August 21, 2011

Deus Ex-Overtaken By Technology

Deus Ex is an action role-playing game (RPG) and first person shooter game. It sold more than a million copies as of 2009 and was named "Best PC Game of All Time."

A prequel Deus Ex: Human Evolution is due to be released this month (August 2011).

You play a coalition anti-terrorist agent in a world slipping further and further into chaos.

The time is 2052 and you are in a dystopian society where society has progressed faster technologically than it has evolved spiritually--and people are struggling to cope with technological change and are abusing new technology.

The challenges portrayed in the trailer show people using/abusing technological augmentation--the integration of technology with their human bodies--replacing damaged limbs, adding computer chips, and even "upgrading themselves".

There are many issues raised about where we are going as a society with technology:

1) Are we playing G-d--when we change ourselves with technology, not because we have too (i.e. because of sickness), but rather because we want to--at what point are we perhaps overstepping theologically, ethically, or otherwise?

2) Are we playing with fire--when we start to systematically alter our makeup and change ourselves into some sort of half-human and half-machine entities or creatures are we tempting nature, fate, evolution with what the final outcome of who we become is? As the end of the trailer warns: "Be human, remain human"--imagine what type of cyborg creatures we may become if we let things go to extremes.

3) Technology may never be enough--As we integrate technology into our beings, where does it stop? The minute we stop, others continue and we risk being "less intelligent, less strong, and less capable than the rest of the human race." In short, are we facing a technological race toward dehumanization and enhanced machines.

4) Drugs and other vices follow--To prevent technology augmentation from being rejected, mankind relies on ever larger and more potent doses of drugs. We not only risk losing elements of our humanity to technology, but also to drugs and other vices that make us forget the pain of change and rejection (physical and perhaps emotional).

Deus Ex literally is Latin for "G-d out of the machine." Perhaps, future dystopian society starts out by people trying to play G-d, but I think the risk is that it ends with the proverbial devil displacing the best laid intentions.

While technology holds the most amazing of promises from curing disease, solving world hunger, and endless innovations (even including developing the archetype bionic man/women--"We can rebuild him...we have the technology"), without a solid moral compass and frequent check-ins, we run the risk of technology getting away from us and even doing more harm than good.

Share/Save/Bookmark

August 20, 2011

Cloud Second, Security First

Leadership is not about moving forward despite any and all costs, but about addressing issues head on.

Cloud computing holds tremendous promise for efficiency and cost-savings at a time when these issues are front and center of a national debate on our deficit of $14 trillion and growing.

Yet some prominent IT leaders have sought to downplay security concerns calling them "amplified...to preserve the status quo." (ComputerWorld, 8 August 2011)

Interestingly, this statement appeared in the press the same week that McAfee reported Operation Shady RAT--"the hacking of more than 70 corporations and government organizations," 49 of which were in the U.S., and included a dozen defense firms. (Washington Post, 2 August 2011)
The cyber spying took place over a period of 5 years and "led to a massive loss of information."(Fox News, 4 August 2011)

Moreover, this cyber security tragedy stands not alone, but atop a long list that recently includes prominent organizations in the IT community, such as Google that last year had it's networks broken into and valuable source code stolen, and EMC's RSA division this year that had their SecurID computer tokens compromised.

Perhaps, we should pay greater heed to our leading cyber security expert who just this last March stated: "our adversaries in cyberspace are highly capable. Our defenses--across dot-mil and the defense industrial base (DIB) are not." (NSA Director and head of Cyber Command General Keith Alexander).

We need to press forward with cloud computing, but be ever careful about protecting our critical infrastructure along the way.

One of the great things about our nation is our ability to share viewpoints, discuss and debate them, and use all information to improve decision-making along the way. We should never close our eyes to the the threats on the ground.

(Source Photo: here)

Share/Save/Bookmark

Social Media: Closer Together or Further Apart?

This satirical video with lyrics sung by Elliott Yamin (from American Idol) shows a relationship where interest in everything social media outweighs the real social relationship between the two people (boy and girl).

Even sitting right next to each other, they are texting and skyping as if they are a thousand miles away!

The boy keeps trying to get the girl to pay him some real attention--waving his arms, closing her computer lid, and even pretending to shoot himself--but nothing works. The girl is in social media heaven--or hell--and she just keeps on going online: Texting, Tweeting, Facebooking, Yelping, Grouponing, Blogging, Digging, YouTubing, and on and on.

The boy looks miserable and is proverbially screaming out: "hello, can't we just be together for real?" But to her, the reality is attained ironically through connecting on social media.

While the video exaggerates the relationship dynamics as impacted by social media, it does acutely point out the many ways that connecting with others has changed in the age of social computing.

But is the change mostly positive or negative--does social media draw us closer or does it in a sense drive a virtual wedge between us?

This past week, the Wall Street Journal (16 August 2011) reported that studies show that "digital communications can lead to more or better friendships online and off, greater honesty, faster intimacy in relationships, and an increased sense of belonging...on the whole, technology appears to enhance real-world relationships."

in particular, social media seems to be a type of panacea for shy and anxious people who report feeling "significantly less shy, more comfortable, and better accepted by their peers" when they are online than off. Additionally, the "frequent communications online could serve as a practice for in-person social interactions."

When people are online, they feel perhaps safer, freer, and able to be themselves and this helps them connect with others in a way that is maybe more real than the facade they hide behind in the "real world."

This can work in negative ways too like when people get behind the wheel of the car, they sort of think they are anonymous and you see them cursing, speeding, etc. In this case, they let their inhibitions go, and in it's place you get things like road rage. Online too, you have creeps come out and say and do inappropriate things behind the veil of anonymity.

