Showing posts with label Cutting Edge Technology. Show all posts
Showing posts with label Cutting Edge Technology. Show all posts

September 25, 2016

You Changing My What

So change agents are some of the most sought after...yet most abhorrent individuals on this planet. 

We all recognize that things can be better, and on one hand, we want someone to come and help us make it so...a change agent!

However, change is painful and frequently results in unintended and unwanted consequences, and so on the other hand, we hate change agents. 

Many change agents may not just change things that need to get changed and fixed, but they may change a lot of things that were working just fine before, thank you.  

Can anyone say reorganization? 

Moreover, change agents may not be changing things for the right reasons like the good of the organization.

Instead they may be self promoters, control freaks who have to do things their way, or they may be serial job hunters--next stop change everything and get the heck out of Dodge!

Change agents may work with people to get requirements, input, and vet the issues and the solutions or they may just be paying lip service to others, only to really shove their or someone else's agenda down your throats. 

You see there is healthy change that is based on genuine learning, growth, and maturity, and then there is change that is destructive, diabolical, and selfish. 

When you decide to change something, what's your motivation and your goal--is it to right the wrongs in the organization, reengineer business processes, and introduce new technologies or is it to change for change's sake alone. 

Yes, we did something. Check the box. Tell the management committee. We earned our keep and oh yeah, then some. We changed something, anything. Hip Hip Hooray. Bonus time!

So either you'll get an award and promotion or you'll get asked accusingly and threateningly, "Who told you to change that?!"

Change which has no real support or merit is dead on arrival (DOA), and will be gone, gone, gone long after the change agent is gone.

So don't freak out--the b.s. changes are either going to kill the organization or simply end up in Fresh Kills landfill.

The real changes may actually make you stronger. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

June 2, 2012

Superabled, Not Disabled


This is a video of South African sprinter and Olympic hopeful, Oscar Pistorius--a double amputee fitted with curved, carbon-fiber prosthetic "Cheetah Blades" that can "challenge the fastest sprinters in the world."

There was a fascinating article about this in the Wall Street Journal today (2-3 June 2012)--on how high-tech implants are being put in people's bodies and brains, changing them from disabled to "superabled."

The article explains how "the goals for many amputees is no longer to reach a 'natural' level of abilities, but to exceed it, using whatever cutting-edge technology is available."

And just like body implants are helping spur superhuman abilities, so too neural implants can stimulate brain activity to focus attention, faster learning, hone skills, and augment performance. 

Last September, Tim Hemmes, paralyzed from a motocycle accident, was able to use a brain implant to move a mechanical arm, just with his thoughts!

"Technology can give us brains and brawn" and those with disabilities and the elderly who have lost mental and physical capacities will be early adopters--"they have a lot to gain and are willing to face the risk inherent in new medical technology."

There are many ethical questions when it comes to human implants--especially when it comes to the possibility of people voluntarily substituting technology for healthy body parts--just to have the Steve Austin-like, Six Million Dollar Man, bionic capabilities. 

Another question is once we start replacing our body parts--our very selves--with technology augmentation, at what point do we stop being us?  

And at what point, do we potentially stop being human and become something else--half human, half machine--or even more machine than human?  

Like the mythical creature, the centaur, which was half man and half horse--it seems like humans have always wondered about what makes them who they are and ultimately what they might become if they try to co-exist or meld with something altogether different.

By combining technology into our humanity, we are becoming something different--maybe a super human, if we use it ethically and for the good. Or perhaps we may become something more malevolent, if we go on to abuse our superabled powers to dominate or otherwise harm those less souped-up than us.  

Only time will tell where technological implantation and human augmentation ultimately takes us--it holds both enormous promise that we need to leverage and frightening risks that must be carefully planned and managed.

Share/Save/Bookmark

October 1, 2010

Awesome Emergency Management Technologies

Obviously, I am a technology aficionado, but there is none more awesome than technology, which saves lives.

So to me, defense systems (a topic for another blog) and emergency management systems are two of the most fascinating and compelling areas of technology.

Recently, I have been closely following the story of the Chilean miners trapped beneath 2,200 feet of rock and earth due to a cave-in on 5 August.

It took 17 days to even find the miners in the winding underground mineshaft, and since then the ongoing determination and ingenuity of the emergency rescuers has been incredible.

The Wall Street Journal, 1 October 2010, in an article called “Inventions Ease the Plight of Trapped Miners” describes this unbelievable rescue effort.

