SlideShare a Scribd company logo
1 of 33
Download to read offline
Part II Communication, Cloud, Video and Data
Lisa Martinez 408.638.9016 @ 2014 Copyright Wicked
 A – We must truly understand the limitations and approaches
people use to push some new idea.
◦ Innovation is rarely invention, as an example we can review Big Data
 Data>Information>Knowledge>Wisdom
 B – Delivery in a distributed architecture federated and
promoted by Students
◦ Communication Strategy
 C - We must ensure we focus on innovation in an objective
manner.
◦ Objective Research through student led engagements in a shared
service model
WICKED 2014@copyright Lisa Martinez 408.638.9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
There are industry standard being
overlooked.
WICKED 2014@copyright Lisa Martinez 408.638.9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
Between end points – service provider
Beyond end points – within a public cloud
Within the private clouds
Before Changes
 Mega Trunks
 Super Trunks
 Fiber Optic
 Fiber Channels
 Analog
 IP
 Wireless
◦ Drones
 Broadband
◦ Telecommunications
◦ Security
◦ Machine to Machine
WICKED 2014@copyright Lisa Martinez 408.638.9016
Device
Voice
Video
Data/Applications
Unreliable aspirations to encrypt data and we must assume we
are not finding proven video encryption providers.
• Isolation and containment are simply smarter
IG Layer
Access
Control Links
(ACL)
inbound and
outbound
connectivity
model
isolates
threats into
three
segments
while making
each gradient
layer less
accessible
WICKED 2014@copyright Lisa Martinez 408.638.9016
Applications which are not dropping
software on the device.
Accessible as an on Premise, Hybrid or
fully Hosted Cloud solution.
WICKED 2014@copyright Lisa Martinez 408.638.9016
 3rd party solutions with remote management features
◦ Video Conferencing or Telepresence
◦ Most meeting solutions – Maestro, Skype, Google Hangouts and
Webex as examples
 3rd party cloud services
◦ SFDC offers a CRM capability – many features are hosted, co-located
or on premise
◦ ERP in a cloud
◦ Intuit offers many
◦ Cisco offers many
 Developed in house or SDN and Gaming are all described in
the context of Big Data.
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Understanding the common variables with an application of search
tags to enable multi-generational and cross-border association of
the shared for a minimum viable system model.
◦ Experience based learning in a model designed for rapid expansion and
local customization.
◦ Teaching students with hands on learning using open source solutions from
the wisdom of the most recognized experts in these various fields.
◦ Understanding the semantics and stage of an existing practice does not
need its own standard.
 In fact, using the approach will cause a train wreck.
 Big data offers an example of the subject
WICKED 2014@copyright Lisa Martinez 408.638.9016
Community
Outreach
Social Media as a
Channel
Supported
By
Mentored
By
Zero to
Five
K-5th 6-8th 9-12th 13-20th Workforce Seniors
1. Design Vision and Strategy
WICKED 2014@copyright Lisa Martinez 408.638.9016
Systems for People in IDENTITY minimum viable system
Students
Employee Supplier Customer
MC.1. Party Management Capability
MC.2. Offer Management Capability
BP.1. Design Strategy and Vision
MC.3. Financial Management Capability
408.638.9016 Lisa Martinez 2014 @ Copyright WICKED Design Solutions
Offer
IaaS
PaaS
SaaS
Content Id
no private
information
public life
Private
life
economic
life
social life
family life
health
and safety
life
408.638.9016 Lisa Martinez 2014 @ Copyright WICKED Design Solutions
Type 2
diabetic
Physician
A manager in
retail
A major
retailer
IGL6 - 7
Public
IGL1-3
Private
IGL4-5
Private
 From offices around the world, InfoComm serves its
members and the industry through:
◦ Education, including technical and business courses, in the classroom and
online
◦ Resources, such as AV standards, thought pieces, and market research
◦ Events, including local roundtables and international trade shows
 Established in 1939, InfoComm has more than 5,000 members,
including manufacturers, systems integrators, dealers and distributors,
independent consultants, programmers, rental and staging companies,
end-users and multimedia professionals from more than 80 countries.
 As an ANSI Accredited Standards Development Organization (SDO),
InfoComm offers the Certified Technology Specialist™ (CTS®) program
— the only audiovisual certification ANSI accredited under the
International Standard ISO/IEC 17024.
Cable IP4/IP6 IP address 16.21.165.01
 Our view into our television
was once a one way view
 Our view into the world was
once a one way view
400 lines of
resolution
1100 lines of
resolution
May 2014 Report
to the President
Restores Civil
Liberties with
Virtual Life
WICKED 2014@copyright Lisa Martinez 408.638.9016
Before Now video is sent and received
May 2014 Report
to the President
Restores Civil
Liberties with
Virtual Life
WICKED 2014@copyright Lisa Martinez 408.638.9016
Personal Investment Carrier Service Contract
 I choose a carrier and I purchase the device with an understanding
(a contractual agreement) between me and the mobile carrier
Any Cell phone service
provider
My Device
Carrier supplies a service to
use my device
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Within my home, I am still private and protected. Right?
“No”, but you can trust us.
May 2014 Report
to the President
Restores Civil
Liberties with
Virtual Life
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Let students work through the details of the new technology
innovations
◦ Have a limited group of stakeholders “wisdom” reviews and advisors
◦ The report to the president did not appear to get into the subject
 The opportunity for students to protect themselves, although the
potential is high for teachers and police to force students to turn
off the devices...
◦ Attendance in class – an ideal way to check in
◦ Bullying Prevention – Students are far less likely to be cruel
◦ Replay experiences – how many times have your notes been complete.
◦ Participate in Experience Based projects – working with at risk populations
◦ Safety – a way for your parents to find you at all times
◦ Safety – a way to replay your abduction or human trafficking kidnapping
 A way to prove you told the truth when someone doesn’t trust you.
WICKED 2014@copyright Lisa Martinez 408.638.9016
Records
the view
you see
Records the
way you
respond to
what you see.
Google Glasses
Wearable Mobile Technology
Presents
Gaming as
an option
virtual or
augmented
reality
