrying. [detailed]
December 11th special forum
December 12th Special Forum
The greatest advantage of data for decision analysis, in fact, is behind a kind of Internet service system, so a extended to more people's livelihood areas, such as health data, health care service system, the packaging capacity in the back, in front of the need to the system ontology is a people with a good interface, let people very good use. [detailed]
On big data currently in the industry and landing areas of difficulty, branch DNT to trying to do, the idea is as many as possible with existing business data are combined, allow customers to smooth the transition to the new large data business model. [detailed]
Jingdong large data platform to support Jingdong orders, businesses, proprietary trading, warehousing, distribution, customer service, finance and o2o across all business, mainly to complete access, storage, computing the three basic work, based on Hadoop offline data platform JDW and Kafka, storm of real-time data platform JRDW. [detailed]
In a private cloud and data center, due to the increase in the number of machines, hardware equipment damage is inevitable, the energy consumption will become users a lot of expenditure, based on generic x86 server of cluster and the horizontal expansion it cloud architectures exist many problems which need to users to face. In this regard, IBM based on Power 8 technology to make the product significantly improved efficiency. [detailed]
Data processing market can be divided into three blocks, trading market, analysis of data, unstructured data, the three pieces of transaction type may be accounted for one third, type analysis accounted for more than a third, looking at the market the development of future Hadoop will completely replace the market analysis, because the former today's performance, function slowly began to surpass the latter node is probably in 2018, and data warehouse will also big change. [detailed]
The traditional big data companies past always blindly stressed can handle much data, achieve what kind of performance, seldom pay attention to these data really can give customers to provide much of the value, only the amount of data processing is truly revolutionary, slightly concerned about the data is can not let these data automatically for the user to provide wisdom, for the user to solve real problems. [detailed]
In the traditional industries, the financial industry with the Internet big data applications are smaller, mainly people's digital. The financial industry to use big data early historical data query, but now they are also as Internet companies, using a variety of information to the digital behavior, and on the label, so as to realize the marketing, credit, risk assessment, really do use data, so that the value of the data. [detailed]
17:10BDTC 2015 plenary session of the last speech from the United States Michigan State University professor Jin Rong, his speech topic is machine learning - so that the big data can not be changed into possible". During his speech. He first noted the current machine learning are the main challenges -- the amount of data and high dimensional data, then he on the random algorithm, random projection, dual random projection were introduced in detail. And in his speech finally prospects, mainly includes three aspects: theorem of Impossibility exist in a variety of random machine learning methods; research and development of new theories and methods to improve the lower bound of the stochastic method; application of these improved stochastic machine learning methods. [details]
16:45Cloudera company R & D engineers, Kudu inventor Lipcon Todd brings the theme of the speech is "for Fast Kudu:Storage Analytics on fast Data". Lipcon Todd is also a member of Hadoop, HBASE and other projects. He said the kudu is a new storage engine, the motivation of the R & D project is to solve HBase, etc. These can not balance between high performance analysis and update, Todd Lipcon introduced in detail kudu how to simplify the construction of analytic application architecture, how to improve the performance analysis, on the other, he invited the millet company, an engineer for his support and demonstration kudu above effect in practical application. [details]
16:10Star ring technology, founder and CTO of sun Yuanhao firstly introduces the problems faced by the traditional data warehouse: the amount of data is growing too fast, resulting in a decrease in the operational efficiency; data extraction and processing costs are too high, not in view of the unified processing; unable to deal with a variety of types of data; do not have to search or an association analysis to discover hidden relationships; do not have the ability of advanced data mining analysis. Subsequently, he made a detailed introduction to the characteristics of new era logic data warehouse need to have: data, computing are distributed; need to have cross query of relational databases and Hadoop data source, polymerization, and the associated operation; mixed load and multi tenant SLA management ability. In the multi tenant resource management use cases, Sun Yuanhao pointed out that the 2014 to 2015 resource scheduling framework for the dispute, Mesos and Kubernetes gradually occupy the edge, YARN is marginalized. [details]
15:35Jingdong cloud platform, the chief architect, Liu Haifeng, the Department of system technology is responsible for the name of a large memory database JIMDB: from 2014 to 2016, the theme of the speech. "Memory is the new disk", JIMDB based on redis, to memory for data storage, and its underlying technology research and development including the storage engine (dict, LSM with RAM-SSD hybrid, B + tree), replication protocol (async, sync, etc.), distribution strategy (hash and range of three parts. Over the past two years, JIMDB continued construction, has a few large memory machines, multiple data centers, 1000 + online cluster, supporting the Jingdong almost all of the business. [details]
14:55Primeton Information Technology Co., Ltd. CTO Jiao Lieyan in the era of big data of enterprise business system 3.0 "theme of the speech said the rise of big data for the core elements of Business System 3.0. The development of big data, prompted the change of business architecture. Primeton presents a new generation of Reactive architecture style architecture. Based on the reactive architecture of distributed data acquisition, based on the reactive architecture of distributed data processing, based on missing data of mass data quality control, the static and dynamic desensitization desensitization, big data metadata technology is technical highlights of the architecture. [details]
14:25China Mobile Research and development center in Suzhou general manager assistant and CTO sun Shaoling in "big data hot cold thinking" in a keynote speech said in the process of transformation of traditional enterprises in large data, usually through Bi upgrade for big data platform, organization structure transformation and internal data integration, active data acquisition three stages. At present, China Mobile has completed the first stage, the second stage has been carried out, the third stage has nascent. [details]
13:50Databricks company co-founder, spark chief architect Xin is to bring the theme of the Spark Development: review 2015, 2016 "speech outlook, he introduced the spark's goal is" unified engine across data workloads and platforms, ". When it comes to the biggest change in Spark in 2015, he felt that it should have been increased by API DataFrames. For Spark ecosystem, he said the main focus on three different directions, one is the application of the upper, two is the lower level of the environment, and the most important is the connection to the data source. [details]
13:05Gawain, academician of Chinese Academy of engineering has called the "multimedia data analysis and search on the topic, depth profiling of media data not, see not clear, can not find the three major technical challenges, and solutions are ultra efficient video coding compression problem, in video coding tools introduced scene model, obtain better coding efficiency; oriented object detection, tracking and recognition to solve the problem of pattern recognition, support ROI, GPS and multi camera Association; to large-scale visual search to solve the inter camera search problem, develop new visual descriptors standard to support effective search. McGowan said that at present, research in intelligent city media data has just begun, personal data of the study will be more challenging, we need to in all aspects of scientific data further efforts, collaborative innovation. [details]
11:30Programme planning director Xing Hai Xu in his speech first said that big data has from speculation to the enterprise application, from the pilot to production, it mainly displays in: the initial completion of the historical data concentration; semi / unstructured began to use; into the Shucang, credit, risk control and other key business; new independent organization, new service model; start attaching great importance to the training data analyst Huawei IT product line of large data solution. Then, he said, the future data will be fully and cloud fusion, the main demand is: unified platform, online and offline isomorphism; engine diversification, really open up; geographical distribution, logical and physical; service ability, and cloud binding. [details]
Xu Xinghai followed by the speaker is HUAWEI telecom software big data chief technology planning area. For future development of Huawei data platform, wave zone said Huawei hopes the effective integration of the new and traditional technologies, and this integration capability can be in between customers to quickly copy. Secondly, I hope this integration capability to curing, so that these abilities in different customers for the rapid replication. Third, Huawei hopes this platform can have a relatively complete data asset management platform, allows users to truly understand the data and the use of data. [details]
11:00Vice president of IBM, hardware systems, Greater China general manager Guo Ren sound speech focused in future cognitive load need new IT infrastructure. He first introduced the cognitive age of big data platform and data infrastructure, and Watson are the typical representatives of a cognitive age, he believes that the era of cognitive needs a new integration, to open source technology continued contribution to IBM continues to lead in the field of spark. Then, he introduced the cognitive era of IBM analysis solutions and demonstrated the cognitive computing example of IBM: innovative on power FPGA combination of CIFAR-10 Linux image classification test. [details]
10:15China Unicom Corporation informatization and e-commerce business department, deputy general manager and general structure of normal Ji'an in keynote speech share the China Unicom network communications data used in industry to explore the experience, and puts forward the technical challenges faced in the development of large data, such as the open source version of the continuous problem; solve the contradiction between the data security and data open; big data applications of multi tenant and big data platform of multi tenant management and operation. [details]
09:35Alibaba group CTO Wang Jian brought the title of the Internet, data and computing, the keynote speech. Wang Jian said that the data is to be settled down, rather than the existence of a limited value of the collection. Internet, data and computing are interdependent, not the basic value of the data on the Internet is very small, the existence of natural data, but only to be calculated in order to truly play a value. When the information can not inform the user of the world, the data can be completely described. So, let the Internet become the infrastructure, data into the production of information, computing into a public service, is about the world's innovation and creation of equality and freedom to achieve. [details]
09:15Venustech, vice president of CCF big data expert committee deputy secretary general Pan Zhuting issued the latest "2016 big data technology development trend, mainly includes: the visualization of large data driven civilians; multidisciplinary integration and the rise of scientific data; data security and privacy concern; the new hot spot into the big data processing diversification big data to improve social governance mode; and the people's livelihood and promote the development of big data applications;" action plan "to drive industrial ecology; depth analysis of large data driven intelligent application; data ownership and data sovereignty concern the Internet, financial and health keeping the heat, the wisdom of the city, the industrial enterprise data, big data is the new growth point of open source; evaluation and the birth of technology and talent ecological benign competition. Subsequently, the trend is more through 2013-2015 contrast, pointed out that China's 2016 big data development in the future from the major Internet Co, government agencies and entrepreneurs. [details]
09:10Director of the Department of computer science and engineering, Ohio State University, M. Critchfield Robert professor Zhang Xiaodong, Professor, President of the general assembly speech. He said the mankind to explore the physical and material world, a strong demand to promote performance of computer rapid development, today's big data and not on the existing physical and material world in the middle of the continuity, but a new larger and more fierce digital world come, we all live in an era full of data, all of our actions with the the digital world. [details]
09:05Researcher at the Institute of computing, CCF data experts committee secretary general Cheng Xue Qi said in his speech, he said the annual China's big data technology conference have made adequate preparations, after the end of the session of the general assembly immediately entered the stage in the preparation of the next session of the general assembly. Big data technology hot development, big data technology conference will be adhering to the technology and application of wind vane, is committed to creating a big data real creative exchange platform, and will continue to adhere to this idea. [details]
09:002015 China big data technology conference grand opening of the general assembly, general manager of China Mobile Suzhou R & D center assistant and CTO Sun Shaoling first introduced the general assembly and the guests. This session of the general assembly by the China Computer Federation (CCF) hosted hosted in the CCF data expert committee, Chinese Academy of Sciences Institute of computing technology, DNT branch in Beijing Science and Technology Co., Ltd. and CSDN, which is jointly organized by "data security, depth analysis, industry applications as the theme, poly rope data floor face challenges. [details]
08:552015 China big data technology conference (BDTC 2015) in the Chinese Academy of Sciences Institute of Computing Technology Research Institute, deputy researcher, CCF big data expert committee members under the auspices of the Commission to open. During that time, he expressed his heartfelt thanks to each of the guests.
18:00 conference will be officially opened on December 10th 9:00, please look forward to!
17:20[industrial and manufacturing data Forum] Hangzhou University of Electronic Science and technology, associate professor of computer science Wu Yifan bring "for Zhejiang province manufacturing industry data analysis: Status and challenges," the theme of the speech, he first from the economic status of Zhejiang Province launched a speech, heavier, Zhejiang Province, the proportion of the second industry, SMEs in a wide range, massive economic features, in the low-end industry mainly. Formed with regional characteristics, "one Township, one product", the development of multi industry forms of radiation integration and development of industrial clusters. However, the transformation and upgrading of the need for new technology support. Manufacturing big data is the big data generated in the field of manufacturing industry, the manufacturing industry in Zhejiang province has a large number of data industry wide, complex process and other characteristics of the enterprise.
