Showing posts with label Alerts. Show all posts
Showing posts with label Alerts. Show all posts

November 26, 2015

ISIS Ruined Our Vacation

So we rolled the dice this Thanksgiving vacation and came up sort of empty.

We were supposed to go to Las Vegas, but then there is ISIS threatening to strike the U.S. 

Already, ISIS is claiming 71 soldiers in 15 states in the U.S., and the FBI is saying that ISIS terrorists are being recruited in all 50 states

Yet our leadership doesn't want to fight ISIS while they are still over there--instead, we are foolishly waiting for the next big terror attack over here, as if 9/11 with 3,000 dead wasn't enough!

We are stubborn, deaf to the terror threats, reactive, and refuse to wake up to the danger that is facing our country. 


Dancing around the issue with some drone and airstrikes--no matter how lethal--is not going to remove this enormous terror threat--coming from some of the most barbaric of enemies that we have ever faced. 

My sister told me from a lecture she heard recently about the terrorist threats we are facing, "We are used to fighting finite wars--there is a start/middle/end. [But] they [ISIS] fights infinite wars--not defined [by time or space]."

So how did we come to cancelling our Vegas holiday vacation?


Here is our story...

The number 613 in Judaism is very important--it represents the number of commandments in the Torah.

We have been seeing this number lately wherever we go: We look at the clock, it's 6:13. We are driving and look at the license plate in front of us--613. We go shopping and the receipt is for $6.13. We rolled a pair of dice (above), that's right 613, and much more. 

We asked what this means and were told it's a warning and to do teshuva (repentance) and follow the commandments more stringently. 

On Shabbat this week, I was reading the Wall Street Journal, and then saw an article on a new illustrative book of the commandments called, "The 613."

That night, I dreamed the entire night about 613--and the need to unlock the code of what it meant for us. 

The next day, my wife said "I have a really bad feeling about Vegas, let's go visit your parents graves."

When we got there, my wife touched the tombstone, and said she could hear my dad telling her not to go to Vegas--was this just playing on her imagination?

So she calls her father who is chasidic and he contacts a famous, pious and mystical Rabbi, the Vizhnitzer Rebbe--and without asking him about the trip--the Rebbe just pops out to my father-in-law that he should tell us not to go on our trip, and if we have to go, to take a different path.

My wife tells her father that we already made plans, have tickets, and don't want to cancel the trip, so we are instructed to give charity (so I immediately write a check for $613!) and do other deeds for repentance instead. 

Then the night before we are supposed to fly out, my daughter comes out with her iPhone and a news items on the State Department issuing a global travel alert "amid concerns that terror groups and individuals plan more attacks after the Paris massacres."

If all this wasn't enough, my back which has been hurting the last week, then completely gives out out on me--and in enormous pain, we simply can't go anywhere.

One warning, two warnings, three warnings...we can't be deaf to G-d's message.

So on this Thanksgiving, a sincere thank you to Hashem (and the Vizhnitzer Rebbe) for guiding us and keeping us from danger.

And a not so thank you to ISIS for implicitly spoiling our Thanksgiving holiday plans to Vegas. 

A small and insignificant, but nevertheless a casualty to our political disengagement, false appeasement, fearfulness to recognize the enemy, and war-weariness to take the bastards down and take them down hard and for good before something, G-d forbid, serious and much worse happens. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

April 10, 2014

You Mess At Your Own Risk

This guy is obviously pretty serious about not messing with his car. 

"Touch this car again. You are laser sighted. You will be shot in the face!!!"


I remember in NY, people messed with the cars all the time--nasty stuff like backing or plowing into your bumpers when trying to park, keying cars, slashing tires, knocking off the mirrors, egging the cars, and one guy I remember even had his car stolen and the couple actually had sex in his back seat!


The stupid steering wheels locks to the brakes were a joke for security, the noisy annoying car alarms were so routine no one looked or cared, and LoJack helps you find the clunker again although you may never want to drive it anyway after what the crooks would do to it.


Not sure this sign will help ward off all the crap that people do--somehow they always find another way to be jerks with someone else's stuff.


Aside from James Bond's car that would explode if you tried to mess with it, does anyone else have any good ideas for car protection?  ;-)


(Source Photo: Dannielle Blumenthal)

Share/Save/Bookmark

February 17, 2014

Alert, Alert, And More Alerts

No this is not an alert, but some strategic thinking about alerts. 

As a kid, we get our first alerts usually from the fire alarm going off in school and practicing the buddy system and safely evacuating. 

As adults, we are used to get so many types of alerts:

- Homeland Security threat alerts
- Breaking news alerts
- Emergency/Disaster alerts
- Severe weather alerts
- Smog alerts
- Transportation delay alerts
- Accident alerts
- Fraud alerts
- Economic and financial alerts
- Amber missing child alerts
- Internet security alerts
- Power loss alerts
- Home or business intruder alerts
- Fire alerts
- Carbon Monoxide alerts
- Medical/health alerts
- Chemical spill alerts
- Product safety or recall alerts
- Unsafe drinking water alerts
- Active shooter alerts
- Work closure alerts
- Parking garage alerts
- Dangerous marine life alerts
- Dangerous current or undertow alerts
- Air raid siren alerts
- Solar eclipse alerts
- Meteorite or falling space debris alerts
- Special sale or promotional event alerts

With the arrival of highly successful, mass social media applications like Twitter, we have alerts aggregated for us and listed chronologically as things are happening real-time. 

The brilliance of the current Twitter-type alerting is that we can sign up to follow whatever alerts we are interested in and then have a streaming feed of them.  

The alerts are short--up to 140 characters--so you can quickly see the essence of what is happening or ignore what is irrelevant to you. 

When more space is needed to explain the details behind an alert, typically a (shortened) URL is included, which if you click on it takes you to a more in depth explanation of the event or item. 

So alerts are a terrific balance between short, attention grabbing headlines and links to more detail, as needed. 

What is also great about the current alerting mechanism is that you can provide concise alert information, including:

- Message source (for ensuring reliability)
- Guidance (for providing immediate instruction on response). 
- Hazard (for specifying the type of incident)
- Location (for identifying geographic or mapping locality)
- Date/time (for implications as to its currency)
- Importance (for determining severity such as catastrophic, critical, etc.)

While we remain ever, hyper-vigilant, we need to be careful not to become anxiety-ridden, or at some point, simply learn to tune it all out, so we can actually live life and get stuff done.

It's good to know what's going on out there, but can too much information ever become a bad thing? ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

July 19, 2013

With Surgical Precision


This is awesome--the iKnife ("Intelligent" knife) for cutting away cancer, can also detect the cancerous cells. 

I had previously heard about dogs being able to sniff cancers such as lung, ovarian, and skin--but never a surgical knife doing this. 

With the iKnife, a surgeon can use a electrosurgical knife to cut/burn away cancerous tissue, but even better yet, this knife sucks away the smoke containing the vaporized tissue to a mass spectrometer that analyzes the particles and is said to be 100% accurate (so far) in detecting cancerous tissue (from those that are normal).

This is critical because it can be lifesaving in guiding surgeons not to miss any of the cancer (and therefore also helps avoid repeat surgeries) as well as not removing unnecessary tissue that is not cancerous. 

Dogs can help alert us to hidden cancers within and the iKnife can help remove them with greater precision and success. 

Hopefully, with G-d's help, one day we won't need either anymore. ;-)


Share/Save/Bookmark

April 16, 2013

A Shocking Bra To Stop Attackers

In the medieval times, to help ensure fidelity of partners and protect against rape, they invented something called a chastity belt--I am sure you get it. 

There is one for women and there is another one fitted for men.

Now in light of the horrible rape attacks in India, 3 female students in India's SRM University have developed an anti-rape bra that literally shocks attackers. 

The bra is called "SHE" (for Society Harnessing Equipment) and unlike the chastity belt of the olden-days, this bra according to Popular Science delivers 3,800 kv to attackers. 

Women can activate the bra when they feel unsafe and it is pressure sensitive and is calibrated to be able to differentiate say a hug from something more violent. 

The woman is insulated from getting shocked by a polymer lining on the inside. 

The bra is also being outfitted so the pressure sensor sends a Bluetooth signal to your smartphone to send text message alerts to family or friends and the police with your GPS location. 

I want to end with a quote from one of the students as to their inspiration for this innovative anti-rape bra:

"Studying in a convent girls school, we were always taught to be good to everyone and bear a cheerful smile. After stepping into the real, cruel world, we realized that our smile could not last for long as the threat to our purity and integrity always lingered on...Hence, we have initiated the idea of self-defense, which protect the women from domestic, social and workplace harassment."

While I hope these students don't believe that everyone in the world is cruel, I applaud these young women for doing something positive to help protect women worldwide.  

I don't know how practical this anti-rape bra will end up being (i.e. wearing something that produces a dangerous shock), this is a good step in thinking about how to make women less of a target and increase the risk to any would-be attacker. ;-)

(Source Photo: adapted from here with attribution to Nicolas Sanguinetti) 


Share/Save/Bookmark

July 1, 2012

When Aliens Come Calling

This is an out-of-this-world topic that I don't think I have written about before...ALIENS--no seriously! 