Records the
way you
respond to
what you see.
Content and Logging Sensor Data
Sensor Data/Logging/Metadata or Raw Data from Video, Audio and Web Activity or Texting
WICKED 2014@copyright Lisa Martinez 408.638.9016
Many of us don’t realize data is the raw
or technical form of all methods of
communication
Data is no longer trustworthy Nor do the experts get invited
 Data is information or just data
 Data is knowledge or just data
 Data is Wisdom or just data it is
not evidence nor intelligence
 Data manipulated outside the
process is just data outside the
process (fusion)
 Data connected outside the
process is just data connected
(fusion)
 Data tools and technology behave
without controls supplied in 3rd
party applications.
 Data is not governed nor does it
have any value when people who
are not involved in the original
format manipulate raw data.
◦ No one is expected to change, alter
or manipulate nor does massaging
ever pass ethical standards
 Data can be harmful if connected
with other data, as it can easily be
mis-represented, as facts.
(Fusion)
 In the case of big data we might
ask ourselves, who was involved
in and did the experts get invited?
WICKED 2014@copyright Lisa Martinez 408.638.9016
Data
Raw Format
Applications
(information
and
Knowledge)
Content
Knowledge
(Content and
Information)
Information
(Documents)
Records
Display
User Transactional
User
Management
user
Company LDAP
or AD account
X X –Restricted
group see
Sarbanes Oxley
rules
Network IP and
Host
X X
Secure access
certificate or Key
X X
Monitor and
Design
Key Controls
SOD
404 Assurances
Any financial
Management,
based on roles
based access
Any create, read,
update or archive
Financial
Management
Quality
Management
Employee
Performance
All request are
pre-authorized
and validated
All approvals are
approved or
delegated to a
person with same
or greater
authority.
Asset Device Any organization
or agency
supplied
Any organization
or agency
supplied
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Two dimensions that “do not” integrate within many organizations
◦ Not in recognized as a Technology domain, Business Process nor EA
◦ Not in the Business Intelligence and EDW are not always integrated
◦ Not in the Master Data with the BI or Technology
 An application qualifies for SDLC change control threat analysis
every time a “get” or “create” command is used in an API (games,
data only subscriptions, legacy applications, custom in house
applications, BI Developed Applications, any minor change with
such commands = application).
 Audio, Images and Video are now part of the Big Data size big.
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Assume the conceptual model will converge through to data
and potentially be returned or converted to another form.
◦ In these materials we assume data represents content in many forms
when presented as an application or video or game.
◦ The point and assumption must be users are unaware of the technical
details.
◦ The following table suggest a person will potentially never understand
and not need to understanding that the four domains are also data.
View(s) Organization
or Agency
Content Information Knowledge Records
Person as
an individual
No Video or Audio
or digital data in
an application
or other form of
presentation
Video or Audio or
digital data in an
application or
other form of
presentation
Video or Audio
or digital data in
an application
or other form of
presentation
An official recording of an
event or transaction which
requires validation and
reporting to regulatory
authorities.
Person as
an Agent
Yes Video or Audio
or digital data in
an application
or other form of
presentation
Video or Audio or
digital data in an
application or
other form of
presentation
Video or Audio
or digital data in
an application
or other form of
presentation
An official recording of an
event or transaction which
requires validation and
reporting to regulatory
authorities.
WICKED 2014@copyright Lisa Martinez 408.638.9016
 Adoption of a Service Management Model for Business Services
enables focus on the business which doesn’t require Technical Changes
◦ Expands upon an IT Service Management model with human wellness to crisis
capabilities.
◦ Factors the many forms of digital information to aid in the wellness of citizens or
consumers for the Public and Private sectors.
◦ Low effort to adoption-builds upon IT in most organizations ITIL ITSM has been
adopted and adds the person centered design concept.
◦ Common method to prevent and protect versus cause and effect
 Benefit “outcomes” effectively measure Privacy and Security
 Benefit “outcomes” effectively plan investments according to a baseline risk
 Benefit “outcomes” effectively prepare, plan, mitigate, recover and restore in crisis
situations
 Benefit “outcomes” effectively supplies an expectation for measuring risk for citizens
WICKED 2014@copyright Lisa Martinez 408.638.9016
 A single woman may take comfort in having a friendly eye watching over
her.
◦ The only way to be comforted in such situations would be if the police commit to
responding if trouble is detected.
 A woman would be far less likely to change in her room if she had a safe
place to undress.
 How friendly can a camera be if you were married or sexually active?
◦ You’d have to know and be able to control the device.
◦ Many camera’s appear to be off, they are actually on.
◦ Many audio conversations are recorded and distributed
 Women are far more likely to be adversely effected by an intimate
encounter if the video were ever released.
◦ Catalog and strong metadata management will absolutely enable retrieval of
images.
WICKED 2014@copyright Lisa Martinez 408.638.9016
 While technology exist to promote intelligence for crime fighting, or
fusion which results in false positives without having all the facts.
 A person may have had their identity stolen once or twice in their
lifetime.
◦ Instead of asking a person the person immediately is excluded from a potential
role in a project or company.
 What if they have a common name and when you Google the name,
suddenly mug shots are the first images you see?
◦ What if your name was so common and mysteriously was the name someone
arrested for fraud in nearly every state?
 Would you consider the candidate if you had to dig into the person’s life and rule out
so many criminals?
 If you also were married more than twice, you might have a reason for
name changes.
 The number of times a person’s been married, may exclude a woman but you’d never
know if it was a man.
WICKED 2014@copyright Lisa Martinez 408.638.9016

