Your SlideShare is downloading. ×
0
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Converging Communications: The Perfect Storm
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Converging Communications: The Perfect Storm

1,031

Published on

Keynote presentation for the NATO 24/7 Defining a Digital Strategy Seminar, Brussels, Belgium, March 2011

Keynote presentation for the NATO 24/7 Defining a Digital Strategy Seminar, Brussels, Belgium, March 2011

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,031
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Converging Technologies: The Perfect Storm Joanne Jacobs Social Media Consultant NATO 24/7: Defining a Digital Media Strategy 1 March 2011, Belgium Image source: http://www.flickr.com/photos/ooocha/2705333658 /
  • 2. Scope of the presentation <ul><li>Convergence: variations and scope </li></ul><ul><li>State of the Network: technologies, infrastructure and content trends </li></ul><ul><li>Capitalization on emergent technologies </li></ul><ul><li>Strategy development </li></ul><ul><li>Questions </li></ul>
  • 3. WHAT’S CONVERGING?
  • 4. Convergence <ul><li>Wired vs wireless </li></ul><ul><li>Private vs public </li></ul><ul><li>Entertainment vs information </li></ul><ul><li>Government controlled vs control resistant </li></ul><ul><li>Individual vs collaborative media consumption </li></ul><ul><li>Unique media product vs multiple media product consumption </li></ul>Image source: http://www.flickr.com/photos/pagedooley/3032068934/
  • 5. Wired v Wireless Image source: http://www.flickr.com/photos/thristian/141645528/ Image source: http://www.flickr.com/photos/garryknight/4844271836/
  • 6. Private v Public TRADITIONALLY PUBLIC OR PRIVATE MONOPOLY TRADITIONAL MIX OF PUBLIC AND PRIVATE TRADITIONALLY PRIVATE PRIVATISED & REGULATED INCREASING PAY PER VIEW CONTENT INCREASINGLY CONCENTRATED
  • 7. Entertainment v Information Image source: http://www.flickr.com/photos/el3enawe/328141697/ Image source: http://www.flickr.com/photos/kevin-prichard/2562090457 /
  • 8. Govt Control v Control Resistance Image source: Wikimedia Commons
  • 9. Individual v Collaboration Image source: http://www.flickr.com/photos/meddygarnet/4182588486/ Image source: http://www.flickr.com/photos/makelessnoise/2827958609/
  • 10. Focused view v Multitasking Image source: http://www.flickr.com/photos/johannesfreund/2320330661/ Image source: http://www.flickr.com/photos/rhodes/2591964489/
  • 11. Convergence: Implications <ul><li>Increasing oligopolisation of communications and content industries </li></ul><ul><li>Decreasing means of state or diplomatic control </li></ul><ul><li>Increasing appetite for variety and portability of content consumption </li></ul><ul><li>Rise of social media for business and personal communication </li></ul>Image source: http://www.flickr.com/photos/stvheld/4463862500/
  • 12. STATE OF THE NETWORK
  • 13. State of the Network: Users <ul><li>1.2 billion internet users in the world at 30 June 2010 – 28.7% of world population ( Internet World Stats ) </li></ul><ul><li>22% of all time spent online is in social networks ( Nielsen ) </li></ul><ul><li>Fastest growing user group of social media are seniors ( Pew Internet ) </li></ul><ul><li>Facebook most visited site online in 2010 ( Experian Hitwise ) </li></ul>Image source: http://www.flickr.com/photos/liebedich/3679711527/
  • 14. State of the Blogosphere SOURCE: Technorati State of the Blogosphere Report, November 2010 http://technorati.com/blogging/article/state-of-the-blogosphere-2010-introduction/
  • 15. State of the Twittersphere SOURCE: Twitter stats for 2010, Sysomos: http://www.sysomos.com/insidetwitter/twitter-stats-2010/
  • 16. Facebook by country SOURCE: Top countries on Facebook, August 2010: http://royal.pingdom.com/2010/08/12/the-top-countries-on-facebook-chart/
  • 17. Facebook as a country SOURCE: Brian Solis, Facebook Connects 500 Million people, July 2010 http://www.briansolis.com/2010/07/facebook-connects-500-million-people-defining-a-new-era-of-digital-society /
  • 18. State of the Network: Users (Mobile) <ul><li>Mobile social networking has grown at least 10% globally in past year ( TNS Worldwide , Comscore ) </li></ul><ul><li>80% of western world and 20% of developing world will have smartphones by 2014 ( Gartner ) </li></ul><ul><li>Social media to become more popular use of mobile than voice and SMS by 2015 ( mobileSQUARED ) </li></ul><ul><li>Mobile app store revenues will hit US$15billion in 2011 (Gartner via Techcrunch ) </li></ul>