MSNBC ran an interview with Seth Shostak, the chairman of the International Academy of Astronautics' SETI Permanent Study Group (27 June 2012).

SETI is the well-known orgnaization that conducts the Search for Extraterrestrial Intelligence--they employ 150 scientists, educators and support staff, and their projects have been sponsored by NASA, Department of Energy, U.S. Geological Survey, and many technology companies like HP, Sun, and more. 

At SETI, they monitor radio transmissions and telescope observations for signals that "cannot be ascribed to noise."

According to Shostak, he believes that we will detect alien signals by between 2025 and 2030, although he acknowledges that searching for alien life in the cosmos in like looking for a needle in a haystack, and it "never occurs when you expect them."

However with advances in technology (specifically computer processing), we will get closer to be able to monitor "all-sky, all the time, all frequencies," rather than searching a specific star system, for a specific time, at specific frequencies.

The really interesting question posed though is what happens if we actually detect an alien signal?

Apparently, most of the planning, according to Shostak is for the initial protocols for alerting everyone and even then "it takes something on the order of five days" to assess whether it is real or not. 

The big concern is that "nobody is in charge" for handling such a global...no, intergalactic event. 

And, he says "I don't think there's any large-scale effort to prepare humanity."

Maybe, it's that we don't believe or want to believe that this eventuality will ever really occur.

Perhaps, it's too frightening to think of ourselves as the native Americans being invaded by colonials with superior technology and firepower.

Yet according to a National Geographic survey, more than a third (36%) of people surveyed think aliens exist. And how many more people are afraid to admit it?

Aliens could be a good thing--coming here benevolently to share with us or they could act alien and try to take from us. From our own Earthly experiences, it seems the latter is far more likely. 

We have a lot of fingers and weapons pointed at each other all time, I wonder whether we need to spend more time and effort thinking, planning, and preparing for something much more scary and threatening than each other.

(Source Photo: here with attribution to Chris at Oblong Pictures)

Share/Save/Bookmark

June 23, 2012

Biosecurity--Where Every Moment Counts

A biological attack on the United States is a most frightening prospect and one that could present an existential threat to us. 

Just the very mention of bio-warfare agents such as anthrax, ebola, smallpox, bubonic plague, and others are enough to provoke sheer terror in most people. 

BioWatch is a program managed by the Department of Homeland Security (DHS) in partnership with the Centers for Disease Control (CDC) and the Environmental Protection Agency (EPA) to monitor for a biological attack.

According to Bloomberg Businessweek (21 June 2012) bio-surveillance is currently conducted in 30 metropolitan areas around the country using 600 air filters to detect pathogens, where samples are collected daily and taken to labs for analysis in what amounts to a 36 hour turnaround to determine if there is a hazard. 

A new technology made by Positive ID or Northrop Grumman collects samples four times a day and analyzes it on the spot for bateria, viruses, and toxins, and sends the results to officials by secure network in as little as two hours. 

The shorter time to detection will give more time to save lives by getting drugs and vaccines to the field sooner and prevent the spread from person to person.  

DHS wants to deploy 2,500 of these new sensors and the bio-attack alert system at a cost of approximately $5.7 billion, if Congress approves. 

If this bio-sensing system proves out functionally, then the price tag seems well worth it. 

Bioweapons like cyber-attacks can cause widespread panic as well as disruption to our everyday way of life, however a bio-attack has the added feature of making people symptomatic and infecting them with deadly and painful illnesses. 

Cyber attacks can infiltrate and take out our critical infrastructure, but biological attacks can directly destroy our physical bodies and the population itself. 

A bio-attack and a cyber-attack together could devastate us by attacking us while at the same time inhibiting our ability to deliver medication and quarantine those that are ill and so on. 

In addition to grossly improving on our cyber defensive (and offensive) capabilities, we must do everything we can to enhance our biosecurity--this mean upgrading our preparedness for bio-terrorism and bio-warfare using the latest technologies available to sniff out and identify a bio attack and alert us so we can respond timely, while we still can. 

(Source Photo: here with attribution to U.S. Department of Defense)

Share/Save/Bookmark

May 26, 2012

Warnings: When It's Not Just "Crying Wolf"

There is a famous saying that "Those who cannot learn from history are doomed to repeat it." - George Santayana 

An editorial appeared in the Wall Street Journal (10 April 2012) by French philosopher Pascal Bruckner called "The Ideology of Catastrophe" that accuses those who warn others of danger as having "tiny minds who wish us suffering."

This "philosopher" maligns both Jewish prophets and Christian "millenarian movements" for having "no function other than indignation...and [the Prophet] becomes intoxicated with his own words and claims a legitimacy with no basis."

Mr. Bruckner must be completely clueless of those throughout history that have sought to warn us of dangers that if the world would but have listened, untold numbers of millions could have been saved. 

From the earliest of times, there have been warnings about pending catastrophes and those that paid attention were able to make a difference. 

In the Torah (Bible), G-d warned Noah of the impending flood, and Noah was able to save humankind and animals--2 by 2 they went unto the ark for 40 days and nights of pouring rain that vanquished the earth.

In the Prophets, G-d has Yonah (after being swallowed by the whale) warn the the inhabitants of Nineveh to repent and prevents them and their city from destruction. 

In the 20th century, if only the world had paid attention to the genocidal desires of maniacs like Adolph Hitler (may his name be cursed) in books like Mein Kampf, how many tens of millions may have been spared. 

In terms of the advent of nukes and other weapons of mass destructions, to at least some extent people and governments have listened to warning and retreated from a philosophy of mutually assured destruction (MAD) to instead move toward anti-proliferation, arms reduction treaties, and other safeguards, and we have thank G-d been able to avoid major catastrophes from these dangers. 

Thankfully, with dire medical issuances about various diseases, pandemics, and even warning about the dangers of obesity, smoking, and drinking, we have been able to curb harmful behaviors, promote healthier living, and lengthen life spans.

Similarly, with environmental warnings, we have been able to create awareness and educate people on more sustainable living--through conservation, recycling, reuse, as well as renewable energy sources, and more. 

Moreover, warnings about runaway spending and the national deficit have been heard for decades, but having ignored these for the most part, we now face a $16,000,000,000,000 bill and growing rapidly--soon coming due to future generations of Americans.  And we are already witnessing the effects--inflation, unemployment, default, and perhaps succession from the Euro and the EU itself--of countries on the other side of the Atlantic that have made the similar errors in their wild spending ways.

While some corporate, religious, and political leaders do use fear tactics to gain power or whatever they are personally-seeking that does not make every warning false and malevolent. 

Certainly, at the other end of the spectrum, some people would rather live in denial of any issues and pretend that everything is just hunky-dory all the time. 

Bruckner does makes some superficial and one-sided arguments--denouncing warnings and claiming that:

- Warnings cause fear, which becomes a self-fulfilling prophecy.

- Warnings "though they try to awaken us...eventually deadens us."

- People who warn "do not [really] intend to warn us as much as to condem us."

- Leaders issue warnings "to dazzle us in order to make us docile."

Unfortunately, Bruckner has failed to distinguish between fear-mongering and fact. 

Bruckner missed the point of how real warnings can help people--which is through changing hearts, minds, and behaviors. 

1) Fear is not a self-fulfilling prophecy unless people do not act in time to change dangerous and irresponsible behaviors.

2) Genuine warnings do not deaden those who seek truth and a way forward--it only deadens those who are unwilling or unable to adapt. 

3) People who warn based on facts and with sincerity to help others do not wish to condem us--rather they wish to alleviate unnecessary suffering.

4) Leaders who issue warnings to alert people to very real dangers out there in order to seek safety or change course are not trying to dazzle and make docile, but rather they seek to save lives by creating awareness, educating, and empowering people to change before it is too late.

Some people understand well from history as well as from common sense that our behaviors have consequences--other do not. 

For me, when we stray into dangerous waters, I am glad for the true heros out there looking out for us and helping guide us live better and longer lives. 

While it is good to be critical of unfounded warnings and charlatans, it is necessary to have warnings that are grounded in fact, given sincerely, not forced on others, and help people stay successfully on the road to health, prosperity, and human rights.

(Source Photo: here with attribution to Alex Peruso)

Share/Save/Bookmark

March 1, 2012

Dashboarding The Information Waves

I had an opportunity to view a demo of a dashboarding product from Edge called AppBoard, and while this is not a vendor or product endorsement, I think it is a good example to briefly talk about these types of capabilities. 

Dashboard products enable us to pull from multiple data sources, make associations, see trends, identify exceptions, and get alerts when there are problems.

Some of the things that I look for in dashboard tools are the following:

- Ease of use of connecting to data 

- Ability to integrate multiple stovepiped databases

- A variety of graphs, charts, tables, and diagrams to visualize the information

- Use of widgets to automatically manipulate the data and create standardized displays

- Drag and drop ability to organize the dashboard in any way you like to see it

- Drill down to get more information on the fly 

While there are many tools to consider that provide dashboards, information visualization, and business intelligence, I think one of the most important aspects of these is that they be user-centric and easy to implement and customize for the organization and its mission.

