SlideShare a Scribd company logo
1 of 9
engage. listen. act.




A Network Perspective

Federal Acquisition − IAC Executive Series



Name Kim Patrick Kobza (Twitter @kpkfusion)
Title President and CEO Neighborhood America
Date July 1, 2009

                                               All information is proprietary and confidential.
Network Transformation

 Networks drive every process within every organization in
  the world. Moving to a “network information economy”.
 Old World View: Value is created in linear processes where
  there are clear lines of command and control, accountability
  and authority. “Value chains, supply chains”
 New World: Value can also be created by expanding
  networks beyond linear models, That distributed listening
  networks can generally add value: create efficiencies, save
  time and costs. (Customers, partners, employees, citizens).


                     All information is proprietary and confidential.   2
Different Network Experiences Solve Unique
            Business Problems
 All networks are not social. Networks may be built for a
  purpose and have social characteristics. Different needs
  require different solutions. Twitter, Facebook, YouTube.
 Networks can be experiences, not destinations.
 Networks can be complex, where small differences in
  experience create very large differences in outcome.
 Big difference between necessary factors and sufficient
  conditions to success.



                     All information is proprietary and confidential.   3
Case 1: Discrete Exchange, Department of Defense
  Defense Acquisition Program Assessment (DAPA)
DoD seeks to assess acquisition program
and identify areas for cost savings. Taps
knowledge of global military leaders for
ideas and feedback.

 Business Problem: DoD needed to
  collect large volumes of validated
  and attributed input from a wide
  range of stakeholders. [mirrors
  public comment process].                                                     Key Stakeholders
                                                                                Department of Defense
 Attributes: Independent and                                                   Global military personnel
  discrete, not anonymous; more                                                 Legislators
  than opinions, informed based on                                              Taxpayers benefitting from
  referential information.                                                        reduced spending
                                                                               Lead: Lt. Col Rene Bergeron

                            All information is proprietary and confidential.                                  4
Results (DAPA)


“Those inclusive decisions not                          Business Results
   only helped to substantiate the                       Urgent need met by speed of SaaS. Public
                                                           comment site turned on in less than 48 hours
   team’s recommendations, but                           One employee with limited IT skills managed
   also they helped to increase                            outreach and incorporated findings into reports
   confidence in those decisions.                        DoD benefitted from shared insight and
   Becoming part of the process                            knowledge of military leaders ‘on the ground’
   instilled a sense of inclusion                        Report and recommendations delivered to
                                                           Deputy Secretary of Defense on-time and on-
   and ownership among all those                           budget
   involved, including senior
   leadership.”
                -   Key Project Staff Member
                      Department of Defense


                              All information is proprietary and confidential.                          5
Case 2: Social collaboration (concept)




            All information is proprietary and confidential.   6
Network Aggregation

 In a “network information economy” networks can be used
  to aggregate knowledge, people, and resources across
  institutional boundaries. Value creation is key.
 Have to be thoughtful in using social collaboration. Or:
   Too many solution possibilities to be credible.
   If audience too broad and anonymous, will lead to lack of trusted
    environment.
 Consider combination of two approaches.



                        All information is proprietary and confidential.   7
Barriers

 Disruptive versus Incremental Change. What if it works?
   Roles change. Our individual contributions to value change. How
    we are measured changes. Networks are unpredictable and full of
    emergent properties.
 If we view simply as technology challenge will lead to failure
  and loss of historic opportunity.
   If we approach in a chaotic way, will lead to bad experiences and
    poor outcomes – loss of credibility, reluctance to accept change.




                        All information is proprietary and confidential.   8
Having a Network Perspective:
           A different type of change
 Having a network perspective is a matter of global
  competitiveness and national security.
 A disruptive change that is being forced on our institutions.
 Is an urgent issue with no time to waste.
   See Dr. Linton Wells, Dr. Mark Drapeau, Social Software and
    National Security, an Initial Net Assessment


  Thank you. @kpkfusion




                          All information is proprietary and confidential.   9

More Related Content

What's hot

Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Equipping the cyber workforce
Equipping the cyber workforce Equipping the cyber workforce
Equipping the cyber workforce CyberRecruit
 
IntelliKnow Datasheet
IntelliKnow DatasheetIntelliKnow Datasheet
IntelliKnow DatasheetJason Brown
 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networksdigitallibrary
 
Defense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeDefense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeIBMGovernmentCA
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecurityIT@Intel
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityPhil Agcaoili
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutionsZsolt Nemeth
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaSyed Peer
 
milSuite and Open Source
milSuite and Open SourcemilSuite and Open Source
milSuite and Open SourcemilSuite
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilienceAndrew Bycroft
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2fphart
 