Here are some of the technologies making their way a half-mile underground to the 33-trapped miners:

- The Paloma (or Pigeon)—supply pod that is “a five-foot-long hollow cylinder that works like a pneumatic tube.” Rescuers stuff it with supplies and lower about 40 of these every day through a 4 inch diameter shaft to supply the miners food, medicine, electrical supplies.
- The Phoenixrescue capsule, 10 feet tall, 900 pounds, with its own oxygen supply and communication systems designed to extract the trapped miners and bring each of them for the 15-40 minute ride it will take to get them to the safety of the surface.
- Fiber Optic Communications—the miners are using a fiber-optic video camera and telephone link hooked to videoconferencing equipment. This has been cited as one of the biggest boosters of the miner’s morale.
- Video Projectors—cellphones with built in projectors have been sent down to the miners allowing them to watch films and videos of family and friends.
- iPods—these were considered, but rejected by the chief psychologist of the rescue effort who feared that this may isolate the miners, rather than integrate them during this emergency.
- Modern Hygiene Products—Dry shampoo, soap-embedded hand towels, and self-sterilizing socks, have helped reduce odor and infection from the miners.

NASA engineers have exclaimed about the innovation shown by the Chilean emergency rescuers: “they are crossing new thresholds here.”

There are some great pictures and graphics of these devices at an article in the U.K. Telegraph.

What was once being targeted as a holiday rescue, by December, is now being envisioned as an October-November rescue operation. And with the continued application of innovation and technology, the miners will soon we back safe with their families and loved ones.
Also, ongoing kudos to the heroic rescuers!

Share/Save/Bookmark

July 5, 2008

The Three I’s and Enterprise Architecture

One question that is frequently asked in enterprise architecture is whether new technologies should be adopted early (more cutting edge) or later (more as quick followers). Of course, the third course of action is to close ones eyes or resist change and simply “stay the course.”

The advantages to bleeding edge technology adoption is having the early advantage over competitors in the marketplace (this head start provides the ability to incorporate innovation into products early and capture a hefty market share and quite possibly dominance), while the advantage to quick followers being learning from mistakes of others, building from their initial investments and a more mature technology base (for example, with software, one where the bugs have been worked out) thereby potentially enabling a leapfrog effect over competitors. The advantage to staying the course is organizational stability in the face of market turmoil; however, this is usually short lived, as change overwhelms those resistant, as the flood waters overflow a levee.

The Wall Street Journal 5-6 July 2008 has an interview with Theodore J. Frostmann, a billionaire private-equity businessman, who tells of Warren Buffet’s “rule of the three ‘I’s,” which is applicable to the question of timing on technology adoption.

“Buffet once told me there are three ‘I’s in every cycle. The ‘innovator,’ that's the first ‘I’. After the innovator comes the ‘imitator.’ And after the imitator in the cycle comes the idiot. So when…we’re at the end of an era it’s another way of saying…that the idiots have made their entrance.”

I relate the innovator and the early adopter in their quest for performance improvement and their sharing the early competitive advantage of innovation.

Similarly, I associate the imitator with the quick followers in their desire to learn from others and benefits from their investments. They recognize the need to compete in the marketplace with scarce economic resources and adapt mindfully to changes.

Finally, I relate the idiots that Warren Buffet refers to with those that ignore or resist change. Often these organizations mistake their early market success for dominance and in their arrogance, refuse to cede to the need to adjust to changing circumstance. Alternatively, these enterprises are truly ignorant of the requisite to adapt, grow, mature, and transform over time, and they mistakenly believe that simply sitting behind the cash register and waiting for customers is the way to run a business (versus a Costco whose warehouse, wholesale model has turned the nature of the business on its head).

In architecting the enterprise, innovation and imitation, while not without cost and risk, will generally speaking be highly rewarded by superior products and services, greater market share and more loyal customers, and a culture of success in the face of constant change. You don't need to look far for examples: Apple, 3M, P&G, Intel, Toyota, Amazon, and more.


Share/Save/Bookmark

February 13, 2008

Fashion, Technology and Enterprise Architecture

I was a little surprised to read a blog in MIT Technology Review online from 31 January 2008 about “the melding of technology and fashion.”