When making critical decisions (especially those involving life and death) and when time is of the essence--we need tools that can be can be easily navigated and manipulated to get the right information and make a good decision, quickly. 
 
As a fan of information visualization tools, I appreciate tools like this that can help us get our arms around the "information overload" out there, and I hope you do too.

(All Opinions my own)

Share/Save/Bookmark

June 24, 2011

Feedback, Can't Live Without It

Whether you call it feedback or performance measurement, we all need information on how we are doing in order to keep doing better over time.


Wired (July 2011) reports that there are 4 basic stages to feedback:

1. Evidence--"behavior is measured, captured, and stored."

2. Relevance--information is conveyed in a way that is "emotionally resonant."

3. Consequence--we are provided with the results of our (mis)deeds.

4. Action--individuals have the opportunity to"recalibrate a behavior, make a choice, and act."

The new action (in step 4) is also subject to measurement and the the feedback loop begins again.

Feedback plays a critical role in helping us achieve our goals; according to psychologist Albert Bandura, if we can identify our goals and measure our progress to them, we greatly increase the likelihood that we will achieve them.

Thus, feedback is the way that we continually are able to course correct in order hit our targets: if we veer too much to the right, we course correct left; if we veer too much to the left, we course correct right.

Feedback loops "can help people change bad behavior...[and] can encourage good habits."

From obesity to smoking, carbon emissions to criminal behavior, and energy use to employee performance, if we get feedback as to where we are going wrong and what negative effects it is having on us, we have the opportunity to improve.

And the way we generate improvement in people is not by trying to control them--since no one can really be controlled, they just rebel--instead we give them the feedback they need to gain self-control.

These days, feedback is not limited to having that heart-to-heart with somebody, but technology plays a critical role.

From sensors and monitors that capture and store information, to business intelligence that makes it meaningful in terms of trends, patterns, and graphs, to alerting and notification systems that let you know when some sort of anomaly occurs, we rely on technology to help us control our often chaotic environments.

While feedback can be scary and painful--no one wants to get a negative reaction, criticized, or even "punished"--in the end, we are better off knowing than not knowing, so we have the opportunity to evaluate the veracity and sincerity of the feedback and reflect on what to do next.

There are many obstacles to self-improvement including disbelief, obstinance, arrogance, as well as pure unadulterated laziness. All these can get in the way of making necessary changes in our lives; however, feedback has a way of continuing to come back and hit you over the head in life until you pay attention and act accordingly.

There is no escaping valid feedback.

Share/Save/Bookmark

June 9, 2011

Misappropriating Twitter

By now we are all familiar with the news story regarding a prominent lawmaker, recently married, who admitted to a longstanding pattern of inappropriate sexual exploits via Twitter.

As The Wall Street Journal (9 June 2011) notes, the individual got caught when he “mistakenly sent the photo to tens of thousands of Twitter followers,” rather than as a private message.

As a public servant who is a proponent of social media technology used appropriately, I was very concerned when I saw this in the news (note: all opinions my own).

The government needs social media tools like Twitter. It is an important tool for sharing information and alerts. It is obviously not for “sexting” your followers, especially with a Twitter handle that is apparently coming from someone in the government.

Twitter is an important means of engaging the public in important ways, moving this great country forward on policy issues and a vision that is noble, righteous, and for the betterment of our world. What a shame when these tools are misappropriated!

So while I cannot say “with certitude” what exactly this person was thinking, I am certain that we need social media in government and that there are numerous positive ways for it to be applied. With the caveat that the basis for social media by anyone in government has to be truth, transparency and genuine outreach on issues of importance to the people.

A lot of government people and agencies are doing a good job with Twitter and other social media tools. Let's go back to focusing on the positive work that we can do with them, even as we note with caution how badly they can be misused.


Share/Save/Bookmark

May 31, 2011

CPR by iPhone


Great new iPhone App by the San Ramon Fire Department called FireDepartment.
This life-saving iPhone app notifies citizens trained in CPR (that have opted-in) of a cardiac emergency occurring in a public area near them.
An article in Government Technology (May 2011) explains that citizens can "start administering CPR before first responders arrive at the scene."
The problem it addresses is that generally it takes about 7 minutes from a heart attack to death, and it can take about just as long for rescue crews to reach victims.
So, if there are qualified people in the vicinity that can help in the the crucial minutes in between, they can literally save lives.
This is how it works:
1) Emergency dispatchers receive a call for help.
2) They enter "CPR assistance needed" into the dispatch system.
3) First responders AND local citizens with the CPR app (within 500 feet of the emergency) are alerted.
4) Location-based technology in the iPhone directs you to not only where the assistance is needed but also to where the nearest automated external defibrillator (AED) can be found.
"If you're at Starbucks and next door at the deli someone goes down, you're getting a notification."
Currently, the app covers San Ramon County's 155 miles, but there are plans to make it available as open source code to other jurisdictions across the country as well.
The app was developed with the help of Fire Chief Richard Price who previously was a software engineer and is bringing a new technology focus to life-saving emergency response.