  • 19. State of the Network: Infrastructure <ul><li>10 times mobile network bandwidth increase for 2011 ( IDC ) </li></ul><ul><li>SONET/Synchronous Digital Hierarchy technology with virtual concatenation (VCAT) and link capacity adjustment (LCAS) as standard communications protocol for wired networks (replacing PDH) </li></ul><ul><li>Satellite technology increasingly being used when wired and mobile networks disrupted (Eg: Iran , Egypt ) </li></ul>Image source: http://www.flickr.com/photos/mrpbps/5225685355/
  • 20. Smartphone adoption SOURCE: ComScore Mobile Year in Review 2010 http://www.comscore.com/Press_Events/Presentations_Whitepapers/2011/2010_Mobile_Year_in_Review
  • 21. Egypt internet access SOURCE: Arbor Networks tracking of Egypt internet traffic, January 27, 2011: http://farm6.static.flickr.com/5291/5395027368_7d97b74c0b_b.jpg
  • 22. Satellite infrastructure <ul><li>Satellite internet can bypass government controls on internet access </li></ul><ul><li>Variation 1: portable satellite internet (modem based) </li></ul><ul><ul><li>EG: INMARSAT’s BGAN </li></ul></ul><ul><ul><li>High cost investment and connection charges (av 256K download) </li></ul></ul><ul><li>Variation 2: satellite phone internet access </li></ul><ul><ul><li>EG: Iridium </li></ul></ul><ul><ul><li>Slow connection (av. 9K download, @ $5/Mb) </li></ul></ul><ul><li>Currently >2000 satellites orbiting planet of which at least 500 operational. </li></ul>Image source: http://www.flickr.com/photos/watchsmart/2058892578/
  • 23. State of the Network: Security <ul><li>CONCERN: Approaching ubiquitous wireless access </li></ul><ul><li>CONCERN: Low uptake of security software on mobile and networked entertainment devices </li></ul><ul><li>IMPROVED: Storage and backups </li></ul><ul><li>IMPROVED: Tracking and data accuracy </li></ul>Image source: http://www.flickr.com/photos/mrpbps/5226283926/
  • 24. State of the Network: Content <ul><li>Content being created for multiple access channels </li></ul><ul><li>Social media being used for immediacy or as an archive </li></ul><ul><li>Increasing opportunity to share content creation and indexing with public/consumers </li></ul><ul><li>Traditional content sources resistant to shared publishing </li></ul>Image source: http://www.flickr.com/photos/springfieldhomer/4643181526/
  • 25. EMERGENT TECHNOLOGIES
  • 26. Emergent Technologies <ul><li>Mobile phone based augmented reality </li></ul><ul><li>Geolocation and location based services </li></ul><ul><li>3D, immersive environments and ‘gamification’ </li></ul><ul><li>Real time services (translation, content access and sharing, reputation assessment) </li></ul><ul><li>Anonymizing architecture and private networks </li></ul>Image source: http://www.flickr.com/photos/neilspicys/2349764000/
  • 27. Researching Emergent Tech <ul><li>Online media: Slashdot, Mashable, Read Write Web, Boing Boing, Gizmodo, Engadget </li></ul><ul><li>Social Bookmarks: Digg (Technology), Reddit, Delicious, Stumbleupon keyword searches </li></ul><ul><li>Social media monitoring (see over) </li></ul>Image source: http://www.flickr.com/photos/danrandom/97980185/
  • 28. Social media monitoring <ul><li>Free keyword monitoring tools: </li></ul><ul><ul><li>Socialoomph </li></ul></ul><ul><ul><li>Blogpulse </li></ul></ul><ul><ul><li>Tinker </li></ul></ul><ul><ul><li>Surchur </li></ul></ul><ul><ul><li>Keotag </li></ul></ul><ul><ul><li>Boardtracker </li></ul></ul><ul><ul><li>Socialmention </li></ul></ul><ul><ul><li>Research.ly </li></ul></ul><ul><ul><li>… many more </li></ul></ul>Image source: http://commons.wikimedia.org/wiki/File:Social_Media_optimization.jpg
  • 29. User/list monitoring <ul><li>Users often as, or more reliable than press and published sources </li></ul><ul><li>Blog search </li></ul><ul><li>Twitter list search </li></ul><ul><li>Twitter user search </li></ul><ul><li>RSS feeds from identified useful sources </li></ul><ul><li>REVIEW VALUE OFTEN </li></ul>Image source: http://commons.wikimedia.org/wiki/File:Vacker-i-storm.jpg
  • 30. Evaluating Technologies <ul><li>Need to consider: </li></ul><ul><ul><li>Opportunities, not practice </li></ul></ul><ul><ul><li>Listening, not speaking </li></ul></ul><ul><ul><li>Green light, not red light regulation </li></ul></ul><ul><ul><li>Integration with current practice in content consumption/application adoption </li></ul></ul><ul><ul><li>Bandwidth consumption and redundant systems </li></ul></ul><ul><ul><li>Price AND cost of use </li></ul></ul>Image source: http:// commons.wikimedia.org/wiki/File:Pulse_evaluation.JPG
  • 31. Capitalizing on Emergent Tech <ul><li>Rise of social technologies has provided useful market research platform </li></ul><ul><li>Users willing to offer time to test/work with data </li></ul><ul><li>Mobile access highest adoption growth potential throughout the world </li></ul><ul><li>Anonymizing technologies should be considered in addition to data encryption for security. </li></ul>Image source: http://www.flickr.com/photos/hulagway/4010502408/
  • 32. COMMUNICATING DIPLOMACY
  • 33. Public Service Communication Needs <ul><li>Ensuring access </li></ul><ul><li>Intuitive information indexing </li></ul><ul><li>Regular updates </li></ul><ul><li>Listening for questions </li></ul><ul><li>Responding to questions in a timely fashion </li></ul><ul><li>Intelligence gathering and interpretation </li></ul>Image source: http:// commons.wikimedia.org/wiki/File:Public_service.jpg
  • 34. Crisis Management <ul><li>Mobile and social technologies uniquely suited to crisis management </li></ul><ul><li>Social media networks can handle high number of server requests </li></ul><ul><li>Mobile technologies allow fast evidential sharing </li></ul><ul><li>Mirroring prevents wholescale shutdown </li></ul>Image source: http://commons.wikimedia.org/wiki/File:NATO_humanitarian_meals.jpg
  • 35. Crisis case studies (1) <ul><li>CASE 1: Libya </li></ul><ul><ul><li>Full shut down of internet </li></ul></ul><ul><ul><li>Google Speak2Tweet </li></ul></ul><ul><ul><li>Dial-up modem access </li></ul></ul><ul><ul><li>Satellite connectivity </li></ul></ul><ul><ul><li>Direct phone conversations from hospitals to mainstream media </li></ul></ul>
  • 36. Crisis case studies (2) <ul><li>CASE 2: Cyclone Yasi, Brisbane Floods </li></ul><ul><ul><li>Widespread power interruptions </li></ul></ul><ul><ul><li>Mobile phones most common means of information access/ dissemination </li></ul></ul><ul><ul><li>Qld govt site unable to handle requests to site – reverts to twitter </li></ul></ul><ul><ul><li>Qld Police takes over and uses Twitter integrated with Facebook for updates </li></ul></ul>
  • 37. Crisis case studies (3) <ul><li>CASE 3: Wikileaks </li></ul><ul><ul><li>Shut down of domain resulted in reinstatement of site in under 12 hours </li></ul></ul><ul><ul><li>Mirroring of (encrypted) content to over 1000 different sites </li></ul></ul><ul><ul><li>Networks of volunteer supporters/donors </li></ul></ul><ul><ul><li>Mainstream media supported crisis management </li></ul></ul>
  • 38. Network, Communications Fragility <ul><li>Digital divide still exists but is closing </li></ul><ul><li>Communications technology gateways still vulnerable </li></ul><ul><li>Unified, scalable and accessible protocols for communications providing more robust network </li></ul><ul><li>NATO have the opportunity to invest in robust infrastructure in more fragile areas to ensure ongoing success of missions </li></ul>Image source: http://www.flickr.com/photos/revdave/347411015/
  • 39. Defining a Digital Strategy <ul><li>Iterative approach more useful than 6-12 month diffusion strategy </li></ul><ul><li>Listening post strategy more useful than broadcast strategy </li></ul><ul><li>Access strategy more useful than content restriction strategy </li></ul><ul><li>Existing infrastructure more useful than building in-house networks/content streams </li></ul><ul><li>Minimum time workload requirement with emergent technologies more useful than maximum time or recommended total time </li></ul>Image source: http://www.flickr.com/photos/29968788@N00/4735595075 /
  • 40. Questions? <ul><li>Joanne Jacobs </li></ul><ul><li>Social Media Expert Consultant </li></ul><ul><li>Email: joanne@joannejacobs.net </li></ul><ul><li>Blog: http://joannejacobs.net/ </li></ul><ul><li>Twitter: joannejacobs </li></ul><ul><li>Skype: bgsbjj </li></ul><ul><li>Skype-in: (+44) 0208 144 9348 </li></ul><ul><li>Mob: (+44) 07948 318 298 </li></ul>

×