Agility and security

652 views

Published on

Slides for a talk at the FIRST / CEP round table meeting on 11/12/10 in NYC. I will post my speaker notes elsewhere.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
652
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • A political working class.
  • James Watt and his contemporaries thought they were inventing a form of locomotion, but they were unleashing social gravitational forces.
  • The machine led to political movements around the world. May 4th movement in China pictured.
  • Reductionism, a new mode of thought, came from the machine.
  • Leonard Kleinrock, Lawrence Roberts, Robert Kahn, and Vint Cerf thought they were building a computer network…
  • It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  • It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  • It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  • It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  • It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  • It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  • Modernism and reductionism already took a drubbing in the postmodern counter-culture of the 70’s, and now they are in their final steep decline. They are being supplanted by a new kind of network empiricism that will exert its own gravitational force on our social and organizational fabric.
  • Rouge River Ford plant by Sheeler – corporations became ever larger, compelled by economies of scale and concentration of capital.
  • Frederick Taylor. Harbinger of reductionism, planning, and control.
  • Data processing
  • Connective backplane
  • Waggle dance for consensu
  • The brain of the corpus enterprise
  • The brain of the corpus enterprise
  • Stand knee deep cursing the tide?
  • Aside: My mom knows fractals, she grows these in her garden.
  • Agility and security

    1. 1. Agility and Security Imperatives in tension
    2. 2. Agility Security
    3. 3. • The Network Age • Network Age Enterprise • Agility and Emergence • Some Thoughts on Risk
    4. 4. Meta Context Industrial -> Information (Network) Age
    5. 5. From: http://www.industrialrevolutionresearch.com/images/factory.gif
    6. 6. From: http://www.nyc-architecture.com/LM/Ellis_island(1).jpg
    7. 7. From: http://www.mkbergman.com/date/2006/07/ $
    8. 8. From: http://theformofmoney.blogharbor.com/blog/_archives/2009/3/24/4131366.html
    9. 9. From http://www.humanthermodynamics.com/watt-engine.jpg
    10. 10. From: http://history.cultural-china.com/en/34History7223.html
    11. 11. From: http://www.goldenswamp.com/2009/08/22/educations-reductionist-flaw-is-like-the-digesting-
    12. 12. http://www.lamag.com/featuredarticle.aspx?id=13526&page=2 http://www.computerhistory.org/internet_history/internet_history_70s.html http://www.livinginternet.com/i/ii_kahn.htm http://www.velocityguide.com/internet-history/lawrence-roberts.html http://www.let.leidenuniv.nl/history/ivh/chap2.htm
    13. 13. http://www.fmsasg.com/SocialNetworkAnalysis/
    14. 14. http://www.web-censorship.org/congratiolation-piratpartiet-pirate-party/
    15. 15. http://farm3.static.flickr.com/2027/2449663234_ea24706dc8_o.png
    16. 16. http://www.opensource.org/
    17. 17. http://itunes.apple.com/us/app/seeclickfix-plus/id348529764?mt=8
    18. 18. http://www.how-why.com/ph510/index.html
    19. 19. http://www.ukuleleman.net/uploaded_images/Bush%20Faces%20of%20the%20dead-795931.jpg
    20. 20. The Corporate Enterprise In the Network Age
    21. 21. http://www.acsu.buffalo.edu/~jconte/Images/Sheeler_American_Landscape.jpg
    22. 22. http://swik.net/Technology-News+infrastructure
    23. 23. http://worldwidegoodnews.com/blog/?p=194
    24. 24. http://connect.in.com/gravitational-force/photos-gravitational-20force-13347ed2bc4673f6.html
    25. 25. http://www.calacirian.org/?p=725
    26. 26. Becoming Agile (and Emergent)
    27. 27. Intentional Emergence Surroundings
    28. 28. Generativity = “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences.”
    29. 29. http://21gov.net/about/press-release/
    30. 30. Thoughts on Risk
    31. 31. Consumerization of IT Interconnected networks Integrated suppliers Outsourcing Identity App prolilferation Transactional relationships Third party contractors
    32. 32. http://www.walyou.com/blog/2008/10/05/usb-security-gadget-lock-up-your-gadgets/
    33. 33. Work pushed here
    34. 34. http://complexity.orconhosting.net.nz/history.html
    35. 35. “…information is important as a stage in the continuous process by which we observe the outer world, and act effectively upon it.” … “There is no Maginot line of the brain.” “In anything like a normal situation, it is both far more difficult and far more important for us to ensure that we have an adequate knowledge than to ensure that some enemy does not have it.” “We need to emphasize our ability to observe and process the world, rather than protect what we know.”
    36. 36. Bias toward Safe Enablement
    37. 37. http://www.mxcsoft.com/Man_Securing%20Your%20Emails.htm
    38. 38. http://mapandcounters.blogspot.com/2010/05/tahgc-france-1940-1972.html
    39. 39. Thanks! Jim Stogdill James.stogdill@accenture.com @jstogdill
    40. 40. backups
    41. 41. http://ifisc.uib-csic.es/img/Bio.jpg
    42. 42. http://upflysoft.com/2010/05/29/yahoo-weather-3-0-freeware-2/
    43. 43. http://venturebeat.com/wp-content/uploads/2009/03/28811286_e1671e30a9.jpg
    44. 44. Further Reading
    45. 45. From: http://kl.zensci.dk/industrial-revolution
    46. 46. http://www.autolife.umd.umich.edu/Race/R_Overview/Rouge_Plant.htm

    ×