June 11, 2013
Apple Designers Lost In The Imagination Orchid
June 9, 2013
Turnkey Cyberwar
It's called Plan X and it's being pursued by the Defense Advanced Research Projects Agency (DARPA).
The idea is for cyber warfare to be conducted like traditional kinetic warfare--where "munitions made of 1s and 0s [are] to be as a simple to launch as ones made of metal and explosives."
Cyberspace is considered a domain of warfare similar to land, sea, air, and space, and it is necessary to be able to craft offensive capabilities where "a military operator can design and deploy a cyber effect, know what it's going to accomplish...and take the appropriate level of action."
We can't fly by the seat of our pants in cyberspace any longer; we've got to have turnkey solutions ready to launch in order to defend our people and interests.
To accomplish this, we need:
1) Surveillance: A good map of cyberspace detailing enemy cyber outposts and threats akin to the geographical maps we have identifying physical targets and dangerous movements.
2) Weapons: Reliable cyber weapons ready to take on and take out enemy networks similar to kinetic weapons ready to destroy their military hardware and infrastructure.
3) Launch protocols: The rules of engagement for attack and counterattack and the ability to intuitively and securely unleash those even faster then the turnkey capabilities with which we can respond with traditional military might.
Whether, the cyber weapon looks like Angry Birds or some other point (at the target) and swipe (to launch at them) interface is almost beside the point--what is key is that we are ready to fight like hell in cyberspace, win uncontested, and keep the peace again. ;-)
(Source Photo: here with attribution to Great Beyond)
Turnkey Cyberwar
December 6, 2007
An Online Only World and Enterprise Architecture
How long will it be before the internet becomes our primary means of storing personal data and running software applications (web-based)?
MIT Technology Review, 3 December 2007, reports that one core vision for the evolution of technology (that of Google) is that we are moving from a computer-based technical environment to an online-only world, where “digital life, for the most part, exists on the Internet”—this is called cloud computing.
Already, users can perform many applications and storage functions online. For example:
- “Google Calendar organizes events,
- Picasa stores pictures,
- YouTube holds videos,
- Gmail stores email, and
- Google Docs houses documents, spreadsheets, and presentations.”
Moreover, MIT Technology Review reports that it is rumored that Google is working on an umbrella application that will pull these disparate offerings together for a holistic cloud computing solution.
What’s the advantage of cloud computing?
A computer hard drive is no longer important. Accessibility to one’s information is limited only by one’s access to the internet, which is becoming virtually ubiquitous, and information can be shared with others easily. “The digital stuff that’s valuable… [is] equally accessible from his home computer, a public internet café, or a web-enabled phone.”
What are some of the issues with cloud computing?
- Privacy—“user privacy …becomes especially important if Google serves ads that correspond to all personal information, as it does in Gmail.”
- Encryption—“Google’s encryption mechanisms aren’t flawless. There have been tales of people logging into Gmail and pulling up someone else’s account.”
- Copyright—“one of the advantages of storing data in the cloud is that it can easily be shared with other people, but sharing files such as copyrighted music and movies is generally illegal.”
- Connectivity—“a repository to online data isn’t useful if there’s no Internet connection to be had, or if the signal is spotty.”
Of course, Google’s vision of an online-only world isn’t without challenge: Microsoft counters that “it’s always going to be a combination of [online and offline], and the solution that wins is going to be the one that does the best job with both.” So Microsoft is building capability for users “to keep some files on hard drives, and maintain that privacy, while still letting them access those files remotely.”
I will not predict a winner-take-all in this architecture battle of online and offline data and applications. However, I will say that we can definitely anticipate that information sharing, accessibility, privacy, and security will be centerpieces of what consumers care about and demand in a digital world. Online or offline these expectations will drive future technology evolution and implementation.
An Online Only World and Enterprise Architecture