Social media provide tools for us to connect with others. And like any tool, social media can be used for good or bad: On the positive side, it can help us to reach out to others and connect, share, collaborate, and innovate. On the negative side, it can be used as escape from reality or even to conduct unethical or criminal activities.

How we use social media is up to us--the potential to go in either direction is very powerful.

Share/Save/Bookmark

August 19, 2011

Supercookies Are Super Invasive


You're alone sitting at the computer surfing the web, you're looking up health, financial, entertainment, shopping, and other personal things.

You feel comfortable doing your thing...you have your privacy and can be yourself without someone looking over your shoulder.

But is the sense of safety real or an illusion?

For the most part, when we are online, we are not safe or in private.

Like at work, where you get the warning that you are being monitored, when you are browsing the Internet, your actions are being tracked site by site (but this is done without warning)--by cookies--or data packets exchanged between web servers and user's browsers.

On the plus side cookies are used for identification, authentication, preferences, and maintaining shopping cart contents; but on the negative side, they are installed on users computers to track your activities online.

The Wall Street Journal (18 August 2011) reports that now there are Supercookies! and "history stealing."

- Supercookies are not cookies with that can fly or lift locatives, but rather they are more difficult to locate and get rid off your computer, so they track your activities, but are hidden in different places such as in the web browsers cache.

- "History stealing" is done when you visit certain websites, and they use software to mine you web browser history to determine where you've visited and then use that to for example, target advertising at you. Imagine though what other profiling can be compiled by categorizing and analyzing your browsing history in aggregate.

Currently, the online ad industry has established self-imposed guidelines to supposedly protect privacy, but they seem wholly inadequate such as "collecting health and financial data about individuals is permissible as long as the data don't contain financial-account numbers, Social Security numbers, pharmaceutical prescriptions or medical records." But knowing people's household finances, credit histories, and personal medical histories is okay--by whose standard?

According to the WSJ, web tracking is not only alive and well, but flourishing with "80% of online display ads are based on tracking data."
Why should anyone have the ability to track our personal web surfing?

We don't need ads targeted at us--we are not targets! We are very capable of searching online for what we what we are interested in and when we are interested in it--thank you!

Session cookies that expire at the end of ones web browsing for session management is one thing; but persistent cookies that collect and mine your personal data--that's should be a definite no-no.

Like with the advertisements that come unwanted in the traditional mailbox and get routinely and speedily placed in the garbage, online advertisements that are based on intrusive website tracking is not only a nuisance, but a violation of our privacy--and should be trashed as a concept and a practice.

Share/Save/Bookmark

Robot Fighters Coming Soon




I love keeping up with the latest in robotics, especially when it comes to battlefield versions.

The Wall Street Journal (19 August 2011) featured QinetiQ's Modular Advanced Armed Robotic System (MAARS) today as "America's Newest Soldiers."

MAARS features tank treads, days and night vision cameras, a 4-barrel 40mm high-explosive grenade launcher, and a M240B 7.62mm machine gun.

"It can stand sentry at a checkpoint and warn people away with a police style hailer, a nonblinding laser, tear gas or smoke grenades. As a last resort, it can fire lethal rounds."

Watching this thing, I imagine the D Day landings in Normandy would've looked a lot different with a swarm of these fellows landing on those bullet-riddled beaches.

The nature of the fight is changing and whoever stands in front of one of these armed robots (and even better next generation versions to come) better be prepared to say "bye bye, it was nice knowing you." ;-)

(Source Photo: here)

Share/Save/Bookmark

August 15, 2011

Helping Employees Find The Right Job Fit


I have a new article in Public CIO Magazine (August 2011) on the topic of how to handle poorly performing employees.

"Finding the right candidate for a job is much like finding a spouse -- it requires the right chemistry. There's a critical difference between having great qualifications and being the right person for a particular job, which is a concept that organizational behavior specialist refer to as 'person-job fit.'"

"When you see employees struggling, try to bring them up to speed in every possible way. If that doesn't work, help them find a better position to continue their path of professional and personal development."

Read the rest of the article at Government Technology.


(Source Photo: here)

Share/Save/Bookmark

August 14, 2011

Ten Years After 9/11

This video on the 9/11 memorial in NYC opening on 9/11/11 speaks for itself.

Enjoy and remember!

Share/Save/Bookmark

Images, Alive And Profitable

"There are nearly 4 trillion images on the Internet and 200 million new ones being added each day," according to Chief Revenue Officer (CRO) of Luminate.

Luminate (formerly Pixazza) has the vision of making all those images interactive through image recognition algorithms and human-assisted crowdsourcing to identify objects and tag the images with content.
They "transform static images into interactive content," according to the Luminate website.

The way it works:

1) Icon--look for the Luminate icon image in the lower left corner of the image that means the image in interactive.

2) Mouse--mouse over the image to choose from the interactive image apps.

3) Click--click on the images in the photo to shop and buy it ("Get The Look"), share information (e.g. Facebook, Twitter, email), or navigate (click on contextual hyperlinks from Wikipedia and other sources).

According to Forbes (27 July 2011), Luminate already "has more than 4,000 publishers, 150 million unique visitors per month, and more than 20 million products catalogued."

The image-tagging platform provides context and information for consumers and revenue generating opportunities for producers--so it is a win-win for everyone in the marketplace!

By connecting end-user Internet images on the front-end with advertisers and commerce on the back-end, Luminate has found a way to integrate web-surfers and industry--no longer are advertisements on the web disconnected as pop-ups, banners, or lists from the Internet content itself.

Right now, there are apps for annotations, advertisements, commerce, and social media. Luminate plans to open up development to others to create their own for things such as apps for donations for disaster relief images or mapping and travel apps for images of places.

Luminate, as a photo-tagging and application service, is advancing our experience with the Internet by creating a richer experience, where a photo is not just a photo, but rather a potential gateway into everything in the photo itself.

In my view, this is a positive step toward a vision of a fully augmented reality, where we have a truly information-rich "tagged environment", where everything around us--that we see and experience--is identified and analyzed, and sourced, and where the images of the world are alive no matter how or from what angle we look at them.

Lastly, my gut tells me that Google is heavily salivating over where this company is going and future developments in this field.

(Source Photo: here)

Share/Save/Bookmark

August 13, 2011

Attacked And Then Some

We watched this week the riots in London--the chaos, the anarchy, the destruction, and ultimately the fear brought upon the everyday people.

But nothing was more chilling than the video of the Malaysian student who already beaten and bloodied is helped to his feet by what seems like a good samaritan only to be taken off-guard by what turns out to really be a second attack, where they steal his wallet, phone, and Sony PSP playstation.

U.K. Prime Minister David Cameron said about this incident: "When we see children as young as 13 looting and laughing, when we see the disgusting sight of an injured young man with people pretending to help him, while they are robbing him, it is clear that there are things that are badly wrong in our society."

But what is wrong with society and how are we going to correct them?

Clearly, there are feelings are social inequality and injustice around the world and this has sparked protests, riots, and war.

This last week we saw the gamut from peaceful protests in Tel Aviv over the rising costs of living, to the riots in the UK leading to over a thousand arrests and estimates of hundreds of millions of dollars in damage, and ongoing warring battles for the Arab Spring occurring in the Middle-East in Libya, Yemen, Syria, and more.

And while protesting and even demanding change in the face of injustice is sometimes necessary, the brutal attacks on innocents is not a fight for social justice, but rather of those who would take advantage of the times for their own greed and malevolence--it is sick to loot, burn, and attack just because they can.

Unfortunately, we saw similar mob mentality in Egypt when CBS reporter, Lara Logan was brutally raped by a crowd celebrating the resignation of Hosni Mubarak.

So what is wrong? There are some people who lack a clear sense of right and wrong, and who are not inhibited from doing horribly wrong and violent things.

I remember as a child growing up, my father used to tell me, when there is no one to stand up and be a man, you be the man--you be the example!

This was not a lesson in masculinity, but rather of morality--no matter what others do, no matter how egregious, no matter how many, you must have the conviction to stand up and do what is right.

To me, we need more fathers in this world like mine, who teach and demand responsibility from their children.

Similarly, we need more nurturing mothers, enlightened educators, genuine models of religious piety, as well as wise and inspirational leader--who can bring out the best in our young people and give them hope, but also guidance.

Both the London riots and the attack on the student that happened this week, could happen anywhere next, if we don't continue to address the basic needs of the people (from freedom to human rights, economic prosperity, etc.), and ensure a society that is governed by law, but also driven by ethical behavior and a sense of duty rather than entitlement.

Share/Save/Bookmark

August 12, 2011

Helmet Hair--Thanks Borat


I'd like to nominate this product for innovation award of the week.
The UK DailyMail (12 August 2011) has an article about a Kazakhstan company that has invented "helmet hair"--a line of motorcycle hard hats that looks like a very real head of hair.

They have helmets that look like men, women, and bald guys.

There are way crazier helmets--like the one that looks like a tush (and even one with a breast), a cracked walnut, a watermelon, a globe, a tennis ball, a golf ball, and let's not forget the eight ball helmet.

While I appreciate the creativity of the marketing agency Good! that came up with these, I do worry about a couple things:

1) A police officer will pull someone over for riding without a helmet, even though they are really riding with a helmet (but you just can't tell with the look of a head of hair on it).

2) Other drivers and pedestrians will get distracted by these zany helmets and zig-zag or walk into traffic and have an awful accident.

Ever since Borat's trip to the United States in 2006 to make a mockumentary comedy film and learn about our culture, I've wandered what he has been busy with back home in his native land and when he would once again come back and visit us in the U.S...I believe this must be his big return. :-)

(Source Photo: here)

Share/Save/Bookmark

To Follow Or Not To Follow

Theskystallione

Twitter is a great streaming feed for news and information, but what you get depends on who you follow.

While Twitter does provide suggestions based on whether they are "promoted" or who you already follow (i.e. follow Joe because they are "followed by" Julia), it doesn't tell you a lot of information about them except their Twitter handle, short profile, location, basic stats, etc.

A new service called Twtrland helps you decide who to follow by providing lot's more information and displaying it in an organized fashion--simply plug in the Twitter handle you are interested in knowing more about and you get the following:

1) Basic Info--Picture, profile, stats on follow/follower/tweets

2) Top Followers--Let's you know who else (from the who's who) is following this person.

3) Advanced Stats--Provides measures on how often he/she gets retweeted, tweets per day, retweets, etc.

4) Graph of Content Type--Displays in pie chart format the type of content the person puts out there: plain tweets, links, pictures, retweets, replies and more.

5) Samples of Content by Category--Examples of this persons tweets are provided by category such as: famous words, plains tweets, pictures, links, retweets, and mentions.

I like the concept and execution of Twtrland in organizing and displaying tweeters information. However, I cannot really see people routinely taking the time to put in each Twitter handle to get this information. Making a decision a who to follow is not generally a research before you follow event. The cost-benefit equation doesn't really make sense, since it doesn't cost you anything to follow someone and if you don't like their tweets, you can always change your mind later and unfollow them if you want.

Overall, I see Twtrland more as a profiling tool (for research or interest) by getting a handy snapshot of what people are doing/saying online in the world of micro-blogging, rather than a decision support system for whether I should add someone to my follow list or not.

(Source Photo: Twtrland Profile of Sylvester Stallone, Rocky!)

Share/Save/Bookmark

August 7, 2011

Computer, Read This

In 2002, Tom Cruise waved his arms in swooping fashion to control his Pre-Crime fighting computer in Minority Report , and this was the tip of the iceberg when it comes to consumer interest in moving beyond the traditional keyboard, trackpads, and mice to control our technology.

For example, there is the Ninetendo Wii and Microsoft Kinect in the gaming arena, where we control the technology with our physical motions rather than hand-held devices. And consumers seem to really like have a controller-free gaming system. The Kinect sold so quickly--at the rate of roughly 133,000 per day during the first three months--it earned the Guinness World Record for fastest selling consumer device. (Mashable, 9 March 2011),
Interacting with technology in varied and natural ways--outside the box--is not limited to just gestures, there are many more such as voice recognition, haptics, eye movements, telepathy, and more.

- Gesture-driven--This is referred to as "spatial operating environments"--where cameras and sensors read our gestures and translate them into computer commands. Companies like Oblong Industries are developing a universal gesture-based language, so that we can communicate across computing platforms--"where you can walk up to any screen, anywhere in the world, gesture to it, and take control." (Popular Science, August 2011)

- Voice recognition--This is perhaps the most mature of the alternative technology control interfaces, and products like Dragon Naturally Speaking have become not only standard on many desktops, but also are embedded in many smartphones giving you the ability to do dictation, voice to text messaging, etc.

- Haptics--This includes touchscreens with tactile sensations. For example, Tactus Technology is "developing keyboards and game controllers knobs [that actually] grow out of touchscreens as needed and then fade away," and another company Senseg is making technology that produces feelings so users can feel vibrations, clicks, and textures and can use these for enhanced touchscreens control of their computers. (BusinessWeek, 20-26 June 2011)

- Eye-tracking--For example, new Lenovo computers are using eye-tracking software by Tobii to control the browser and desktop applications including email and documents (CNET, 1 March 2011)

- Telepathy--Tiny implantable chips to the brain, "the telepathy chip," are being used to sense electrical activity in the nerve cells and thereby "control a cursor on a computer screen, operate electronic gadgets [e.g. television, light switch, etc.], or steer an electronic wheelchair." (UK DailyMail, 3 Sept. 2009)

Clearly, consumers are not content to type away at keyboards and roll their mice...they want to interact with technology the way they do with other people.

It still seems a little way off for computers to understand us the way we really are and communicate. For example, can a computer read non-verbal cues, which communication experts say is actually something like 70% of our communications? Obviously, this hasn't happened yet. But when the computer can read what I am really trying to say in all the ways that I am saying it, we will definitely have a much more interesting conversation going on.

(Source Photo: here)

Share/Save/Bookmark

August 6, 2011

The World Peaceularity

Futurist, Ray Kurzweil laid out his vision for a time when artificial intelligence surpasses the pure human kind--this he called The Singularlity.

Now people from around the world are building a presentation in Google Docs with alternatives visions of our future--it is both fascinating and humorous.

The image on World Peacularity was my contribution with a vision for a future as stated in Isaiah 2:4 "Nation shall not lift up sword against nation, neither shall they learn war anymore."

Hope you like it and that we can share the desire for and pursuit of World Peace together.

Share/Save/Bookmark

DRI or DOA

 Wow--the last few weeks and months have unfortunately seen so many things going wrong for us as a country (with the exception of nailing Bin Laden, which was a huge win!)--the problems start with intractable political battles over the debt ceiling, the continuing mounting deficit, the S&P downgrade, the high unemployment, the housing funk, the stock market instability, our falling education rankings in the world, the drought in the Southwest, the famine in Somalia, the turmoil in the Middle East, and today losing so many of our brave special forces soldiers in Afghanistan, and they don't end there--you just shake your head in disbelief and ask how can all this be happening?

I suppose on one hand there is the religious answer that perhaps we are sinners and are being punished for our wrongdoings and that G-d out of his love for us is trying to teach us something and put on us a better track. It is comforting to know that G-d is watching us and controlling the events of the world and is ultimately looking out for our good. With the recent hardships, I would say let the L-rd have mercy on us. Amen!

On the other side, there are those who attribute life events to chance--the roll of the dice--life's general tendencies to ups and downs--perhaps even astrology or fate or other forces of the universe. To them, what happens, happens. It is part of the tests of life and we have to do our best to overcome the trials and tribulations that come our way and hope for better days ahead.

A third viewpoint are those that hold self responsible. They say, what have I or we done to screw things up so badly--What mistakes have we made? What misinterpretations have we read? What actions did we take or fail to take that led to all this mess? This is one that I am most curious about here because it has to do with our our taking responsibility for what is going wrong and for making things right (not in a spiritual sense like in the religious view or in the reactive sense like the rollercoaster view of life as a sequence of chance events).

When we hold ourselves accountable--I believe that means at all levels of our society--from the "I" as in each and every one of us to the the Principals of our Schools, the CEOs of our Fortune 500 companies, our Representatives in Congress, and the Commander in Chief, as some examples. Is everyone doing what they are supposed to be doing and as well as they are supposed to be doing it?

Fortune Magazine (23 May 2011) in an article about the enormous success of Apple pointed out something really critical in their culture that breeds excellence--and that is accountability for delivering results.

"At Apple there is never any confusion as to who is responsible for what." They have a name for this at Apple and it the "DRI"--the Directly Responsible Individual! "Effective meetings at Apple have an action list [and] next to each action item will be the DRI." Moreover, they function as "a unified team."