What was surprising to me was not the concept that technology could be used to enhance fashion, because certainly we would expect that technology would enable faster, better, and cheaper processes for manufacturing garments, and perhaps even aid the development of garments from new high-tech materials that can protect from sunlight, remove sweat and odor, or wear better, last longer, and protect the wearer from any and all hazards (fire retardant, bullet proof, maybe even crash resistant).

However, this particular blog was not about any of those things. Rather, the blog was about “wearable technologies” demonstrated at the Seamless: Computational Coulture fashion show.

What types of fashion technologies are we talking about?

  1. Shape-changing dresses
  2. Music-playing sweaters
  3. Jackets that display text messages with light emitting diodes
  4. Glow in the dark clothes made from organic solar cells
  5. Skirts that use kinetic energy to power gadgets
  6. Rings that “display a wearer’s Google hits”
  7. Shirts that “reflects Wi-Fi strength

The end of the blog states, the fashion show was “entertaining and electrifying.”

The blog acknowledges that “many of these designs will never reach the market.” Yet, even the very concept of many of these wearable technologies seems useless, if not outright silly. And maybe that’s the point, silly gets attention and that is what fashion designers want.

From a User-centric enterprise architecture perspective give me the Star Trek uniform that can be worn in any weather, atmosphere, or on any planet in the solar system and I call that high-tech fashion. Beam me up Scotty.


Share/Save/Bookmark

September 29, 2007

24 TV Series and Enterprise Architecture

“24, last year’s most Emmy Award-winning television series with five Emmys, including Outstanding Lead Actor in a Drama Series (Kiefer Sutherland) and Outstanding Drama Series, is one of the most innovative, thrilling and acclaimed drama series on television.” (TV.com)

What makes 24 so thrilling?

Well there is the drama, the intrigue, the ever twisting plot and constant terrorist threats, and of course, Keifer Sutherland and the rest of the 24 team.

There is also the technology and its application to track the terrorists, communicate effectively, and the business intelligence to decipher the terrorist plots. While the technology is not perfect and often it is used by the terrorists to thwart CTU as well, it still comes across quite impressively.

On a Bluetooth technology website, I found this:

“Fox's hit television show ’24’ has always displayed the latest in cutting edge technology.CTU (Counter Terrorist Unit) agents and terrorists alike. But which model of Bluetooth headsets are they actually wearing?” (bluetomorrow.com) During this season (Day 5) of 24, Bluetooth wireless headsets can be seen constantly being used by both

The technology used in 24 is viewed as cutting-edge and trend-setting (i.e. everyone wants to know which model CTU is using).

On another site, Government Computer News, 7 January, 2007, it states: “Federal superspy Jack Bauer battles fate and countless foes on the hit TV show “24”—a drama unfolding in real time and depicted on several windows within the screen. Like the Bauer character, who himself is the fictional successor to an earlier superagent who liked his tipple “shaken, not stirred,” federal IT users frequently will have to share information quickly if they hope to prevail or even survive in 2007.” (http://www.gcn.com/print/26_01/42874-1.html)

Again, the 24 series is viewed as a model for information technology users and IT sharing.

In the same GCN article, Homeland Security Department, G. Guy Thomas, the Coast Guard’s science and technology adviser for the Maritime Domain Awareness Project, states: “The ultimate goal that technologists and policy-makers should strive for is user-definable interfaces, which would provide a ‘common operational picture [COP] that serves as an interface to a collaborative information environment.’”

The COP contains an operational picture of relevant information shared by more than one command and facilitates collaborative planning and assists all echelons to achieve situational awareness. This type of operating picture is often seen being used in CTU to track and ultimately catch (with Bauer’s help) the terrorists.

For Homeland Security enterprise architecture, 24 can serve as a target state forsynthesizing business process and technology. For example, the integration between the business processes and the technology is virtually flawless in CTU, where business intelligence at the Los Angeles office is communicated and made virtually immediately available to the agents in the field for quickly following up on leads and cornering conspirators.

Additionally, even the character Jack Bauer himself displays not only tremendous heroism and patriotism in his efforts to protect this nation and its citizens, but also his innovative and can-do persona is a model for enterprise architecture development of creative yet grounded target technology states and transition plans for our organizations.

Additionally, from a User-centric EA perspective, we need to look outside our agencies at business and technology best practices in the public and private sectors, and yes, even at fictional portrayals. It is even from dramas like 24, and maybe especially from such visionary elements that EA can adapt information, creativity, and innovation to plan a genuine target state for our enterprises.


Share/Save/Bookmark