The Next Big Thing
Posts about next generation technologies and their effect on business.

Applying 3D Simulation to Enterprise Security

simulation.pngUsing a 3D simulator to visualize a computing environment is a long way from traditional IT security, but the drama of video gaming actually enables analysts to watch over their networks more effectively. An article New Scientist titled: The real Ton: IT security as a shoot ‘em up   describes some research under development at the Lincoln Laboratory, part of the Massachusetts Institute of Technology. In the simulation, network administrators can patrol their environments as if they were playing a first-person shooter - much like in the cult film Tron.

 

This was presented at the IEEE High Performance Extreme Computing Conference in September 2012. Both the paper and the presentation are available for download.

 

Although not really gamification in the purist definition, it definitely is an example of serious gaming moving into the IT field.

Labels: 3D| IEEE| security| Simulation
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author
Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation