Showing posts with label Information. Show all posts
Showing posts with label Information. Show all posts

August 10, 2012

Friends or Foes

People are amazing creatures--they can be sincere and trustworthy or phoney and users.  How do you tell them apart?

I learned in enterprise architecture and information architecture that information is power and currency--i.e. that those who have it rule and those who know how to get it--are the kingpins.

They may get information legitimately through research, study, reading, review, and working with others or they may cozy up to others illegitimately, to more to the point--find out "what's going on?" what have they heard. or "what's the real scoop?" 

In some cases, it is merely benign networking and that is a healthy thing--or as they say, "it's not what you know, but who you know." 

But in other cases, some people may take it too far, and literally prey on others when they are vulnerable, trusting, or simply let their guard down. 

We spend a lot of our waking hours in the office , and therefore people's social needs manifest in work friendships, confiding in others, going out for a coffee, lunch, drinks, etc. 

However, at work, people are also competitive and can be ruthless in getting what they want, making themselves look good, badmouthing others, going for that "gotcha", and even stealing other people's ideas and hard work--now where did they leave that notebook?

So when you tell an associate something--are they trustworthy with your feelings, experiences, information tidbits or will they take what you share and use it for their own ends?

There are a lot of good, decent people out there, but unfortunately, not all of people are.

Is their face for real or a poker face?  Are they playing on your side or playing you?  Will they come to your aid at the moment of truth or use the opportunity to thrust the blade through your back.  

My father used to joke about some people being two-faced, and then why would they choose that (ugly) one that they have on. :-)

I always learned talk is cheap and actions speak volumes. So when someone asks about your latest project, your kids, or ailing parents--is it from someone who genuinely gives a hoot or from someone who'd like to get you off guard, even for that split second.

In the military, this would be related to psychological operations (PsyOps)--getting into the other's person's head, figuring out what makes them tick, and then using that to extract intelligence or inflict mental and emotional "blows."

In law enforcement, perhaps the equivalent would be the old "good cop, bad cop" routine--where one person offers you some cold water or a cigarette and tells you everything will be alright, while the other person slams the table, yells, threatens, and says "your going to be going away for a long time."

There are lots of ways to get into a person's head, under their skin, and get to that valuable information--without going to the levels of physical, "torture" techniques, some of which have since been generally outlawed such as waterboarding.

So which people that you deal with are good, genuine, helpful, and have integrity, and which are selfish, nasty, and cruel?

It is definitely a challenge day-in and day-out to tell who is who--and you shouldn't let the bad apples out there, ruin your trust in all people--you just have to make sure to look beyond the veneer--to see if the other person is more friend or foe.

(Source Photo: here with attribution to BlueRidgeKitties)

Share/Save/Bookmark

August 3, 2012

FOIA Making Us Stronger

To commemorate 46 years since the Freedom of Information Act (FOIA) was passed on July 4, 1966, the Project on Government Oversight (POGO) came out with a infographic showing the significant progress that has been made in government transparency and areas they still see for possible improvement. 

Similarly, Government Executive Magazine ran an feature article in June 2012 called "The Truth Behind Transparency," calling progress with open government as "tough to gauge."

The basic idea of FOIA as the website for Sunshine Week put it is: "the public's right to know about its government."

Obviously, as GovExec points out, one of the main questions over the years with FOIA is "how quickly and fully do agencies respond to FOIA requests?"

To much and too soon, and do you perhaps put at risk various sensitive information, jeopardizing elements of the functioning of government itself?

Too little and too late, and then is the opportunity for mismanagement, waste, fraud, and abuse simply an after fact?

As Beth Novek, former deputy chief technology officer for open government, described it, open government is a "shorthand for open innovation or the idea that working in a transparent, participatory, and collaborative fashion helps improve performance, inform decision-making, encourage entrepreneurship and solve problems more effectively."

Transparency can aid in accountability by shedding a light on leadership and its performance management. It can also be a great opportunity to bring new ideas and opinions to the fold, perhaps leading to better decisions and results, at the end of the day, for all. 

The challenge for government is to guard against any information risks to the safety and security of our nation.  

An informed nation, is a stronger nation--to me, it is a foundation of a government "of the people, by the people, for the people."

Government and the people working together, duly informed, to confront our toughest challenges and solve our greatest problems.


Share/Save/Bookmark

July 6, 2012

The Information Is On You

There was a fascinating article in the New York Times (17 June 2012) called: "A data giant is Mapping and Sharing the Consumer Genome."

It is about a company called Acxion--with revenues of $1.13 billion--that develops marketing solutions for other companies based on their enormous data collection of everything about you!
 
Acxion has more than 23,000 servers "collecting, collating, and analyzing consumer data...[and] they have amassed the world's largest commercial database on consumers."

Their "surveillance engine" and database on you is so large that they:

- "Process more than 50 trillion data 'transactions' a year."
- "Database contains information about 500 million active consumers."
- "About 1,500 data points per person."
- Have been collecting data for 40 years!

Acxion is the slayer of the consumer big data dragon--doing large-scale data mining and analytics using publicly available information and consumer surveys.

They collect data on demographics, socio-economics, lifestyle, and buying habits and they integrate all this data.

Acxion generates direct marketing solutions and predictive consumer behavior information.

They work with 47 of the Fortune 100 as well as the government after 9/11.

There are many concerns raised by both the size and scope of this activity.
 
Firstly, as to the information itself relative to its:

- Privacy
- Security

Secondly, regarding the consumer in terms of potential: 

- Profiling
- Espionage
- Stalking
- Manipulation 

Therefore, the challenge of big data is a double-edged sword: 

- On one hand we have the desire for data intelligence to make sense of all the data out there and use it to maximum affect.
- On the other hand, we have serious concerns about privacy, security, and the potential abuse of power that the information enables. 

How we harness the power of information to help society, but not hurt people is one of the biggest challenges of our time. 

This will be an ongoing tug of war between the opposing camps until hopefully, the pendulum settles in the healthy middle, that is our collective information sweet spot. 

(Source Photo: Andy Blumenthal)


Share/Save/Bookmark

TED For Everyone

The New Yorker (9 July 2012) has an article on TED Talks. 

TED stands for Technology/Entertainment/Design and is a conference venue for some of the most magnificent speakers.

Just looking at some of TED's "most popular this month"--turn to TED if you want to hear about:

- Information being collected about you on the web
- How through vulnerability, we can empathize, belong, and love
- Whether through evolution our kids will be different than us
- Ways to prepare for Alzheimer disease
- New ideas for cleaning up oil spills
- How schools kill creativity
- The talents and abilities of introverts
- How to inspire and be a great leader 


TED is literally a world of information and it is presented in a high quality way.

Almost anyone would be floored by the honor to present at TED.

Talking at TED means not only that you have something important to say, but that you can pull-off saying it the right way. 

What makes TED lectures great though (and viewed 800 million times so far) maybe also makes them more than a little sterile.

Firstly, the 4-day TED conference itself is only for special people--admission starts at $7,500 and no that does not include lodging and travel, and you have to have an "invitation"--posh posh--to attend. 

Then, the actual presentations are "closely governed"--speakers are carefully sought out and vetted, material that is counterintuitive is of interest, and "TED's eye for theatre...[with] vigilance about immersion and control" are a strong part of the showmanship. 

However, while on one hand, these things perhaps are a hugh part of the TED success--wash, rinse, repeat--on the other hand, it also makes for a feel that is very scripted, uniform, almost molded. 

The New Yorker article even describes how the speakers practice again and again--repeating their monologues hundreds of times and to whoever will listen. There is essentially nothing impromptu, ad-libbed, or in a sense real about the entertainment-aspect of what you are watching and listening to. 

While the information seems to always be great--the presentation with the speaker, sound, lights, slide show, audience shots, etc.--comes across like a row of identically-built houses in a development. 

Each "house" (or presentation in this case) may be filled with interesting people, things, and love, but on the outside, as one of my friends says--they are identical, so that coming home after a long day at work, you almost don't know at times which row house is yours anymore. 

If TED ever did a lecture on how they could improve TED. these would be some of my suggestions (and there is no gloss here):

- Open it to everyone--Restricting TED to invitation-only is elitist and maybe worse. Opening TED to more people to attend, learn, and enjoy--let's everyone have an opportunity to benefit--regardless of who you are or where you come from.

- Diversify the speakers--It is nice to have scientists and entrepreneurs and stars present at TED, but it would be even nicer to have regular, common people too. Everyone has a story to tell--whether or not you have a Ph.D. or run your own company. While it is great to learn from the "experts," it would be fascinating to hear from everyday people on their challenges and how they deal with them and overcome them or not. Just as an example, regularly, I see an incredible homeless lady on the street in DC--yes, well-dressed, talkative, polite--and I would want to hear how she ended up where she is and how she copes and survives her experiences on the street everyday. The point it that every person is a world onto themselves and worth hearing about--the key is how to get the experiences, the feelings, and the lessons learned. 

- Genuine, less scripted speeches--Part of good entertainment is making it real, but when it is just another (over-)rehearsed performance, the speakers seem almost robotic. Wouldn't it be wonderful to hear human beings talk in a more relaxed and yes, genuine-way about very important human topics of significance to us all? Right now, people crave information --heck, it's the information age and nice informative lectures are racking up the views, but at some point soon, people are going to want and expect more.

- Shake it up with the venue--TED is conservative extraordinaire. The one (or occasionally two or three) speakers on the stage, the dark background and spotlighted speaker, the PowerPoint or Prezi presentation, the dangling microphone, the opening applause, the slow and methodical speech--yes TED is "ideas that inspire," but it is also a venue that bores. Perhaps, if you are an avid conference attendee and like the routine, copy-cat set-ups, you feel at home in TED.  But why not let people talk here, there, and everywhere--let someone speak on the street, in a park, on a ship, or even parachuting off a plane.  How about someone on the International Space Station?  Or on the front lines in a major military engagement. People have a lot to say and where they say it--says a lot about them and adds to their message. A stage is a stage. Even a snake-oil salesman has a soapbox. 

Not to be confused with TED, there are TEDx events--"TED-like" that are organized by volunteers on a community-level, a "do-it-yourself TED" that is occurring at a "global rate of about five per day"--and these come closer to the open ideal, but still more can be done to make TED itself an organization where truly ideas come from all people, for all people.

While TED's brand is exclusive and valuable--perhaps more important is education that is valuable for the masses.

(Source Photo: here with attribution to Juhan Sonin)

Share/Save/Bookmark

March 3, 2012

In The Year 2032 And Beyond

Trends help us to see where things are coming from and potentially where they are going.

There is a Cisco Visual Networking Index (VNI) Forecast for 2010-2015 that projects global IP traffic (voice, video, and data) and the numbers are ginormous!

Here are some highlights from their highlights for where we will be in only 3 years--by 2015: 

- Annual global IP traffic will reach one zettabyte (which is about 100 million x all printed material in the U.S. Library of Congress (which is 10 terabytes)).

- Devices connected to the network will be 2 for 1 for every person on this planet (and many people who live in 3rd world conditions do not have any devices, so what does that say for how many devices the rest of us have?).

- Non-PC traffic (from TVs, tablets, smartphones, more) will reach 15% and is more than doubling every year (makes you think about when you fridge and toaster are going to be connected to the Internet).

- Mobile Data traffic is practically doubling (or 92%) annually meaning a growth of 2,600% over 5 years (and according to the New York Times (5 Jan 2012) "The Top 1% of Mobile Users Consume Half of The World's Bandwidth" and the top 10% of users consume 90%!).

- Video traffic (TV, Video on Demand, Peer to Peer, etc.) will be almost 2/3 (or 62%) of all consumer internet traffic (and services like YouTube, Skype, FaceTime, Hulu are WebEx all play a role as we want to see as much or more than hear what is going on).

The takeaway for me from all this is that truly information transmission is exploding over the Internet, and we will continue to need more advanced technologies to "pipe" it all to where its going and do it faster than ever. 

However to build on these forecasts, over the longer term (further out in time, so more risky, of course)--say 20 years or so--some of my colleagues and I studying at National Defense University project the following:

- Rather than transmitting voice, video, and data over the Internet, we will be focused on transmitting thoughts (mental activity rather than spoken) and transmitting matter (like the Transporter on Star Trek).  

- Transmission of thoughts will occur in real-time, through persistent connections, probably implants in teeth, glasses, subcutaneous, etc.

- Safety and health will be monitored through these same "connections" and medicine or other physiological treatments for routine things will be administered remotely through the same.

- Education will be through instantaneous zaps of information to your brain (like in The Matrix) from a universal database, rather than through traditional in-class or online courses.

- Like now, the contextual policy and legal issues will be around privacy and security--and you will need to pay dutifully for each in a world where not only what you say and do, but rather what you think, can get you in lots of trouble. 

Okay, for these things to happen by 2032 is probably a little aggressive, but don't rule any of them out over time.  ;-)

Share/Save/Bookmark

February 29, 2012

Progressing From Data to Wisdom

I liked this explanation (not verbatim) by Dr. Jim Chen of data, information, knowledge, and wisdom.

- Data: This is an alphanumeric entity and/or symbol (ABC, 123, !@#...)

- Information: This is when entities are related/associated to each other and thereby derive meaning. (Information = Data + Meaning)

- Knowledge: This is information applied to context. (Knowledge = Data + Meaning + Context)

- Wisdom: This is knowledge applied to multiple contexts. (Wisdom = Data + Meaning + (Context x N cases)).

I'd like to end this blog with a short quote that I thought sort of sums it up:

"A man may be born to wealth, but wisdom comes only with length of days." - Anonymous
(Source Photo: here)

Share/Save/Bookmark

February 25, 2012

The False Information G-d

The amount of data in the world is exploding and yet the belief in G-d is evaporating.  

A review in the Wall Street Journal (22 February 2012) of a book called "Abundance" points to the explosion of data with the prevalence of information technology. 

From the earliest civilization to 2003, all written information totaled 5 exabytes (an exabyte is a quintillion bytes or 1 followed by 18 zeros).

But this is nothing compared to the last number of years, "where the change is not just accelerating, but the rate of acceleration of change is itself accelerating."

Between 2003-2010, 5 exabytes of digital information was created every 2 days, and by next year, 5 exabytes will be produced every 10 minutes!

Similarly, Wired Magazine (March 2012) reports in an interview with George Dyson that the "Digital Universe" is growing organically and "cycling faster and faster and it's way, way, way more than doubling in scale every year. Even with the help of [tools like] Google and YouTube and Facebook, we can't consume it all."

According to ComputerWorld (13 February 2012) in Your Big Data To-Do List, with all this data being generated, there is a mistaken assumption that we have to consume it all like drinking from a firehose. The article references a McKinsey study that projects that by 2018, there will be a need for 140,000 to 190,000 additional data analysts and statistical experts to try and make sense of it all. The article suggests that instead of trying to grasp at all the data, we instead "data scoop" and "target projects that can showcase results as opposed to opting for the big-bang, big-data projects."

And tools are being developed and deployed to try to get our arms around the information rolling in around the world. For example, Bloomberg Businessweek (November 28 - December 4, 2011) describes the tool from Palantir being used by the military, Intel, and law enforcement agencies for data mining, link analysis, and even predictive analytics. 

These days, "It's like plugging into the Matrix"--in terms of the amount of data streaming in. One special forces member in Afghanistan describes it as follows: "The first time I saw it, I was like Holy crap. Holy crap. Holy crap." But the thinking is now-a-days that with tools like Palantir (and others), we "can turn data landfills into gold mines."

But while information is power, Harvard Business Review (September 2011) in Learning to Live With Complexity acknowledges "We are hampered by cognitive limits." And moreover, "Most executives think they can take in more information than research suggests they can." And harnessing data into information is constrained by the complexity involved--driven by the number, interconnections, and diversity of interacting elements.

The result is that while we are becoming in a sense data rich, in may ways, we are still information poor. And even with all the sensors, data, and tools available to search, access, and analyze it, we are becoming perhaps overconfident in our ability to get our arms around it all and in turn master the world we live in. 

The hubris in our abilities to use information technology is leading many to worship the proverbial information G-d, and in turn, they are forgetting the real one. According to the Pew Forum on Public and Religious Life (February 2010) as quoted in CNN, "young Americans are significantly less religious than their parents and grandparents were when they were young."  Moreover, a full one in four American millennials--those born after 1980--are not affiliated with any faith--they are agnostic or atheists.

Similarly, Mental Floss Magazine just a few months ago (November-December 2011) had various authored columns asking "Is G-d In Our Genes?" and another "Is G-d In a Pill?" questioning whether the age-old belief in G-d comes either from a genetic disposition in some to a drug-induced states in others.

While religion is a personal matter, and for a long time people have argued whether more people have died in wars over religion or money and power, as a person who believes in G-d, I find it most concerning that with the rise of information (technology) power in the last 30 years, and the exuberance and overconfidence generated from this, there is an associated decline in belief in G-d himself.  

While technology has the potential to raise our standard of living (in leaps and bounds even) and help solve many of our vexing problems, we cannot forget that technology is run by human beings who can choose to be good or evil and use information technology to either better mankind or the opposite, to destroy it. 

Ultimately, I believe that it is but G-d almighty who shapes the thoughts and destiny of mankind, so that one man sees just a string of bits and bytes--a matrix of zeros and ones--while another sees a beautiful new musical composition, the next terrorist attack, or even the amazing cure for cancer.  

(Source Photo: here)

Share/Save/Bookmark

October 20, 2011

Be Careful What You Point That At

By now many of you may or may not have pointed your smartphones at a QR ("Quick Response") code to get more information on products, places, events, and so forth.

A QR code is a barcode that that generally contains alphanumeric information and takes you to a website when you read the QR code with your smartphone (i.e. by taking a picture of it with a QR reader app).

QR codes remind me of the barcodes in the store at the checkout line, but QR codes look more like a squared-off roschach test compared to the barcodes on items you purchase which are rectangular straight lines from top to bottom.

By reading the QR code, you don't have to remember or type any information into your smartphone--your just zipped right off to wherever the QR points you (usually after you confirm on the screen that you are okay with going to the URL).

But QR codes like with any information technology, can be used for good or evil -- for some reason though people seemed to have been unsuspecting of the sort of innocuous looking QRs.

Kaspersky Lab has issued a warning on QR codes after finding consumers in Russia scammed when they thought they were downloading an Android app and where instead infected with malware that caused them to send SMS messages to a premium number that charged for each message sent.

So while QR codes can take a reader to a harmless website for information, like other computer code, they can contain instructions that cause you to send email, SMS messages, download applications, etc.

So unless you know what you are QR reading (i.e. you have a high-degree of confidence in whoever placed the advertisement with the QR code)--think twice before scanning that barcode, because you may get a surprise package in your smartphone that you weren't expecting causing infection of your device, loss of privacy to the information stored on it, or costing you money for things you never wanted or intended to spend on.

Scanning a QR code while as simple taking a picture of a sunset--may not have as beautiful consequences.

(Source Photo: here)

Share/Save/Bookmark

August 14, 2011

Images, Alive And Profitable

"There are nearly 4 trillion images on the Internet and 200 million new ones being added each day," according to Chief Revenue Officer (CRO) of Luminate.

Luminate (formerly Pixazza) has the vision of making all those images interactive through image recognition algorithms and human-assisted crowdsourcing to identify objects and tag the images with content.
They "transform static images into interactive content," according to the Luminate website.

The way it works:

1) Icon--look for the Luminate icon image in the lower left corner of the image that means the image in interactive.

2) Mouse--mouse over the image to choose from the interactive image apps.

3) Click--click on the images in the photo to shop and buy it ("Get The Look"), share information (e.g. Facebook, Twitter, email), or navigate (click on contextual hyperlinks from Wikipedia and other sources).

According to Forbes (27 July 2011), Luminate already "has more than 4,000 publishers, 150 million unique visitors per month, and more than 20 million products catalogued."

The image-tagging platform provides context and information for consumers and revenue generating opportunities for producers--so it is a win-win for everyone in the marketplace!

By connecting end-user Internet images on the front-end with advertisers and commerce on the back-end, Luminate has found a way to integrate web-surfers and industry--no longer are advertisements on the web disconnected as pop-ups, banners, or lists from the Internet content itself.

Right now, there are apps for annotations, advertisements, commerce, and social media. Luminate plans to open up development to others to create their own for things such as apps for donations for disaster relief images or mapping and travel apps for images of places.

Luminate, as a photo-tagging and application service, is advancing our experience with the Internet by creating a richer experience, where a photo is not just a photo, but rather a potential gateway into everything in the photo itself.

In my view, this is a positive step toward a vision of a fully augmented reality, where we have a truly information-rich "tagged environment", where everything around us--that we see and experience--is identified and analyzed, and sourced, and where the images of the world are alive no matter how or from what angle we look at them.

Lastly, my gut tells me that Google is heavily salivating over where this company is going and future developments in this field.

(Source Photo: here)

Share/Save/Bookmark

August 12, 2011

To Follow Or Not To Follow

Theskystallione

Twitter is a great streaming feed for news and information, but what you get depends on who you follow.

While Twitter does provide suggestions based on whether they are "promoted" or who you already follow (i.e. follow Joe because they are "followed by" Julia), it doesn't tell you a lot of information about them except their Twitter handle, short profile, location, basic stats, etc.

A new service called Twtrland helps you decide who to follow by providing lot's more information and displaying it in an organized fashion--simply plug in the Twitter handle you are interested in knowing more about and you get the following:

1) Basic Info--Picture, profile, stats on follow/follower/tweets

2) Top Followers--Let's you know who else (from the who's who) is following this person.

3) Advanced Stats--Provides measures on how often he/she gets retweeted, tweets per day, retweets, etc.

4) Graph of Content Type--Displays in pie chart format the type of content the person puts out there: plain tweets, links, pictures, retweets, replies and more.

5) Samples of Content by Category--Examples of this persons tweets are provided by category such as: famous words, plains tweets, pictures, links, retweets, and mentions.

I like the concept and execution of Twtrland in organizing and displaying tweeters information. However, I cannot really see people routinely taking the time to put in each Twitter handle to get this information. Making a decision a who to follow is not generally a research before you follow event. The cost-benefit equation doesn't really make sense, since it doesn't cost you anything to follow someone and if you don't like their tweets, you can always change your mind later and unfollow them if you want.

Overall, I see Twtrland more as a profiling tool (for research or interest) by getting a handy snapshot of what people are doing/saying online in the world of micro-blogging, rather than a decision support system for whether I should add someone to my follow list or not.

(Source Photo: Twtrland Profile of Sylvester Stallone, Rocky!)

Share/Save/Bookmark

July 30, 2011

Sensors, Sensors Everywhere

Three_surveillance_cameras

Sensors will soon be everywhere--waiting, watching, and working to capture information about you and the environment we inhabit.

Every sensor is an opportunity to collect data and use that data for making better decisions.

Of course, we see sensors deployed first and foremost from our military overseas, in Iraq and Afghanistan, which uses drones to spy on and strike on our adversaries. The drones are really flying platforms of sensors and in some cases with weapons at ready. According to the New York Times (20 June 2011) "From blimps to bugs, an explosion in aerial drones is transforming the way America fights and thinks about its wars..the pentagon now has some 7,000 aerial drones...[and] has asked for nearly $5 billion for drones for next year." These drones are providing "a Tsunami of data" from intelligence, surveillance, and reconnaissance. The change to drones is so significant in our military that the Times reports that "already the Air Force is training more remote pilots, 350 this year alone, than fighter and bomber pilots combined."

Similarly, the Wall Street Journal (5 July 2011) reports that another type of sensor--surveillance cameras--are being deployed big time in China with a new surveillance network in Chongqing of 500,000 cameras (Beijing already has 280,000 cameras in its system) "that officials says will prevent crime but that human-rights advocates warn could target political dissent." While this project is significantly larger and more aggressive than other cities have deployed, China is certainly not alone in deploying surveillance cameras in their cities--Chicago has 10,000, New York has 8,000, and London has over 10,000. According to the WSJ, the overall market last year for surveillance-equiptments sales, not including networking gear or software totaled $1.7 billion! So smile, you are on camera--and it's candid, indeed.

A third article ran in Government Computer News (July 2011) on a more innocuous type of sensors to be used--this being the mass deployment of mobile sensors for the National Weather Service (NWS) on vehicle fleets such as Greyhound buses etc. Beginning in October, "2,000 commercial vehicles will be equipped with sensors...and will be sending data to NWS in near real time. We will be rolling out coverage on the national level." The mobile sensors will be taking 100,000 observations daily--every 10 seconds, about every 300 meters--measuring temperature, humidity, dew, precipitation, and solar information." In the future, we are looking at the potential of a "a sensing probe in every car"--for collecting information on hazardous roads, traffic patterns, and preventing accidents. Other applications for mobile sensors could be for "monitoring chemical and biological agents," nuclear and radiological ones, or CO2 and Ozone and more.

While sensors can collect data that can be used to analyze situations early and often to help people; certainly, they can also be misused to spy on one's citizens and suppress freedom. It can be a slippery slope. Perhaps that why Wired Magazine recently ask (July 2011) who's "Watching the Watchers" making the distinction between:

1) Surveillance--the monitoring of events by those above, the authorities--with CCTV etc. and monitoring events from control rooms, potentially from anywhere around the world.
2) Sousveillance--the monitoring of events by those below, the citizens--with everyday smartphones, cameras, and videocams and posting the digital images and sound bytes to YouTube, Facebook, Twitter, and so on for the world to see.

With IPV6 providing enough Internet address for attaching sensors to every atom on the surface of the earth and sensors becoming smaller and more imperceptible, we can soon monitor and report on everything, everywhere all the time. Some of the biggest challenges remain ensuring the information monitored is kept secure, private, and used legally and ethically and sifting through all the data to identify the truly meaningful information from what's just noise.

(Source Photo: here)

Share/Save/Bookmark

July 29, 2011

Capturing It All

Lifelogging

Often it seems as if so much of our life is spent memorizing things and then trying to remember what we thought we memorized.

It starts in grade school and continues throughout our education--memorize, spit back, repeat.

Advances in education may actually recognize the need and try to get kids to think now-a-days, but there are still all the "fundamentals" that need to be put to memory, so you can pass the standardized tests like the SAT, GRE, GMAT, LSAT, MCAT, and more.

But we don't just memorize to pass tests, we pride ourselves on what "we know" and we test ourselves and show off our expansive knowledge-base through things like board games such as Trivial Pursuit to game shows such as Jeopardy.

At work too, we hire, retain, and reward people based on their "knowledge, skills, and abilities" and recognize those who are true "subject matter experts."

I remember friends who used to read the encyclopedia to increase their knowledge, and the Almanac with all the facts and figures--is still a best-seller. In Yeshiva, we also spent a good part of our high school years, memorizing from the Talmud.

The challenge for us in the 21st century is that knowledge is growing so fast that we as individuals can barely keep up with the volume and pace of change, so we specialize professionally and seek expert advice from others on areas outside our area of specialization.

Still we memorize and try to remember as much as we can. We read, watch TV, browse the Internet, travel, try new things, and fill our heads with incessant facts, memories, and chatter. And we become frustrated when we can't remember names of people we recently meet, the punch line to a joke, the facts for a presentation at work, the spelling of a simple word, or even what we had for breakfast.

So rather than memorize and forget, people are turning to capturing events from their lives and playing it back when they need to recall information or are feeling nostalgic.

We do this when we take photos, videos, audiocasts, blog, tweet, etc. and then access these from our hard drives or the Internet though services like Flikr, YouTube, Podbeam, Blogger, Twitter, and so on.

Now we starting to move beyond recording just moments in times (i.e. snapshots) and instead capturing it all!

The Futurist (July-August 2011) reports that people are discovering things like Lifelogging--where through cameras, recording devices, and storage media, they record virtually "every instant of their lives." We are nearing at a time, when this is becoming "not only feasible, but possibly even appealing" to the masses.

By recording the events of our life--whether in blogs, photos, audio or video recordings--and combining this with advanced search tools, lifelogging "could provide us with the equivalent of near total recall."

Perhaps the ability to capture more and more of our lives digitally will make it unnecessary in the future to sit and memorize so many useful and useless facts and information.

We don't have to remember everything in our heads, we just need to know how to access the information when we need it.

Learning does not have to be about memorizing but rather can be about critical thinking, and being an expert does not have to be about what you have memorized, as much as your experience and ability to think through problems and find solutions.

(Photo Source: here)

Share/Save/Bookmark

April 23, 2011

Information-Free Is Invaluable

At first I admit it, I didn't really get Google; I mean what is this G-o-o-g-l-e and the shtick about "doing search"?

But the writing was on the wall all along with their incredible mission statement of: "to organize the world's information and make it universally accessible and useful."

So search is the just the beginning of a long list of now amazingly valuable Google properties and services (now valued with a market capitalization of almost $169 Billion):

- Search (Google Search, Google Search Appliance, Google Desktop)
- Cloud Computing (Google Apps Engine, Google Storage for Developers, Chrome Notebooks)
- Advertising Technology (Adwords, AdSense, DoubleClick)
- Website Analytics (Google Analytics)
- Operating Systems (Chrome OS, Android, Honeycomb)
- Web Browser (Google Chrome)
- Productivity Software (Gmail, Google Calendar, Google Apps Suite)
- Social Computing (Google Wave, Google Talk, Orkut, Buzz)
- News Aggregator (Google News, Google Reader)
- Translation (Google Translate)
- Telecommunication (Google Voice)
- Clean Energy (Google Energy)
- Geospatial (Google Maps, Google Earth)
- Video (YouTube)
- Photos (Picassa)
- Electronic Books (Google Books)
- Blogs (Blogger)

What Google seems to intuitively get is that their free powerful web services creates invaluable consumer market share and mind share--like a honey pot. Once the consumer comes on board--like good little bees, they are ripe for companies to reach out to via advertising for all and every sort of product and service under the sun. And according to 1998 revenue breakdown, as much as 99% of Google's revenue is associated with advertising!
Google is brilliant and successful for a number of reasons:

1) Google is consumer-oriented and knows how to attract the crowd with free services, and they let others (the advertisers) concern themselves with monetizing them.

2) Google is incredibly innovative and provides the breath and depth of technology services (from cloud to productivity to search to video) that consumers need and that are easy for them to use.

3) Google is information rich, but they share this broadly and freely with everyone. While some have complained about the privacy implications of this information bounty; so far, Google seems to have managed to maintain a healthy balance of information privacy and publicity.

4) Google values their people, as their "owners manual" reads: "our employees...are everything. We will reward them and treat them well." And to help retain their talent, Google just gave their employees a 10% raise in January.

5) Google wants to be a force for good--their creed is "Don't be evil." They state in their manual: "We believe strongly that in the long term, we will be better served- as shareholders and in all other ways--by a company that does good things for the world, even if we forgo some short-term gains."

Do not underestimate Google--as the Wall Street Journal, 23-24 April, 2011 summarizes today, they are not a conventional company.

At the end of the day, if Google is successful in their business of making information universally accessible and useful, then we are talking about making an invaluable difference in the lives of humanity--where information builds on itself, and knowledge--like the Tree of Knowledge in the Book of Genesis--is alive and constantly growing for all to benefit from in our Garden of Eden, we call Earth.

(Source Picture: Honeybird)

Share/Save/Bookmark

April 3, 2011

The Eyes Have It




In the last couple of weeks, a new innovation by Tobii for eye tracking technology built into the lid of laptop computers has been featured on CNN, the New York Times (March 27, 2011), and Bloomberg Businessweek (March 28-April 3, 2011)

Tobii allows users to "control their computers just by looking at them."

The eye tracker uses infrared lights (like those used in a TV's remote control) to illuminate the pupils, and optical sensors on the computer screen capture the reflection. Tobii can determine the point of gaze and movement of the eyes to within 2 millimeters.

So forget the mouse--"just look at a particular location on the screen, and the cursor goes there immediately."

This is a natural user interface that is fast and intuitive, generally "halving the time needed for many chores."

Eye tracking is being tested and planned by Tobii and others for the following

- Read text down the screen and it automatically scrolls. - Look at a window or folder to choose it. - Use a map by eyeing a location and then touching it to zoom. - Activate controls by holding a glaze for a quarter to half a second. - Play video games by moving through with your eyes. - Gaze at a character and they will stare back at you. - Leave your TV and it pauses until you return.

This technology has the potential to help disabled people (who cannot use a traditional mouse) as well as prevent strains and injuries by reducing some repetitive stress movement.

Within a couple of years, the cost of eye tracking technology is seen as coming down from tens of thousands of dollars to a couple of hundred dollars for a laptop clip-on device or even less for those built right in.

I think another important use for eye tracking is with augmented reality technology, so that as people navigate and look around their environment, sensors will activate that can provide them all sorts of useful information about what they are seeing.

Ultimately, where this is all going is the addition of a virtual 4th dimension to our vision--where information is overlaid and scrolling on everything around us that we look at, as desired.

This will provide us with an information rich environment where we can understand more of what we see and experience than ever before. Terminator, here we come! Augmented_reality

Share/Save/Bookmark

January 9, 2011

The Center Of Gravity Is Information

Center of Gravity (COG) is a military concept that Dr. Joseph Strange defines as “primary sources of moral or physical strength, power, and resistance.” From a military perspective, this is where we should concentrate when attacking the enemy. As Prussian strategist Carl von Clausewitz states, “that is the point against which all our energies should be directed.”

In “Center of Gravity Analysis” (Military Review, July/August 2004), Army Colonel Dale Eikmeier describes the framework for COG and how an enemy (your threat) attempts to exploit them, as follows:

· Center of Gravity—the organizations that do the work (e.g. the military/industrial complex)

· Critical Capabilities (CC)—the strengths of the organization—its “primary abilities”

· Critical Requirements (CR)—the supplies that a COG use—the inputs that are their opportunities, if leveraged for future plans

· Critical Vulnerabilities (CV)—the vulnerabilities a COG has—e.g. exposed or unguarded critical infrastructure

From an enterprise architecture perspective, I greatly appreciate this analysis of COG as it aligns beautifully with Albert Humphrey’s famous Strenghts, Weaknesses, Opportunities, and Threats (SWOT) Analysis for organizational strategic planning.

Aside from typical SWOT analysis to develop your organization’s strategy, the COG analysis adds greater offensive analysis to SWOT--like the military, organizations using the COG model can disrupt competitors’ advantages by seeking to weaken them where they are most vulnerable.

For example, EA used in this fashion may lead a company to build a sophisticated online sales site that directs customers away from your competitor’s retail location. Similarly, acquiring a major supplier (i.e. vertically integrating) may disrupt a competitors’ supply capability, and so on. The point is that EA becomes a force for attack rather than a mere planning tool or information asset.

It is at this point that I disagree with the assertion in the article that “Information is not power; it is a tool, an enabler. It helps wield military or economic power. By itself, it is simply information.”

Far to the contrary, information is one of the greatest assets that we have. It is the way that an advanced, intellectually based society competes. Of note, our declining performance in Science, Technology, Engineering, and Mathematics (STEM), which is so greatly worrisome to our leadership, is of concern because it is directly a threat to our competitive advantage, both militarily and economically, in the global environment.

Information, as embodied by the Internet, is now the center of our society. With it, we perform critical tasks of information sharing, collaboration and education. Used effectively, our military has developed robust command, control, communications, computers, intelligence, reconnaissance, and surveillance (C4ISR)—all information-based. Similarly, our industry is highly competitive and advanced because of the engineering, innovation, and people behind it.

Enterprise architecture, once a small part of the IT infrastructure, can actually play a far greater role in the information society if we allow it to. We have morphed from the industrial age of the 18th and 19th centuries to a highly advanced information society that creates new sources of critical capability, but also new critical vulnerabilities that must be defended. And we must also leverage the vulnerability of our enemies in order to stay viable. Whether it’s cyber-warfare or economic survival, information is at the heart of everything we are successfully doing today.


Share/Save/Bookmark

November 6, 2010

Podcast and Slideshare by Andy Blumenthal on Mobility Solutions

Assorted smartphones

Click here for the audio of my speech at the Adobe Government Assembly on Wednesday, November 3, 2010 in Washington, DC. (Subscribe to all my podcasts on iTunes here.)
Share/Save/Bookmark

June 12, 2010

Managing Change The Easy Way


We all know that change is not easy, even when it's necessary.

As human beings, we question change, fear change, and at times resist change.

Often, change is timely or even overdue, and is needed to remain fresh, competitive, and in sync with changes in the external and internal environment.

At other times, change could be conceived of for selfish, arbitrary, politically motivated, or poorly thought out reasons.

People often react to change negatively, saying things such as:

- “Everything is really fine, why are you rocking the boat?”

- “This will never work” or “We’ve already tried that and it didn’t work.”

- “This is just the pendulum swinging back the other way again.”

- “Thing are now going to be even worse than before.”

- “I’ll never do that!”

The key to dealing with change is not to dismiss people’s feelings, but to take the time to thoroughly understand them, to take input from them for change, and to explain what is changing (precisely), for whom, when, where, and why.

The more precise, timely and thorough the communications with people, the better people will be able to deal with change.

To successfully plan and implement change, we need people to be engaged and on-board rather than to ignore or subvert it.

Below is a nice “change model” From http://www.changecycle.com/changecycle.htm that helps explain the stages of change that people go through including loss, doubt, discomfort, discovery, understanding, and integration.

To me the keys to managing through these six stages of change are solid information, clear communications, and people working together.

The Change Cycle™ Model

(All of the text below is quoted)

Stage 1 – Loss to Safety

In Stage 1 you admit to yourself that regardless of whether or not you perceive the change to be good or 'bad" there will be a sense of loss of what "was."

Stage 2 – Doubt to Reality

In this stage, you doubt the facts, doubt your doubts and struggle to find information about the change that you believe is valid. Resentment, skepticism and blame cloud your thinking.

Stage 3 – Discomfort to Motivation

You will recognize Stage 3 by the discomfort it brings. The change and all it means has now become clear and starts to settle in. Frustration and lethargy rule until possibility takes over.