There are also iPhone apps that walk you through performing CPR, such as CPR-Choking and CPR Hero.
Hopefully, we never need these apps, but it's good to know people and information are there to help just an iPhone app away.

Share/Save/Bookmark

May 6, 2011

Avoiding The Ultimate In Surprise


Everyone remember the I Love Lucy show? Well, that show really epidemized what it meant to surprise and be surprised by all the antics that the main character, Lucy, got into--show after show.

One thing that's very clear is that no one really likes surprises (except maybe for some comic relief and that's one reason I believe the show was the most popular season after season).

So what's the problem with surprises? They are not inherently bad--there can be good surprise and bad ones.

The issue is really that people want to be prepared for whatever is coming there way.

Even surprise parties or gifts somehow seem sweeter when the recipient isn't completely "taken by surprise."

One of my bosses used to often repeat to the team, "I don't like surprises!"

Hence, the importance of what we all got in the habit of saying--communicate, communicate, communicate--early and often.

With the tragic tornados that struck last week across the south killing some 329 people, we are reminded how important early warning to surprises in life can be.

The Wall Street Journal reports today that new technologies are being developed for early warning of these tornados such as:

- Visual cues--Antennas that can track cloud-to-loud lighting, which is often invisible from the ground, but it "drops sharply in a storm just before a tornado develops" and can therefore provide early detection for those that can see it.

- Sound waves--Using "infrasonic microphones" we can pick up storm sounds from as far as 500 miles away at frequencies too low to be detected by the human ear and can filter out the noise to track the storm's severity and speed, and therefore hear in advance if it is turning dangerous.

Early warning saves lives...even a few extra minutes can provide the much needed time for a person to get to a shelter.

After the 2004 Indian Ocean earthquake and tsunami which killed more than 230,000 people, an early warning system was put in place there and again with the the recent Japanese earthquake and tsunami of 2011, we see the ongoing need for these efforts to advance globally.

These efforts for early detection and alerts have always been around.

Already thousands of years ago, settlers built lookout towers and fire signals to get and give early notice of an advancing army, marauders, dangerous beasts, or other pending dangers.

Nowadays, we have satellites and drones providing "eyes in the sky" and other technologies (like the proverbial trip wires and so on) are being developed, refined, and deployed to protect us.

Advance warning and preparation is important for risk management and life preservation and leveraging technology to the max for these purposes is an investment that is timeless and priceless.

The challenge is in identifying the greatest risks (i.e. those with the most probability of happening and the biggest impact if they do) so that we can make our investments in the technologies to deal with them wisely.

Share/Save/Bookmark

February 3, 2011

Leading With Business Intelligence

Check out this great video on Mobile Business Intelligence (BI) put out by MicroStrategy (Note: this is not an endorsement of any particular vendor or product).

Watch the user fly through touchscreen tables, charts, graphs, maps, and more on an iPhone and iPad-- Can it really be this easy?

This fits in with my firm belief that we've got to use business analytics, dashboarding, and everything "information visualization" (when done in a user-centric way) to drive better decision-making.

This is also ultimately a big part of what knowledge management is all about--we turn data into actionable insight!

What is so cool about this Mobile BI is that you can now access scorecards, data mining, slicing and dicing (Online Analytical Processing--OLAP), alerting, and reporting all from a smartphone or tablet.

This integrates with Google maps, and is being used by major organizations such as U.S. Postal Service and eBay.

Running a business, I would want this type of capability...wouldn't you?

As Federal Judge John E. Jones said: "What gets measured get's done, what gets measured and fed back gets done well, and what gets rewarded, gets repeated."

Share/Save/Bookmark

October 8, 2010

You’ve Got An Alert

You’re all probably familiar with the capability of signing up for alerts to your computer or mobile device (phone, blackberry, pager, PDA, etc.).

By signing up, you can get notifications about severe weather (such as tornados or earthquacks), transportation troubles (such as street closures or metro incidents), utility disruptions (water, telephone, or power), government and school closings, Amber alerts, or breaking news and information on major crisis (such as homeland security or other emergency situations).

Unfortunately, not everyone bothers to sign up for these. Perhaps, they don’t want to bother registering for another site, giving and maintaining their personal contact information, or maybe they just prefer to rely on major news sources like CNN or social networking sites like Twitter for getting the word out.

