Christian Unger
Translational Research Institute (TRI) Australia
Christian Unger has worked in the IT industry for over 17 years, during this time he has specialised in system administration of Linux systems, especially automated host deployment, centralised configuration management and SOE development, with strong background in firewall administration and SELinux.

For the past five years, he has been the IT manager for the Translational Research Institute, managing complex stakeholder requirements across four large educational and hospital partner organisations with more than 1000 building occupants. This has added experiences in a greater range of IT issues, from migrating service to & in the cloud, management of HPC systems, administration of HSMs, complex and conflicting stakeholder needs assessment, to assembling height adjustable workstations and portable digital signage.

Strange things that lurk in your {supercomputer|cloud}
Technical Level (3 being the highest score): 2

The ground beneath corporate enterprise and research computing sector has changed as a result of cloud and accelerated computing technologies, but detrimental features emerge when considering security in an operational context. Hyperscale public cloud deployments present unrivalled opportunities for agility and scalability. Yet, the expansive toolbox available in every cloud management dashboard is a blessing and curse.

GPU and accelerator-based high performance computing has enabled machine learning, inference and convolutional neural networks to solve problems we only had brute force and intelligent decision systems maps for, as little as ten years ago.

In this talk, Christian and Jake will delve into less obvious aspects of cloud computing security and some real world examples of when supercomputing might be used in sophisticated and malicious ways with modern artificial intelligence techniques (such as Generative Adversarial Networks) in play.

The talk draws upon real world experiences and cutting-edge infrastructure to demonstrate some of these features. This is a talk that will appeal to technologists, computer scientists and management alike.

Presentation video can be found HERE