More Related Content

What's hot

DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assuranceNur Shiqim Chok
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the EnterpriseDaniel Miessler
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
Huawei ict insights
Huawei ict insightsHuawei ict insights
Huawei ict insightsVU
 
The Future Of Information Technology: Welcome… to the Digital Age
The Future Of Information Technology: Welcome…to the Digital AgeThe Future Of Information Technology: Welcome…to the Digital Age
The Future Of Information Technology: Welcome… to the Digital AgeCisco Canada
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...Real-Time Innovations (RTI)
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - ciscoMITEF México
 
Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Ivanti
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingIvanti
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesVeridium
 
SecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_CapstoneSecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_CapstoneCecil Sellars
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 

What's hot (20)

DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Practical IoT Security in the Enterprise
Practical IoT Security in the EnterprisePractical IoT Security in the Enterprise
Practical IoT Security in the Enterprise
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
Huawei ict insights
Huawei ict insightsHuawei ict insights
Huawei ict insights
 
The Future Of Information Technology: Welcome… to the Digital Age
The Future Of Information Technology: Welcome…to the Digital AgeThe Future Of Information Technology: Welcome…to the Digital Age
The Future Of Information Technology: Welcome… to the Digital Age
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme! Noi siamo Ivanti: più forti insieme!
Noi siamo Ivanti: più forti insieme!
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial Services
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
SecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_CapstoneSecuringAWirelessNetwork_Capstone
SecuringAWirelessNetwork_Capstone
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 

Viewers also liked (8)

1. design strategy and vision for crisis management
1. design strategy and vision for crisis management1. design strategy and vision for crisis management
1. design strategy and vision for crisis management
 
All Problem Solution Astrology Tantra Black Magic Vashikaran Remedy Specialist
All Problem Solution Astrology Tantra Black Magic Vashikaran Remedy SpecialistAll Problem Solution Astrology Tantra Black Magic Vashikaran Remedy Specialist
All Problem Solution Astrology Tantra Black Magic Vashikaran Remedy Specialist
 
Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...
Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...
Kamakhya Temple Ameti or Tantric Fertility Festival Mela Parv Ambuvachi Ambub...
 
