Time Series Foundation Models - current state and future directions
2018 03 smart cities albany
1. Smart Cities in the Age
of Customer Experience
David Bressler (@djbressler)
March 2018
Smart City value will be realized through software.
More software means more value, but also more
complexity.
7. The Challenge to Secure
Smart City Applications:
How do I create:
• A native security experience that is
convenient, frictionless, and makes it fast
to add to new security modalities to apps?
• Secure enough to meet audits &
compliance requirements?
• Provides “developer velocity”: maximum
value without high costs to develop,
operate, or support?
Velocity
Convenience
Security
8. CA Smart City Examples
Washington, DC
Breaking Down
Data Silos
Waste management
data used by social
services &
department of
health
Louisiana
Improving
Government
Ops &
Innovation
Tax collection, federal
program integration,
innovation
compliance
London, UK
OneTransport
Transportation data
integration,
orchestration, and
citizen experience
Cascais, Portugal
Modern
Application
Architecture
Data sharing
between app silos,
improving problem
resolution
Amazonia, Brazil
Government in
Your Hands™
secure mobile
enablement, API
integration, identity
Emerging
Blockchain
Record-keeping,
“supply chain”
integration (eg
opioid data
management)
9. Can our
Smart Cities
be Healthier
Cities?
If 20 minutes of
exercise, 3x per week
improves health
outcomes, could I
lower insurance rates
for people willing to
share their smart-bike
activity?
9bit.ly/HealthyCiti
Ask, so is this a citibike app, a cigna app, or a NY app? Who develops it? Who benefits? We need to create a platform for permissionless innovation, and we can’t do that without the right data governance and security. The security technology is there today, it’s just unevenly implemented. Make it easier to do security well by building capabilities into the platform so developers don’t have to do it in the silo, defining repeatable security use cases so that we can deliver the security experience to match the risk, and managing risk actively in the flow of app traffic (what are they trying to do, what is and where is the risk, and should we let them do it).