So at Apple they have individual accountability and that is balanced with teamwork, and they nimbly execute the vision of leadership--who too are directly accountable. For example, the Apple Chief Financial Officer is directly responsible for all cost and expenses that lead to profit and loss.

I believe that as a society we could leverage the Apple model to deliver better results for our country without sacrificing our values and freedoms. We all need to step up and be directly responsible individuals! We can't keep looking at the guy/gal next to us and hoping that they will pull us through. It's will take each and every one of us individually and as a team to cut the pork spending, work smarter, study and increase our skills, and stop the incessant bickering and start doing something constructive.

If we keep fighting over who controls the pie, soon there won't be any pie left. Let's all be DRIs and take a bigger picture view to save the country, while there is still a lot worth saving.

(Source Photo: here)

Share/Save/Bookmark

August 5, 2011

Facial Recognition Goes Mainstream

Bar

Facial recognition applications are no longer just for the military and law enforcement to identify hostiles or criminals, but rather is going mainstream.

The Wall Street Journal (5 August 2011) reports from the bar scene to the television and from vampire gaming to celebrity match-ups, facial recognition software is now part of our everyday technology mix.

Facial recognition is "at a tipping point where some of these face-recognition technologies are not just gimicks, but are becoming useful." Moreover, the technology has become quite good with "frontal face images, the error rate of rejecting a legitimate claim--when the face image and name match-decreased to 0.29% in 2010 from a rate of 79% in 1993."

So here are some examples of how facial recognition is being used:

- SceneTap: Free app for iPhone and Droid "displays real time stats on the local bar scene...shows the number of people at the bar, the male-to-female ratio, and the average age of the patron"--all from facial recognition--this is not bad except for the bartender on a slow night.

- TVs with Viewdle: TV set-top boxes with facial recongition can "identify who is sitting in front of the TV then customize programming accordingly...displaying most recently watched or recorded shows"--can anyone say America's Got Talent!

- Third Eye: Facebook game that based on facial recognition identifies people as either vampires or slayers. Even without the app, I'd bet I'm one of the slayers :-)

- FaceR Celebrity: This iPhone app uses a picture and facial recognition software to determine which celebrities you most closely resemble. For me, it's Sylvester Stallone, all the way--I'm sure of it.

A lot of people are concerned about the privacy implications of facial recognition--collecting and storing images of faces and using it for surveillance and tracking and getting into your business...like knowing what bars or whereever else you are going to.

But apps like SceneTap say they don't collect personal information, nobody sees the video feed, and they don't match the images to photos on the web or Facebook to identify exactly who is entering the bar. This is sounding a little like TSA and the body imaging scanners they use--i.e. don't worry nobody sees your privates! :-)

But perhaps, whether or not they do or don't isn't the point, they could and that is a privacy concern.

Facial recognition technology, even though it is used in gaming, it is not kid's play, and it should be regulated to avoid a society where Internet "big brother" has virtually unlimited capability to track and match each and every facial you!

(Source Photo: here)

Share/Save/Bookmark

August 4, 2011

Google+ And A History of Social Media

Ten_commandments

Bloomberg Business (25-31 July 2011) tells in biblical terms the history of social media leading up to the recent release of Google+:

"In the beginning, there was Friendster; which captivated the web'ites before it was smitten by slow servers and exiled to the Far East. And then a man called Hoffman begat LinkedIn, saying "This name shall comfort professionals who want to post their resumes online," and Wall Street did idolize it. And then Myspace lived for two thousand and five hundred days and worshipped flashy ads and was subsumed by News Corp., which the L-rd hath cursed. And Facebook emerged from the land of Harvard and forsook the flashy ads for smaller ones and welcomes vast multitudes of the peoples of the world. And it was good."

With the "genesis" of Google+, there is now a new contender in virtual land with a way to share posts, pictures, videos, etc. with limited groups--or circles of friends--and an advance in privacy features has been made.

According to the article, even Mark Zuckerberg and some 60 other Facebook employees have signed up for Google+.

With all this confusion brewing in social media land, one wonders exactly why Randi Zuckerberg (Mark's sister) recently headed for the exits--a better offer from Google? :-)

Google+ has many nice features, especially in terms of integration with everything else Google. On one hand, this is a plus in terms of potential simplicity and user-centricity, but on the other hand it can be more than a little obtrusive and scary as it can \link and share everything from from your profile, contacts, pictures (Picasa), videos (YouTube), voice calls (Google Voice), geolocation (Google Maps), Internet searches, and more.

Google owns a lot of Internet properties and this enables them to bundle solutions for the end-user. The question to me is will something as basic as Circles for grouping friends really help keep what's private, private.

It seems like we are putting a lot of information eggs in the Google basket, and while they seem to have been a force for good so far, we need to ensure that remains the case and that our privacy is held sacred.

(Source Photo, With All Due Respect To G-d: here)

Share/Save/Bookmark

August 3, 2011

Head Over Heels For Technology



This is really a very cool video called iPad Head Girl.


The girl is covered with 4 iPads--each with an image of a different angle of a headshot (face, back, and sides) making it look almost like her real head.


You're thinking--what is this: a robot, a person, an alien?--it's really up to your imagination, but you'd better get a closer look.


I understand from Coolest-Gadgets that this is actually part of an advertising campaign by Thinkmodo for a racy iPad magazine called "Cosmo for Guys," and No, I am not promoting this in any way!


However, the advertising with the walking head iPads and the images of the girl is definitely making heads turn, but for very different reasons and it has nothing to do with sex and everything to do with technology.


My view is that we are fascinated by the "latest and greatest" use of technology--and are basically ready, on the lookout for the next great amazing breakthrough.


Technology while obviously amazing feats of science, engineering, and design--also borders on the magical for most of us as we watch and see what the new technology can do, even though we don't really know how it does it.