Açiliş lider kadın eğitimi sunum
Açiliş lider kadın eğitimi sunumAçiliş lider kadın eğitimi sunum
Açiliş lider kadın eğitimi sunum
 
Scholar
ScholarScholar
Scholar
 
Astrology Tantra Solution Remedies
Astrology Tantra Solution RemediesAstrology Tantra Solution Remedies
Astrology Tantra Solution Remedies
 
4. Five Capability
4. Five Capability 4. Five Capability
4. Five Capability
 
Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )
Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )
Great Important books on top secret topics by dr.rupnathji ( dr.rupak nath )
 

Similar to Part II Communication, Cloud, Video and Data Insights

Stefano Testas | CIsco | Big Data
Stefano Testas | CIsco | Big DataStefano Testas | CIsco | Big Data
Stefano Testas | CIsco | Big DataSmash Tech
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingInside Analysis
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11captsbtyagi
 
Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalMarc Musgrove
 
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingAnalyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingDenodo
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne AFCEA International
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
 
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the ITCIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the ITDenodo
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practicecschlein
 
ScienceSoft Corporate Profile
ScienceSoft Corporate ProfileScienceSoft Corporate Profile
ScienceSoft Corporate ProfileSergei Rabotai
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 
The Cisco Intranet Case Study by Todd West
The Cisco Intranet Case Study by Todd WestThe Cisco Intranet Case Study by Todd West
The Cisco Intranet Case Study by Todd WestPrescient Digital Media
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibilitydianadvo
 
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Flexera
 
Internet of Everything for Marketers
Internet of Everything for MarketersInternet of Everything for Marketers
Internet of Everything for MarketersRashish Pandey
 
MatterPoint Overview
MatterPoint OverviewMatterPoint Overview
MatterPoint OverviewBob Rivas
 

Similar to Part II Communication, Cloud, Video and Data Insights (20)

Stefano Testas | CIsco | Big Data
Stefano Testas | CIsco | Big DataStefano Testas | CIsco | Big Data
Stefano Testas | CIsco | Big Data
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of Everything
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11
 
Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 final
 
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision MakingAnalyst Webinar: Best Practices In Enabling Data-Driven Decision Making
Analyst Webinar: Best Practices In Enabling Data-Driven Decision Making
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the ITCIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the IT
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practice
 
HK IT Security Consultant Profile
HK IT Security Consultant ProfileHK IT Security Consultant Profile
HK IT Security Consultant Profile
 
ScienceSoft Corporate Profile
ScienceSoft Corporate ProfileScienceSoft Corporate Profile
ScienceSoft Corporate Profile
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
The Cisco Intranet Case Study by Todd West
The Cisco Intranet Case Study by Todd WestThe Cisco Intranet Case Study by Todd West
The Cisco Intranet Case Study by Todd West
 
Making the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data VisibilityMaking the Case for Stronger Endpoint Data Visibility
Making the Case for Stronger Endpoint Data Visibility
 
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
 
Internet of Everything for Marketers
Internet of Everything for MarketersInternet of Everything for Marketers
Internet of Everything for Marketers
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
MatterPoint Overview
MatterPoint OverviewMatterPoint Overview
MatterPoint Overview
 

More from MrsAlways RigHt

Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudMrsAlways RigHt
 
Human development cost of quality in a quantified world
Human development cost of quality in a quantified worldHuman development cost of quality in a quantified world
Human development cost of quality in a quantified worldMrsAlways RigHt
 
Setting up an International Innovation Incubator
Setting up an International Innovation IncubatorSetting up an International Innovation Incubator
Setting up an International Innovation IncubatorMrsAlways RigHt
 
Bmsqms revisedwithchevrons
Bmsqms revisedwithchevronsBmsqms revisedwithchevrons
Bmsqms revisedwithchevronsMrsAlways RigHt
 
9. foundation ea to 2 use cases
9. foundation ea to 2 use cases9. foundation ea to 2 use cases
9. foundation ea to 2 use casesMrsAlways RigHt
 
5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisis5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisisMrsAlways RigHt
 
6. cloud offers hca edu doj
6. cloud offers hca edu doj6. cloud offers hca edu doj
6. cloud offers hca edu dojMrsAlways RigHt
 
3. Identity, Awareness and Design Patterns
3. Identity, Awareness and Design Patterns3. Identity, Awareness and Design Patterns
3. Identity, Awareness and Design PatternsMrsAlways RigHt
 
A system approach to cyber security
A system approach to cyber securityA system approach to cyber security
A system approach to cyber securityMrsAlways RigHt
 
Crisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmcCrisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmcMrsAlways RigHt
 
High risk populations with NIEM
High risk populations with NIEMHigh risk populations with NIEM
High risk populations with NIEMMrsAlways RigHt
 
Patterns within patterns in architecture v2
Patterns within patterns in architecture v2Patterns within patterns in architecture v2
Patterns within patterns in architecture v2MrsAlways RigHt
 
Standards for a blue ocean
Standards for a blue oceanStandards for a blue ocean
Standards for a blue oceanMrsAlways RigHt
 
A wicked problem with perceptions
A wicked problem with perceptionsA wicked problem with perceptions
A wicked problem with perceptionsMrsAlways RigHt
 
Assume entity types offer management capability
Assume entity types offer management capabilityAssume entity types offer management capability
Assume entity types offer management capabilityMrsAlways RigHt
 