The problem is that in a real crisis situation where time is of the essence and every minute and second counts—envision that tornado swooping in or that ticking time bomb about to go off—we need to let people know no matter what they are doing—ASAP!

According to GovTech (October 2010), the California Emergency Management Agency is planning to deploy a new system called Commercial Mobile Alert System (CMAS) to “deliver warnings and safety information via text alerts to wireless phones in specified areas without requiring individuals to subscribe to the service.”

A pilot is scheduled to begin in San Diego in the fall.

With CMAS, emergency information can be targeted to an area affected and transmitted to everyone in the receiving area without them having to do anything. Just like your televisions receiving the emerging alerts (which is great if you happen to be watching), now your mobile devices will get them too.

I remember hearing the stories from my father about World War II how the German Luftwaffe (air force) would blitz (i.e. carpet bomb) London and other Ally cities, and the sirens would go off, blaring to give the people the chance to take cover and save their lives.

Well, thank G-d, we don’t often hear any air raid sirens like that anymore, and with CMAS having the potential to someday grow into a full national network of wireless emergency alerts, we may never have to hear sirens like that again.

(Photo: Courtesy Oak Ridge National Laboratory Emergency Management Center; http://communication.howstuffworks.com/how-emergency-notifications-work1.htm)


Share/Save/Bookmark

September 30, 2010

Apps for Mobile Health Care



Talking about apps for your phone…this one is amazing from MIT Media Labs.

Attach a $1-2 eyepiece (the "NETRA") to your phone and get your eye prescription in less than 2 minutes.

What's next?
I wonder if they will come out with more apps for health and wellbeing that check your vital signs such as temperature, pulse, blood pressure, respiratory rate, and more.

I can envision the smartphone becoming our personal health assistant for monitoring and alerting us to dangerous medical conditions.

This will increase our ability to get timely medical care and save lives.
This is a long way from "I've fallen and I can't get up," and that's a great thing.

Share/Save/Bookmark

August 7, 2010

No Real Solution Without Integration

Emergency Management Magazine (July/August 2010) has an article called “Life Savers” that describes how a convergence of new technologies will help protect and save first responder lives. These new technologies can track first responders’ location (“inside buildings, under rubble, and even below ground”) and monitor their vital signs and send alerts when their health is in danger.

There are numerous technologies involved in protecting our first responders and knowing where they are and that their vitals are holding up:

  • For locating them—“It will likely take some combination of pedometers, altimeters, and Doppler velocimeters…along with the kinds of inertial measurement tools used in the aerospace industry.”
  • For monitoring health—“We’ve got a heart monitor; we can measure respiration, temperature. We can measure how much work is being done, how much movement.”

The key is that none of the individual technologies alone can solve the problem of first responder safety. Instead, “All of those have to be pulled together in some form. It will have to be a cocktail solution,” according to the Department of Homeland Security (DHS), Science and Technology (S&T) Directorate that is leading the effort.

Aside from the number of technologies involved in protecting first responders, there is also the need to integrate the technologies so they work flawlessly together in “extreme real world conditions,” so for example, we are not just monitoring health and location at the scene of an emergency, but also providing vital alerts to those managing the first responders. This involves the need to integrate the ability to collect inputs from multiple sensors, transmit it, interpret it, and make it readily accessible to those monitoring the scene—and this is happening all under crisis situations.

While the first responder technology “for ruggedized vital-sign sensors could begin in two years and location tracking in less than a year,” the following lessons are clear:

  • The most substantial progress to the end-user is not made from lone, isolated developments of technology and science, but rather from a convergence of multiple advances and findings that produce a greater synergistic effect. For example, it clearly takes the maturity of numerous technologies to enable the life saving first responder solution envisioned.
  • Moreover, distinct technical advances from the R&D laboratory must be integrated into a solution set that performs in the real world for the end-user; this is when product commercialization becomes practical. In the case of the first responder, equipment must function in emergency, all hazard conditions.
  • And finally, to bring the multiple technologies together into a coherent end-user solution, someone must lead and many parties must collaborate (often taking the form of a project sponsor and an integrated project team) to advance and harmonize the technologies, so that they can perform as required and work together seamlessly. In the case of the first responder technology, DHS S&T took the lead to come up with the vision and make it viable and that will save lives in the future.


Share/Save/Bookmark

May 20, 2008

Systems Monitoring and Enterprise Architecture

When we log on at work, most if not of us get some sort of message that logging on connotes acknowledgment to monitoring and that there is no implied privacy to what you’re doing when logged onto corporate IT assets.

Monitoring is a way of life at work. It is part of information security, management oversight, and ensuring systems are running effectively (and preventing a severe network outage).

