Computer Sciences Corporation is an American multinational corporation that provides information technology services and professional services. Its headquarters are located in Falls Church, Virginia. CSC has 74,000 employees in over 70 countries. Its clients include commercial enterprises and the U.S. federal government, as well as state, local and non-U.S. government agencies.In September 2009, when Xerox acquired Affiliated Computer Services, CSC became the only remaining major "hardware vendor independent" IT Service provider with headquarters and major operations in the US.CSC has been a Fortune 500 Company since 1995, ranked 185 in the 2014 rankings. The company also figures in the Forbes Global 2000 list. Wikipedia.


Time filter

Source Type

News Article | May 10, 2017
Site: marketersmedia.com

— Factors such as growing expenditure on the security of critical infrastructures, rising adoption of cloud–based data storages and data analytics employed by the organizations are fueling the market. In addition, increasing threat of cyber security, as well as terrorism, has influenced organizations to advance the safety values, thus promoting industry growth. However, lack of correlation among security solutions and privacy concerns against the installation of surveillance cameras are hindering the market growth. Amongst Type, rising use of security strategies in organizations of all sizes makes system integration service to lead the market. Based on Components, hardware segment dominates the market owing to rising government spending in developing countries such as India, China, and Brazil to monitor security at airports, railway stations and on streets. North America is anticipated to lead market due to increasing illegal actions, need for security against terrorist activities and unlawful immigration in the region. Furthermore, strict government rules for safety & security and technological improvements in physical security solutions such as video surveillance are also fostering the growth of the market in North America. Some of the key players in the market include ADT Corporation, Anixter International Inc., Axis Communications AB, Bosch Security Systems, Inc., Cisco Systems, Inc., Computer Sciences Corporation (CSC), EMC Corporation, Genetec Inc., Hewlett-Packard, Honeywell International, Inc., IBM Corporation, McAfee Inc, Morpho SA, Pelco Inc., Schneider Electric, Siemens AG and Tyco International PLC, About Stratistics MRC We offer wide spectrum of research and consulting services with in-depth knowledge of different industries. We are known for customized research services, consulting services and Full Time Equivalent (FTE) services in the research world. We explore the market trends and draw our insights with valid assessments and analytical views. We use advanced techniques and tools among the quantitative and qualitative methodologies to identify the market trends. Our research reports and publications are routed to help our clients to design their business models and enhance their business growth in the competitive market scenario. We have a strong team with hand-picked consultants including project managers, implementers, industry experts, researchers, research evaluators and analysts with years of experience in delivering the complex projects. For more information, please visit: http://www.strategymrc.com For more information, please visit http://www.strategymrc.com/