What's hot (20)

Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Equipping the cyber workforce
Equipping the cyber workforce Equipping the cyber workforce
Equipping the cyber workforce
 
IntelliKnow Datasheet
IntelliKnow DatasheetIntelliKnow Datasheet
IntelliKnow Datasheet
 
Adaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery NetworksAdaptive Access Contextual Security for Application Delivery Networks
Adaptive Access Contextual Security for Application Delivery Networks
 
Defense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeDefense Intelligence & The Information Challenge
Defense Intelligence & The Information Challenge
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information Security
 
CSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber SecurityCSO Magazine Confab 2013 Atlanta - Cyber Security
CSO Magazine Confab 2013 Atlanta - Cyber Security
 
milSuite
milSuitemilSuite
milSuite
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Perspectivesonbigdatamissionneeds gushunt-120331115815-phpapp02
Perspectivesonbigdatamissionneeds gushunt-120331115815-phpapp02Perspectivesonbigdatamissionneeds gushunt-120331115815-phpapp02
Perspectivesonbigdatamissionneeds gushunt-120331115815-phpapp02
 
Security assessment for financial institutions
Security assessment for financial institutionsSecurity assessment for financial institutions
Security assessment for financial institutions
 
Brief introduction
Brief introductionBrief introduction
Brief introduction
 
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaGCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, Doha
 
milSuite and Open Source
milSuite and Open SourcemilSuite and Open Source
milSuite and Open Source
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2
 

Viewers also liked

Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
Startup DNA: the formula behind successful startups in Silicon Valley (update...
Startup DNA: the formula behind successful startups in Silicon Valley (update...Startup DNA: the formula behind successful startups in Silicon Valley (update...
Startup DNA: the formula behind successful startups in Silicon Valley (update...Yevgeniy Brikman
 
JW US Writing Presentation
JW US Writing PresentationJW US Writing Presentation
JW US Writing PresentationJennifer White
 
Customer Engagement in a Sales Environment - 5 D's
Customer Engagement in a Sales Environment - 5 D'sCustomer Engagement in a Sales Environment - 5 D's
Customer Engagement in a Sales Environment - 5 D'sMahesh Iyer
 
Trabajo powerpoint roberto_medrano
Trabajo powerpoint roberto_medranoTrabajo powerpoint roberto_medrano
Trabajo powerpoint roberto_medranomedranoslide
 
Case - FADU - Portugal - Novo logotipo
Case - FADU - Portugal - Novo logotipoCase - FADU - Portugal - Novo logotipo
Case - FADU - Portugal - Novo logotipoBrav Design
 
International Design Festival
International Design FestivalInternational Design Festival
International Design FestivalMatias Figliozzi
 
Apache Hadoop India Summit 2011 talk "Profiling Application Performance" by U...
Apache Hadoop India Summit 2011 talk "Profiling Application Performance" by U...Apache Hadoop India Summit 2011 talk "Profiling Application Performance" by U...
Apache Hadoop India Summit 2011 talk "Profiling Application Performance" by U...Yahoo Developer Network
 
You Media: Relationships and The Long Tail of Popularity
You Media: Relationships and The Long Tail of PopularityYou Media: Relationships and The Long Tail of Popularity
You Media: Relationships and The Long Tail of PopularityMrinal Desai
 
Week 4 - jQuery + Ajax
Week 4 - jQuery + AjaxWeek 4 - jQuery + Ajax
Week 4 - jQuery + Ajaxbaygross
 
Templos da Grécia Antiga
Templos da Grécia AntigaTemplos da Grécia Antiga
Templos da Grécia AntigaJosé Ferreira
 
2007 bpc conference
2007 bpc conference2007 bpc conference
2007 bpc conferenceguest56b4f0
 
Cto. Nacional Atletismo
Cto. Nacional AtletismoCto. Nacional Atletismo
Cto. Nacional AtletismoF. Ovies
 
Z4 b 0001_zipcar_101_aw
Z4 b 0001_zipcar_101_awZ4 b 0001_zipcar_101_aw
Z4 b 0001_zipcar_101_awabudge
 
Tic Vacaciones
Tic VacacionesTic Vacaciones
Tic Vacacioneswonkar
 
Jeff Nolan - Connecting the Dots
Jeff Nolan - Connecting the DotsJeff Nolan - Connecting the Dots
Jeff Nolan - Connecting the DotsBrent Leary
 
Wishing you happy holidays
Wishing you happy holidaysWishing you happy holidays
Wishing you happy holidaysOliver Hanisch
 

Viewers also liked (20)

Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
Startup DNA: the formula behind successful startups in Silicon Valley (update...
Startup DNA: the formula behind successful startups in Silicon Valley (update...Startup DNA: the formula behind successful startups in Silicon Valley (update...
Startup DNA: the formula behind successful startups in Silicon Valley (update...
 
