Monique Jeanne Morrow (she/her)

Monique Jeanne Morrow (she/her)

Zürich, Schweiz
10.395 Follower:innen 500+ Kontakte

Info

With over 25 years of experience as a global technology leader, Monique Morrow has…

Artikel von Monique Jeanne Morrow (she/her)

Alle Artikel anzeigen

Aktivitäten

Anmelden, um alle Aktivitäten zu sehen

Berufserfahrung

  • Hedera Grafik
  • -

    Zurich, Switzerland

  • -

    Zurich, Switzerland

  • -

    Washington D.C. Metro Area

  • -

    Zürich Area, Switzerland

  • -

    Greater Los Angeles Area

  • -

    Zürich Area, Switzerland

Ausbildung

  • University of Nicosia Grafik

    University of Nicosia

    University of Nicosia

    The University of Nicosia is the #1 university in the world for Blockchain Education.

  • City University-Seattle Zurich, Switzerland Program

  • Graduate Certificate in Information Systems, focus on Decision Support Systems

  • Activities and Societies: Phi Eta Sigma; Phi Kappa Phi

    Includes transfer of previous work from University of Hawaii-Manoa, 1975-1979 including one year abroad at the University of Paris- Sorbonne in 1979

  • Diplome d’Etudes Superieures de la Civilisation Francaise, L’Universite de Paris- Sorbonne, Paris, France, 1979.

Bescheinigungen und Zertifikate

Ehrenamt

  • IEEE Standards Association Grafik

    Co-Chair

    IEEE Standards Association

    –Heute 3 Jahre 9 Monate

    Science and Technology

    Area of focus is Ethics in Extended Reality as organizations rally around the "metaverse." Ethics will be a key factor in the discussion and in creating standards in this space.

  • GSMA Grafik

    Distributed Ledger Technology Chair

    GSMA

    1 Jahr 4 Monate

    Science and Technology

    Monique served as Chair for this working group that consists of mobile carriers and solution providers that are focused to create standards for Distributed Ledger Technology .

Veröffentlichungen

  • Telco Tokenization and Stablecoin Development an Industry Opportunity

    IEEE

    2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain&Beyond (iGETblockchain) 7-11 Nov 2022.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Blockchain and the Tokenization of the Individual: Societal Implications

    Future Internet MDPI Journal

    We are living in a world where the very systems upon which trust is based are being challenged by new and exciting paradigm shifts. Centralization whether in the form of governments, financial institutions, enterprises and organizations is simply being challenged because of the lack of trust associated with data governance often experienced in the form of data breaches or simply a monetization of our data without our permission and/or incentives to participate in this emerging decentralization…

    We are living in a world where the very systems upon which trust is based are being challenged by new and exciting paradigm shifts. Centralization whether in the form of governments, financial institutions, enterprises and organizations is simply being challenged because of the lack of trust associated with data governance often experienced in the form of data breaches or simply a monetization of our data without our permission and/or incentives to participate in this emerging decentralization of structures. We see this trust deficit challenging the very institutions we have depended on including but not limited to financial institutions, private enterprises or government bodies. A new “social contract” is required as we continuously evolve into more decentralized and self-governing (or semi self-governing) entities. We will see more development in digital sovereignty with the caveat that a governance model will need to be defined. This position paper will present evidence that supports the premise that blockchain and individual tokenization could provide a new social contract.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Internet of Women, Accelerating Culture Change

    River Publishers

    "Female scientists, technologists, engineers, and mathematicians worldwide are making historic contributions to their fields. The modern workforce is closer to gender-equal than it has ever been, and many efforts are in place to support further progress. The Internet of Women provides an exciting look at personal narratives and case studies of female leaders and cultural shifts around the globe that illustrate this promising trend."

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Perspectives on New Work

    Sitra

    Compendium of viewpoints on definition of work in the future.
    "THIS BOOK IS THE PRODUCT of multiple inputs, several
    streams of experiences, ideas, comments and guidance
    that took place both face-to-face and on social media.
    The movement of thought was open for comments and
    contributions all the time. It is said that when you work on
    a demanding topic for several months you tend to lose a
    lot of perspective. You’re just too close to what you study.
    This lack of…

    Compendium of viewpoints on definition of work in the future.
    "THIS BOOK IS THE PRODUCT of multiple inputs, several
    streams of experiences, ideas, comments and guidance
    that took place both face-to-face and on social media.
    The movement of thought was open for comments and
    contributions all the time. It is said that when you work on
    a demanding topic for several months you tend to lose a
    lot of perspective. You’re just too close to what you study.
    This lack of perspective takes typically one of two forms:
    you may think something is obvious when it really isn’t. It
    may be obvious to you because you have been thinking
    about the issue for a long time. But it might not be so obvious
    to someone else. Hal Varian suggests that the other
    possibility is that after spending a lot of time on a substantial
    topic you may think something is complicated, while it
    is quite obvious to someone else. This is why the book follows
    the logic of my exploration being enriched, complemented
    and commented by many of the very best experts
    on the topic of the book: the emerging new world of work."

    Veröffentlichung anzeigen
  • Intercloud: Solving Interoperability and Communication in a Cloud of Clouds

    Cisco Press

    Now, four leading experts thoroughly introduce these powerful new technologies. Writing for CTOs, IT/network managers, security architects, product managers, application owners, service architects, and consultants, they explain both underlying Intercloud concepts and practical use cases.

    Sharing deep architectural insight, the authors focus on key technical enablers, from virtualization to autonomic management and advanced protocols. They also address the business challenges service…

    Now, four leading experts thoroughly introduce these powerful new technologies. Writing for CTOs, IT/network managers, security architects, product managers, application owners, service architects, and consultants, they explain both underlying Intercloud concepts and practical use cases.

    Sharing deep architectural insight, the authors focus on key technical enablers, from virtualization to autonomic management and advanced protocols. They also address the business challenges service providers will face in federated Intercloud relationships. Illuminating the Intercloud with cutting-edge customer examples, they also describe a phased pathway towards coherent deployment. You’ll discover how the Intercloud can improve agility, portability, cost, and speed–and how to start transforming its potential into reality.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Disrupting Unemployment

    Ewing Marion Kauffman Foundation

    The sinister notion that machines will someday kill all jobs has been around for at least 200 years. Yes, machines can replace people at work or change the work that is needed, and they always have. At the same time, the labor force participation in the world has remained quite stable for many generations, and on the whole, the middle class has been growing worldwide. Innovation can both kill and create work.

    Andere Autor:innen
    • David Nordfors
    • Vint Cerf
    • Max Senges
    • Philip Auerswald
    • Robert B. Cohen
    • John Hagel
    • Dan Harple
    • Mohammad Islam
    • Joi Ito
    • Steve Jurvetson
    Veröffentlichung anzeigen
  • Innovation, Technology and Youth; Harnessing Lessons Learned for Strengthening Youth Participation in using Technology for Sustainable Development

    United Nations (UN-Habitat)

    UN-Habitat call to action to support our global youth and women!

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Journal of Ict Standardization 2-1; Special Issue on Cloud Security and Standardization

    River Publishers

    As Editor for this special edition that included several authors.
    The industry has been experiencing the deployment of cloud computing models varying from Private Cloud, Hybrid Cloud to an evolution of InterCloud. There are cloud security implications for each model; and within InterCloud a notion of federation may be implied. How do we define cloud bursting and cloud brokering functions and the security requirements therein? What are the use cases? What is the impact of cloud and…

    As Editor for this special edition that included several authors.
    The industry has been experiencing the deployment of cloud computing models varying from Private Cloud, Hybrid Cloud to an evolution of InterCloud. There are cloud security implications for each model; and within InterCloud a notion of federation may be implied. How do we define cloud bursting and cloud brokering functions and the security requirements therein? What are the use cases? What is the impact of cloud and virtualization on mobile networks and its services? What is the status of standards activities related to cloud security and these scenarios? Authors were invited to submit papers, on these topics for the special issue.

    Veröffentlichung anzeigen
  • "Internet of Things: Architectural Framework for eHealth Security"

    Journal of ICT Standardization, River Publishers

    Abstract: The Internet of Things (IoT) holds big promises for Health Care, especially in Proactive Personal eHealth. To fulfil the promises major challenges must be overcome, particularly regarding privacy and security. This paper explores these issues, discusses use case scenarios, and advances a secure architecture framework. We close the paper with a discussion of the state of various standard organizations, in the conviction of the critical role they will play in making eHealth…

    Abstract: The Internet of Things (IoT) holds big promises for Health Care, especially in Proactive Personal eHealth. To fulfil the promises major challenges must be overcome, particularly regarding privacy and security. This paper explores these issues, discusses use case scenarios, and advances a secure architecture framework. We close the paper with a discussion of the state of various standard organizations, in the conviction of the critical role they will play in making eHealth bloom.
    Keywords: IoT, IoE, M2M, eHealth Security, Standards.

    Andere Autor:innen
    Veröffentlichung anzeigen
  • A Cloud Based - Architecture for Cost-Efficient Applications and Services Provisioning in Wireless Sensor Networks

    Wireless and Mobile Networking Conference 2013

    More and more wireless sensor networks (WSNs) are being deployed. However, provisioning WSN applications and services in a cost efficient manner remains an uphill task. In the current state of affairs, WSN applications and services make little re-use of third party modules due to the lack of appropriate discovery mechanisms. Furthermore, they are bundled with the WSNs in which they are provisioned and this precludes the use of the same WSN by other applications and services. Novel…

    More and more wireless sensor networks (WSNs) are being deployed. However, provisioning WSN applications and services in a cost efficient manner remains an uphill task. In the current state of affairs, WSN applications and services make little re-use of third party modules due to the lack of appropriate discovery mechanisms. Furthermore, they are bundled with the WSNs in which they are provisioned and this precludes the use of the same WSN by other applications and services. Novel approaches are indeed required. Cloud computing is an emerging paradigm with three key aspects (Software as a Service – SaaS, Platform as a Service – PaaS, and Infrastructure as a Service – IaaS) and several inherent benefits (e.g. efficient use of resources, easy introduction of new applications and services). It can potentially aid in tackling the cost efficiency issue in WSN applications and services provisioning. Unfortunately, this area has not yet received much attention in the research community. This position paper pinpoints the challenges, reviews the state-of-the-art, sketches a new architecture and proposes a research agenda.

    Andere Autor:innen
    • Paul Polakos, Cisco
    • Prof. Roch Glitho Concordia University
    Veröffentlichung anzeigen
  • Internet of Things

    The Internet Protocol Journal

    The Internet of Things
    IPJ
    Authors: David Lake, Monique Morrow, Ammar Rayes
    Until a point in time around 2008 or 2009, there were more human beings in the world than devices connected to the Internet. That is no longer the case. In 2010, the global average of connected devices per person was 1.84. Taking only those people who use the Internet (around 2 billion in 2010), that figure becomes 6 devices per person. [1] Chip makers such as ARM have targeted developments of low-power CPUs…

    The Internet of Things
    IPJ
    Authors: David Lake, Monique Morrow, Ammar Rayes
    Until a point in time around 2008 or 2009, there were more human beings in the world than devices connected to the Internet. That is no longer the case. In 2010, the global average of connected devices per person was 1.84. Taking only those people who use the Internet (around 2 billion in 2010), that figure becomes 6 devices per person. [1] Chip makers such as ARM have targeted developments of low-power CPUs and predicts up to 50 billion devices connected by 2020. [2] Today, most of these devices are entities that the user interacts directly with—PC or Mac, smartphone, tablet, etc. But what is changing is that other devices used every day to orchestrate and manage the world we live in are becoming connected entities in their own right. They consist not just of users interacting with the end devices—the source and treatment of the information garnered will now occur autonomously, potentially linking to other networks of similarly interconnected entities. Growing to an estimated 25 billion connected devices by 2015, the rapid explosion of devices on the Internet presents some new and interesting challenges

    Andere Autor:innen
    Veröffentlichung anzeigen
  • RCF 5994: Application of Ethernet Pseudowires to MPLS Transport

    IETF

  • RFC 5920: Security Framework for MPLS and GMPLS Networks

    IETF

  • RFC 5704: Uncoordinated Protocol Development

    IETF

  • Rec. Y.1714: MPLS Management and OAM Framework

    ITU-T

  • RFC 5085: Pseudowire Virtual Circuit Connectivity Verification (VCCV)

    IETF

  • RFC 4377: Operations and Management (OAM) Requirements for Multi-Protocol Label Switched (MPLS) Networks

    IETF

  • A Data Annotation Architecture for Semantic Applications in Virtualized Wireless Sensor Networks

    14th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2015)

    Accepted for publication in proceedings of 14th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2015) – Technical Session, 2015, May 11-15, Ottawa, Canada.

    Andere Autor:innen
  • Interactions of Intelligent Route Control with TCP Congestion Control

    Proceedings of IFIP Networking Conference, May 2007

    Andere Autor:innen
    • Ruomei Gao
    • Ellen Zegura
    • Dana Blair
    Veröffentlichung anzeigen
  • OAM in MPLS-Based Networks

    IEEE Communications

    Andere Autor:innen
  • RFC 6310: Pseudowire (PW) Operations, Administration, and Maintenance (OAM) Message Mapping

    IETF

    This document specifies the mapping and notification of defect states between a pseudowire (PW) and the Attachment Circuits (ACs) of the end-to-end emulated service. It standardizes the behavior of Provider Edges (PEs) with respect to PW and AC defects. It addresses ATM, Frame Relay, Time Division Multiplexing (TDM), and Synchronous Optical Network / Synchronous Digital Hierarchy (SONET/SDH) PW services, carried over MPLS, MPLS/IP, and Layer 2 Tunneling Protocol version 3/IP (L2TPv3/IP) Packet…

    This document specifies the mapping and notification of defect states between a pseudowire (PW) and the Attachment Circuits (ACs) of the end-to-end emulated service. It standardizes the behavior of Provider Edges (PEs) with respect to PW and AC defects. It addresses ATM, Frame Relay, Time Division Multiplexing (TDM), and Synchronous Optical Network / Synchronous Digital Hierarchy (SONET/SDH) PW services, carried over MPLS, MPLS/IP, and Layer 2 Tunneling Protocol version 3/IP (L2TPv3/IP) Packet Switched Networks (PSNs).

    Andere Autor:innen
    Veröffentlichung anzeigen
  • Wireless Sensor Network Virtualization: Early Architecture and Research Perspectives

    IEEE Network Magazine

    Accepted for publication in forthcoming issue of IEEE Network Magazine

    Andere Autor:innen

Patente

  • Method of securely transmitting a message via a telecommunications network

    Ausgestellt am US 11477169

    Abstract: A method of securely transmitting a message from a sending entity to a receiving entity via a network. A Processing String Engine is communicatively coupled to the sending and receiving entities. The sending entity requests the Processing String Engine to provide a network routing path for message transmission from the sending entity to the receiving entity and to provide a processing string for the message transmission. The Processing String Engine identifies a network path and…

    Abstract: A method of securely transmitting a message from a sending entity to a receiving entity via a network. A Processing String Engine is communicatively coupled to the sending and receiving entities. The sending entity requests the Processing String Engine to provide a network routing path for message transmission from the sending entity to the receiving entity and to provide a processing string for the message transmission. The Processing String Engine identifies a network path and generates a processing string. The sending entity appends the processing string to the message and sends the message to the receiving entity. The message is unreadable while the processing string is appended thereto. Upon receipt of the message with the appended processing string, the receiving entity requests removal the processing string. Upon successful verification of the receiving entity, the processing string is removed, and the message is returned to the receiving entity.

    Andere Erfinder:innen
  • Method of Privatizing Mobile Communications Using Dynamic IMSI and MSISDN

    Ausgestellt am US 11223957

    A method of privatizing mobile communications using a dynamic International Mobile Subscriber Identity [IMSI] and Mobile Station International Subscriber Director Number [MSISDN]. A first privacy token having an associated IMSI and MSISDN is provided to a User Equipment [UE]. The first privacy token has a predefined validity period. The IMSI and MSISDN assigned to the privacy token are shared with a plurality of Mobile Network Operators [MNOs], while the International Mobile Equipment Identity…

    A method of privatizing mobile communications using a dynamic International Mobile Subscriber Identity [IMSI] and Mobile Station International Subscriber Director Number [MSISDN]. A first privacy token having an associated IMSI and MSISDN is provided to a User Equipment [UE]. The first privacy token has a predefined validity period. The IMSI and MSISDN assigned to the privacy token are shared with a plurality of Mobile Network Operators [MNOs], while the International Mobile Equipment Identity [IMEI] of the UE remains concealed.

    Andere Erfinder:innen
  • Method of Verifying Telecommunications Messaging Traffic Based on Decentralized Identifiers

    Ausgestellt am US 109654461

    A method of verifying telecommunications messaging traffic between two entities and monetizing the verified traffic. A receiving entity receives a message from a sending entity. The message includes a hash value computed by the sending entity based on the content of the message. The hash value is encrypted using a private key of the sending entity. The receiving entity identifies, within a blockchain, a Decentralized Identifier [DID] associated with the sending entity, resolves the DID into a…

    A method of verifying telecommunications messaging traffic between two entities and monetizing the verified traffic. A receiving entity receives a message from a sending entity. The message includes a hash value computed by the sending entity based on the content of the message. The hash value is encrypted using a private key of the sending entity. The receiving entity identifies, within a blockchain, a Decentralized Identifier [DID] associated with the sending entity, resolves the DID into a DID document and retrieves therefrom a public key associated with the sending entity.

    Andere Erfinder:innen
  • System and Method of Validating Internet of Things (IoT) Devices

    Ausgestellt am US 10,826,684

    A system and method for validating an Internet of Thing (IoT) device on an IoT network. The IoT device captures and stores the historical sensor values,along with corresponding timestamps in a local memory. A controller receives the historical sensor values and also receives a heartbeat token over a network that is different than the IoT network.

    Andere Erfinder:innen
  • System and Method for General Data Protection Regulation (GDPR) Compliant Hashing in Blockchain Ledgers

    Ausgestellt am US 10,812,455

    The invention relates to computer architectures ad methods that automatically comply with data security regulations using immutable audit ledgers, such as blockchains. In particular the invention provides a computer system that effectively complies with data processing regulations, including but not limited to, the European Union's General Protection Data Regulation (GDPR)

    Andere Erfinder:innen
    • Guido Reissner
  • Method of Using Blockchain Ledger and Zero Knowledge Proof For Tokenized Communications

    Ausgestellt am US US10652184B1

    A Tokenized Communication Service Provider (TCSP) for providing secure messaging between a consumer and a message sender without exposing the consumer communication preferences and Personally Identifiable Information (PII) to the message sender. TCSP issues a communication token to be used for the communication between the consumer and the message sender. Consumer authorization is recorded in a blockchain ledger and a Zero Knowledge Proof mechanism is used to establish that the TCSP possesses…

    A Tokenized Communication Service Provider (TCSP) for providing secure messaging between a consumer and a message sender without exposing the consumer communication preferences and Personally Identifiable Information (PII) to the message sender. TCSP issues a communication token to be used for the communication between the consumer and the message sender. Consumer authorization is recorded in a blockchain ledger and a Zero Knowledge Proof mechanism is used to establish that the TCSP possesses the consumer contact information and authorization. The consumer authorization is revocable by the consumer, and the revocation is recorded in the blockchain ledger.

    Andere Erfinder:innen
    Patent anzeigen
  • Cloud Framework for Multi-Cloud Extension

    Ausgestellt am US 10305726

    A representation of network resources and relationships among network resources is established. The network resources include network resources of a tenant and network resources of a plurality of clouds. The multi-cloud extension extends to network resources of the tenant and the plurality of clouds, and is isolated from the resources of other tenants.

    Andere Erfinder:innen
  • Deep Learning Bias Detection in Text

    Ausgestellt am US 102824414B2

    In one embodiment, a method includes obtaining a text from a user, applying the text to a deep learning neural network to generate a plurality of bias coordinates defining a point in an embedded space and in response to determining that at least one of the plurality of bias coordinates exceeds a threshold, providing an indication of bias to the user.

    Andere Erfinder:innen
  • System and method for management of network-based services

    Ausgestellt am US 9,450,836

    In one embodiment, a system includes an interface configured to receive a first request sent from a first customer for a first service provided by a first service provider, the first request being of a first type. The system also includes at least one processor configured to determine a first set of configuration parameters from a first policy associated with the first service provider in response to receiving the first request. The at least one processor also causes a node associated with the…

    In one embodiment, a system includes an interface configured to receive a first request sent from a first customer for a first service provided by a first service provider, the first request being of a first type. The system also includes at least one processor configured to determine a first set of configuration parameters from a first policy associated with the first service provider in response to receiving the first request. The at least one processor also causes a node associated with the first service provider to provide the first service in response to receiving the first request using the first set of configuration parameters.

    Andere Erfinder:innen
  • System and method for transporting digital radio signal streams in a small cell network environment

    Ausgestellt am US 9413860

    A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio…

    A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio signal stream can be received using a Common Public Radio Interface, and the radio signal stream may include sub-streams transported through segmented channels over the backhaul link.

    Andere Erfinder:innen
  • System and method for routing using path identifiers was

    Ausgestellt am US 9,253,089

    This invention introduces the concept of a Service Path Identity (SPID) that identifies a set of resources within the datacenter that are authorized to communicate with each other. The hosts on the Service Path are members of a virtual private network. A Service Path Protocol (SPP) is then used by the endpoints, switches, and routers that have been identified as on the Service Path (through separate means) to discover, bind, and release associations to the Service Path.

    Andere Erfinder:innen
  • System and Method for Transporting Digital Baseband Streams in a Network Environment

    Ausgestellt am US 8,964,641

    A method is provided in one example embodiment that includes receiving a radio signal stream and segmenting the radio signal stream into segments (e.g., blocks of data, pieces of information, bits of data, etc.). The segments may be packetized and transported in packets over a pseudowire in a packet-switched network.

    Andere Erfinder:innen
  • System and method for routing using path identifiers

    Ausgestellt am US 8,937,953

    In one embodiment, a computer-implemented method includes receiving a request for a service. In response to receiving the request, a server providing the service is discovered. The method includes determining whether a user associated with the request has permission to access the service. The method also includes, in response to determining that the user associated with the request has permission to access the service, routing the request to the service.

    Andere Erfinder:innen
  • System and method for transporting digital radio signal streams in a small cell network environment

    Ausgestellt am US US Patent # 8,824,478

    A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio…

    A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio signal stream can be received using a Common Public Radio Interface, and the radio signal stream may include sub-streams transported through segmented channels over the backhaul link

    Andere Erfinder:innen
  • Image-based point-of-sale mobile settlement system

    Ausgestellt am US 8,459,545

    Methods and systems for facilitating image-based payment transactions through the exchange of encoded images between devices connected to a communication network. The encoded images represent different parts of a contract and may be tiled to form a unique image-based mosaic that includes information to complete and validate a payment transaction.

    Andere Erfinder:innen
  • Collecting network performance data from multiple autonomous systems

    Ausgestellt am US 8,265,074

    An apparatus, comprising:
    first Border Gateway Protocol (BGP) logic comprising BGP route table data;
    a first network interface that is configured to communicatively couple to a first autonomous system;
    data collection logic encoded in one or more non-transitory computer-readable storage media for execution and when executed operable to perform:
    discovering an address prefix of a data collector that is communicatively coupled to second BGP logic of a router within a second autonomous…

    An apparatus, comprising:
    first Border Gateway Protocol (BGP) logic comprising BGP route table data;
    a first network interface that is configured to communicatively couple to a first autonomous system;
    data collection logic encoded in one or more non-transitory computer-readable storage media for execution and when executed operable to perform:
    discovering an address prefix of a data collector that is communicatively coupled to second BGP logic of a router within a second autonomous system that is coupled to the first autonomous system directly or indirectly through one or more networks or internetworks, wherein the second autonomous system is independent of the first autonomous system;
    based on the address prefix,
    determining a path through the first autonomous system, the one or more networks or internetworks, and the second autonomous system to the data collector based on the BGP route table;
    requesting the data collector to provide one or more data values relating to performance of network elements of the second autonomous system;
    receiving and storing the one or more data values;
    wherein the data collection logic further comprises logic which when executed causes retrieving one or more performance data values from each of one or more local border routers within the first autonomous system.

    Andere Erfinder:innen
    • Masum Hasan
    Patent anzeigen
  • System and Methods for identifying Network Path Performance

    Ausgestellt am US 8,160,055

    A pseudowire verification framework gathers and maintains status of individual pseudowires by aggregating the state of the individual node hops defining the pseudowire. The framework provides complete assessment of a network by gathering status feedback from network nodes (forwarding entities) that are inaccessible directly from a requesting node by employing an intermediate forwarding entity as a proxy for inquiring on behalf of the requesting node. Therefore, status regarding inaccessible…

    A pseudowire verification framework gathers and maintains status of individual pseudowires by aggregating the state of the individual node hops defining the pseudowire. The framework provides complete assessment of a network by gathering status feedback from network nodes (forwarding entities) that are inaccessible directly from a requesting node by employing an intermediate forwarding entity as a proxy for inquiring on behalf of the requesting node. Therefore, status regarding inaccessible pseudowires is obtainable indirectly from nodes able to “see” the particular pseudowire. Configurations further assess multihop pseudowires including a plurality of network segments; in which each segment defines a pseudowire hop including forwarding entities along the pseudowire path. In this manner, pseudowire health and status is gathered and interrogated for nodes (forwarding) entities unable to directly query the subject pseudowire via intermediate forwarding entities.

    Andere Erfinder:innen
    • Mark Townsley
    • Jim Guichard
    • George Swallow
    • Tom Nadeau
    Patent anzeigen

Projekte

  • Towards Cloud Architectures for Cost Efficient Applications and Services Provisioning in IP Wireless Sensor Networks

    CISCO RFP project to demonstrate the application and service provisioning in wireless sensor networks using cloud-based architectures. The project focuses on IaaS, PaaS and SaaS aspects and involves validation through several demos.

    I'm working on the IaaS aspect of the project to allow efficient utilization of sensor networks using virtualization.

    Andere Mitarbeiter:innen

Auszeichnungen/Preise

  • Top 100 Influencers in Identity

    One World Identity

    https://oneworldidentity.com/influential-people-2019/

  • Top 50 Women in Tech

    Forbes

    https://www.forbes.com/top-tech-women/#533f1e024df0

  • Top 100 Digital Shapers 2018 Switzerland

    digitalSwitzerland

    https://digitalswitzerland.com/2018/09/28/here-are-switzerlands-100-digital-shapers/

  • Business World Magazine On Line Ethics and Security

    Business World Magazine

    https://www.prnewswire.com/news-releases/the-humanized-internet-wins-business-worldwide-magazine-award-for-its-outstanding-commitment-to-online-ethics-and-security-682766481.html

  • PR News Non-Profit Communicator of the Year Finalist

    PR News

    http://www.prnewsonline.com/nonprofit-awards-2018

  • Global Citizen Award

    Henley & Partners

    Monique Morrow, humanitarian, technological pioneer, and co-founder of The Humanized Internet, was today awarded the prestigious Global Citizen Award® by leading international citizenship and residence advisory firm Henley & Partners.

  • 10 Women In Networking/Communications That You Should Know

    N2Women

    Networking Networking Women (N2 Women) is a discipline-specific community for researchers in the communications and networking research fields. The main goal of N2 Women is to foster connections among the under-represented women in computer networking and related research fields. N2 Women allows women to connect with other women who share the same research interests, who attend the same conferences, who face the same career hurdles, and who experience the same…

    Networking Networking Women (N2 Women) is a discipline-specific community for researchers in the communications and networking research fields. The main goal of N2 Women is to foster connections among the under-represented women in computer networking and related research fields. N2 Women allows women to connect with other women who share the same research interests, who attend the same conferences, who face the same career hurdles, and who experience the same obstacles.

    http://n2women.comsoc.org/10-women-in-networkingcommunications-that-you-should-know/2016-10-women-in-networkingcommunications-that-you-should-know/

  • Social Media Champion of the Year - 2016

    Business Worldwide Magazine

    http://www.prnewswire.co.uk/news-releases/leading-technological-evangelist-at-cisco-picks-up-two-global-business-awards-606487646.html

  • Visionary of the Year 2016 - Technology, Social Change and Ethics

    Business Worldwide Magazine

    http://www.prnewswire.co.uk/news-releases/leading-technological-evangelist-at-cisco-picks-up-two-global-business-awards-606487646.html

  • Top Women in Cloud Innovations

    Cloud Now

    CloudNOW is a non-profit consortium of the leading women in cloud computing, providing a
    forum for networking, knowledge sharing, mentoring, and economic growth. CloudNOW offers
    members the opportunity to creatively approach the technological challenges of cloud today,
    working in partnership with the tech industry, and cloud thought leaders.
    To learn more, visit cloud-now.org.

  • AI Magazine Social Media Presence of the Year 2016

    AI Magazine

    Honored as AI Magazine's Social Media Presence of the Year 2016 https://issuu.com/aiglobalmedia/docs/ai_magazine_october_2016/38

  • First Women in Standardization Expert Group (WISE)

    Women in Standardization Expert Group

    ITU organized its first Women in Standardization Expert Group (WISE) event at the World Telecommunication Standardization Assembly (WTSA-16), on 30 October 2016 in Yasmine Hammamet, Tunisia. The event consisted of a workshop on practical skills for successful negotiations, as part of ITU-T's commitment to promoting equality for men and women delegates attending its meetings and conferences, followed by a panel discussion highlighting the experiences of leading women from the ICT and…

    ITU organized its first Women in Standardization Expert Group (WISE) event at the World Telecommunication Standardization Assembly (WTSA-16), on 30 October 2016 in Yasmine Hammamet, Tunisia. The event consisted of a workshop on practical skills for successful negotiations, as part of ITU-T's commitment to promoting equality for men and women delegates attending its meetings and conferences, followed by a panel discussion highlighting the experiences of leading women from the ICT and standardization fields.

  • Leading UK CIOS - Who Happen To Be Female

    CIO FROM IDG

    CIO UK compiles a list of some of the leading CIOs in the UK - and further afield

    The 2016 edition of the CIO 100 was more diverse than previous editions with women making up 16% of its members, a small increase on the most recent global figures of 9% reported by Harvey Nash and the 12% reported by Gartner. CIO UK takes a look at some of the women working in technology leadership and driving change across a number of different sectors.

  • Participated at The Women in Leadership Forum

    Women in Leadership Forum

    Ajman University had the pleasure to host Ms. Monique Morrow on campus, the chief Technology Officer with CISCO was in town to participate in “Women in Leadership Economic” forum in Dubai.

    https://www.ajman.ac.ae/en/news/2016/women-in-leadership-icon-visits-ajman-university.html

  • Speaker At the 18th Global Women in Leadership Conference in Dubai

    the 18th Global Women in Leadership Conference

    Monique Morrow, speaking on the second day of the 18th Global Women in Leadership Economic Forum in Dubai, Monique Jeanne Morrow, chief technology officer of new frontiers development and engineering at Cisco Systems, noted that women must look at the role of technology in all that is happening today.

    For more info: http://www.khaleejtimes.com/women-must-be-aware-of-tech-innovations

  • Women of Influence

    YWCA

    The YWCA-NYC envisions a day when the diverse women of New York City, once seen as at risk or working poor, can sustain themselves and their families, and are empowered to define and attain their own unique goals and aspirations, contributing to strong communities, building a better New York for everyone.

  • Top 50 Most Inspiring Women in Technology - Europe

    Inspiring Fifty

    Press Release

    TOP FIFTY MOST INSPIRATIONAL WOMEN IN EUROPEAN TECH REVEALED

    The top fifty most inspirational women in European technology for 2016 are revealed today by Inspiring Fifty, highlighting leading women from across the sector – including influencers, entrepreneurs, business leaders, academics and policy makers.

    In this year’s list 11 countries are represented: Belgium, France, Germany, Ireland, Italy, Netherlands, Norway, Spain, Sweden, Switzerland, and the…

    Press Release

    TOP FIFTY MOST INSPIRATIONAL WOMEN IN EUROPEAN TECH REVEALED

    The top fifty most inspirational women in European technology for 2016 are revealed today by Inspiring Fifty, highlighting leading women from across the sector – including influencers, entrepreneurs, business leaders, academics and policy makers.

    In this year’s list 11 countries are represented: Belgium, France, Germany, Ireland, Italy, Netherlands, Norway, Spain, Sweden, Switzerland, and the UK. Once again, the UK leads other countries with 23 finalists, France follows with seven, the Netherlands with five, and Germany and Italy with three each.

    They join last year’s formidable Inspiring Fifty: Europe who were celebrated during an event hosted by the UK Prime Minister’s office at 10 Downing Street in March 2015.

    Today’s announcement follows a public nomination process during which hundreds of nominations were received. A prestigious panel of judges from Europe and the US then had the difficult task of selecting the final fifty.

    “What a fantastic group of inspirational women. It was a tough selection process as we had hundreds of impressive nominations, but these fifty stood out for their experience and achievements, particularly over the past year. One thing they all have in common is a very obvious passion for the tech industry, which make them the perfect role models to inspire other women looking to build a career in the sector”, said Shari Yoder Doherty from Atomico. “I’m also delighted to announce we have secured a partnership with Inspiring Fifty to support their goals going forward”.

  • 2015 Digital Woman of the Year Finalist-Europe

    Digital Leadership Institute

    http://adaawards.com/2015-eu-finalists/

  • Cisco Security Ninja Green Belt

    Cisco

  • FDM Everywoman in Tech Finalist in Inspiration Category

    FDM Everywoman

    The British tech industry is thriving, predicted to be worth £221bn by 2016*. As a result it is estimated that by 2022 the UK will need at least 1.82 million new engineering, science and technology professionals**. Advances in technology have created a huge variety of fascinating new careers from mobile technology to energy requirements. Yet despite this, only one in 20 IT job applicants is female according to half of tech employers***. The reasons for this are varied, but unhelpful…

    The British tech industry is thriving, predicted to be worth £221bn by 2016*. As a result it is estimated that by 2022 the UK will need at least 1.82 million new engineering, science and technology professionals**. Advances in technology have created a huge variety of fascinating new careers from mobile technology to energy requirements. Yet despite this, only one in 20 IT job applicants is female according to half of tech employers***. The reasons for this are varied, but unhelpful stereotypes and low take up of STEM subjects in schools are regularly cited as reasons why the industry lacks gender diversity.

    The tech industry is crying out for fresh talent with nearly half of all technology firms seeking to hire more staff. Research shows that role models and opportunities to network are key to countering this talent deficit**** and the FDM everywoman in Technology Awards is the industry’s most influential programme that both celebrates and inspires.

  • Top WoM2M 2015

    Connected World Magazine

    The annual WoM2M is comprised of some of the most powerful women in the technology sector, representing many of the largest, most innovative companies in the world.

    “I am very pleased to be able to honor the 2015 women of M2M,” says Peggy Smedley, editorial director, Connected World magazine. “Each year I am able to work with a great group of women and this year is no exception. The women we are recognizing this year lead with grace and equanimity and are surely risk takers as we all…

    The annual WoM2M is comprised of some of the most powerful women in the technology sector, representing many of the largest, most innovative companies in the world.

    “I am very pleased to be able to honor the 2015 women of M2M,” says Peggy Smedley, editorial director, Connected World magazine. “Each year I am able to work with a great group of women and this year is no exception. The women we are recognizing this year lead with grace and equanimity and are surely risk takers as we all learned from General Price’s amazing presentation.”

    The 2015 WoM2M have been chosen because they each bring a unique lens to their respective companies, helping push connected technologies forward to help their companies become better corporate citizens and technology leaders overall.

  • Cisco Security Ninja White Belt Advanced

    Cisco

    Technical foundational certification for Cisco Secure Development Lifecycle.

  • GEM-TECHGlobal Achiever

    UN Women and ITU

    Tech Award for Gender Equality and Mainstreaming.
    Monique Morrow, Cisco Systems
    Monique Morrow is Chief Technology Officer (CTO) of Cisco's Services Group. She has over two decades of experience in IP internetworking. Monique has dedicated her life to the promotion of the engineering field to women. She advises: "No matter where you are in the world, follow your curiosity and your passion. Technology is so much fun! Take risks! Don't let anyone stop you!" At the 2013 ITU Girls in ICT Day,…

    Tech Award for Gender Equality and Mainstreaming.
    Monique Morrow, Cisco Systems
    Monique Morrow is Chief Technology Officer (CTO) of Cisco's Services Group. She has over two decades of experience in IP internetworking. Monique has dedicated her life to the promotion of the engineering field to women. She advises: "No matter where you are in the world, follow your curiosity and your passion. Technology is so much fun! Take risks! Don't let anyone stop you!" At the 2013 ITU Girls in ICT Day, Monique spoke on this issue in the European Parliament. Here she urged women to take ownership of their individual careers and write the script for their future.

  • Top 10 Influential IT Women in Europe

    Think Progress

    We take a look at ten women who are playing a crucial role in the European IT industry and may just be the role models a future generation of young females need to redress the gender balance. -

    See more at: http://www.think-progress.com/nordic/en/business-insight/top-ten-influential-women-europe/#sthash.vmHxeZmA.dpuf

  • Clementina Saduwa Award

    IEEE Region 8

    Clementina Saduwa was a tireless and extremely effective volunteer student leader a few years back, when the IEEE Nigeria Section was being revived, and she went on to become the first ever IEEE Region 8 Women In Engineering (WIE) Coordinator. In January 2007, She was killed in a random act of violence and left behind her husband and young daughter. She was 29 years old.

    To honour her rule and work throughout the years, IEEE Women In Engineering and IEEE Region 8 have named the award for…

    Clementina Saduwa was a tireless and extremely effective volunteer student leader a few years back, when the IEEE Nigeria Section was being revived, and she went on to become the first ever IEEE Region 8 Women In Engineering (WIE) Coordinator. In January 2007, She was killed in a random act of violence and left behind her husband and young daughter. She was 29 years old.

    To honour her rule and work throughout the years, IEEE Women In Engineering and IEEE Region 8 have named the award for the recognition of women engineer in Region 8 who, through their engineering and career achievements, has demonstrated noteworthy support for women in the profession and has established a benchmark of engineering excellence.

    This years recipient holds the title of Chief Technology Officer (CTO) at Cisco Services, with a focus of developing strategic technology and business architectures for Cisco customers and partners. She has over twenty years of experience in the field of computer inter-networks, and a pristine record of innovations. She also has a brilliant history of urging women to take ownership of their careers and “writing their own script” for the future. On this subject she has presented to the European Parliament. She is passionate about advancing Girls in ICT and Women in Technology.

    IEEE Region 8 happy to announce that the winner of the Clementina Saduwa Award for 2014 is Monique Jeanne Morrow from Switzerland!

  • Cisco Technology Radar Gold Medalist and Hall of Fame

    Cisco Strategy Technology Group

    Gold Medalist and inducted into Cisco Technology Radar Hall of Fame
    https://techradar.cisco.com/

Sprachen

  • English

    Muttersprache oder zweisprachig

  • French

    Muttersprache oder zweisprachig

  • German

    Fließend

  • Mandarin

    Grundkenntnisse

Organisationen

  • Crypto Valley Association

    Individual Member

    –Heute
  • International Society Service Innovation Professionals

    President Jan 2016

    –Heute

    http://www.issip.org

  • utopiacities.org

    Advisor

    –Heute

    "Reimagining the Future of Slums" http://www.utopiacities.org

  • SheWorks!

