Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
AbstractThe concept of Cloud Computing has raised many hopes and just as many concerns. Can we reduce costs and improve performance by sharing computing resources over the Internet?
What risks are incurred and issues are raised by doing so?
How can those risks be mitigated? What research areas still need to be explored?
Some may note that Cloud Computing has significant parallels to timesharing. How appropriate then to explore the bounds of this technology at Dartmouth, which played an essential role in the creation of timesharing!
Stephen Hanna is a Distinguished Engineer at Juniper Networks, where he is responsible for driving security standards. He is co-chair of the Trusted Network Connect Work Group in the Trusted Computing Group and co-chair of the Network Endpoint Assessment Working Group in the Internet Engineering Task Force.
Hanna is active in other networking and security standards groups such as the Open Group and OASIS. He is the author of several IETF RFCs and published papers, an inventor or co-inventor on 33 issued U.S. patents, and a regular speaker at industry events such as Interop and the RSA Conference.
He holds a Bachelor's degree in Computer Science from Harvard University.