Dr. Ghosh will influence talent and technology in the delivery of AI solutions for financial services, healthcare, media and telecom industries AUSTIN, TX--(Marketwired - May 16, 2017) - CognitiveScale, a provider of industry-specific machine intelligence software, today announced the addition of Dr. Joydeep Ghosh as the company's first Chief Scientific Officer. An internationally recognized authority on machine learning, data-web mining and related artificial intelligence (AI) approaches, Dr. Ghosh joins the team with more than 30 years of experience applying these technologies to complex real-world problems. As CognitiveScale's Chief Scientific Officer, Dr. Ghosh will focus on aligning and tightly integrating the company's Cognitive Cloud software with industry-specific data models and the latest algorithmic sciences efforts; recruiting the best and the brightest minds in AI while supporting those already at CognitiveScale; and educating the market about the power and value of augmented intelligence and enterprise-grade AI. Dr. Ghosh's research appears in more than 400 peer-reviewed papers that have been cited more than 20,000 times to-date, in addition to more than 50 book chapters and 20 co-edited books. His works have received 16 best paper awards to date. Dr. Ghosh has chaired top data mining and machine learning conferences such as ACM-KDD and the SIAM International Conference on Data Mining, and often keynotes such conferences. Dr. Ghosh was elevated to an Institute of Electrical and Electronics Engineers (IEEE) Fellow in 2004 for his extensive work on robust AI-driven solutions that synergistically integrate multiple types of learning systems to address complex problems. Subsequently, he received the Technical Achievement Award (2015), the highest research award given by the IEEE Computer Society, among a host of other distinctions. "CognitiveScale's approach to developing software that emulates and extends human cognitive abilities represents a quantum leap in the field of AI," said Dr. Joydeep Ghosh, Chief Scientific Officer, CognitiveScale. "I look forward to helping advance their industry optimized AI products that help professionals make sense of messy, disparate first and third party data, improve customer engagement, and drive smarter decisions and business processes." "It is with great pride that we welcome someone that literally wrote the book on multi-learner artificial intelligence and its application for business and social impact," said Matt Sanchez, Founder and CTO, CognitiveScale. "Dr. Ghosh is at the pinnacle of machine learning researchers and practitioners worldwide. As our Chief Scientific Officer, he will help accelerate the development of world-class augmented intelligence products and our mission of delivering scalable and practical machine intelligence to the enterprise." Accomplishments in Academia While assuming the Chief Scientific Officer role at CognitiveScale, Dr. Ghosh will continue to serve as the Schlumberger Centennial Chair Professor of Electrical and Computer Engineering at the University of Texas (UT), Austin, where he is also affiliated with the McCombs School of Business, Department of Computer Sciences and Biomedical Engineering. Dr. Ghosh is the founder-director of IDEAL (Intelligent Data Exploration and Analysis Lab), established at UT in 1991 as the Lab for Artificial Neural Systems. After more than two decades in academia his passion for research and teaching is as strong as ever. Dr. Ghosh was voted "Best Professor" in the Software Engineering Executive Education Program at UT. He has graduated 35 PhDs to date, two of whom were chief scientists at companies acquired by Google. Many others hold key R&D positions in industry or are tenured faculty members in top Computer Science departments. For more information about Dr. Ghosh and other members of the CognitiveScale executive leadership team, as well as information about the company's industry-specific AI solutions, please visit https://www.cognitivescale.com/. ABOUT COGNITIVESCALE CognitiveScale builds augmented intelligence software for financial services, healthcare, and commerce markets. The company's products, ENGAGE and AMPLIFY, are built on its open and extensible AI foundation, CORTEX. Our products help businesses use AI to transform user engagement, improve decision-making, and deliver self-learning and self-assuring business processes in a risk mitigated manner. The company has successfully deployed its enterprise-grade software with multiple Global 500 companies using its unique 10-10-10 method that helps businesses model their first cognitive system in 10 hours, customize it using their own data in 10 days, and go live within 10 weeks. Located in Austin, New York, London and India, CognitiveScale investors include Norwest Venture Partners, Intel Capital, IBM Watson, and Microsoft Ventures. For more information visit cognitivescale.com.


The system consists of four sensors that monitor different physical parameters of the driver and their position at the wheel. From these values, the system is able to generate a series of acoustic signals if it detects some risk, thus alerting the driver and avoiding a possible accident. As the researchers explain, fatigue has a wide range of symptoms: blurred vision and increased blink rate; anxiety and changes in the driver's behavior; increase in the number of movements needed to be comfortable on the seat; and, more importantly, an increase in the driver's reaction time to a certain dangerous situation on the road. "For this reason, it is important to have some system capable of detecting those symptoms to help increase the driver's safety. Now, most of the current solutions focus on eye movement and face detection, and our system goes further," says Jaime Lloret, researcher at the Polytechnic University of Valencia. The system devised by the researchers consists of an electronic board that acts as a central processing unit, two pressure sensors and another two that measure the driver's temperature, all of them located on the steering wheel, and by duplicate for monitoring both hands; a light sensor on the headrest that would detect possible snoozes when driving; and the buzzer that generates the acoustic alarm in case of detecting fatigue or distraction. All of this is complete with a collision sensor that detects collisions or sudden braking and a button to reset the system located on the steering wheel. "After triggering an alarm, the driver has to disable it by pressing the button," says Sandra Sendra, researcher from the University of Granada. The sensors are connected to the central electronic board, which receives data from the sensors every second, and it processes and analyzes them by an algorithm, to check if the collected values remain within the thresholds considered normal or safe. When any of these sensors exceeds said threshold values, the algorithm tries to define if it is a false alarm or if the sensors have registered a possible fatigue or distraction situation. In an affirmative case, the acoustic signal that alerts the driver is activated. Additionally, all data are stored on a micro-SD card for a possible post-processing task, in case of accidents or future studies. The system was presented at the 1st EAI International Conference on Future Intelligent Vehicular Technologies, held last September in Portugal. The work was also awarded as the best paper of the conference. Looking ahead, the researchers plan to incorporate a small GPS receiver to collect the position of the vehicle and a wireless module that allows to connect the system with the drivers' smartphones, so that, as a last resort, the system is able to make an emergency call. Explore further: Cadillac to make Super Cruise hands-free driving tech available in 2018 Cadillac CT6 More information: Low-Cost Vehicle Driver Assistance System for Fatigue and Distraction Detection. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, (2017), Vol.185, Pp. 69-79. DOI: 10.1007/978-3-319-51207-5_7