Government ICT Process Benchmarking
Government ICT Process BenchmarkingGovernment ICT Process Benchmarking
Government ICT Process BenchmarkingMrsAlways RigHt
 

More from MrsAlways RigHt (20)

Enabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloudEnabling science, technology and innovation with per cloud
Enabling science, technology and innovation with per cloud
 
Human development cost of quality in a quantified world
Human development cost of quality in a quantified worldHuman development cost of quality in a quantified world
Human development cost of quality in a quantified world
 
Setting up an International Innovation Incubator
Setting up an International Innovation IncubatorSetting up an International Innovation Incubator
Setting up an International Innovation Incubator
 
Bmsqms revisedwithchevrons
Bmsqms revisedwithchevronsBmsqms revisedwithchevrons
Bmsqms revisedwithchevrons
 
9. foundation ea to 2 use cases
9. foundation ea to 2 use cases9. foundation ea to 2 use cases
9. foundation ea to 2 use cases
 
5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisis5. shared service business offers capacity and crisis
5. shared service business offers capacity and crisis
 
6. cloud offers hca edu doj
6. cloud offers hca edu doj6. cloud offers hca edu doj
6. cloud offers hca edu doj
 
3. Identity, Awareness and Design Patterns
3. Identity, Awareness and Design Patterns3. Identity, Awareness and Design Patterns
3. Identity, Awareness and Design Patterns
 
Socialmediadashboard
SocialmediadashboardSocialmediadashboard
Socialmediadashboard
 
A system approach to cyber security
A system approach to cyber securityA system approach to cyber security
A system approach to cyber security
 
Retail SWOT v.2
Retail SWOT v.2 Retail SWOT v.2
Retail SWOT v.2
 
Crisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmcCrisis prevention and readinessv2foundation pmc
Crisis prevention and readinessv2foundation pmc
 
Just wicked
Just wickedJust wicked
Just wicked
 
High risk populations with NIEM
High risk populations with NIEMHigh risk populations with NIEM
High risk populations with NIEM
 
Patterns within patterns in architecture v2
Patterns within patterns in architecture v2Patterns within patterns in architecture v2
Patterns within patterns in architecture v2
 
Standards for a blue ocean
Standards for a blue oceanStandards for a blue ocean
Standards for a blue ocean
 
A wicked problem with perceptions
A wicked problem with perceptionsA wicked problem with perceptions
A wicked problem with perceptions
 
Pcd gov v3
Pcd gov v3Pcd gov v3
Pcd gov v3
 
Assume entity types offer management capability
Assume entity types offer management capabilityAssume entity types offer management capability
Assume entity types offer management capability
 
Government ICT Process Benchmarking
Government ICT Process BenchmarkingGovernment ICT Process Benchmarking
Government ICT Process Benchmarking
 

Recently uploaded

How Technologies will change the relationship with Human Resources
How Technologies will change the relationship with Human ResourcesHow Technologies will change the relationship with Human Resources
How Technologies will change the relationship with Human ResourcesMassimo Canducci
 
Operations Management -- Sustainability and Supply Chain Management.pdf
Operations Management -- Sustainability and Supply Chain Management.pdfOperations Management -- Sustainability and Supply Chain Management.pdf
Operations Management -- Sustainability and Supply Chain Management.pdfcoolsnoopy1
 
Mind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and ThoughtsMind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and ThoughtsCIToolkit
 
Management 11th Edition - Chapter 13 - Managing Teams
Management 11th Edition - Chapter 13 - Managing TeamsManagement 11th Edition - Chapter 13 - Managing Teams
Management 11th Edition - Chapter 13 - Managing Teamsshakkardaddy
 
The Final Activity in Project Management
The Final Activity in Project ManagementThe Final Activity in Project Management
The Final Activity in Project ManagementCIToolkit
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsCIToolkit
 
Exploring Variable Relationships with Scatter Diagram Analysis
Exploring Variable Relationships with Scatter Diagram AnalysisExploring Variable Relationships with Scatter Diagram Analysis
Exploring Variable Relationships with Scatter Diagram AnalysisCIToolkit
 
From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentFrom Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentCIToolkit
 
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsDigital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsHannah Smith
 
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...CIToolkit
 
Adapting to Change: Using PEST Analysis for Better Decision-Making
Adapting to Change: Using PEST Analysis for Better Decision-MakingAdapting to Change: Using PEST Analysis for Better Decision-Making
Adapting to Change: Using PEST Analysis for Better Decision-MakingCIToolkit
 
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Giuseppe De Simone
 
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...Conny Dethloff
 
Management 11th Edition - Chapter 11 - Adaptive Organizational Design
Management 11th Edition - Chapter 11 - Adaptive Organizational DesignManagement 11th Edition - Chapter 11 - Adaptive Organizational Design
Management 11th Edition - Chapter 11 - Adaptive Organizational Designshakkardaddy
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionCIToolkit
 