17:10Microsoft Asia Research Institute researcher Hong Chuntao shares entitled An Efficient MXNET: and Flexible Programming Framework for Deep Learning. He introduced the program interface, system architecture, design details and so on. MXNet features: automatic derivation, less memory, flexible interface, support distributed, multi CPU. Command interface similar to Numpy, the difference is more than CPU support and parallel execution. Symbolic excuse is similar to a function. MXNet combines these two interfaces together, these two kinds of interfaces can be used. The details of the design of MXNet include: symbolic execution and automatic derivation operation depends on the engine; save memory. Among them, the operation depends on the engine, including reading, deleting, writing and sharing resources.
17:00[health and biological data Forum] health and biological data of the forum at the end of a speaker is from Shenzhen Hua Gene Research Institute Vice President Liu, he brought the topic is oriented to the precise needs of medical biological data ". How to fully collect these data and how to effectively organize and analyze these data is currently facing the challenges of the two aspects. In these two aspects, BGI do positive attempt, high-throughput, low cost of gene data acquisition platform is constructed, in birth defects, single gene disorders and cancer. In addition, BGI has established the database and related diseases research, diagnosis and treatment of help. Finally, Liu Xin summed up the big data platform they build at the same time, it will also put forward the direction of future development of biological big data platform.
16:50[industrial and manufacturing big data sub Forum] National Key Laboratory Assistant, associate professor Wang Liangyong speech theme is the process of industrial production of smart factories and intelligent manufacturing". He content and challenge from the process industry intelligent manufacturing, intelligent optimization of manufacturing and industrial big data, intelligent optimization of manufacturing systems in three aspects of the big data technology to share. Process industry plays a fundamental strategic role in the national economy, and the process of industrial production is highly efficient and green. The connotation and challenge of intelligent manufacturing for process industry, the overall requirements of innovation driven, quality first, green development, structure first, talent oriented.
16:40[big data infrastructure] in terms of big data applications, many developers may be no consideration for his evaluation criteria, especially based on the open source data systems, most developers prefer to get the technical support. Researcher from the Chinese Academy of Sciences, the Chinese Academy of Sciences, the University Professor, doctoral tutor Zhan Jianfeng to explain the BigDataBench: open source of large data base test standards". BigDataBench a from the CAS Institute of computing the dominant big data benchmark evaluation standard, currently in the international academia and industry get more extensive application.
16:15[deep learning] Huazhong University of Science and Technology Professor, deputy director of the national security engineering center, white Xiang shared title for the depth of the scene text recognition method of speech. He is mainly from the problem definition, significance and challenges, algorithms and other aspects of the share. He believes that scene text recognition refers to the scene text is converted into a computer readable programmable process. Scene text recognition can be used in product search, human-computer interaction and other aspects, the challenges faced by the color, scale, direction, font, language, background, etc..
16:10[health and biological data sub Forum] College of computer science, National University of Defense Technology Software Institute researcher Shao Liang Peng in the Tianhe supercomputer biomedical data research "theme speech are introduced in detail Tianhe supercomputer series. Tianhe No.2 has become world super count in the history of the first six times in a row to win the super computer, above the field of life science of number of users accounted for 30%, and mainly for the group learn big data, bio medicine, scientific literature big data of three kinds of life science data research. The Milky way can effectively solve the computation intensive and data intensive problems, and communication intensive three kinds of biological data based on.
16:00[big data infrastructure] from enterprises and recorded co-founder infrared and everyone share the theme as "massive small files and large files coexist under storage system evaluation and tuning" report, because in the big data storage technology, in a business, often in conjunction with exist some large files, and numerous small files to be stored, in this case, to build and maintain the two memory systems were stored in large and small documents is obviously not the economy even painful and need new evaluation and tuning.
15:40[industrial and manufacturing data sub Forum] Sany Huaxing digital company general manager assistant and Research Institute executive vice president Yan Xin do entitled "based on the data of mechanical control engineering information integration platform" of the speech. At the beginning of the speech, Yan Xin explained the choice of excavator products as a research platform for the reasons. Currently excavator development presents a high efficiency and low energy consumption, intelligent precision, better user experience and other trends.
15:30[deep learning] Xiamen University professor Ji Rongrong shared a speech entitled "the compact nature of the visual data system: a large scale feature hash and deep network compression". He mainly introduces the visual big data search and recognition system based on the two key points of feature hash and deep neural network. He noted that visual data has exploded in recent years, as well as an urgent need for large-scale visual search technology. He considers that the feature hashing for large scale visual search has certain advantages, and introduces the data independent hash and data non independent hash. He introduced the AlexNet, SPPNet, VGGNet, and GoogleNet, which are commonly used in the compression of the deep neural network. He mainly introduces the global error minimization compression, i.e., the cross - link layer, the joint minimization of non linear response based classification (or feature representation) decision surface distance reconstruction error.
15:20[big data infrastructure] for application data, the server is a very important basic platform products, apparently on the market general server products to large Internet companies to expand the data is not realistic. There are a number of reasons, from Alibaba technical support department senior expert De Fang Xiao made the theme of "big data server technology exploration and practice of" report, to explain the Ali in Scorpio server product innovation and practice.
15:10[health and biological data Forum] Tongji University Professor Huang Deshuang "biological hospital data in machine learning modeling and processing" development has to share today. For what is the biological big data, he said that due to the huge amount of biological data, the existing software systems and processing methods in a tolerable time, can not be timely access, management and processing of the data set. The key scientific problems in large data in machine learning, including data random partition theory and small sample high-dimensional data problems of machine learning theory, different types of data asymmetry of the machine learning theory, the same categories of samples from non independent identically distribution of machine learning theory, the solution is mainly layer from the data layer and model layer and algorithm. Finally, he introduced the research direction in the future.
14:50[industrial and manufacturing big data sub Forum] Professor Gao Hong of Harbin Institute of Technology to bring the sharing is the industry perception big data acquisition and calculation". First of all, she talked about the relationship between the fourth industrial revolution and big data. Industrial data is a huge amount of data generated by the application of information technology in the field of industry, which has the characteristics of industry correlation, flow correlation, timeliness, modal diversity, quality and so on.
14:40[industrial and manufacturing big data sub Forum] Baosteel Central Research Institute, chief researcher Guo Zhaohui share the theme is to let the demand pull industry big data". He "only to create value industry big data can have vitality technology in enterprise" this famous saying launched a speech. But industry big data and data mining technology, very few can achieve the expected success. Industry to the reliability of the requirements of a high, technical reliability or not determine the value of its high and low. Guo Zhaohui talked about the accuracy of the existing sample is not equal to the correct judgment of the new sample. Data quality seriously affects the analysis results, when the error of the data itself and the detection range of the same order of magnitude, it means that the detection of no value. So, he explained that the smallest error may not be the best, there is poor extension.
14:30[health and biological data Forum] bring Shenzhen University Distinguished Professor 100053 speech title is "EEG/fMRI Sdudies on emotion and cognition" 100053 professor said the mood is complex psychophysiological phenomenology, reflects the interaction of human internal and external environmental impact. The subjective evaluation of emotion mainly includes the basic emotion theory and the dimension theory. Therefore, the study of the genetic mechanism of emotion will help people to deepen understanding of the essence of emotion in theory, in the application of emotional disorder prevention and intervention.
14:30[big data infrastructure] in the era of big data, flash memory technology has been a rapid development, is a new star in the field of storage. However, how to improve the storage and reading efficiency of the whole system by flash memory and improve the reliability of the system? From Beijing Yi HENGCHUANG Technology Co., Ltd. R & D Manager / Architect flash system responsible for Dong Hwa University explained the flash memory technology to deal with large data challenges, "the theme of the report, he from the traditional store encountered problems, to today SSD development and application and the latest products, and how the software technology to improve the reliability of the flash memory application.
14:20[deep learning forum] Alibaba iDST voice group senior expert Yan Zhijie introduced data technology and machine learning / deep learning application in the customer service center, mainly includes three aspects: customer data, precipitation speech recognition, GPU multi machine multi acoustic model training to identify speech; two, the traditional customer service support full automatic speech recognition the amount of quality inspection, quality inspection by positioning to enhance customer service consistency; three, pay treasure to identify "my customer service" automatic problem, predicted by the user behavior trajectory. IDST using the model of DNN-HMM. Use of Kaldi, their development of a GPU multiprocessor Doka machine learning MiddlewareModel averaging solve the latency problem, based on DBLSTM of acoustic modeling in speech recognition, as well as through based on the positioning of DLSTM quality supervision, inspection and quarantine.
14:00[big data infrastructure sub Forum] Docker technology has been more and more favored by many developers, and YARN for the majority of fans is still a relatively new product platform. What happens if they are put together to melt? Liang Yuming, senior research and development director from Hulu company for everyone to explain this magical experience. His speech title is "Docker - On YARN Voidbox in the practice of Hulu". Because of the large data computing platform based on YARN, different computing frameworks can be mixed in the same cluster, thus improving the utilization of cluster resources.
13:50[health and biological data sub Forum], Chinese Academy of Sciences, computing technology research institute researcher Liu Zhiyong in the Cryo EM data processing and structure of biological macromolecules refactoring, keynote speech said biological macromolecular structure research can rich scientific knowledge of human biology, and to provide scientific basis for modern medical and pharmaceutical. At the same time, it is pointed out that the current development of the frozen electron microscope is hot, and it is in the world leading level in the field of electron microscopy. Three dimensional reconstruction technique of frozen electron microscope includes two techniques: single particle reconstruction and electron tomography, and Liu Zhiyong makes a detailed interpretation of these two technologies.
13:35[industrial and manufacturing big data sub Forum] Tsinghua University, vice president of the school of software, Professor Wang Jianmin brought the speech entitled "discrete industry big data applications and challenges". Wang Jianmin first introduced the background of industrial big data, that the industry does not exist big data this view is not correct. He said that the current global industry into the era of intelligent Internet products.
13:30[deep learning forum] first lecturer horizon robotics technology, senior engineer Yu Yinan depth study of the evolution and achievements, introduces some advances in the area of target recognition and image, and from the algorithm, data, and computing three level prospect depth study in the future. Algorithm, including theoretical analysis, greater network design, structured data processing, faster performance; data, including more labeled data, the low frequency data acquisition, complex data acquisition, lower data acquisition cost; calculation and NVIDIA graphics cards (AMD also began to force), data transmission technology InfiniBand/RDMA, FPGA technology, such as are worthy of attention. He also predicted that deep learning hardware will be from the general direction of a dedicated, class brain chip is a direction.
13:30[big data infrastructure Forum] even if you don't want to listen to Ali engineer blow double 11 cows, but you still want to know Ali in the technical aspects of the data platform is how to do, because he really is a technique to live. From Ali cloud computing Co., Ltd. senior expert Li Chao give everybody to bring the topic is "Ali Yunda data platform quest", Li Chao begins with a review of the Ali Yunda data platform development mileage, and in-depth explanation of the ODPs, ads and other offline, real-time computing platform technology difficult and innovation.
13:30Medical health and biological big data sub forum under the auspices of the school of information science and engineering, Lanzhou University, Hu Bin, under the auspices of the beginning.
13:25[deep learning sub Forum] BDTC second 2015 days in the afternoon of the deep learning forum in ant financial services group, vice president and chief data scientist paint far under the auspices of the beginning. Paint far said that the depth of learning in the field of the current image, speech, natural language applications have great progress, today from companies and academia of the speakers will discuss the current depth of learning achievements, facing the challenges, solutions, tools, application prospects more problems were talked about.
13:20Industrial and manufacturing large data sub forum in the second half of the Chinese Academy of Sciences Institute of computing technology, deputy researcher Jin Xiaolong, under the auspices of continuing to expand.
13:20BDTC 2015 industrial and manufacturing large data sub forum in Harbin Institute of Technology, associate professor, doctoral tutor Wang Hongzhi under the auspices of the official start.
12:30[Financial Forum for large data] financial forum for large data in the morning last a guest speaker from the appropriate letter data innovation center chief data scientist a bright, he brought the topic is "big data applications in credit risk management, now the financial industry to get the data from the user's face, before in the traditional finance how to use these data has not been systematic research. The main focus of the paper is how to design the appropriate letter data system is how to design, what is the data source, how to store and organize data, how to provide services.