Global Cyber Security market is estimated at $85.21 billion in 2015 and is expected to reach $224.48 billion by 2022 growing at a CAGR of 14.84% from 2015 to 2022Pune, India - April 24, 2017 /MarketersMedia/ — Summary The Global Cyber Security market is estimated at $85.21 billion in 2015 and is expected to reach $224.48 billion by 2022 growing at a CAGR of 14.84% from 2015 to 2022. Growing cyber crimes which may cause the loss of intellectual and financial assets and increase in adoption of cloud-based security solutions are some of the key factors propelling the market growth. Whereas use of pirated and freeware software for cyber security is hindering the market growth. Growing demand for Next Generation Security Solutions and increasing potential for Mobile and Web Applications and Platforms are the opportunity factors for the market players. However lack of skilled professionals is challenging the market growth. By service, Managed Services segment is expected to grow at highest CAGR during forecast period. In deployment mode, organisations are showing interest towards cloud deployment because of its cost-effective and time-efficient features. North America accounted for the highest market share as compared to other regions. The Asia Pacific region is expected to grow at a higher CAGR and is anticipated to account for the highest market share during forecast period because of increase growing adoption of web and mobile based business applications. Demand from developing countries in this region is one of the key drivers for the Asia Pacific region to move with highest CAGR during forecast period. Request a Sample Report @ https://www.wiseguyreports.com/sample-request/960010-cyber-security-global-market-outlook-2016-2022 Some of the key players in the market include BAE Systems PLC, The Boeing Company, Booz Allen Hamilton Inc, Cisco Systems Inc, Computer Sciences Corporation, Dell Inc, Finmeccanica SpA, General Dynamics Corporation, Hewlett Packard Company, International Business Machines Corporation (IBM), Intel Security, Symantec Corporation, Rapid7, Inc., EMC RSA, Fireeye, Inc., Trend Micro, Inc. and Sophos Ltd. Solutions Covered: • Web Filtering • Unified Threat Management (UTM) • Security and Vulnerability Management • Risk and Compliance Management • Intrusion Detection System/Intrusion Prevention System (Ids/Ips) • Identity and Access Management (IAM) • Firewall • Encryption • Distributed Denial of Service Mitigation • Disaster Recovery • Data Loss Protection (DLP) • Antivirus and Anti malware • White listing • Other Solutions Security Types Covered: • Application Security • Cloud Security • Content Security • Endpoint Security • Network Security • Wireless Security • Industrial Control Systems Security Services Covered: • Professional Services o Training and Education o Risk and Threat Assessment o Managed Security Services (MSS) o Design and Integration o Consulting • Managed Services Applications Covered: • Telecom and IT • Retail • Manufacturing • Healthcare • Government and Public Utilities • Banking, Financial Services and Insurance (BFSI) • Aerospace, Defense and Intelligence • Other Applications Deployment Modes Covered: • On-Premises • Cloud Components Covered: • Services • Solution Organization Sizes Covered: • Large Enterprises • Small and Medium Enterprises Regions Covered: • North America o US o Canada o Mexico • Europe o Germany o France o Italy o UK o Spain o Rest of Europe • Asia Pacific o Japan o China o India o Australia o New Zealand o Rest of Asia Pacific • Rest of the World o Middle East o Brazil o Argentina o South Africa o Egypt At any Query @ https://www.wiseguyreports.com/enquiry/960010-cyber-security-global-market-outlook-2016-2022 Table of Contents 1 Executive Summary 2 Preface 2.1 Abstract 2.2 Stake Holders 2.3 Research Scope 2.4 Research Methodology 2.4.1 Data Mining 2.4.2 Data Analysis 2.4.3 Data Validation 2.4.4 Research Approach 2.5 Research Sources 2.5.1 Primary Research Sources 2.5.2 Secondary Research Sources 2.5.3 Assumptions 3 Market Trend Analysis 3.1 Introduction 3.2 Drivers 3.3 Restraints 3.4 Opportunities 3.5 Threats 3.6 Application Analysis 3.7 Emerging Markets 3.8 Futuristic Market Scenario 4 Porters Five Force Analysis 4.1 Bargaining power of suppliers 4.2 Bargaining power of buyers 4.3 Threat of substitutes 4.4 Threat of new entrants 4.5 Competitive rivalry 5 Global Cyber Security Market, By Solution 5.1 Introduction 5.2 Web Filtering 5.3 Unified Threat Management (UTM) 5.4 Security and Vulnerability Management 5.5 Risk and Compliance Management 5.6 Intrusion Detection System/Intrusion Prevention System (IDS/IPS) 5.7 Identity and Access Management (IAM) 5.8 Firewall 5.9 Encryption 5.10 Distributed Denial of Service Mitigation 5.11 Disaster Recovery 5.12 Data Loss Protection (DLP) 5.13 Antivirus and Anti malware 5.14 White listing 5.15 Other Solutions 6 Global Cyber Security Market, By Security Type 6.1 Introduction 6.2 Application Security 6.3 Cloud Security 6.4 Content Security 6.5 Endpoint Security 6.6 Network Security 6.7 Wireless Security 6.8 Industrial Control Systems Security 7 Global Cyber Security Market, By Service 7.1 Introduction 7.2 Professional Services 7.2.1 Training and Education 7.2.2 Risk and Threat Assessment 7.2.3 Managed Security Services (MSS) 7.2.4 Design and Integration 7.2.5 Consulting 7.3 Managed Services 8 Global Cyber Security Market, By Application 8.1 Introduction 8.2 Telecom and IT 8.3 Retail 8.4 Manufacturing 8.5 Healthcare 8.6 Government and Public Utilities 8.7 Banking, Financial Services and Insurance (BFSI) 8.8 Aerospace, Defense and Intelligence 8.9 Other Applications 9 Global Cyber Security Market, By Deployment Mode 9.1 Introduction 9.2 On-Premises 9.3 Cloud 10 Global Cyber Security Market, By Component 10.1 Introduction 10.2 Services 10.3 Solution 11 Global Cyber Security Market, By Organization Size 11.1 Introduction 11.2 Large Enterprises 11.3 Small and Medium Enterprises Buy Now @ https://www.wiseguyreports.com/checkout?currency=one_user-USD&report_id=960010 What our report offers: - Market share assessments for the regional and country level segments - Market share analysis of the top industry players - Strategic recommendations for the new entrants - Market forecasts for a minimum of 8 years of all the mentioned segments, sub segments and the regional markets - Market Trends (Drivers, Constraints, Opportunities, Threats, Challenges, Investment Opportunities, and recommendations) - Strategic recommendations in key business segments based on the market estimations - Competitive landscaping mapping the key common trends - Company profiling with detailed strategies, financials, and recent developments - Supply chain trends mapping the latest technological advancements Continued.... Contact Us: sales@wiseguyreports.com Ph: +1-646-845-9349 (US) ; Ph: +44 208 133 9349 (UK) Contact Info:Name: NORAH TRENTEmail: sales@wiseguyreports.comOrganization: WISE GUY RESEARCH CONSULTANTS PVT LTDAddress: Pune -40027, Maharashtra, IndiaPhone: 841 198 5042Source URL: http://marketersmedia.com/cyber-security-market-global-industry-analysis-key-vendors-opportunity-forecast-2017-to-2022/189463For more information, please visit https://www.wiseguyreports.com/sample-request/960010-cyber-security-global-market-outlook-2016-2022Source: MarketersMediaRelease ID: 189463