JW US Writing Presentation
JW US Writing PresentationJW US Writing Presentation
JW US Writing Presentation
 
Act research
Act researchAct research
Act research
 
Customer Engagement in a Sales Environment - 5 D's
Customer Engagement in a Sales Environment - 5 D'sCustomer Engagement in a Sales Environment - 5 D's
Customer Engagement in a Sales Environment - 5 D's
 
Trabajo powerpoint roberto_medrano
Trabajo powerpoint roberto_medranoTrabajo powerpoint roberto_medrano
Trabajo powerpoint roberto_medrano
 
Case - FADU - Portugal - Novo logotipo
Case - FADU - Portugal - Novo logotipoCase - FADU - Portugal - Novo logotipo
Case - FADU - Portugal - Novo logotipo
 
International Design Festival
International Design FestivalInternational Design Festival
International Design Festival
 
Apache Hadoop India Summit 2011 talk "Profiling Application Performance" by U...
Apache Hadoop India Summit 2011 talk "Profiling Application Performance" by U...Apache Hadoop India Summit 2011 talk "Profiling Application Performance" by U...
Apache Hadoop India Summit 2011 talk "Profiling Application Performance" by U...
 
Hans ament
Hans amentHans ament
Hans ament
 
You Media: Relationships and The Long Tail of Popularity
You Media: Relationships and The Long Tail of PopularityYou Media: Relationships and The Long Tail of Popularity
You Media: Relationships and The Long Tail of Popularity
 
Week 4 - jQuery + Ajax
Week 4 - jQuery + AjaxWeek 4 - jQuery + Ajax
Week 4 - jQuery + Ajax
 
Templos da Grécia Antiga
Templos da Grécia AntigaTemplos da Grécia Antiga
Templos da Grécia Antiga
 
2007 bpc conference
2007 bpc conference2007 bpc conference
2007 bpc conference
 
Alexis Willey
Alexis Willey Alexis Willey
Alexis Willey
 
Cto. Nacional Atletismo
Cto. Nacional AtletismoCto. Nacional Atletismo
Cto. Nacional Atletismo
 
Z4 b 0001_zipcar_101_aw
Z4 b 0001_zipcar_101_awZ4 b 0001_zipcar_101_aw
Z4 b 0001_zipcar_101_aw
 
Tic Vacaciones
Tic VacacionesTic Vacaciones
Tic Vacaciones
 
Jeff Nolan - Connecting the Dots
Jeff Nolan - Connecting the DotsJeff Nolan - Connecting the Dots
Jeff Nolan - Connecting the Dots
 
Wishing you happy holidays
Wishing you happy holidaysWishing you happy holidays
Wishing you happy holidays
 

Similar to Presentation For IAC Federal Acquisition

Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decisioneuwebtc01
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decisioneuwebsc01
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decisioneuweben01
 
The Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution UtilityThe Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution UtilityJill Kirkpatrick
 
Information governance process & technology
Information governance process & technologyInformation governance process & technology
Information governance process & technologyGNetadmin
 
An Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementAn Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementSafeNet
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010Tim Willoughby
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Troy Marshall
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Eduserv Symposium 2013 - Threat or opportunity?
Eduserv Symposium 2013 - Threat or opportunity?Eduserv Symposium 2013 - Threat or opportunity?
Eduserv Symposium 2013 - Threat or opportunity?Eduserv
 
Open Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationOpen Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationGisli Olafsson
 
Due Diligence - Real-estate solution
Due Diligence - Real-estate solutionDue Diligence - Real-estate solution
Due Diligence - Real-estate solutionCONact GmbH
 
Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Praveen Raman
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaThe Takshashila Institution
 

Similar to Presentation For IAC Federal Acquisition (20)

Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decision
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decision
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decision
 
The Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution UtilityThe Data-Driven Transformation of the Distribution Utility
The Data-Driven Transformation of the Distribution Utility
 
IANS-2008
IANS-2008IANS-2008
IANS-2008
 
Information governance process & technology
Information governance process & technologyInformation governance process & technology
Information governance process & technology
 
An Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementAn Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key Management
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Eduserv Symposium 2013 - Threat or opportunity?
Eduserv Symposium 2013 - Threat or opportunity?Eduserv Symposium 2013 - Threat or opportunity?
Eduserv Symposium 2013 - Threat or opportunity?
 