12:20[large data policies, regulations and standards of] China Research Institute of information communication technology and the standard of the big data project manager, Data Center Alliance, deputy head of the large data sets Jiang Chunyu firstly reviews database benchmark development; secondly to sort out the current data platform technology benchmark status and needs of the. Then it introduces the domestic first big data platform benchmark standard formulation, and for the first time for big data platform benchmark results report, assessment method, the audit process and test results about content. Finally, the paper puts forward the direction of future data platform benchmark testing standards and testing.
11:50[data market and trading sub Forum] China Institute of information communications, senior engineer Han Han published a speech entitled "building a standardized data flow environment," the speech. She shared the following three aspects: the need to clear the basic concepts, data exchange model depth analysis, as well as the construction of a standardized data distribution environment. She refers to data exchange and data exchange to form a data flow. She is from the three aspects of responsibility and benefit, has carried on the introduction to the public data resources and non - public data resources. She believes that the primary responsibility is to protect personal information, followed by the entire life cycle of the data management responsibilities. She suggested that the mode of data exchange is facing many challenges, it should improve the market mechanism, carry out data trading pilot, explore new models of data asset securitization. She believes that the data flow transactions facing the two extremes: black market disorderly flow of data, the data can not be frozen to flow, given the recommendations: the construction of a standardized data flow environment, improve the legal system of data flow.
11:50[financial data sub Forum] Professor Zhu Feida Singapore Management University School of information systems share based on social media data personal credit application mode, including four aspects: social dimension feature extraction, to join the now traditional credit model; by production type pattern mining different credit categories of implicit user model; based on social network of risk transfer query and search engine; real time anti fraud detection and warning system.
11:45[Database sub Forum] Pivotal R & D director Yao Yandong to bring the sharing is: "open source big data engine: distributed Greenplum database kernel analysis". At the beginning of the speech, he introduced to the GPDB source database is for big data storage, calculation, mining and design. In the next, Yandong Yao details the Greenplum architecture, the product support standard SQL support, SQL 2003 OLAP extensions, supporting MapReduce, expansion programming languages (Python, R, Java, Perl, C / C + +); and to provide customers with access interface, through the third party tools, text analysis and data mining.
11:40[large data policies, regulations and standards of] when China manufacturing 2025 meet industrial data what happens, from Tsinghua University big data technology research center deputy director Lu Wei lady in large data policies, regulations and standards of the sub forum "industrial data to help China build 2025" speech. Ms. Lu Wei first introduced the German industrial 4 and the United States industrial network, the two new industrial revolution national strategic representative for big data in the new industrial revolution, the role of the elements of the role of understanding.
11:30Data science and Engineering Research Institute of East China Normal University, Professor Qian Weining, the theme of the report is to expand the transaction processing system". He talked about the original database is used for booking and billing. Transaction processing includes two issues of concurrency control and database recovery. Qian Weining first introduced the transaction processing of the four elements: Atomic, consistency, isolation, persistence. We can use the advantages of new storage devices, high-speed networks, large capacity memory and non-volatile fast storage media, etc., to extend the application of data management system architecture to transaction processing.
11:20[financial data Forum] millet financial, technical director of the side flow of DW construction business architecture are mainly introduced in the keynote speech, and development tools, including log tool scribe, ETL tool Hadoop/Hdfs, DW weapon HBase, data analysis tool Hive/Sentry, OLAP tool impala, data migration tool sqoop, machine learning tool spark. Also focuses on the analysis of the users of financial picture and data for a large anti fraud, and gives his own exploration and practice, to prevent hacking, abnormal environmental monitoring / phone verification; prevent forged identity, the real name authentication; identification of false information, cross validation.
11:10[data market and trading sub Forum Beijing law firm Allen & overy managing partner Wangxin Rui in a speech entitled "data related legal risk and compliance advice". He mainly from credit, risk control, marketing and collection of four links to share. He first mentioned the concept and connotation of personal information. Personal information processing links, including the collection (purpose legitimate), processing (processing purposes and methods), the transfer (transfer purposes and scope), delete (after the purpose of the deletion). Then, he explained the eight basic principles of personal information protection (including restrictions on the collection, use, etc.), as well as the protection of personal information related to legal documents. Finally, he noted that the big data compliance includes authorization integrity, data desensitization, security measures.
11:00Big data policies and regulations and standardization of Information Industry Development Strategy Research Institute of Nanjing University of Posts and Telecommunications, Wang Chunhui, President of the "personal information and data protection path" speech. Teacher Wang Chunhui think big data for legislation, should in the mature development of large data to through the process of legislation and standardization to promote its development, and is now the big data applications early bound to the development of the industry. In the process of data processing, your processing methods and the use of rules must be open and transparent. Because the original owner of the data has its own data, today has become a very difficult to define the problem.
10:40[database] China Mobile Suzhou R & D Center for the development of large data product development department of to bring the share is: "the development and application of"". First of all, he introduced to Postgres-X2 is a distributed relational database. That has the characteristic of the relational database, and has the characteristic of expansibility and high availability at the same time, it is mainly applied to the real time online transaction processing system.
10:30【数据市场及交易分论坛】数据堂（北京）科技股份有限公司联合创始人、副总裁肖永红发表题为《大会时间共享交易与产业生态》的演讲，他认为，我国大数据产业生态现状是：互联网企业领跑，携“用户”以令诸侯；产业分布过于偏重应用环节；应用领域的行业分布仍不够全面；缺乏综合性的数据聚合流通平台。大数据产业生态良好发展的关键是一个这样的链条：数据采集 -> 数据公开 -> 数据开放 ->Data interconnection, the trend of data interconnection irreversible. Currently big data sharing transactions are still in an early stage, more and more forms of trading, but in a state of need to be greater than the supply. Data hall is around the status of the data bank to expand the business.
10:20[financial data sub Forum] Huawei cloud computing product line technical director Ma Qianli "let the data" Hui "talk: Huawei fusioninsight big data solving scheme" theme of the speech focused on sharing data of Huawei's solving scheme on the technical level, Huawei big data infrastructure platform from the open source, in addition to Hadoop, spark, Huawei has independently developed a three important components, work namely development management platform and data integration tools porter; real-time application service platform farmer; adaptation data data mining platform miner.
10:00[financial big data sub Forum] Ant King service group, vice president, chief data scientist paint far in the theme of the application of the financial sector in the financial sector. Ant Ali cloud and cloud has carried out various projects in artificial intelligence, related to the depth / machine learning, speech recognition, image recognition, such as NLP, and has been applied in the field of advertising, search, recommend, risk control, credit, intelligent assistant. For example, in the field of large-scale machine learning, to build a Server Parameter, has been applied to advertising, Taobao mobile search, lynx real-time comments. At the same time launched the Customer Service Interligent, recognition Speech can be carried out, for & QA (identification & Problem), deep learning, natural language processing, etc..
09:50[large data policies, regulations and standards of] from Gartner's telecom operators technology research department director Liu Yi made the American health data privacy and Security Act status "report, explain in detail the United States in medical health privacy and data applications legislation and legal status.
09:45[Database sub Forum], "Li Zhanhuai, director of the Institute of software, Northwestern Polytechnical University," the new storage architecture of data management technology challenges and opportunities". The development of storage media to promote the data management technology, new memory devices in the expansion, read and write delay and other aspects have greater progress. He introduced NVM into today's storage subsystem two programs
09:40[data market and trading sub Forum] CICA data Gong static do entitled the "center" of the data flow model "of the speech. She was the first of the CICA data are introduced. Then, she shares the following three aspects: data flow to stimulate the network effect; to overcome the flow of "friction"; "to center" of the data flow. She proposed the data sharing has three unique charm: the non - destructive reproduction, the marginal cost is low, the benefit tendency is infinite. She believes the key to give full play to the value of big data is a must do everything possible to reduce the cost of the flow of data. For the privacy of data flow in the era of big data era, she believes that the current difficulties are the lack of supporting laws and regulations, as well as innovative measures. Next, she analyzed the cost of two party flows, three party flows and four party flows. Finally, she describes the "de center" of the data flow platform, and how to achieve the data can not be visible, how to achieve the data copyright protection mechanism, how to protect the privacy of information protection is proposed.
09:18[Database sub Forum] Tianjin general senior vice president and CTO Wu new speech topic is "8t OLTP high-end GBase database core technology analysis". Wu introduced a new focus on the overall structure of the 8t GBase: shared memory + process + VP, the core is shared memory. Its innovation is VP compared with Oracle. He was detailed from the following five points
09:16[data market and Trading Forum] Zhongguancun data Industry Association Deputy Secretary General of the Xin He Chen's speech on the theme is the transaction data of the road ", he said, the data and the small data can be combined to correctly describe the world, the lack of data, user portrait is not accurate, the Mona Lisa may become bean. There is the buyer, the seller and the industrial value, there is the existence of the market. An obstacle is difficult to fair pricing, because of property rights definition, resale control, trading rules, privacy protection, time, scene and other factors. Real time bidding can effectively solve the problem of data pricing. He also said that because of the data can be replicated and other characteristics, the future of the road data transactions should be Equity Exchange Data (data transactions), and data assets are not violated.
09:15[large data policies, regulations and standards of the Forum] with the development of big data, how data is used by the many challenges, how to from the perspective of laws and regulations to regulate the use, from Telecommunications Research Institute of the Ministry of industry and information policy and economic research the legal department director Li Haiying Ms. in today's data policies, regulations and standards of sub forum made a speech of "big data of legislative challenge and thinking. The arrival of the era of big data, data has become a key resource and production factors, data sovereignty, security, protection and other issues of concern. Ms. Li Haiying introduction about data security and data protection legislation at home and abroad, combined with the development trend of big data, foreign legislation on key issues. Analysis legislative challenges brought about by the development of large data, explore how to balance development and security and use of data and privacy protection, for legislation of our country future data to explore thinking.
09:15[financial data sub Forum] safe technology data of general manager of platform of Xiaojing in the intelligent safety brain: safe practice of financial data, "keynote speech to share the peace is to create for the financial industry of intelligent real-time decision engine (peace of mind), it consists of basic count method development platform, the depth of learning platform, public opinion monitoring and analysis platform, visualization platforms, recommending composition analysis of mining platform, information security monitoring platform, in order to in the above carry out risk quantification and anti fraud fraud, intelligent recommendation, health care, intelligent operation. At the same time he showed the safety of the brain in the customer marketing, risk management and control, operational management and other areas of application examples.
09:11[financial data sub Forum] ant financial services group security intelligence director Jidong Chen served as moderator of the forum, he said financial is undoubtedly the most important application scenarios of Internet data and risk assessment is the core of the whole financial. How to do through large data risk management, how to conduct a credit assessment of large data, the establishment of the whole society of credit system, will be an important topic of this forum.
09:10AsiaInfo Intelligence Data Co., Ltd. big data cloud platform, general manager of the Department of He Hongling announced data market and Trading Forum officially began, the original intention of this forum is approach to data sharing, break the barriers of data, promote efficient data legitimate flows and trigger network effects in the data value, let the public fully enjoy the large bonus data.
09:00[Database sub Forum] 2015 China big data technology conference of the database of the official start of the forum, the forum by the East China Normal University data science and Engineering Research Institute, Zhou Aoying, president.
09:00Today is the second day of BDTC2015 China big data technology conference, will usher in the eight major forum and HUAWEI big data technology special live broadcast, please continue to focus.
17:40[Internet big data sub Forum] micro public tax bank co founder and COO has published a speech entitled "the application of government data in the field of credit investigation" speech. The existing credit system meet the needs of the financial main defects can include generous: credit evaluation system construction is not perfect, credit evaluation technology is backward, missing data, messy, resource is difficult to unity, evaluation result does not have predictive, evaluation model do not have common applicability. The use of large data platform for technical support, the use of big data technology to optimize performance.
17:30[large data analysis and ecosystem Forum] Nanjing University Department of computer science, Pasa data laboratory of Professor Yi Hwa Huang speech is "octopus (Octopus): the R language cross platform large data in machine learning and data analysis system based on. He talked about big data machine learning is one of the two major aspects of machine learning and big data processing, the intersection of research topics.