Kenneth Klapproth in DM Review, 22 February 2008 reports that network management tools are able to collect date “across the shared network to present real-time and historical availability, performance, and configuration statistics on individual services and applications.”

Cross platform monitoring and event management and resolution are important to maintaining the availability of today’s complex networks that are vital for corporate communications (voice, data, and video).

  • ALERTS: Monitoring not only alerts IT personnel to when networks falter, but can also be set to provide alerts when certain fault tolerances are reached, so that IT personnel can take action before the network is brought down.
  • CAPACITY: Network monitoring identifies not only when the network becomes overloaded, but also when there is excess capability that can be more optimally used.
  • TRENDING: Performance is not monitored as snapshots in time, but also can provide historical trending that can provide valuable information based on usage patterns.
  • VISUAL REPORTING: “Dashboard and web displays deliver visually compelling and graphically concise reports [of key network and capacity utilization trends] that enable organizations to make the right decisions faster and with more confidence.”
  • QUALITY OF SERVICE: QoS is improved with monitoring. “Managers can see the current and historical use and performance of network resources, monitor and report on congestion, correlate QoS configuration with network performance, and use the information to improve traffic and service delivery.”

Additionally, many network monitoring tools have the ability for other key management features including self-discovery and healing. These features include: IT asset management, remote control, problem resolution, operating system set-up and configuration, software distribution, license monitoring, back-up and recovery, security, and lights-out management.

While network monitoring and management are more operationally focused, they are critical from an enterprise architecture perspective to ensure the delivery of core IT functionality for the enterprise: namely, a robust, sound, secure, cost-effective, state-of-the-art IT infrastructure upon which information can be delivered to the right people, anytime, anywhere.

Network management tools can also be helpful in building the enterprise architecture because of their asset discovery feature. With the ability to spider out over the network and touch anything with an IP address, these tools can help identify key enterprise architecture assets in order to establish the baseline and plan for future targets.


Share/Save/Bookmark

April 23, 2008

Activity Monitoring and Enterprise Architecture

When you log on at work, many of you probably—know it or not--click on an acknowledgement that you consent to monitoring of your activities.

When you are working, your time and your “privacy” are not really your own!

Organizations routinely conduct various sorts of monitoring include network monitoring, intrusion detection monitoring, and now more and more, monitoring of employee activities online. This is an important part of the organization’s technical and security architecture.

  • Network focused--Network monitoring describes the use of a system that constantly monitors a computer network for slow or failing systems and that notifies the network administrator in case of outages via email, pager or other alarms. It is a subset of the functions involved in network management.”
  • External focused--“An intrusion detection system (IDS) is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses, trojan horses, and worms).” (Wikipedia)
  • Internal-focused--An activity monitoring tool, according to ComputerWorld Magazine, 7 April 2007, “monitors all activities on an end-user’s system to make sure that no data or computer usage policies are violated. If a violation does occur, the agent issues an alert to the company’s security team and begins collecting data for further review.”

While we all can understand the need for network monitoring and intrusion detection systems, many find internally-focused activity monitoring, a put-off, a display of lack of trust in the employees, or a violation of our privacy.

However, companies do actually have much to fear from their employees—especially the disgruntled or corrupt ones:

CyberDefense Magazine, August 2004, reports in “Beware of Insider Threats to Your Security” as follows: “Gartner estimates that 70% of security incidents that cause monetary loss to enterprises involve insiders…[that] recent FBI statistics show that 59% of computer hackings are done internally…[and that] a source inside the United states intelligence community stated that more than 85% of all incidents involving the attempted theft or corruption of classified data involved an individual who had already been thoroughly vetted and been given legal access to the data.

According to ComputerWorld, activity monitoring tools “features a video-like playback feature that lets security administrators view precisely what a user was doing before, during and after a policy violation was flagged. That can help the admins determine almost instantly whether the violation was an accident or the result of deliberate action…[Additionally, other tools] keeps an eye on all internal network traffic for sensitive or inappropriate material…[or] monitor database activity and check for improper access and other abuses.”

“Because the software [tools] can quickly correlate log even from practically every IT system, it also serve as both a “real-time alerting system and an after-the-fact forensic tool.”

Related products can actually be set up to quarantine a computer, when a policy violation is detected.

The architecture for monitoring the network and internal and external threats is becoming ever more sophisticated. While according to ComputerWorld, Gartner estimates that “less than 30% of Fortune 5,000 companies have installed such [activity monitoring] tools,” we can expect many more to adopt these in the near future.

These tools are vital in today’s information-rich environment where confidentiality, availability, and integrity are the backbone for our enterprise decision-making.


Share/Save/Bookmark