Like the lady walking around with iPad head--we see it, but can't really believe what we're seeing.


The miracle of technology--keeps us all at the edge of our seats with hope, wonder, and awe for what magic is going to walk down the street next and leave us mouths agape.

Share/Save/Bookmark

July 31, 2011

Technology Anonymous

Alcoholics Anonymous is famous for their program to help people attain and maintain sobriety.
With the latest addiction being everything technology, there is now a movement toward "technology detox" or the AA equivalent, Technology Anonymous.
I remember reading months ago about people so addicted to the Internet and online video games that they literally had to be institutionalized to get them to eat, sleep, and return to some sort of normal life again.
Apparently, technology taken to the extreme can be no less an addiction than smoking, drinking, of fooling around.
And there is even a Facebook page for Internet and Technology Addiction Anonymous (ITAA).
I've recently even heard of challenges for people to turn off their technology for even 24 hours; apparently this is a tough thing even for just that one day--wonder if you can do it?
The Wall Street Journal (5 July 2011) reported on someone who "signed up for a special [vacation] package called "digital detox," [that] promised a 15% discount if you agree to leave your digital devices behind or surrender them at check in."
The message is clear that people "need a push to take a break from their screens."
Here are brief some statistics from the WSJ on technology addiction even while on vacation:
- 79% expect to remain connected for all or some of the time on their next vacation.
- 68% (up from 58% in 2010) say they will check email while on vacation--daily or more frequently--for work.
- 33% admitted to hiding from friends and family to check email on vacation.
- Also, 33% check email on vacation while engaged in fast-paced activities such as skiing, biking, and horseback riding.
For people routinely checking email as many as 50-100 times a day, going on vacation and leaving technology behind can be a real shock to our social computing systems. Should I even mention the possibility of not logging unto Facebook, Twitter, YouTube, Flikr, etc. I see people convulsing and going into withdrawal just at the thought.
So what is this technology addiction we are all on? There's no nicotine or alcohol or testosterone involved (except in some extreme video games, maybe).
Incredibly, for many technology is the first thing we check in the morning and last before we close our eyes at night.
It even lays on the night table right next to us--our spouse on one side and our smartphone on the other. Which do you cuddle with more?
It's scary--technology is an addiction that is not physical, but rather emotional.
It is the thrill of who is calling, emailing, texting, friending, or following us and what opportunities will it bring.
Like Vegas or a lottery ticket...technology holds for us the possibility of love, friendships, sexual encounters, new job opportunities, fame, fortune, travel, and so on.
There is no limit, because technology is global and unbridled and so is our ambition, desires, hopes, and even some greed.
(Source Photo: here)

Share/Save/Bookmark

July 30, 2011

Federal Register On Steroids

"The Federal Register is "the official daily publication of rules, proposed rules, and notices of Federal agencies and organizations, as well as executive orders and other presidential documents." It is published by the Office of Federal Register, National Archives and Records Administration in the Government Printing Office's (GPO) Federal Digital System (FDsys)--"the next generation on online government information."

Attached is a snapshot that shows a very basic chronological order of posts with an issue of the Federal Register subdivided by agency/organization. It's organized and to the point!

Now, here is a new way of looking at the information from GovPulse, a site developed to "make such documents as the Federal Register searchable, more accessible and easier to digest...to encourage every citizen to become more involved in the workings of their government and make their voice heard." The site is built from open source.

You'll see that there is a lot more information readily available, organized in multiple ways, and really quite user-centric; some examples:

1) Number of Entries for the Day: The number of entries for the day are listed right at the top.
2) Calendar for Selecting Day of Interest: Next to the number of entries for the day, you can click on the calendar icon and get an instant 3 months of dates to choose from or enter another date of interest and be instantly take to there.
3) Statistics for the Day: The right sidebar displays the locations mentioned on a map and the types of entries and reporting agencies in pie charts.
4) Department Entries are Prominently Displayed: Both the number of entries for each department are identified as well as identifying their type and length along with an abstract for the entry. Each Department's entries can easily be expanded or collapses by clicking on the arrow next to the department's name.
5) Entries are Enabled for Action: By clicking on an entry, there are options to share it via social media to Twitter, Facebook, Digg, and Reddit to let others know about it and there is also a listing of your senators and representatives and their contact information to speak up on the issues.

Additional helpful features on the homepage--immediate access to areas that are last chance to act or what's new, such as:

1) Comments closing in the next 7 days
2) Comments opened in the last 7 days
3) Rules taking effect in the next 7 days
4) Rules proposed in the last 7 days

Moreover, you have another map with bubbles showing mentioned locations or you can enter your own location and get all the entries subdivided by 10, 15, 20 miles and so on up to 50 miles away.

Another feature called Departmental Pulse, show a trend line of number of entries per department over the last year or 5 years.

At the top of the page, you can quickly navigate to entries in the Federal Register by agency, topic, location, date published, or do a general search.

There are other cool features such as when you look at entries by department, you can see number of entries, places mentioned, and a bubble map that tells you popular topics for this department.

Overall, I think GovPulse deserves a big thumbs up in terms of functionality and usability and helping people get involved in government by being able to access information in easier and simpler ways.

The obvious question is why does it take 3 outsiders "with a passion for building web applications" to do this?

While I can't definitively answer that, certainly there are benefits to coming in with fresh eyes, being true subject matter experts, and not bound by the "bureaucracy" that is endemic in so many large institutions.

This is not say that there are not many talented people in government--because there certainly are--but sometimes it just takes a few guys in a garage to change the world as we know it.

Federal_register Govpulse

Share/Save/Bookmark

Sensors, Sensors Everywhere

Three_surveillance_cameras

Sensors will soon be everywhere--waiting, watching, and working to capture information about you and the environment we inhabit.