17:20[large data security forum] beauty company co-founder and CTO Liang Kun in the keynote speech in the sentry financial real-time wind control system. He said the real-time wind control system for the banking industry to continue to maintain high-speed development is becoming more and more important. Sentry financial real time wind control system is a real time transaction risk assessment system based on big data technology. The working process is, in every single transaction, real-time (1) business system transaction information sending wind control system; (2) to discover the transaction in the presence of abnormal behavior and suspicious scene; (3) according to found "evidence" of computing the risk coefficient of the transaction; (4) risk factor information feedback to the service system. Sentry use of open source components have distributed storage system Cassandra, real-time computing system Storm, distributed consistency protocol implementation ZooKeeper.
17:00[Internet data sub Forum] Beijing TRS Information Technology Co., Ltd., vice president of Rui Bao Liu: problem for the data - the engine of government development in the Internet Era "of speech. Government led the wisdom of urban construction is facing a bottleneck, the wisdom of the city's market driven. Wisdom 1 is to make full use of the Internet channel. Wisdom is a whole, system, can not be separated from the whole ecological chain, the entire ecosystem support. The wisdom of the 2 is to achieve the data support of government regulation: data space and time; real-time comparison, found abnormal; mining data relationship; establish an exponential model. Big data so that each individual is true. Using machine learning to build a risk assessment model of net loan platform, quantitative analysis of the results of docking management, the implementation of supervision, to achieve the protection of the rights and interests of foreign, focusing on monitoring the object of real-time risk analysis. Wisdom 3, more and more people's behavior is digitized, the decision needs data support.
16:50[large data security forum] from Tencent secure cloud department assistant general manager with a speech on the theme is "big data against social cheat cheat". He was first introduced to safety, in fact, including three aspects, including for public opinion, fear of violence, spy on national security; needle for information security, business security enterprise security; and to information disclosure, community fraud of public safety. Although many solutions, including multi dimension data collection, effective dimension selection, machine learning, but the effect of social fraud is not very good, so Tencent previously used in the security business in social fraud, good results, they said for dyeing, including Shuntengmogua find a den of thieves. In addition, in counterwork stage need attention to confidentiality and interfere with each other and other methodology. At last, he introduced the big data evaluation system in detail.
16:40[Social Governance big data sub Forum] Beihang University professor Wu Junjie around the social computing and social public opinion management research progress on contemporary big data and social computing depth sharing. City beating the traffic, environment, energy consumption, medical, emergency and other large data network coordinated evolution of social and physical society, to bring a new opportunity for social perception, big data thinking has been deeply rooted. From the perspective of social system, the innovation system and the main communication mode in the era of big data mainly include cross network information communication, the emergence of group behavior, the coordination of human - machine - object and symbiotic intelligence, multi - Center governance. However, social computing is also faced with big data modeling, short text analysis, big data computing, multi discipline cross and other challenges.
16:30[large data analysis and ecosystem Forum] to UnionPay Hui Chi co-founder and CTO Chiron brought share is UnionPay Hui Chi consumption data of the solutions. UnionPay wisdom relying on the overall situation of large data resources, through the unique technical means, the introduction of the depth of the industry. Data security, data privacy, data property is the big data industry chain three basic. Business intelligence through the collection, management, analysis and transformation of data, so that it can be used to obtain the necessary information. Through big data analysis of customer target characteristics, realize the wisdom of financial credit cycle integration solutions. Wisdom quanyun by collecting all kinds of internal and external data, using the Hadoop infrastructure such as query, statistics and analysis.
16:20[data security forum] data security data security director Zheng Bin Ali Alibaba Group in the "big data under the data security" in his keynote speech to the data flow control as the center of the IT era is coming to be based on data sharing, activate the productive forces for the purpose of the DT era, and big data is a new factor of production. Internet plus the new infrastructure cloud terminal (cloud: cloud computing, big data, Networking: Internet; network; terminal: terminal, APP) is the activation of big data.
16:10[Internet big data sub Forum] Huang Yongjian, vice president of the country's dual technology entitled "mining user behavior data in the gold mine" speech. He believes that the characteristics of the user's behavior data include a large number of data, can be collected, accurate, structured and unstructured. Marketing decision-making process in advance, the performance of 60% of the buyers in contact with the sales staff has completed its decision-making process. The problem: optimization to enhance the user experience? How to better design products in line with the user's interest? Our solution: acquisition, analysis, reporting, decision making, forecasting, and action. He introduces the technology of multi dimensional data analysis by means of an example. Data full association under the big data, can be based on data analysis to solve the difficult problems of enterprises.
16:05[large data analysis and ecosystem sub Forum] eBay software engineer, Apache kylin PMC members Zhong Jian made a speech entitled "Apache kylin data visualization practice". Kylin key lies in its advance calculation, the color, size and other dimensions proposed by the Hadoop for processing. Starting from the eBay and Jingdong two cases, detailed showing Kylin rich visual interfaces and powerful data processing ability. Kylin Zeppelin and Apache were integrated and two development. Developers can develop their own back-end in the Zeppelin architecture, just write interpreter; while the corresponding Zeppelin statement on the other platforms can also run the same.
16:00[Social Governance big data sub Forum] Chinese People's Public Security University professor Mei Jianming to "big data and the prevention of terrorism" as the theme sharing speech. Terrorist organizations use the Internet to carry out financing, money laundering activities, with the characteristics of hidden, real-time, easy to escape regulation. In this era of anti-terrorism prevention is the key. Big data to provide an opportunity to guard against terrorism, but the challenge is also obvious. These challenges come from many aspects, such as technology, law, culture, system and so on. In the aspect of technology, the data has the characteristics of wide source, multi form, high redundancy, fast update and weak association. At the same time, there are many difficulties in the legal, cultural and institutional aspects.
15:40[Internet big data sub Forum] Renmin University of China associate professor Dou Zhicheng published entitled "big data era of Internet analysis engine" speech. There are some problems in the manual editing Directory: navigation is only suitable for a small number of sites; manual editing costs are high, users find sites difficult; find portal sites, rather than looking for information, and user needs. Search engines have not changed the basic model for 20 years: the web page is the basic unit; return a simple result list "blue links ten"; users to obtain information through the results of the reading. This model can not meet the needs of users on a large scale Internet data, some of the higher order information access requirements can not be very good to meet.
15:30[Social Governance big data sub Forum] Chinese Social Science Research Center of Peking University research and development department director Gu Jiafeng bring big data era Chinese social survey of the new concept of science theme speech. Data of human social behavior and environment impact, since its inception in 2006, North China Social Science Research Center has carried out a number of Chinese families tracking survey (CFPS), and a number of actions, based on big data technology precise survey system, survey data element management system and cooperation with Peking University Library, integration of data resources, build a data sharing and utilization of integrated service platform to build.
15:25[big data analysis and ecological system sub Forum] Baidu big data research and Development Engineer clothing country base speech theme is to carry out large data analysis by Elasticsearch". Distributed architecture elasticsearch originally constructed in the Lucene search engine. Inrecent years, full text retrieval system transformation for the data analysis platform. He believes that the rise of Elasticsearch in recent years with the ecology are inseparable. Elasticsearch has advantages such as multi dimension analysis, real time and easy to use.
15:20[Social Governance big data sub Forum] under the auspices of the State Key Laboratory of complex systems management and control of the State Key Laboratory of management and control of the Institute of automation, Chinese Academy of Sciences, under the auspices of Zheng Xiaolong.
15:20[data security forum] minglue technology partner Yang Wei lecture on the theme "enterprise big data platform construction safety, he said that the current enterprise security risks at present not only from outside the enterprise, but also from the internal and external risk and service risk, he introduced two aspects of Hadoop platform" safe "both safe and reliable, he focused on the lack of security configuration of Hadoop platform which is hidden, including: the authentication mechanism of SIMPLE, nobody can impersonate superuser; Linux user group information file access control based on local authority can be exploited by malicious users; no unauthorized data access and coarse-grained data access control, not authorized to obtain key data; open the underlying file storage, file that will lead to steal stolen data content.
15:10[Social Governance big data sub Forum] South China Normal University computer school professor Zhao Gansen shared the "data fusion and security in the big data management". He shared the financial credit mining and criminal accomplice, tracking, based on synergistic blend of tax management, major guess investment cheap governance, synergistic blend of data security control of data of social governance cases. Major governance of guess investment, low intelligence, for example, synergistic blend of relational queries on the first step is to open up the data island, but also to do let isolated sheet association table and data reconstruction.
15:00[Internet big data sub Forum] Jingdong Mall big data research and Development Department of the person in charge of Liu Yanwei published a speech entitled "implementation and application of real time data platform Jingdong" speech. He shared the Jingdong real time data platform architecture and implementation. The basic process is the data through the JDBUS (data through train) to write real-time data bus, and then introduced real-time data platform. Data through the car is a powerful data handling system, its value lies in the realization of the underlying complex technology through the product, so that all people can complete the work of data mining. Real time data bus is the data access and downstream consumption between a temporary data storage and messages in standard format reduce docking cost between the heterogeneous systems, access, multi user consumption, to achieve an asynchronous architecture, a single entity data stored in topic granularity. Real time computing platform is based on Storm to build a flow based computing platform, a unified real-time computing cluster, to achieve the maximum utilization of the company's resources, including human, technology, hardware, etc..
14:50[big data security sub Forum] data analysis and data mining engineer Gao Jiafeng and colleagues to share the "telecom operator information security algorithm research and application of practice" theme speech. Gao Jiafeng said intercepting harassing phone scams and spam messages, based on statistics and business personnel experience of traditional management methods, high cost and low efficiency, how to use the data more efficient completion of the work, Gao Feng show China Mobile based on Algorithms and models of data test process. The big data platform management information platform contains the platform layer, algorithm layer, application layer, can provide a powerful data processing can be used to enhance the overall value of information security, using Spark Hadoop and other open source technology.
14:45[large data analysis and ecological system sub Forum] Jingdong group cloud platform data chief architect Du Yufu shared the topic is to build a large data ecological environment". Data analysis includes data acquisition, storage, modeling, analysis, application. He described in detail the use of the link Spark, GraphX Flume, streaming and other technologies. Ecological significance lies in the joint operations between partners, to achieve a win-win situation. Jingdong ecological cloud is a cloud service available to the user: in the upper analysis tools are provided; in the cloud provides cloud storage, cloud analysis, sea of clouds, and provides developers with the use of data cluster and real-time analysis. Administrator through Jingdong data cloud management data gateway. In the end, he stressed that any data should have its own market, otherwise there is no value.
14:30[Internet big data sub Forum] Baidu director of architects, machine translation technology director He Zhongjun share entitled Internet machine translation of the speech. Previous statistical machine translation needs bilingual translation model, but also requires the language model of the target language. The phrase based approach is shown to be not translated well, and it is difficult to use the global information, the process is complex, and the cost of resources is large. Based on deep learning, the method makes full use of the global information and the fluency of the target text, the model is small, the steps are simple, and the network structure is complex.
14:20[Social Governance big data sub Forum] ZTE soft creative Polytron Technologies Inc Vice Minister of intelligence products Deng Hui shared the "big data in the government management of the application and thinking". The government is a natural big data trader. ZTE soft innovation in the process of cooperation in the process of discovery, relatively easy to solve infrastructure, technical architecture needs to be resolved from the beginning of 0, to solve the problem of government agencies. The key components include the main data management platform, large data acquisition terminal, big data center, big data analyzer, big data server, visualization server, big data client. In the data center, he takes the subscription library model as an example, analyzes the data analysis process. There are difficulties in the process of cooperation, such as complex data format, data quality is not high. Finally, he also shared the big data analysis process of the pit, such as feature extraction, assessment methods to determine the evolution of the algorithm, etc..
14:12[large data analysis and ecosystem Forum] IBM data and analysis of the cause of the big data products Hong, director of Jianxun share is "spark data and design to meet changes. Customers join Spark and IBM began to innovate, to collect massive data analysis applications, such as for chronic disease prevention and so on. Data is the basis of enterprise competition, the research direction of data analysis has been inclined to the manufacturing industry and industry. IBM large data simple analysis framework by the front-end data acquisition, preprocessing, data mining, visual analysis of the composition. SQL Hadoop based on IBM technology, users can access the data in different ways. Finally, he talked about the ecology of big data is not just a Spark or Hadoop, the developer should re use the old technology, leaving the business value to talk about big data, not a real big data.