This report studies the global Finance Cloud market, analyzes and researches the Finance Cloud development status and forecast in United States, EU, Japan, China, India and Southeast Asia. This report focuses on the top players in global market, like Oracle Corporation (California, U.S.) Google, Inc. (California, U.S.) International Business Machines (California, U.S.) Amazon Web Services Inc. (Washington, U.S.) SAP SE Inc. (Walldorf, Germany) Computer Sciences Corporation (Virginia, U.S) Microsoft Corporation (Washington, U.S.) Salesforce.com (California, U.S.) Huawei Technologies Co., Ltd (Guangdong, China) Capgemini (Paris, France). ZDNet For more information or any query mail at sales@wiseguyreports.com Market segment by Type, Finance Cloud can be split into Financial Forecasting Financial Reporting and Anasysis Financial Security Others Market segment by Application, Finance Cloud can be split into Revenue Management Wealth Management System Account Management Customer Management Others United States, EU, Japan, China, India and Southeast Asia Finance Cloud Market Size, Status and Forecast 2021 1 Industry Overview of Finance Cloud 1.1 Finance Cloud Market Overview 1.1.1 Finance Cloud Product Scope 1.1.2 Market Status and Outlook 1.2 Global Finance Cloud Market Size and Analysis by Regions 1.2.1 United States 1.2.2 EU 1.2.3 Japan 1.2.4 China 1.2.5 India 1.2.6 Southeast Asia 1.3 Finance Cloud Market by Type 1.3.1 Financial Forecasting 1.3.2 Financial Reporting and Anasysis 1.3.3 Financial Security 1.3.4 Others 1.4 Finance Cloud Market by End Users/Application 1.4.1 Revenue Management 1.4.2 Wealth Management System 1.4.3 Account Management 1.4.4 Customer Management 1.4.5 Others 2 Global Finance Cloud Competition Analysis by Players 2.1 Finance Cloud Market Size (Value) by Players (2015-2016) 2.2 Competitive Status and Trend 2.2.1 Market Concentration Rate 2.2.2 Product/Service Differences 2.2.3 New Entrants 2.2.4 The Technology Trends in Future 3 Company (Top Players) Profiles 3.1 Oracle Corporation (California, U.S.) 3.1.1 Company Profile 3.1.2 Main Business/Business Overview 3.1.3 Products, Services and Solutions 3.1.4 Finance Cloud Revenue (Value) (2011-2016) 3.1.5 Recent Developments 3.2 Google, Inc. (California, U.S.) 3.2.1 Company Profile 3.2.2 Main Business/Business Overview 3.2.3 Products, Services and Solutions 3.2.4 Finance Cloud Revenue (Value) (2011-2016) 3.2.5 Recent Developments 3.3 International Business Machines (California, U.S.) 3.3.1 Company Profile 3.3.2 Main Business/Business Overview 3.3.3 Products, Services and Solutions 3.3.4 Finance Cloud Revenue (Value) (2011-2016) 3.3.5 Recent Developments 3.4 Amazon Web Services Inc. (Washington, U.S.) 3.4.1 Company Profile 3.4.2 Main Business/Business Overview 3.4.3 Products, Services and Solutions 3.4.4 Finance Cloud Revenue (Value) (2011-2016) 3.4.5 Recent Developments 3.5 SAP SE Inc. (Walldorf, Germany) 3.5.1 Company Profile 3.5.2 Main Business/Business Overview 3.5.3 Products, Services and Solutions 3.5.4 Finance Cloud Revenue (Value) (2011-2016) 3.5.5 Recent Developments 3.6 Computer Sciences Corporation (Virginia, U.S) 3.6.1 Company Profile 3.6.2 Main Business/Business Overview 3.6.3 Products, Services and Solutions 3.6.4 Finance Cloud Revenue (Value) (2011-2016) 3.6.5 Recent Developments 3.7 Microsoft Corporation (Washington, U.S.) 3.7.1 Company Profile 3.7.2 Main Business/Business Overview 3.7.3 Products, Services and Solutions 3.7.4 Finance Cloud Revenue (Value) (2011-2016) 3.7.5 Recent Developments 3.8 Salesforce.com (California, U.S.) 3.8.1 Company Profile 3.8.2 Main Business/Business Overview 3.8.3 Products, Services and Solutions 3.8.4 Finance Cloud Revenue (Value) (2011-2016) 3.8.5 Recent Developments 3.9 Huawei Technologies Co., Ltd (Guangdong, China) 3.9.1 Company Profile 3.9.2 Main Business/Business Overview 3.9.3 Products, Services and Solutions 3.9.4 Finance Cloud Revenue (Value) (2011-2016) 3.9.5 Recent Developments 3.10 Capgemini (Paris, France). 3.10.1 Company Profile 3.10.2 Main Business/Business Overview 3.10.3 Products, Services and Solutions 3.10.4 Finance Cloud Revenue (Value) (2011-2016) 3.10.5 Recent Developments 3.11 ZDNet 4 Global Finance Cloud Market Size by Type and Application (2011-2016) 4.1 Global Finance Cloud Market Size by Type (2011-2016) 4.2 Global Finance Cloud Market Size by Application (2011-2016) 4.3 Potential Application of Finance Cloud in Future 4.4 Top Consumer/End Users of Finance Cloud For more information or any query mail at sales@wiseguyreports.com Wise Guy Reports is part of the Wise Guy Consultants Pvt. Ltd. and offers premium progressive statistical surveying, market research reports, analysis & forecast data for industries and governments around the globe. Wise Guy Reports features an exhaustive list of market research reports from hundreds of publishers worldwide. We boast a database spanning virtually every market category and an even more comprehensive collection of market research reports under these categories and sub-categories. For more information, please visit https://www.wiseguyreports.com