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & EngineeringBoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & EngineeringBusiness of Software Conference
 
Choosing the best strategy qspm matrix.pptx
Choosing the best strategy qspm matrix.pptxChoosing the best strategy qspm matrix.pptx
Choosing the best strategy qspm matrix.pptxMadan Karki
 
The Role of Histograms in Exploring Data Insights
The Role of Histograms in Exploring Data InsightsThe Role of Histograms in Exploring Data Insights
The Role of Histograms in Exploring Data InsightsCIToolkit
 
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...Nagarjuna Reddy Aturi
 
The Role of Box Plots in Comparing Multiple Data Sets
The Role of Box Plots in Comparing Multiple Data SetsThe Role of Box Plots in Comparing Multiple Data Sets
The Role of Box Plots in Comparing Multiple Data SetsCIToolkit
 

Recently uploaded (20)

How Technologies will change the relationship with Human Resources
How Technologies will change the relationship with Human ResourcesHow Technologies will change the relationship with Human Resources
How Technologies will change the relationship with Human Resources
 
Operations Management -- Sustainability and Supply Chain Management.pdf
Operations Management -- Sustainability and Supply Chain Management.pdfOperations Management -- Sustainability and Supply Chain Management.pdf
Operations Management -- Sustainability and Supply Chain Management.pdf
 
Mind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and ThoughtsMind Mapping: A Visual Approach to Organize Ideas and Thoughts
Mind Mapping: A Visual Approach to Organize Ideas and Thoughts
 
Management 11th Edition - Chapter 13 - Managing Teams
Management 11th Edition - Chapter 13 - Managing TeamsManagement 11th Edition - Chapter 13 - Managing Teams
Management 11th Edition - Chapter 13 - Managing Teams
 
The Final Activity in Project Management
The Final Activity in Project ManagementThe Final Activity in Project Management
The Final Activity in Project Management
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
 
Exploring Variable Relationships with Scatter Diagram Analysis
Exploring Variable Relationships with Scatter Diagram AnalysisExploring Variable Relationships with Scatter Diagram Analysis
Exploring Variable Relationships with Scatter Diagram Analysis
 
From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light AssessmentFrom Red to Green: Enhancing Decision-Making with Traffic Light Assessment
From Red to Green: Enhancing Decision-Making with Traffic Light Assessment
 
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic TraitsDigital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
Digital PR Summit - Leadership Lessons: Myths, Mistakes, & Toxic Traits
 
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
 
Adapting to Change: Using PEST Analysis for Better Decision-Making
Adapting to Change: Using PEST Analysis for Better Decision-MakingAdapting to Change: Using PEST Analysis for Better Decision-Making
Adapting to Change: Using PEST Analysis for Better Decision-Making
 
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
 
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...
Better SAFe than sorry - Why scaled agile frameworks do not necessarily impro...
 
Management 11th Edition - Chapter 11 - Adaptive Organizational Design
Management 11th Edition - Chapter 11 - Adaptive Organizational DesignManagement 11th Edition - Chapter 11 - Adaptive Organizational Design
Management 11th Edition - Chapter 11 - Adaptive Organizational Design
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem Resolution
 
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & EngineeringBoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
BoSUSA23 | Chris Spiek & Justin Dickow | Autobooks Product & Engineering
 
Choosing the best strategy qspm matrix.pptx
Choosing the best strategy qspm matrix.pptxChoosing the best strategy qspm matrix.pptx
Choosing the best strategy qspm matrix.pptx
 
The Role of Histograms in Exploring Data Insights
The Role of Histograms in Exploring Data InsightsThe Role of Histograms in Exploring Data Insights
The Role of Histograms in Exploring Data Insights
 
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...
Advancing Enterprise Risk Management Practices- A Strategic Framework by Naga...
 
The Role of Box Plots in Comparing Multiple Data Sets
The Role of Box Plots in Comparing Multiple Data SetsThe Role of Box Plots in Comparing Multiple Data Sets
The Role of Box Plots in Comparing Multiple Data Sets
 