14:00[large data security forum] focus of Zhou Tao, a senior fellow at Venus sharing is concern "in the safety analysis of how to avoid the" big "data analysis, he first to the enterprise safety data introduced, including safety data of the causes and characteristics and safety of large numbers according to the challenge, he believes that the attack is present in the same way, from the original conventional malicious code to now triggered by the apt data breach, the main countermeasures is to dispose of the incident response of passive mode change, from the more basic data in active threats are found.
13:50[large data analysis and ecological system sub Forum] Hortonworks technician Yu Zhihong (Yu Ted) speech topic is "developments in HBase Recent". He loaded HFile backup from the batch, end to end Offheap read path optimization, HBase on the Slider three part of the detailed explanation of the latest progress of HBase.
13:55[large data security sub Forum] Qihoo 360, senior technical manager Zhuo in his keynote address said to increase defense speed, lack of data on the Internet is the current security encountered two major difficulties. Space for time, is the response strategy proposed by Zhang Zhuo. At the same time, he disclosed Qihoo 360 for the first time, the deep learning is introduced into the field of security, used in the field of net asset identification, identifiable assets, net assets divided, alarm log data analysis.
13:40Big data Internet forum  by machine learning research institute director Liu Wei introduced how to apply the machine learning algorithm is integrated into the "drops of travel" major product lines, including estimates of real-time traffic detection, Jiejia time (ETA, in space, time and traffic forecast, involving the second discrete prediction function, hundreds of thousands of requests the engine (response), trading solution 500 million times per second, calculate the +NP hard problem, the effect for express carpooling success rate one month doubled), global intelligent dispatch system (which may be early to judge the extraction of tension between supply and demand determine the different time preferences, orders to the driver, car speed (portrait) Hashi algorithm matching), mobile social networking platform.
13:35[Social Governance Forum] big data security department of Alibaba group of big data reference Wei Hong "thoughts Internet plus social governance". Alibaba security department was established in 2005, the current staff of nearly 2000 people, is committed to combat crime O2O (online wind control, the line jointly combat). Cyberspace has changed the physical space, and the traditional governance model has been challenged. Advantages in the Internet, such as data analysis, cloud computing power, but also to give social governance. Using the advantage of network space to create a new governance model, instead of helping to solve the governance problems encountered in physical space.
13:30BDTC 2015 social governance big data sub forum, in the host, ZTE cloud computing and big data chief architect Luo Shengmei presided over the official start.
13:20Large data analysis and ecological system sub forum in the Department of computer science, Tsinghua University, Zhang Guangyan, under the auspices of the.
13:20[Forum] BDTC the afternoon of the third day of the Internet data sub forum officially began under the auspices of the Information School of Renmin University of China, Professor, Deputy Dean, wenjirong Internet data, this forum will cover mobile travel, machine translation, data platform, Internet analysis, financial and other aspects of the Internet.
13:10Big data security forum, officially began in the Venus chief strategy officer under the auspices of Pan Zhuting.
12:20[recommendation system sub Forum] chief data officer of the hunting and recruitment network in the publication entitled "the use of Reinforcement learning algorithm to enhance the effectiveness of the recommendations" of the speech. Reinforcement learning provides a theoretical framework for adaptive intelligent systems. He referred to the slot machine algorithm by leaving a small percentage of the test to observe the return, the best choice for the current strategy. Thomspon algorithm using Bayesian theory, according to the current after sampling, select the largest income. MAB model can help UI optimization, recommendation strategy test, user interest detection, content test. MAB Contextual model can be done more in-depth, better.
12:10[Transport and tourism big data sub Forum] BI director of the way home to share the topic of "way home network data analysis business practice". He says the value of the data lies in the combination of technology and business. Qin Yong through multiple case around the way home business, explain the way home in the calculation of design method and result output, improve the analysis of landing driven business. Finally, he said: "data analysis of a certain point and specific business; data analysis there is no fixed method and mathematical model used in the analysis of data, through data analysis, researchers in the business unit rotation enhance data analysis results of value, strengthening data and business interaction".
12:00[education large data sub Forum] in the application of photo search problem, the image text recognition is the focus of the key is also difficult. The whole recognition problem can be decomposed into key sub problems such as word block extraction, word block recognition, line structure analysis, formula structure analysis and so on. At the scene, the extension information architect Xu Chongbo detailed analysis of these issues inherent in the relationship and the core solution. To block word extraction and recognition as an example, the former logic from the background gray balance, local values, component extraction to the mix into a block of words, the latter to print to the image, and random background color, noise, Gaussian blur, distorted transformations to generate samples.
11:45[network and big data communications Forum] network and big data communications Forum last speaker is from Huawei Noah's Ark lab senior researcher Zeng Jia, his speech is mainly focus on telecom data is a key technology challenge. He was first introduced to the unique advantages of Telecom spatio-temporal data, he said seven dimensional data constitute Telecom spatio-temporal data base, need spatio-temporal data analysis platform and production system docking up, and do a lot of business to try: spatial and temporal label, label credit and real-time analysis applications in real-time advertising, precision marketing, financial credit, mobile digital track and aspects.
11:25[recommendation system sub Forum] Jingdong digital marketing senior director of senior director Wan Hao published a speech entitled big data technology in the application of Jingdong advertising. He believes that big data is not just big data, but more important is the insight into the data. Data insight is to refer to the data mining can be applied to the product, enhance the effect of the law. Advertising is the most important big data applications.
11:15[transportation and tourism data sub Forum] the way cattle big data director Meng Jingci were a speech entitled "passers-by cattle travel data application". At present, the way cattle business model into the tourism business, financial technology, film and television media three. The tourism industry has the characteristics of non standardization, high / low frequency, strong timeliness and high guest unit price, and then derived the resource combination, reducing the risk management and risk management and price management needs. Tuniu using the optimal inventory and pricing model, revenue management, price forecasting based on financial derivatives and other solutions. He concluded that tourism products and financial needs to be closely combined, in order to achieve the best revenue management.
11:10[network and big data communications Forum] from Parallel Technology Co., Ltd. research and development director Huang Xinping share mainly focus on Application of big data technology in 7 * 24 hours of data center online operation system and high performance calculation and analysis of the application of large data, he first provided to parallel technology mainly to provide data center cluster large-scale real-time monitoring and management, application performance management, operation data analytical mining. He stressed that the traditional operation and maintenance services lack of detailed analysis, professional operation and maintenance team and professional data center management software, in the face of increasingly complex systems, to solve the increasingly complex management problems. Parallel scientific and technological innovation of 7 * 24 hours online operation and maintenance, on-site operation and maintenance services for Internet Data Center online operation and maintenance, to reduce the purchase of the pressure of operation and maintenance software and professional administrators, to implement the task of automatic data acquisition, analysis, and he talked about the pre Paramon software acquisition data. Finally, he also introduces the application of the optimization case.
11:05[transportation and tourism data sub Forum] advanced data Ctrip based on large data analysis manager Lei share "Ctrip based data architecture in practice". OTA company data has a large difference in business lines, high complexity of the characteristics of its big data landing scene is often the analysis of reports, user center, etc.. The Ctrip data architecture, data source layer buried specification, standard check; offline & real time data access layer log; engine algorithm layer by engine algorithm, audit portrait; general configuration layer achieve export data to general precision marketing platform Kai Fazhong; precision of application layer recommended column and personalized advertising for.
11:00[Education Forum] data quantum science and technology education CTO Ding Wenpeng share the title "Simhash" based on the weight and search. At present, there are some common detection algorithm, such as Hamming distance, more biased in favor of the mathematical description of the Jaccard index, editing distance and vector space cosine similarity. But the use of universal detection algorithm to compare the efficiency of the similarity of the two topics is relatively low, so we need to use Hashing Locality-sensitive, such as MiniHash and SimHash. The speaker, for example, analyzed how to use the SimHash to carry out the problem to re. In practical use, they directly use the near-duplicate characteristics of clustering, the new title can be positioned to the corresponding cluster index, only with the cluster has been subject to similar will be entered, to prevent the zipper. In the search, will use the k=3 to further go to weight, to ensure that the search results in the best.
10:50[recommendation system sub Forum] Sina micro Bo algorithm technical director Jiang Guibin published entitled "big data driven by the micro Bo social recommendation" speech. He is mainly from the following aspects: the role and positioning of the recommendation, the relationship between big data and recommended, the data driven by the micro blog recommendation, business recommendation. He thinks it is recommended to play the role of accelerators and regulators. Accelerator is to accelerate the spread of quality information, accelerate the construction of high value relationships, accelerate the growth of users. Control device is to optimize the structure of the user relationship network, control and initiation of information dissemination of information.
10:40[network and communication data sub Forum] China Electronics Technology Group Corporation No. 7 Research Institute deputy chief engineer and Communications Design Institute chief engineer Shen Wenming in his keynote address said when confronting the challenges brought by the development of the mobile network, operators need more scientific planning network, intelligent network optimization optimization. How to make network planning and Optimization Based on big data, he referred to the "service + software" model, based on a large data platform, the service capabilities, service content, service team integration. In order to achieve the planning design, the company is trying to break through two key capabilities: multi vendor / multi interface data analysis capabilities, network side high precision positioning technology.
10:30[recommendation system sub Forum] the next speech by the fine master technology (ADMaster) technology, vice president and chief architect lu. Lu billion Lei simply introduced the next three guests different topics of direction, including social networking, electricity suppliers and recruitment, and please the next lecturer on the stage speech.
10:20[transportation and tourism data Forum] High German traffic data, a senior expert Fangxing speech topic is "big data to guide travel". He first demonstrated the data analysis of the domestic traffic situation. High moral map through real time data processing, the release of real-time traffic and events, real-time traffic and navigation. Its technical architecture, including: the front desk applications online services, Hbase and other online data storage, Ali ODPS data unified storage, production server real-time log collection. By combining with the existing road network, the road network, combined with the historical speed data to achieve road network data mining, traffic prediction, rendering, release.
10:00[recommendation system sub Forum] FreeWheel Technology Vice President Li Yang published a speech entitled "FreeWheel big data based on the emerging video advertising measurement practice" speech. He mainly from the following three aspects: the emerging video advertising measurement methods, the user's gender age prediction, the completion rate of advertising. He mentioned that the challenge of advertising measurement is still the actual effect of advertising is difficult to be measured, the lack of effective measurement of video advertising. At present, most of the measurements are based on user feedback. New video advertising measurement methods include three kinds: Digital ratings, advertising completion, visible exposure. Video and web page feature extraction of the specific approach is: Based on the name and a brief description, extracted two features, that is, Genre and Topic, with similar users to smooth optimization. The characteristics of advertising completion rate prediction include three dimensions: Ad, User and Context.
09:50[education data sub forum in English fluently says co-founder and chief scientist linhui explain the voice data and its application in language learning. Large data volume, four aspects of variety, velocity and veracity, fluent in English said to adaptive learning, the accumulation of the 2.5 million hours of speech data, this also means that single speech recognition requires 60 years (assuming real-time rate of 0.2), the need for 2 million + CPU cluster can in a short period of time processing is complete. Fluent speech data processing architecture includes real-time algorithm services, voice analysis services, depth model, redis, Kafka, etc..
09:40[Forum] China Telecom cloud computing branch company data division chief data analyst Zhang Zhuyu speech focused in the China Telecom data application, him from the ability of telecom data expansion, he said telecommunications thousands of nodes in the data processing ability of network and communication data, daily gathering 500 million data. Then he introduced the specific process of China Telecom Data Platform for production and service, among them, data access capability 50tb, conduction ability 100TB calculated 200tb. After he made a detailed introduction to the application of China Telecom data, including chart for the risk prevention and control, precision marketing; Kunpeng the people portrait business location, flow thermography; for large data PAAS platform of dragon, open telecom level security open data. Finally, he also stressed that China Telecom has always uphold the openness and integration, the establishment of large data applications ecology.
09:30[transportation and tourism data sub Forum] bring China car chief architect Li Laisi sharing "Shenzhou car large spatiotemporal data processing practice." Data driven Shenzhou car in, security is the basis, technology management and a two pronged approach; efficiency is the key, technology; growth is the target. Through the vehicle networking /OBD data real-time processing, at the same time off-line analysis machine learning to form a prediction model for the service front end scheduling, pricing. In space, the grid is divided into the grid, according to the time of the grid to supply and demand forecast, improve the efficiency of scheduling. In the end, he said that companies can be non core components, large-scale marketing activities, third party cooperation, short-term computing intensive tasks in the cloud deployment (Iaas).