The Danger Zone

The Danger Zone represents the pivotal place where you make the choice either to move on to Stage 4 and discover the possibilities the change has presented or to choose fear and return to Stage 1.

Stage 4 – Discovery to Perspective

Stage 4 represents the "light at the end of the tunnel." Perspective, anticipation, and a willingness to make decisions give a new sense of control and hope. You are optimistic about a good outcome because you have choices.

Stage 5 - Understanding

In Stage 5, you understand the change and are more confident, think pragmatically, and your behavior is much more productive. Good thing.

Stage 6 - Integration

By this time, you have regained your ability and willingness to be flexible. You have insight into the ramifications, consequences and rewards of the change -- past, present, and future.


Share/Save/Bookmark

May 19, 2010

Information, So What?

It’s the information age and for most of us that means we are living and working with various forms of information technology every day giving us access to information through—voice, data, and video—thatshows up on our computer screens, smart phones, tablets, and more.

We are rich in information.

Many would say that we are overloaded with information, because there is so much and we can’t seem to possibly process it all no matter how hard we try--there is always more email to reply to, more YouTube videos to watch, more news and research to read up on, and more people to communicate and collaborate with via social networks, wikis, blogs,
tweets, and so on.

So what’s the point of all the information and collaboration? Is it just for fun and entertainment—like one big game of Trivial Pursuit? Or is it for getting a professional edge—i.e. the more you know and the more people you know, the better you are to advance and succeed?

Ultimately, information serves many purposes—it is the lifeblood of our humanity…it nourishes our curiosity, it feeds our learning and growth, and it enables us to make intelligent decisions in our lives.

Without information, we are just “flying blind” as they say, and couldn’t expect much in terms of personal or professional results for our organizations or ourselves.

So information is critical to improving our decision-making. Information and information technology is how we overcome poor decision-making based on gut, intuition, politics, and subjective management whim—all sure ways to get in a “why did you do that”
pickle!

An interesting article in Defense Systems Magazine (May 2010) called “Getting Inside the Enemy’s Decision Cycle” talks about how the military seeks to disrupt the enemy’s information and decision-making to degrade their war-fighting capability.

“Success in battle is increasingly about making decisions more quickly than your adversary can.”

In the military, the decision cycle is frequently referred to as "OODA Loop"—observe, orient, decide, and attack.

If we can disrupt the enemy’s decision cycle or OODA Loop, we can “decide and act faster than they can.” The result is “I’m going to outmaneuver you” and win!

In short, information translates to decision-making and to action.

- Disrupt that cycle and we are sitting ducks.

- Enhance that cycle and we are stronger for it.

Ultimately, there are lots of important lessons about the criticality of IT to decision-making that comes out of the battlefield:

First, we all need information to survive and thrive.

Second, if we improve information quality and speed of delivery, then the better the decision-making and the impact on and off the battlefield.

This is why information and information technology is truly our competitive advantage and at the heart of our national security.

I believe that this necessitates that we treat IT as not just another budget line item, but rather as a strategic investment.

The vision for IT has always been to bring greater effectiveness and efficiency to the rest of the business and to the mission. Unfortunately, IT has not always lived up to that vision.

Despite some disappointments, we cannot afford to be second-rate in IT, because there will be a negative cascading effect throughout all of our industries and government agencies that rely on information and information technology.

The key for us is to continue investing in technology (wisely), investing in our people (profusely—they are the brains behind the machines), and keep focusing on using IT as an enabler to improve the business and mission of everything else we do.


Share/Save/Bookmark

February 10, 2010

Damned If You Do, Damned If You Don’t

Frequently employees face double-bind message in the workplace and these not only impair morale, but also can result in poor decision-making.

One example has to do with whether we should apply tried and true, best practices or be creative and innovative. This manifests when employees bring innovative approaches to the table to solve problems are told, “there’s no reason to recreate the wheel on this.” And then when the employees take the opposing track and try to bring established best practices to bear on problems, they are told disparagingly “ah, that’s just a cookie cutter approach.”

Another example has to do with when and how much to analyze and when to decide, such that when employees are evaluating solutions and they hustle to get a proposal on the table, only to be told they haven’t done enough work or its superficial and they need to go back, “do due diligence, and conduct a more thorough evaluation.” Then when the employees go back to conduct a thorough analysis of alternatives, business case, concept of operations and so on, only to be told, “what is taking you so long? You’re just getting bogged down in analysis paralysis—move on!”

I am sure there are many more examples of this where employees feel like they are in a catch 22, between a rock and a hard place, damned if they do and damned if they don’t. The point is that creating contradictions, throwing nifty clichés at employees, and using that to win points or get your way in the decision process, hurts the organization and the employees that work there.

What the organization needs is not arbitrary decision-making and double-bind messages that shut employees down. Rather, organizations need clearly defined, authoritative, and accountable governance structure, policy, process and roles and responsibilities that open it up to healthy and informed debate and timely decisions. When everyone is working off of the “same sheet of music” and they know what is professionally expected and appropriate to the decision-making process, then using clichés arbitrarily and manipulating the decision-process no longer has a place or is organizationally acceptable.

We can’t rush through decisions just to get what we want, and we can’t bog down decisions with obstacles, just because we’re looking for a different answer.

Sound governance will help resolve this, but also necessary is a leadership committed to changing the game from the traditional power politics and subjective management whim to an organization driven by integrity, truth, and genuine progress based on objective facts, figures, and reason. Of course, changing an organization is not easy and doesn’t happen overnight, but think how proud we can be of our organizations that make this leap to well-founded governance.


Share/Save/Bookmark