Part II Communication, Cloud, Video and Data Insights

  • 1. Part II Communication, Cloud, Video and Data Lisa Martinez 408.638.9016 @ 2014 Copyright Wicked
  • 2.  A – We must truly understand the limitations and approaches people use to push some new idea. ◦ Innovation is rarely invention, as an example we can review Big Data  Data>Information>Knowledge>Wisdom  B – Delivery in a distributed architecture federated and promoted by Students ◦ Communication Strategy  C - We must ensure we focus on innovation in an objective manner. ◦ Objective Research through student led engagements in a shared service model WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 3. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 4. There are industry standard being overlooked.
  • 5. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 6. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 7. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 8. Between end points – service provider Beyond end points – within a public cloud Within the private clouds
  • 9. Before Changes  Mega Trunks  Super Trunks  Fiber Optic  Fiber Channels  Analog  IP  Wireless ◦ Drones  Broadband ◦ Telecommunications ◦ Security ◦ Machine to Machine WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 10. Device Voice Video Data/Applications Unreliable aspirations to encrypt data and we must assume we are not finding proven video encryption providers. • Isolation and containment are simply smarter IG Layer Access Control Links (ACL) inbound and outbound connectivity model isolates threats into three segments while making each gradient layer less accessible WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 11. Applications which are not dropping software on the device. Accessible as an on Premise, Hybrid or fully Hosted Cloud solution. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 12.  3rd party solutions with remote management features ◦ Video Conferencing or Telepresence ◦ Most meeting solutions – Maestro, Skype, Google Hangouts and Webex as examples  3rd party cloud services ◦ SFDC offers a CRM capability – many features are hosted, co-located or on premise ◦ ERP in a cloud ◦ Intuit offers many ◦ Cisco offers many  Developed in house or SDN and Gaming are all described in the context of Big Data. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 13.  Understanding the common variables with an application of search tags to enable multi-generational and cross-border association of the shared for a minimum viable system model. ◦ Experience based learning in a model designed for rapid expansion and local customization. ◦ Teaching students with hands on learning using open source solutions from the wisdom of the most recognized experts in these various fields. ◦ Understanding the semantics and stage of an existing practice does not need its own standard.  In fact, using the approach will cause a train wreck.  Big data offers an example of the subject WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 14. Community Outreach Social Media as a Channel Supported By Mentored By Zero to Five K-5th 6-8th 9-12th 13-20th Workforce Seniors 1. Design Vision and Strategy WICKED 2014@copyright Lisa Martinez 408.638.9016 Systems for People in IDENTITY minimum viable system Students
  • 15. Employee Supplier Customer MC.1. Party Management Capability MC.2. Offer Management Capability BP.1. Design Strategy and Vision MC.3. Financial Management Capability 408.638.9016 Lisa Martinez 2014 @ Copyright WICKED Design Solutions Offer IaaS PaaS SaaS
  • 16. Content Id no private information public life Private life economic life social life family life health and safety life 408.638.9016 Lisa Martinez 2014 @ Copyright WICKED Design Solutions Type 2 diabetic Physician A manager in retail A major retailer IGL6 - 7 Public IGL1-3 Private IGL4-5 Private
  • 17.  From offices around the world, InfoComm serves its members and the industry through: ◦ Education, including technical and business courses, in the classroom and online ◦ Resources, such as AV standards, thought pieces, and market research ◦ Events, including local roundtables and international trade shows  Established in 1939, InfoComm has more than 5,000 members, including manufacturers, systems integrators, dealers and distributors, independent consultants, programmers, rental and staging companies, end-users and multimedia professionals from more than 80 countries.  As an ANSI Accredited Standards Development Organization (SDO), InfoComm offers the Certified Technology Specialist™ (CTS®) program — the only audiovisual certification ANSI accredited under the International Standard ISO/IEC 17024.
  • 18. Cable IP4/IP6 IP address 16.21.165.01  Our view into our television was once a one way view  Our view into the world was once a one way view 400 lines of resolution 1100 lines of resolution May 2014 Report to the President Restores Civil Liberties with Virtual Life WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 19. Before Now video is sent and received May 2014 Report to the President Restores Civil Liberties with Virtual Life WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 20. Personal Investment Carrier Service Contract  I choose a carrier and I purchase the device with an understanding (a contractual agreement) between me and the mobile carrier Any Cell phone service provider My Device Carrier supplies a service to use my device WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 21.  Within my home, I am still private and protected. Right? “No”, but you can trust us. May 2014 Report to the President Restores Civil Liberties with Virtual Life WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 22.  Let students work through the details of the new technology innovations ◦ Have a limited group of stakeholders “wisdom” reviews and advisors ◦ The report to the president did not appear to get into the subject  The opportunity for students to protect themselves, although the potential is high for teachers and police to force students to turn off the devices... ◦ Attendance in class – an ideal way to check in ◦ Bullying Prevention – Students are far less likely to be cruel ◦ Replay experiences – how many times have your notes been complete. ◦ Participate in Experience Based projects – working with at risk populations ◦ Safety – a way for your parents to find you at all times ◦ Safety – a way to replay your abduction or human trafficking kidnapping  A way to prove you told the truth when someone doesn’t trust you. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 23. Records the view you see Records the way you respond to what you see. Google Glasses Wearable Mobile Technology Presents Gaming as an option virtual or augmented reality Records the way you respond to what you see. Content and Logging Sensor Data Sensor Data/Logging/Metadata or Raw Data from Video, Audio and Web Activity or Texting WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 24. Many of us don’t realize data is the raw or technical form of all methods of communication