09:20[recommendation system sub Forum] Baidu infrastructure department senior architect Shen Guolong published a speech entitled "BML Baidu large-scale machine learning cloud platform practice". He refers to the process of large data processing includes six modules: data, mobile phones, storage, deformation, analysis, business scenarios. And, he shared the Baidu big data processing infrastructure, mainly to explain the large-scale machine learning algorithm framework ELF (Learning Framework Essential), and its characteristics are summarized as easy to use, efficient. He summed up the elements of machine learning success: first, data. Including data collection and multiple sets of data to get through, clear, clear, "clean" data source, Online & Offline data combination; two, system. Fast, low cost implementation, support for the rapid expansion of the scale of the efficient algorithm library, Test AB and model iteration mechanism; three, evaluation criteria. Coverage, confidence, difference, adoption rate, novelty, privacy, prediction of Auc, NDCG, income fluctuation, artificial experience and other indicators, the impact on the overall system.
09:15[network and communication data sub forum of China Mobile Company Fujian Network Management Center Deputy General Manager Wei Min Yang said in his keynote address, in "the experience is king" era of mobile Internet, traditional network operation and maintenance system, has been difficult to adapt to the developing situation. Therefore the enterprise to build customer-oriented perception active operation and maintenance system "five yuan fifth order sample space replacement method put forward ideas., and strive to build a centralized management of the ecological system of performance, and continue to develop the application of letting a hundred flowers bloom.
09:10[recommendation system sub Forum] Beijing Ming Software System Co., Ltd., co founder and CTO Feng Shicong announced the start of the recommendation system forum.
9:08[transportation and tourism data Forum] Beijing city traffic monitoring and Dispatching Center Deputy Director Zhang speech topic is "Beijing city comprehensive traffic data system construction and application of. He introduced the Beijing city traffic operation monitoring and dispatching center (TOCC) basic situation. Next, Zhang talked about the monitoring data system for comprehensive traffic operation analysis in Beijing city. Based on the analysis of urban road network traffic, rail transit, taxi operation analysis, automatic generation of multi granularity integrated traffic analysis report. At the end of his speech, he said that through the open sharing of data resources, tools and environment, to provide an integrated support for professional institutions and personnel.
09:052015 China big data technology conference of traffic and tourism data sub forum officially began, the forum by CSDN deputy editor in chief Dong Shixiao chair.
09:05Network and communications big data sub forum in the HUAWEI Noah's Ark laboratory assistant director Zhang Baofeng under the auspices of the beginning.
09:03Recommended system sub forum in Beijing, Ming and a software system Co., Ltd. co founder and CTO Feng Shicong under the auspices of the beginning.
09:00[education big data sub Forum] with Luo Bin, vice president of large data sharing the "big data decoding education O2O". Who learn team entrepreneurship has a year and a half. He shared the value of big data at the marketing level, how to accurately find and attract potential users through a reasonable data analysis. Luo Bin they analyzed the user conversion rate of multiple channels. They found that users get information on the channel fragmentation, a lot of users in the choice of courses, teachers, users more trust in the relationship between the recommendation. Internet platform for teachers to show a high degree of education and youth trends, the effective teacher in the platform, there are 42% individual teachers rather than from institutions. On the platform, there are 26.2% teachers will buy other teachers courses, teachers and students in the Internet era will have a greater change in the Internet era. Finally, he shared the teacher platform on the GMV (transaction volume) maximum search model, as well as the value of the platform mechanism and data information to the teacher disclosure.
09:00BDTC2015 China big data technology conference third days to start the agenda
17:10[cloud computing security and trusted computing Forum] computer school, Wuhan University Professor, doctoral tutor Huanguo and the Chinese Institute of Electronics cloud computing committee members, Intel China R & D center data center business department chief software architect Li Yan shared the a end "to the end of trusted cloud resolving scheme". Zhang Huanguo said: cloud computing also exists such as equipment, data, content and the common security of the text, but also such as the sharing of resources caused by the sharing of personal security. Currently trusted computing has made series of norms and industrialization of achievement, such as the announcement of the three trusted computing technology standard; TCG announced the TPM2.0 and TSS2.0 new code, and will continue to publish other specification, Microsoft released WIN-8, full support of trusted computing etc.. In terms of end to end, to achieve the trusted cloud infrastructure, trusted cloud platform, trusted cloud terminals, trusted cloud systems, trusted cloud services, the need to build a trusted community in china. Li Yan focuses on the Intel trusted execution technology (TXT), trusted computing pool (TCP), open source remote authentication (OAT), how to help more companies to achieve security and identity protection.
17:00[cloud computing applications for large data intelligent transportation industry forum] treasure ship 2 product director Du Zhongping entitled "treasure ship shipping network 2 construction of ecological practice" speech, first introduced the process of upgrading transformation of shipping formats, from commercial technology and user perspective introduces the characteristics of treasure ship network 2: business research new technology, architecture, design and implementation of more close to the user, to explore Internet plus business model. He then introduced treasure ship Web 2.0 in four areas of port services, inland river shipping, logistics services, personnel services. He also introduced the treasure ship company's core product S-GIS, and treasure ship network cloud 2.0 ecological and shipping data based architecture. He said that a big opportunity for the ecological system of shipping market, you can provide a development, transparency and integrity of the environment, and make innovation in this ecology into a more simple, more likely to occur.
16:30[cloud computing security and trusted computing Forum] CSA Greater China Chairman, HUAWEI chief network security expert Li Yuhang published the 2 era of cloud computing network space security, keynote speech. Cloud computing has evolved from the first generation of the traditional data center, virtual machine to the second generation of green data center, containers, spark, IOT devices such as, the top-level network security framework including international strategy, national laws and industry standards, management processes, tools and talent cultivation in six dimensions. Each dimension need international and cross-border and inter agency, cross sectoral cooperation. For cloud computing software defined boundaries, quantum secure and networking security and mobile application security vulnerability detection, cloud security alliance were launched CSA SDP, CSA quantum safe, IOT security controls and CSA mast service.
16:10[cloud computing data applications of intelligent transportation Forum] Shenzhen city comprehensive traffic command center chief engineer Guan Zhichao brought theme for the new generation of information technology era urban traffic monitoring, modeling, simulation, and evaluation system of speech. He introduced the Shenzhen city traffic cloud computing practice, including the Shenzhen city comprehensive transportation information center and Shenzhen city future traffic key laboratory and so on. He then introduced in Shenzhen city traffic monitoring and model system, he said, build region, macro, meso and micro integration of multi-level traffic model system that can form the reunification of the city's traffic model platform, meet different levels and types of transportation decision support needs. Finally, he introduced the macro, meso, micro, online intelligent simulation environment and impact assessment of urban traffic in Shenzhen city.
16:05["Internet plus" Financial Forum] at Beijing law firm senior partner Wang Xinrui's keynote speech is the name of "financial big data practices and compliance issues", he makes a detailed analysis of credit risk control, marketing, and collection of several aspects of the financial big data business practice, and from the laws and regulations of the enterprise a detailed guide practice data.
15:45[cloud computing security and trusted computing Forum] China Telecom Co., Ltd. cloud computing branch company deputy general manager Zheng Shaobin in entitled "credible, from China Telecom" speech focus on shared China Telecom's practice in terms of security. China Telecom has 15 five-star and 90 four-star data center, has formed a "4 + 2" cloud data center, build more cloud data center; computational capacity of millions of nuclear physics; storage up to EB level; room egress bandwidth over 10TB. Whether it is the government, large enterprises, small and medium-sized enterprises or enterprises for internal use, with the high security requirements for safety.
15:35["Internet plus" Financial Forum] home of the founder of net loan & Ying Chan Group Chairman and President Xu Hongwei has called "cloud credit - to create a P2P net loan industry ecosystem" lectures. During the speech, he shared the credit status of P2P net loan industry for the guests: P2P net loan industry consists of three core participants, investors, borrowers and borrowers P2P platform, directly determines the quality of investor willingness to invest and platform for survival, looking for high quality borrowers because of its breakthrough in the core of the entire P2P net loan industry the former; P2P net loan industry in the rapid development of our country, China has become the world's largest P2P net loan market, but due to the development of China's credit industry is relatively backward, the development of P2P net loan industry in our country at present and bottlenecks; in the central bank's credit system, only 300 million people have real credit relations with banks the accounting for less than 25%, and the P2P platform is currently not included in the central bank credit system, the large and small credit company a lot, but no one is able to provide a P2P net loan A complete copy of the credit report.
15:30[cloud computing security and trusted computing Forum] security dog CEO Chen Fen in the theme for the cloud service model is used to solve the safety of the small and medium-sized enterprises pain points, "the speech said, the small and medium-sized enterprises are facing the risk allocation and external attack serious, very serious security situation, 90% of small and medium-sized enterprises lack systematic safety planning, in terms of security investment and the overall IT investment accounted for less than 3%. According to the safety protection system, network security, security baseline system (anti anti intrusion), identity authentication, Cross hybrid cloud and a public cloud management of several typical cloud security service scenarios and security dogs were put forward several solutions, including: production safety image template, safety producer of image template, community security forces -Store, cloud computing vendors network infrastructure, based on host host level, based on VPC (virtual private cloud).
15:25[cloud computing architecture core technology forum] lark technology founder and CEO left Yue for our decryption windows container of the history, present situation, future and application. Yue left first introduced the difference between windows and Linux designers, and then focuses on the Drawbridge container technology, and compared to the docker, first docker and kernel is shared, Drowbridge is not to be shared and the starting time of the docker relatively much faster. Drowbridge phase of relatively slow. Image Docker does not support multiple integration (such as Apache+MySQL), but Drawbridge can. Because Drawbridge to achieve the 45 API, you can do something Docker can not do things, such as support for Snapshot, can do availability High, as well as enclave Secure (SGX) -R/G. Drawbridge 2, the latest research and development, has been applied in the Machine Learning Azure.
15:20[cloud computing platform to construct and practice Forum] China, member of the Committee of experts on big data, Shanghai Sheng Tao Big Data Technology Co., Ltd. General Manager Ding in the theme is "big data intelligent IT tools and platform" speech first examples of large database market exists many problems: (1) inheritance -- does not support acid, big data will always be "from the sideline while talking"; (2) the performance of large data not only "big", but also to "fast". High performance, real time big data is the future of the road; (3) easy to use - big data to bring us not only the "value big", more important is that everyone will use the big data.
15:18[cloud computing data applications of intelligent transportation Forum] Tongji University Professor Yang Dongyuan, entitled, "big data era urban traffic thinking, analysis and decision making," the speech said, for urban traffic, big data is not a fashionable, but technology to promote, demand pull and task concept change the common call creativity, and the face of the field of urban traffic data technology application problems, need the government to improve predictability, establish the correct values and enhancement of pulse diagnosis ability. Period, he also said in the field of urban traffic, the application of information technology, neither the big data stuffing technique traditional technology framework, nor of association analysis technique and simple to apply. Finally, he introduced the large data evidence based decision analysis framework technology. Its main goal is to improve the decision-making effect of the organic integration of urban transport strategy, policy, planning, construction, management, and control of technical aspects of the strategic control process.
15:15["Internet plus" Financial Forum] letter big data innovation center research and development director Gu Wendong's speech on the theme "Bo that is new, extension letter financial data cloud". He believes that the recommended system is a typical application of large data. After that, he put forward the "connection Internet plus" financial bearing is flat, can be generated and any vertical field, financial products also has a platform, all walks of life cannot do without the financial, this platform what chemical reactions at the beginning and gradually vertical field releases great value. So, he believes that the development trend of Internet banking is: service, scene, cloud + end. In the end, he mentioned that the letter should be used to the letter, businesses, partners Trinity financial services system.
15:10[cloud computing security and trusted computing Forum] was in the Internet companies do safety work and Entrepreneurship of sinomenine cloud security founder &CEO Fu on safety of understanding is very profound. In entitled "for future adaptive security architecture" speech, share a real enterprise security story: famous game was hacked, final 7 joint team with 2 months time through a variety of technical means to found server 10% were infected. He believes that: the security environment is very grim, security has been far behind the development of cloud computing, unable to respond to drastic changes in business needs, more unable to face the professional attacker, corporate security into trouble. So the enterprise need more: applicable to various infrastructure, easy deployment, rapid response, easy to use, real-time detection of unknown threats, continuously monitor contains and protects the core assets, personnel rely on low cloud security services.