    Advisor

    –Heute

    SheWorks! is talent cloud combined with remote workforce management tools that helps companies to hire vetted professional women from the global talent pool and manage, coordinate, monitor, rate and pay their work transparently. https://www.facebook.com/SheWorksCloud/

  • Congressional App Challenge

    Advisory Board

    –Heute

    The Congressional App Challenge (CAC) is a competition aimed at encouraging U.S. high school students to learn how to code by creating their own applications. The Challenge is intended to highlight the value of computer science and STEM (Science, Technology, Engineering and Math) education and encourage students to engage in these fields. By encouraging and recognizing our nation’s young programming talent, Congress hopes to shine a light on the growing importance of these…

    The Congressional App Challenge (CAC) is a competition aimed at encouraging U.S. high school students to learn how to code by creating their own applications. The Challenge is intended to highlight the value of computer science and STEM (Science, Technology, Engineering and Math) education and encourage students to engage in these fields. By encouraging and recognizing our nation’s young programming talent, Congress hopes to shine a light on the growing importance of these skills. Representatives Ed Royce (CA-39) and Seth Moulton (MA-06) are serving as congressional co-chairs of the 2016 Congressional App Challenge. The 2016 Congressional App Challenge will take place from July 18, 2016 through November 2, 2016, and is open to all U.S. high school students in participating districts. Challenge participants are invited, either as individuals or as teams 0f up to four, to create and submit their own software application (“app”) for mobile, tablet, or other computing devices on a platform of their choice. A panel of local computer science professionals and congressional representatives will judge the apps, and the winners in each district will have the honor of being recognized by their Congressional representative. The CAC is coordinated by the Congressional Internet Caucus and the non-governmental sponsor of the project, the Internet Education Foundation.

  • Shevirah

    Advisor

    –Heute

    http://www.esecurityplanet.com/mobile-security/shevirah-moving-forward-for-enterprise-mobile-pen-testing-video.html

  • Girls in Tech, Inc.

    Board of Directors

    –Heute

    Girls in Tech is the largest global organization in the sector, creating awareness of the need to recognize women’s contributions to technology and promoting women working in the workforce. With over 47 active chapter and approximately 20,000 members, the organization provides Global Classroom courses, coding and design bootcamps, entrepreneurial and leadership programming, business pitch competitions, hackathons, networking events, conferences, and sponsors young girls in high school to…

    Girls in Tech is the largest global organization in the sector, creating awareness of the need to recognize women’s contributions to technology and promoting women working in the workforce. With over 47 active chapter and approximately 20,000 members, the organization provides Global Classroom courses, coding and design bootcamps, entrepreneurial and leadership programming, business pitch competitions, hackathons, networking events, conferences, and sponsors young girls in high school to participate in STEM workshops.

  • Samaschool Advisory Board

    Board of Directors

    –Heute

    http://samaschool.org/about/advisory-board/ The internet and the rapid growth of the digital economy are creating unprecedented avenues for economic opportunity. But in order for the unemployed to take advantage of online work opportunities, they need to be lifted into the 21st century economy with new skills. Samaschool aims to bring opportunity to areas with high poverty and unemployment by training low-income people how to find and succeed in digital work. The curriculum teaches…

    http://samaschool.org/about/advisory-board/ The internet and the rapid growth of the digital economy are creating unprecedented avenues for economic opportunity. But in order for the unemployed to take advantage of online work opportunities, they need to be lifted into the 21st century economy with new skills. Samaschool aims to bring opportunity to areas with high poverty and unemployment by training low-income people how to find and succeed in digital work. The curriculum teaches high-demand, market-aligned skills and provides the soft skills and digital literacy training required for success in today’s job market. Through the Samaschool model, low-income people can access a new economy and gain critical skills that will generate new sources of income and pathways out of poverty.

  • Women in Technology International; Exec Women's Forum;Women's Society of Cyberjutsu

    -

    –Heute
  • ITU Telecommunications Standards Advisory Group

    Vice Chair

    –Heute

    http://www.itu.int/net/ITU-T/lists/mgmt.aspx?Group=0&Period=14

  • JCA Cloud Computing

    Chair

    –Heute

    http://www.itu.int/en/ITU-T/jca/Cloud/Pages/default.aspx

  • Gilde Buy Out Partners AG now Rivean Capital

    Advisor

    http://gilde.com/about-us/profile

  • FTTH Council Asia Pacific

    Board of Directors

    http://www.ftthcouncilap.org/

  • Board of Directors for RFSpot

    -

    http://www.rfspot.com, http://www.cisco.com/web/solutions/trends/tech-radar/index.html

  • CodeChix Advisory Board

    -

    http://www.codechix.org/board-of-directors/

  • SHINE for Girls Advisory Board

    -

    http://www.shineforgirls.org/

Erhaltene Empfehlungen

23 Personen haben Monique Jeanne Morrow (she/her) empfohlen

Jetzt anmelden und ansehen

Weitere Aktivitäten von Monique Jeanne Morrow (she/her)

Monique Jeanne Morrow (she/her)s vollständiges Profil ansehen

  • Herausfinden, welche gemeinsamen Kontakte Sie haben
  • Sich vorstellen lassen
  • Monique Jeanne Morrow (she/her) direkt kontaktieren
Mitglied werden. um das vollständige Profil zu sehen

Ebenfalls angesehen

Entwickeln Sie mit diesen Kursen neue Kenntnisse und Fähigkeiten