  • 25. Data is no longer trustworthy Nor do the experts get invited  Data is information or just data  Data is knowledge or just data  Data is Wisdom or just data it is not evidence nor intelligence  Data manipulated outside the process is just data outside the process (fusion)  Data connected outside the process is just data connected (fusion)  Data tools and technology behave without controls supplied in 3rd party applications.  Data is not governed nor does it have any value when people who are not involved in the original format manipulate raw data. ◦ No one is expected to change, alter or manipulate nor does massaging ever pass ethical standards  Data can be harmful if connected with other data, as it can easily be mis-represented, as facts. (Fusion)  In the case of big data we might ask ourselves, who was involved in and did the experts get invited? WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 26. Data Raw Format Applications (information and Knowledge) Content Knowledge (Content and Information) Information (Documents) Records Display User Transactional User Management user Company LDAP or AD account X X –Restricted group see Sarbanes Oxley rules Network IP and Host X X Secure access certificate or Key X X Monitor and Design Key Controls SOD 404 Assurances Any financial Management, based on roles based access Any create, read, update or archive Financial Management Quality Management Employee Performance All request are pre-authorized and validated All approvals are approved or delegated to a person with same or greater authority. Asset Device Any organization or agency supplied Any organization or agency supplied WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 27.  Two dimensions that “do not” integrate within many organizations ◦ Not in recognized as a Technology domain, Business Process nor EA ◦ Not in the Business Intelligence and EDW are not always integrated ◦ Not in the Master Data with the BI or Technology  An application qualifies for SDLC change control threat analysis every time a “get” or “create” command is used in an API (games, data only subscriptions, legacy applications, custom in house applications, BI Developed Applications, any minor change with such commands = application).  Audio, Images and Video are now part of the Big Data size big. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 28.  Assume the conceptual model will converge through to data and potentially be returned or converted to another form. ◦ In these materials we assume data represents content in many forms when presented as an application or video or game. ◦ The point and assumption must be users are unaware of the technical details. ◦ The following table suggest a person will potentially never understand and not need to understanding that the four domains are also data. View(s) Organization or Agency Content Information Knowledge Records Person as an individual No Video or Audio or digital data in an application or other form of presentation Video or Audio or digital data in an application or other form of presentation Video or Audio or digital data in an application or other form of presentation An official recording of an event or transaction which requires validation and reporting to regulatory authorities. Person as an Agent Yes Video or Audio or digital data in an application or other form of presentation Video or Audio or digital data in an application or other form of presentation Video or Audio or digital data in an application or other form of presentation An official recording of an event or transaction which requires validation and reporting to regulatory authorities. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 29.  Adoption of a Service Management Model for Business Services enables focus on the business which doesn’t require Technical Changes ◦ Expands upon an IT Service Management model with human wellness to crisis capabilities. ◦ Factors the many forms of digital information to aid in the wellness of citizens or consumers for the Public and Private sectors. ◦ Low effort to adoption-builds upon IT in most organizations ITIL ITSM has been adopted and adds the person centered design concept. ◦ Common method to prevent and protect versus cause and effect  Benefit “outcomes” effectively measure Privacy and Security  Benefit “outcomes” effectively plan investments according to a baseline risk  Benefit “outcomes” effectively prepare, plan, mitigate, recover and restore in crisis situations  Benefit “outcomes” effectively supplies an expectation for measuring risk for citizens WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 30.
  • 31.
  • 32.  A single woman may take comfort in having a friendly eye watching over her. ◦ The only way to be comforted in such situations would be if the police commit to responding if trouble is detected.  A woman would be far less likely to change in her room if she had a safe place to undress.  How friendly can a camera be if you were married or sexually active? ◦ You’d have to know and be able to control the device. ◦ Many camera’s appear to be off, they are actually on. ◦ Many audio conversations are recorded and distributed  Women are far more likely to be adversely effected by an intimate encounter if the video were ever released. ◦ Catalog and strong metadata management will absolutely enable retrieval of images. WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 33.  While technology exist to promote intelligence for crime fighting, or fusion which results in false positives without having all the facts.  A person may have had their identity stolen once or twice in their lifetime. ◦ Instead of asking a person the person immediately is excluded from a potential role in a project or company.  What if they have a common name and when you Google the name, suddenly mug shots are the first images you see? ◦ What if your name was so common and mysteriously was the name someone arrested for fraud in nearly every state?  Would you consider the candidate if you had to dig into the person’s life and rule out so many criminals?  If you also were married more than twice, you might have a reason for name changes.  The number of times a person’s been married, may exclude a woman but you’d never know if it was a man. WICKED 2014@copyright Lisa Martinez 408.638.9016