15:00Cloud computing platform to build and practice Forum] Hangzhou and pat cloud CTO Huang Huipan published a speech entitled "what is cloud acceleration" speech. He first introduced in the end what is cloud acceleration, he believes that the nature of the network is accelerated, after which he also shared the UPYUN cloud computing system architecture. Although cloud acceleration will bring the cost of hardware, system development and operational aspects of the network cost, but cloud acceleration brings the value is obvious, he thinks there are two main reasons, first is the service standard, transparent, fair; the second is service quality consistency and optimization cycle is short, and as a new generation of CDN Accelerated Service UPYUN redefined the cloud acceleration.
14:55[cloud computing architecture core technology forum (2)] DaoCloud co-founder and CEO Chen Qiyan in the subject is mentioned in the speech of the container to help enterprises transition to the Internet architecture ", before the vessel, the software development is less team collaboration, operation difficult to trace, quality control, integrated continuous, cluster to telescopic, delivery lacks uniform and other pain points plagued. The emergence of the container, the software development process with new ideas, namely: Lean Engineering (Methodology), mobile (application), GIT flow (collaboration), micro (Architecture), cloud platform (platform), container (released). He also introduced said, DaoCloud currently available products and solutions have two, a is DaoCloud should management platform (www.daocloud.io) it is native cloud application one-stop solution; another is DaoStack enterprise service, it is enterprise docker service, including private cloud, hybrid cloud.
14:52[cloud computing data applications of intelligent transportation Forum] drops fast taxi, vice president of technology, big data and commercial career department general manager Zhu Lei: the titled "line in" the cloud "- the era of big data intelligent life" theme speech. He describes the application of large data, products, business and operations related to the case. In addition, Zhu Lei shared a taxi orders intelligent matching, from the human, material, information, services, the nature of the four points of view, and the user's loss of monitoring and early warning systems and operational strategies. Finally, he introduced the big data architecture from two aspects of business and engineering drops taxi.
14:50[platform construction and practice of cloud computing Forum] China Telecom Co Branch Technical Director Guang Xiaoming published a report entitled "field exploration and practice of" China Telecom cloud computing cloud computing speech, he said China Telecom has set up north and south two cloud data center construction covering 8 regions, 2 cloud base, 2 isolation area a total of 17 resource pool nodes (excluding the isolation zone and two bases), and share the Tianyi Yunnan North double live storage pool case and hybrid cloud application case, at the same time, he also introduced the Tianyi hybrid cloud five scenarios, including disaster recovery has been applied, the flexible research and development testing, mobile APP and virtual desktop. In the end, he also introduced the core technology index of sky wing hybrid cloud,
14:45["Internet plus" Financial Forum] ant payment service financial cloud Solutions Manager Wang Lei shared the "cloud computing" Internet plus financial empowerment. He believes that the wide use of financial cloud is in line with the trend of the financial industry, especially the inevitable result of Internet plus finance. He mentioned, financial cloud background is: financial IT application of self-control technology has risen as a national strategy; Internet banking online at any time, small frequent characteristics of traditional IT systems bring enormous challenges; more new small and medium-sized financial institutions, there is an urgent need to specialization, socialization resource support. He believes that although "Internet plus" character from "characteristics Internet plus" business, but for financial, robust, security is also very important.
14:40[cloud computing security and trusted computing Forum] 360 cloud division product director Zhang Xiaobing issued a cloud security technology architecture sharing theme speech. 2014 domestic new malicious samples, phishing sites 2 million 620 thousand, Android virus 3 million 260 thousand, 65.5% sites there are loopholes, the security of the Internet Co has led to a public security accident has led to the disclosure of information leakage. For this purpose, 360 put forward the concept of "data driven security", using QVM artificial intelligence engine, based on massive data mining, the introduction of intelligent machine learning algorithm, accurate identification of unknown malicious software. And through the large data association technology, with a variety of graphics to show the way to help security experts to analyze the unknown threats, discovery, backtracking, tracking and warning. In addition, but also to provide multi tenant isolation, cluster and company business isolation, high anti DNS service, with five network distribution security CDN service, DDoS attack prevention etc. to build secure cloud environment, and independent research and development of the Hawk Eye System for real-time scanning door.
14:30"[Internet plus China]" Financial Forum big data expert committee, Chinese Institute of electronics, cloud computing expert committee, nine one financial information services (Beijing) Co., Ltd. founder and CEO Xu Zewei shared the "Internet financial innovation based on big data". He believes that there are three asymmetric information in the whole traditional finance: information asymmetry, knowledge asymmetry, service asymmetry, and these three can rely on technology to solve the asymmetry. Based on this, he suggested: in essence, Internet banking is the integration of information flow and capital flows. He believes that the data itself does not produce value, how to analyze and use big data to help the business is the key. After that, he proposed three principles of Internet financial industry data transactions: the two sides actively submit transaction data; platform capabilities to the product is simple enough; platform operating data efficiency and liquidity.
14:25[cloud computing data applications of intelligent transportation Forum] Shanghai Beidou satellite navigation platform Co., Ltd., deputy general manager, chief engineer Zhu Feng published entitled the dipper high precision navigation and intelligent transportation "topic. First introduced the development of Beidou and related aspects, he shared the high precision navigation and service cloud, he believes that entering the market with high precision positioning of Beidou (including the entry to the field of Intelligent Transportation), promote the application of innovation with high precision, will promote the development of the Beidou industry, then, he introduced some applications of Beidou in the field of intelligent transportation, and said Lane level applications will become the Big Dipper in the field of intelligent transportation tipping point precision, promote the application of innovation of intelligent transportation, finally he introduces the technical challenges of Beidou high precision navigation, precision positioning, map (high precision Lane level) and availability, high dynamic and low cost (positioning terminal).
14:20[Cloud Computing Core Technology Architecture Forum] vice president and CTO Sun Dongfeng, vice president of foot note how to remember how to use the cloud platform architecture based on ten million mobile applications. Mobile Internet applications based on the picture, the registered users nearly DAU, 3000W million level, the date of new users 30~40%. Problems encountered MySQL+PHP traditional architecture including data bottlenecks, performance bottleneck and horizontal spreading bottleneck of the book of foot, for example, 1. A huge amount of data must pools; 2. The level of SOA extensions service cluster; 3. Three level cache, MySQL downgrade for persistence tool. Through the application of public cloud services, enough memory to achieve a dynamic and easy to expand, on-demand services, the cost of the early 1, the rapid expansion of the late 2 perfect monitoring system and operation and maintenance background; 3 professional data storage support.
14:18[cloud computing platform construction and practice Forum] Intel China Shanghai branch company big data software engineer Luo Zhongyue immediately Ruan Xingping speech, from a technical point of view the Intel mechanism is how to combine the openstack. Mainly includes two steps, (1) RSA in the OpenStack rendering; (2) the use of RSA to expand the function of OpenStack.
14:12[the cloud computing platform for building and practice Forum] Intel data center cloud platform division whole cabinet architecture market, technical manager Ruan Xingping published entitled "Intel machine cabinet architecture: for software defined Infrastructure Optimization of cloud infrastructure solutions", he said with the development of cloud technology to construct data center requirements become more and more standard, deliver more elastic, the deployment of more flexible. Intel's entire cabinet is a logical architecture for computing resources, network resources and storage resources to achieve decoupling and the need for restructuring. This scheme has been applied to redefine today's data center cloud architecture so as to realize the efficient deployment of cloud services. Finally, he also shared the combine software defined infrastructure case with openstack ironic and Intel whole cabinet architecture.
14:10[cloud platform construction and practice Forum] HYPER founder &CTO Wang Xu in his speech, said that the current is in the Docker boom, what is Docker? Docker=Container (LxC) +Layered image (aufs), both LxC and aufs is not something new, and combination has produced great effect, the reason lies in the docker's core is used as the center, to greatly simplify the overall release process, reduce the difficulty of operation and maintenance. Docker for the application of the package, so that the operating system to return to the original , the application and the operating system is completely decoupled, is a revolution in the field of operation and maintenance. At the same time, he said virtual machine is not do the application as the center and hyper is center application virtualization. Finally, he also introduced the nature of hyper, and has a container, why also virtual machine and hyper and containers were compared.
14:05[cloud computing security and trusted computing Forum] Microsoft trusted safety technology policy director chenkai entitled "building a trusted cloud computing platform" of speech, with particular reference to it technology, such as mobile, application, big data, cloud computing and other development brings an of great challenges and opportunities in the calculation. Especially in terms of trust, how to protect the data, who can access the data, where the data, how to prove that you are committed to the user has been concerned about the. To this end, Microsoft provides credible (core security, privacy protection, synthetic gauge and reliability promise), open and flexible (cross platform experience consistent, anytime, anywhere all data, scalable application development and flexible infrastructure) of the security services. As in the Azure platform, companies are free to choose the Linux system. Microsoft's commitment in terms of network security is: development, provide security products and services; customers to protect data security and privacy; assist customers and partners to protect their assets; to help in the fight against cyber crime. Technology, Microsoft in data encryption, through "the data transmission between customer and business, the data transmission between the data center, data storage, between the user end to end data protection to achieve all-round protection. Microsoft has a full set of security system in terms of security.
14:00[cloud computing architecture core technology forum (2)] spruce Beijing Century Network Technology Co., Ltd. CEO Qi Ya Xuan in the theme for the SDN in cloud computing data center application "speech mentioned, SDN simplifies network management, and provide support for the application. In the Internet, SDN is evolution, and not change, because without migrating, free expansion, at any time to retreat and spruce can be realized by OF/OF/VXLAN, such as Arista, centec; in terms of service, SDN is open, rather than closed, using open source technology and integration of third-party resources and quality assurance, spruce is realized through the nfv, such as array and NSFocus; in terms of security, SDN variable passive defense to active defense, need to go through the data acquisition, analysis, and execution.
13:55 "Internet plus" Financial Forum Secretary General of thousands of Internet financial, co-founder Wen Xuechen shared the name "trend of Internet financial reporting and analysis" keynote speech. During the period, he analyzed the "Internet plus" financial background as well as for the "Internet plus" financial future judgments and opinions. He believes that the financial industry is now facing three major aspects of the proposition: the economic downturn, institutional change, technological innovation. He shared two formats for the future development trend of the industry: Internet Securities and Internet insurance. For Internet insurance, he believes that the Internet and insurance overlay to bring new effects: the Internet will give the insurance industry to bring a new blue ocean market; product pricing has become more and more precise, new business models appear. For the development trend of Internet banking, he summed up as: high speed development, innovation integration, integration and reconstruction.
13:50[cloud computing data applications of intelligent transportation Forum] China Institute of electronic cloud computing honorary director of the Committee of experts committee, China big data expert advisory committee, Li Deyi academician of Chinese Academy of Engineering: the "intelligent driving" recognition of the theme of the opening speech. Academician Li said architecture design, module division and the interface agreed to determine the core competitiveness of the smart car industry. Subsequently, he shared the four principles of the architecture design: systems, modules, and happy programming principle, detailing the machine vision to form the driver's vision, he said, machine vision is far from all of human visual perception of the full range simulation. Finally, he shared the smart car sensor how to select and configure and machine vision.
13:40[cloud computing security and trusted computing Forum] CNPC richfit Information Technology Co., Ltd. information security, senior director of technology Huang Sheng: the enterprise private cloud safety protection practice and exploration of "theme speech. Existing enterprise information system on the basis of the use of the model to determine the current stage of enterprise private cloud will be using IaaS based, PaaS supplemented by the model. With the gradual shift to the application layer and become more complex, the traditional single border protection mechanism is difficult to ensure security. From AWS metadata penetration test and full stack attack case, we can see that the cloud computing technology changed everything, but cloud computing platform itself is a complex information system, especially virtualization management, and cloud management system using common software and the existing technology development and eventually deploys on the traditional hardware platform, is still subject to the influence of traditional software and hardware technology ecosystem. Therefore, the traditional means of attack is still a threat, or need to rely on traditional means of protection as a basis for private cloud security.