Open Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationOpen Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference Presentation
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Research Note RSA 2019
Research Note   RSA 2019Research Note   RSA 2019
Research Note RSA 2019
 
Du Diligence Solution for large RE- Portfolio
Du Diligence Solution for large RE- PortfolioDu Diligence Solution for large RE- Portfolio
Du Diligence Solution for large RE- Portfolio
 
Due Diligence - Real-estate solution
Due Diligence - Real-estate solutionDue Diligence - Real-estate solution
Due Diligence - Real-estate solution
 
Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0Idc bif2018 praveen raman _v1.0
Idc bif2018 praveen raman _v1.0
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

Presentation For IAC Federal Acquisition

  • 1. engage. listen. act. A Network Perspective Federal Acquisition − IAC Executive Series Name Kim Patrick Kobza (Twitter @kpkfusion) Title President and CEO Neighborhood America Date July 1, 2009 All information is proprietary and confidential.
  • 2. Network Transformation  Networks drive every process within every organization in the world. Moving to a “network information economy”.  Old World View: Value is created in linear processes where there are clear lines of command and control, accountability and authority. “Value chains, supply chains”  New World: Value can also be created by expanding networks beyond linear models, That distributed listening networks can generally add value: create efficiencies, save time and costs. (Customers, partners, employees, citizens). All information is proprietary and confidential. 2
  • 3. Different Network Experiences Solve Unique Business Problems  All networks are not social. Networks may be built for a purpose and have social characteristics. Different needs require different solutions. Twitter, Facebook, YouTube.  Networks can be experiences, not destinations.  Networks can be complex, where small differences in experience create very large differences in outcome.  Big difference between necessary factors and sufficient conditions to success. All information is proprietary and confidential. 3
  • 4. Case 1: Discrete Exchange, Department of Defense Defense Acquisition Program Assessment (DAPA) DoD seeks to assess acquisition program and identify areas for cost savings. Taps knowledge of global military leaders for ideas and feedback.  Business Problem: DoD needed to collect large volumes of validated and attributed input from a wide range of stakeholders. [mirrors public comment process]. Key Stakeholders  Department of Defense  Attributes: Independent and  Global military personnel discrete, not anonymous; more  Legislators than opinions, informed based on  Taxpayers benefitting from referential information. reduced spending Lead: Lt. Col Rene Bergeron All information is proprietary and confidential. 4
  • 5. Results (DAPA) “Those inclusive decisions not Business Results only helped to substantiate the  Urgent need met by speed of SaaS. Public comment site turned on in less than 48 hours team’s recommendations, but  One employee with limited IT skills managed also they helped to increase outreach and incorporated findings into reports confidence in those decisions.  DoD benefitted from shared insight and Becoming part of the process knowledge of military leaders ‘on the ground’ instilled a sense of inclusion  Report and recommendations delivered to Deputy Secretary of Defense on-time and on- and ownership among all those budget involved, including senior leadership.” - Key Project Staff Member Department of Defense All information is proprietary and confidential. 5
  • 6. Case 2: Social collaboration (concept) All information is proprietary and confidential. 6
  • 7. Network Aggregation  In a “network information economy” networks can be used to aggregate knowledge, people, and resources across institutional boundaries. Value creation is key.  Have to be thoughtful in using social collaboration. Or:  Too many solution possibilities to be credible.  If audience too broad and anonymous, will lead to lack of trusted environment.  Consider combination of two approaches. All information is proprietary and confidential. 7
  • 8. Barriers  Disruptive versus Incremental Change. What if it works?  Roles change. Our individual contributions to value change. How we are measured changes. Networks are unpredictable and full of emergent properties.  If we view simply as technology challenge will lead to failure and loss of historic opportunity.  If we approach in a chaotic way, will lead to bad experiences and poor outcomes – loss of credibility, reluctance to accept change. All information is proprietary and confidential. 8
  • 9. Having a Network Perspective: A different type of change  Having a network perspective is a matter of global competitiveness and national security.  A disruptive change that is being forced on our institutions.  Is an urgent issue with no time to waste.  See Dr. Linton Wells, Dr. Mark Drapeau, Social Software and National Security, an Initial Net Assessment Thank you. @kpkfusion All information is proprietary and confidential. 9