Patent
Computer Sciences Corp. | Date: 2015-06-01

An update system configured to provide software updates, software patches and/or other data packets to one or more computer systems via a network is disclosed. The update system may interact with a network management system, such as an enterprise management system, to distribute data packets and gather configuration information. The update system may generate and send commands to the network management system. The network management system may carry out the commands to distribute data packets and/or gather configuration information.


Patent
Computer Sciences Corp. | Date: 2014-10-17

Various embodiments of the present disclosure can include systems, methods, and non-transitory computer readable media configured to aggregate a plurality of threat signatures from a plurality of threat signature data sources. The bit stream data is analyzed, based on the plurality of threat signatures, to detect a first threat in the bit stream data. A result of analyzing the bit stream data is logged as threat analysis log data. The threat analysis log data is analyzed to detect a second threat in the bit stream data. The threat analysis log data may be analyzed based on a heuristic. An action is triggered based on analysis of the bit stream data, or based on heuristic analysis of the threat analysis log data.


Patent
Computer Sciences Corp. | Date: 2013-10-01

A method includes generating, using a three-dimensional model file corresponding to a facility location, a graphical user interface depicting a virtual representation of the facility location from a first point of view, one or more of a plurality of assets located at the facility location being visible from the first point of view. The method further includes receiving navigation instructions indicating a desire of a user to move within the virtual representation to a second point of view, and updating the graphical user interface to depict a virtual representation of the facility location from the second point of view, a particular asset being visible from the second point of view. The method further includes receiving a user selection of the particular asset, accessing asset information associated with the particular asset, and displaying at least a portion of the accessed asset information.


Patent
Computer Sciences Corp. | Date: 2015-06-26

An update system configured to provide software updates, software patches and/or other data packets to one or more computer systems via a network is disclosed. The update system may interact with a network management system, such as an enterprise management system, to distribute data packets and gather configuration information. The update system may generate and send commands to the network management system. The network management system may carry out the commands to distribute data packets and/or gather configuration information.


Patent
Computer Sciences Corp. | Date: 2015-01-16

Methods, mediums, and systems are described for providing a platform coupled to one or more rules engines. The platform may provide runtime rule services to one or more applications. Different rules engines may be used for different types of rules, such as calculations, decisions, process control, transformation, and validation. Rules engines can be added, removed, and reassigned to the platform. When the platform receives a request for services from an application, the platform selects one of the rules engines to handle the request and instructs the selected rules engine to execute the rule. The rules engine may be selected automatically. The platform may be implemented through a service-oriented architecture.

Loading Computer Sciences Corp. collaborators
Loading Computer Sciences Corp. collaborators