13:40[Cloud Computing Core Technology Architecture Forum] Su Ningyun business OpenStack research and development center director Zhang Xiaobin share the "OpenStack based private cloud of the road". From the beginning of May 2014, Suning Electric private cloud to thousands of physical and KVM virtual machine transformation into openstack private cloud, after a single control node openstack production cluster deployed to deploy multiple data centers, multi region, high availability cluster production changes, there are now four regions, including network and the DMZ a plurality of available domain, multi host sets (clusters), special resource pool calculated and storage intensive host resource pool.
13:36["Internet plus" Financial Forum] Chinese Cloud Computing Technology Industry Association vice chairman, China big data expert committee vice chairman, vice chairman of the Institute of electronics China Liu Rulin delivered the opening speech. He stressed that the essence of cloud computing is the service, it should be to provide the traditional product, software concepts to provide services. Financial service is also provided, in the "Internet plus" under the banner of the proposed financial is necessary. Finance is not only related to the national economy and the people's livelihood, but also related to the vital interests of the people, but also often mentioned in the cloud computing security issues. He believes that the "Internet plus" financial reform there are a lot of things, a vast world.
13:34June 5 in the afternoon, the seventh China Cloud Computing Conference cloud computing data applications of intelligent transportation forum under the auspices of the Chinese Intelligent Transportation Association executive director, vice secretary general, director of the national intelligent transportation industry technology innovation strategic alliance Long Guan Jizhen officially opened.
13:32[cloud computing security and trusted computing Forum] "cloud computing security and trusted computing forum" in the stone network CEO CipherGateway Bai Xiaoyong, under the auspices of the official open.
13:32[cloud computing platform and Building Forum] vice chairman of the Committee of China's big data experts, vice chairman of the China Institute of electronic cloud computing Expert Committee Huang Xiaoqing as chairman of the forum delivered a speech.
13:30Cloud Computing Core Technology Architecture Forum (two) officially launched, there will be 5 guests to share the OpenStack, containers, SDN and other popular technology. Forum by the China Institute of electronic cloud computing expert committee, Beihang University, Professor Qian Depei School of computer science and chair.
13:30[the cloud computing platform for building and practice Forum] June 5, cloud computing platform to build and practice forum in China Institute of electronic cloud computing expert committee, the Chinese Academy of Sciences cloud computing industry technology innovation and incubation, director of the center, Guangdong Electronic Industry Research Institute president Ji Tongkai presided over officially began.
13:30"Internet plus" Financial Forum officially opened in the nine one financial co-founder Wu Wenxiong under the auspices of. Wu Wenxiong pointed out that the moment, the traditional industry has been deeply affected by the Internet thinking, and in the Internet highly fit within the financial industry, cloud computing and big data has become a new trend.
11:30China big data expert consultant, China Institute of electronics, cloud computing vice chairman of the Committee of experts, China Academy of Engineering Li Bohu said that the industry is facing the global new technological revolution and the industrial revolution challenges: the integration of the new generation of information and communication technology and the rapid development of manufacturing industry and the depth, is causing development concept, manufacturing mode and manufacturing method and system, and major changes in the value chain; China manufacturing industry big but not strong, is facing from the lower end of the value chain to high-end, from a big manufacturing country to a powerful one, China from manufacturing to China to create a critical period of transformation; the development trend of the international manufacturing industry and the competition facing a major adjustment; China's economic development and national security put forward higher requirements on the development of the manufacturing industry. In his speech, Li Bohu academician also put forward the corresponding countermeasures for a more challenging. [details]
11:00CSA cloud security alliance founder and CEO Jim Reavis published entitled "cloud today, cloud tomorrow" of the speech. He first introduced the CSA and the cloud computing and healthy development of the importance, he said CSA currently has 64000 members and 300 corporate members, 75 branches. , he also introduced the current leaders of enterprises are using cloud of things including: cloud security agent, operation and maintenance, container technology (docker, rocket), safety analysis, integration of the networking, create local cloud security strategy etc.. So when it comes to the challenges faced by CSA in the future, he said CSA future will work to make the security of the cloud more than any other IT system. This requires CSA to develop some standards to provide some certification, he believes that security should be provided as a service to. Finally, he introduced the SDP virtual private cloud and Internet of things use cases. [details]
10:30Beijing sansec Technology Development Co., Ltd. founder and CEO Zhang Yue Gong said that shared intensive thought based on cloud resources, cloud security risks are mainly from: the boundaries of traditional security thinking failure, sealing, blocking, check, kill off guard, virtual environment, authentication and authorization, visit control more difficult, the cloud administrator has greater authority. In view of this phenomenon, ZhangYue recognized for cryptographic techniques have more advantages in the cloud security: Cryptographic technology is the theoretical foundation of; cryptography is active safety technology, in authentication, authorization, control and data protection has the advantage; cryptography and data processing closely, in line with the depth protection strategy. And in the implementation of the password technology, the hardware is undoubtedly more advantage. [details]
10:00Central South University Professor, thousands of people plan expert Chen Jianer in a keynote speech from many aspects to share the development and changes in transparency in this year. Transparent computing is a new computing model. It is different from the cloud computing, virtual desktop, emphasizing the software on the server side, the calculation of the client, the implementation of the flow of cross platform and small terminal. Cloud computing to solve the problem of data cloud, and transparent computing to solve the problem of cloud software. The main features of transparent computing are: cross software and hardware platform; security issues; easy to use and easy maintenance management; small terminals and a variety of instruments and equipment to run different large software; low cost and environmental protection. Its core key points include HTML5. To achieve cross platform; transparent (cloud) architecture, to achieve controllable service, credible, environmental protection; OS Meta, with security, cross platform characteristics. Transparent calculation of network security has three to ensure that (1) OS Meta active protection; (2) the implementation of the virus protection; (3) data stream monitoring and management. [details]
9:30Adgetec company, CEO of, a bestselling book author Professor Mark Mueller-Eberstein published entitled "cloud computing data drive business innovation and development" speech and introduces how effective use of cloud computing and data networking technology and bring opportunities to rapid changes in the world can become our business accelerator in the. Mark Mueller-Eberstein said became the winner of the new world and reduce cost is not an important issue, more innovative, more take the customer as the center, more flexible to meet the needs of customers is the key, and it maturity is crucial to corporate success indicators. Cloud computing, mobile, data, Internet of things, super app, smart city, 3D printing technology trends to us brings many new opportunities, we should use cloud computing unlimited computing power and data contains the value. [details]
9:00Hughes James (Qiu Jianyi), chief technology officer of Seagate technology senior storage, published a speech entitled "the future of cloud storage", he first introduced the ASTC (advanced storage technology alliance) technology roadmap. He predicted that in 2017, the mechanical hard disk storage density will maintain a compound annual growth rate of 30%, and eventually reached around 2025 per square inch 10Tb, which contributed to the realization of 100TB hard drive. After he introduced the object storage as well as from 2001 to 2013 13 between the object storage startups financing situation, are gradually increasing, of course, Seagate also see this trend. This is also the reason Seagate force in this field. Finally, he concluded that the future storage needs will continue to increase, open source software, including Swift, CEPH, Riak and other software defined storage will eventually reduce the cost of spending, storage API will make the development of a more simple. [details]
8:35Chinese Institute of electronics, cloud computing and vice chairman of the Committee of experts, China big data deputy director of the Committee of experts committee, vice director of committee of National Natural Science Fund, China Academy of Engineering Gawain Academy in the city of multimedia data, storage and processing technology of speech said: the new Turing Award winner is Dr. Michael Stonebraker, one of the most famous experts in the field of database. It is also proved that the big data technology is very important for the industry. Smart city as a representative of the practice of big data. First, smart city is a complex information ecosystem.; secondly, smart city based, big city data sensing network and data center; third, prerequisite for the success of the smart city is main basis for government decision-making from large data centers. [details]
8:30The seventh China Cloud Computing Conference Third Plenary Session of the committee, deputy director of China's big data experts, China electronic society, vice chairman of the Committee of experts committee Huang Xiaoqing chaired the official start.
8:25The seventh China Cloud Computing Conference third days after the morning plenary session, is the core technology of cloud computing architecture (two), the construction and practice of cloud computing platform (two), cloud computing security and trusted computing, "Internet plus" finance, big data cloud computing intelligent transportation industry should use "5 forums.
|General assembly in December 10th|
|09:00-09:05||General meeting and guests at the meeting||Sun ShaolingAssistant to general manager of China Mobile Suzhou R & D center and CTO|
|09:05-09:10||CCF big data expert committee secretary general speech||Cheng Xueqi |
Institute of computing, Chinese Academy of Sciences researcher, CCF big data expert committee of the Secretary General
|09:10-09:15||Speech by the chairman of the conference||Zhang XiaodongDirector of the Department of computer science and engineering, Ohio State University, Professor M. C ritchfield Robert|
|09:15-09:35||Interpretation of the development trend of big data technology in 2016||Vice President Pan Zhuting venustech, Deputy Secretary General of CCF big data expert committee|
|09:35-10:15||Internet, data and Computing||Wang Jian Alibaba group CTO|
|10:15-10:50||Discussion on the application of network and communication big data in the field of tourism and credit investigation||Fan Jian, deputy general manager and chief architect of China Unicom Group Co., Ltd.|
|10:50-11:25||The future of cognitive workload requires a new IT infrastructure||Guo Rensheng IBM, vice president, general manager of Greater China hardware system|
|11:25-12:00||Continuous support business innovation big data platform and business practice||Xu Xinghai HUAWEI IT product line big data solutions planning director|
District wave HUAWEI telecom software big data chief technology planning
|13:00-13:40||Analysis and search of multimedia data||Academician of Chinese Academy of Engineering|
|13:40-14:15||Spark development: review 2015, outlook 2016||Xin Shi Databricks co-founder and chief architect Spark|
|14:15-14:50||Cold thinking of big data heat||Sun Shaoling, general manager of China Mobile Suzhou R & D center assistant and CTO|
|14:50-15:25||Big data era of enterprise business system to 3 Transformation||Jiao Lieyan Primeton information technology Limited by Share Ltd CTO|
|15:25-16:00||From 2014 to 2016, the evolution of large-scale memory database||Liu Haifeng Jingdong cloud platform, the chief architect of the Department of system technology|
|16:00-16:35||The technological evolution and key characteristics of modern data warehouse||Sun Yuanhao star ring technology founder and CTO|
|16:35-17:10||Algorithms for Big Data: Randomized Making the Impossible Possible||Jin Rong tenured professor at Michigan State University|
|17:10-17:45||Storage for Fast Analytics on Fast Data Kudu:||Lipcon Cloudera Todd company R & D Engineer, Kudu inventor|
|December 11th -12 12, special forum|
|December 11th (Friday)|
| Policies and regulations and standardization|
Chairman of the forum:
| data base|
Chairman of the forum:
Zhou Aoying, Qian Ling
| Financial big data|
Chairman of the forum:
Chen Jidong, Wang Jianzong
| Data market and transactions|
Chairman of the forum:
He Hongling, Qi Hongwei
|afternoon|| Big data infrastructure|
Chairman of the forum:
Zhang Wensong, Zhou Haojie
| Deep learning|
Chairman of the forum:
Shan Shiguang, Yu Kai
| Industry and manufacturing industry big data|
Chairman of the forum:
Wang Hongzhi, Jin Xiaolong
| Medical health and biological data|
Chairman of the forum:Hu Bin
|HUAWEI big data technology (need to apply separately)|
December 12th (Saturday)
| Network and communications big data|
Chairman of the forum:
Zhang Baofeng, Zhang Yunyong
| Recommendation system|
Chairman of the forum:
Feng Shicong, Lu Yilei
| Traffic and tourism big data|
Chairman of the forum:
| Education big data|
Chairman of the forum:
Lin Shiding, Yang Dong
| Large data analysis and ecological system|
Chairman of the forum:
| Big data security|
Chairman of the forum:
Pan Zhuting, Tan Xiaosheng
| Internet big data|
Chairman of the forum:
Wen Jirong, Liu Jiang
| Social governance big data|
Chairman of the forum:
Luo Shengmei, Ceng Dajun
|all day||Linux on Power IBM algorithm Marathon Challenge (need to apply separately)|