Every sensor is an opportunity to collect data and use that data for making better decisions.

Of course, we see sensors deployed first and foremost from our military overseas, in Iraq and Afghanistan, which uses drones to spy on and strike on our adversaries. The drones are really flying platforms of sensors and in some cases with weapons at ready. According to the New York Times (20 June 2011) "From blimps to bugs, an explosion in aerial drones is transforming the way America fights and thinks about its wars..the pentagon now has some 7,000 aerial drones...[and] has asked for nearly $5 billion for drones for next year." These drones are providing "a Tsunami of data" from intelligence, surveillance, and reconnaissance. The change to drones is so significant in our military that the Times reports that "already the Air Force is training more remote pilots, 350 this year alone, than fighter and bomber pilots combined."

Similarly, the Wall Street Journal (5 July 2011) reports that another type of sensor--surveillance cameras--are being deployed big time in China with a new surveillance network in Chongqing of 500,000 cameras (Beijing already has 280,000 cameras in its system) "that officials says will prevent crime but that human-rights advocates warn could target political dissent." While this project is significantly larger and more aggressive than other cities have deployed, China is certainly not alone in deploying surveillance cameras in their cities--Chicago has 10,000, New York has 8,000, and London has over 10,000. According to the WSJ, the overall market last year for surveillance-equiptments sales, not including networking gear or software totaled $1.7 billion! So smile, you are on camera--and it's candid, indeed.

A third article ran in Government Computer News (July 2011) on a more innocuous type of sensors to be used--this being the mass deployment of mobile sensors for the National Weather Service (NWS) on vehicle fleets such as Greyhound buses etc. Beginning in October, "2,000 commercial vehicles will be equipped with sensors...and will be sending data to NWS in near real time. We will be rolling out coverage on the national level." The mobile sensors will be taking 100,000 observations daily--every 10 seconds, about every 300 meters--measuring temperature, humidity, dew, precipitation, and solar information." In the future, we are looking at the potential of a "a sensing probe in every car"--for collecting information on hazardous roads, traffic patterns, and preventing accidents. Other applications for mobile sensors could be for "monitoring chemical and biological agents," nuclear and radiological ones, or CO2 and Ozone and more.

While sensors can collect data that can be used to analyze situations early and often to help people; certainly, they can also be misused to spy on one's citizens and suppress freedom. It can be a slippery slope. Perhaps that why Wired Magazine recently ask (July 2011) who's "Watching the Watchers" making the distinction between:

1) Surveillance--the monitoring of events by those above, the authorities--with CCTV etc. and monitoring events from control rooms, potentially from anywhere around the world.
2) Sousveillance--the monitoring of events by those below, the citizens--with everyday smartphones, cameras, and videocams and posting the digital images and sound bytes to YouTube, Facebook, Twitter, and so on for the world to see.

With IPV6 providing enough Internet address for attaching sensors to every atom on the surface of the earth and sensors becoming smaller and more imperceptible, we can soon monitor and report on everything, everywhere all the time. Some of the biggest challenges remain ensuring the information monitored is kept secure, private, and used legally and ethically and sifting through all the data to identify the truly meaningful information from what's just noise.

(Source Photo: here)

Share/Save/Bookmark

July 29, 2011

Capturing It All

Lifelogging

Often it seems as if so much of our life is spent memorizing things and then trying to remember what we thought we memorized.

It starts in grade school and continues throughout our education--memorize, spit back, repeat.

Advances in education may actually recognize the need and try to get kids to think now-a-days, but there are still all the "fundamentals" that need to be put to memory, so you can pass the standardized tests like the SAT, GRE, GMAT, LSAT, MCAT, and more.

But we don't just memorize to pass tests, we pride ourselves on what "we know" and we test ourselves and show off our expansive knowledge-base through things like board games such as Trivial Pursuit to game shows such as Jeopardy.

At work too, we hire, retain, and reward people based on their "knowledge, skills, and abilities" and recognize those who are true "subject matter experts."

I remember friends who used to read the encyclopedia to increase their knowledge, and the Almanac with all the facts and figures--is still a best-seller. In Yeshiva, we also spent a good part of our high school years, memorizing from the Talmud.

The challenge for us in the 21st century is that knowledge is growing so fast that we as individuals can barely keep up with the volume and pace of change, so we specialize professionally and seek expert advice from others on areas outside our area of specialization.

Still we memorize and try to remember as much as we can. We read, watch TV, browse the Internet, travel, try new things, and fill our heads with incessant facts, memories, and chatter. And we become frustrated when we can't remember names of people we recently meet, the punch line to a joke, the facts for a presentation at work, the spelling of a simple word, or even what we had for breakfast.

So rather than memorize and forget, people are turning to capturing events from their lives and playing it back when they need to recall information or are feeling nostalgic.

We do this when we take photos, videos, audiocasts, blog, tweet, etc. and then access these from our hard drives or the Internet though services like Flikr, YouTube, Podbeam, Blogger, Twitter, and so on.

Now we starting to move beyond recording just moments in times (i.e. snapshots) and instead capturing it all!

The Futurist (July-August 2011) reports that people are discovering things like Lifelogging--where through cameras, recording devices, and storage media, they record virtually "every instant of their lives." We are nearing at a time, when this is becoming "not only feasible, but possibly even appealing" to the masses.

By recording the events of our life--whether in blogs, photos, audio or video recordings--and combining this with advanced search tools, lifelogging "could provide us with the equivalent of near total recall."

Perhaps the ability to capture more and more of our lives digitally will make it unnecessary in the future to sit and memorize so many useful and useless facts and information.

We don't have to remember everything in our heads, we just need to know how to access the information when we need it.

Learning does not have to be about memorizing but rather can be about critical thinking, and being an expert does not have to be about what you have memorized, as much as your experience and ability to think through problems and find solutions.

(Photo Source: here)

Share/Save/Bookmark

July 27, 2011

Cloud Computing Presentation by Andy Blumenthal


This was a presentation I gave on Cloud Computing in February 2011 at the Technology Council of Maryland.

Hope you Enjoy!

Share/Save/Bookmark

July 24, 2011

How Do You Like Those Apples?

Apple

A new proposed method for determining Cost of Living Adjustments (COLA) for people receiving Social Security and federal and military retiree pensions is called the Chained Consumer Price Index (CPI).

The Federal Times (18 July 2011) reports that "proposed COLA changes would mean smaller annuities for retirees."

Essentially, the Chained CPI doesn't just look at the change in prices for "market basket" of goods, but it "takes into account...the fact that most consumers change their buying habits when prices go up."

What this means in a simple example (exaggerated for effect) is that:

If the price of an Apple goes up from $1 to $2 instead of COLA being adjusted so that retirees get $2 for the apple, we give them instead maybe $1.25, since we ASSUME that because the price of apples went up "people are likely to buy fewer apples or switch to a cheaper fruit."

Does that sound right from your shopping experience?

Are you going to buy fewer apples or are they sort of a necessity? Further, if the price of apples goes up, is it not likely that the price of other common fruits will go up in an inflationary environment as well.

This proposal which is estimated "to save $300 billion in its first decade" sounds like quite the fuzzy economics indeed.

So how do you like those apples?

(Source Picture: here)

Share/Save/Bookmark

SIMON Says Open


Discovery Channel has a series called Future Weapons.
This is part 1 from Israel and Richard (Mack) Mackowicz, a former Navy SEAL show us "The SIMON."
SIMON is a high-tech, advanced rifle grenade for breaching virtually any door in hostile environments.
It is made by Rafael, one of the largest and most innovative Israeli arms manufacturers.
SIMON is in use by both U.S. and Israel armed forces.
Essentially, a bullet-trap slides over the muzzle of a conventional assault rifle like an M-16.
A regular bullet propels a grenade up to 30 yards into a door, and the blast wave from the detonation breaches the door and any locking mechanisms--with minimum collateral damage and keeping troops out of harms way.
Breaching doors in urban warfare is one of the most dangerous tasks in any mission as troops may be walking into anything from the spray of gunfire to booby traps.
Well as Mack says: "SIMON says open door;" It is an "instantaneous key to any door."
What I like about SIMON is the combination of its simplicity and effectiveness.
On one hand, it works with conventional rifles and bullets and is light and compact to carry. It's as simple as slide, aim, and shoot--and the door is breached for troops to enter and either rescue hostages or get the bad guy.
With whatever technology we are building--whether computers or weapons--they need to be user-centric and mission focused.
Israel has a history of innovation--everything from defense to medicine and making the desert bloom--and I think this has to do with that their survival is constantly imperiled.
The lesson is that we ought to recognize the dangers out there and respond to them with immediacy and vigor, as if our lives depended on it--because in many cases, they really do.

Share/Save/Bookmark

July 23, 2011

Getting To Swift Cyber Justice

Destroyed_computer

The first Department of Defense Strategy for Operating in Cyberspace is out (July 2011).

Of course, like the plans that came before (e.g. Cyberspace Policy Review), it emphasizes the imperative for cyberspace protection. Some highlights:

  • "DoD is particularly concerned with three areas of potential adversarial activity: theft or exploitation of data; disruption or denial or service of access or service..., and the destructive action--including corruption, manipulation, or direct activity that threatens to destroy or degrade network or connected systems."
  • "Cyber threats to U.S. national security go well beyond military targets and affects all aspects of society. Hackers and foreign governments are increasingly able to launch sophisticated intrusions into the networks and systems that control civilian infrastructure."
  • "Every year, an amount of intellectual property larger than that contained in the Library of Congress is stolen from networks maintained by U.S. businesses, universities, and government departments and agencies."

The strategies for cyberspace protection in the DoD plan include treating cyberspace as an operational domain; innovation; partnership; and so on. But we need to leverage our strengths even more.

As the Wall Street Journal pointed out on 15 July 2011: "The plan as described fails to engage on the hard issues, such as offense and attribution." If we can't even identify who's attacking us, and fight back with precision, then we're flailing.

Some may express the concern that we would have all-out war by attacking those who attack us. However, what is the alternative besides confronting our aggressors?

The concept of operations is straightforward: Any computer device that is used to attack us, would immediately be blocked and countered with equivalent or greater force and taken out of play.

This would mean that we are able to get past cyber-bot armies to the root computers that are initiating and controlling them, and dealing with them decisively. This would hold regardless of the source of the attack--individual or nation-state.

The DoD plan acknowledges our own unpreparedness: "Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity."

As in the Cold War, there must be no doubt with Cyber Warfare (as with nuclear) of our ability to inflict devastating second-strike or preemptive attacks with deadly precision.

Until we have unambiguous hunter-killer capability to identify and locate perpetrators of cyber attacks against us and the ability to impose swift justice, we are at the mercy of our aggressors.

We can only have peace in cyberspace when we have the strength to stand up and defend it.

Now we must move with cyber speed to build this capability and stand ready to execute our defenses.

Admiral Mike Mullen was quoted this week (18 July 2011) in Federal Times as saying: "The single biggest existential threat that's out there is cyber...It's a space that has no boundaries. It has no rules."

We must become even better--much better!

(Source Photo: here)

Share/Save/Bookmark