SlideShare a Scribd company logo
Agility and Security
Imperatives in tension
Agility
Security
• The Network Age
• Network Age Enterprise
• Agility and Emergence
• Some Thoughts on Risk
Meta Context
Industrial -> Information (Network) Age
From: http://www.industrialrevolutionresearch.com/images/factory.gif
From: http://www.nyc-architecture.com/LM/Ellis_island(1).jpg
From: http://www.mkbergman.com/date/2006/07/
$
From: http://theformofmoney.blogharbor.com/blog/_archives/2009/3/24/4131366.html
From http://www.humanthermodynamics.com/watt-engine.jpg
From: http://history.cultural-china.com/en/34History7223.html
From: http://www.goldenswamp.com/2009/08/22/educations-reductionist-flaw-is-like-the-digesting-
http://www.lamag.com/featuredarticle.aspx?id=13526&page=2
http://www.computerhistory.org/internet_history/internet_history_70s.html http://www.livinginternet.com/i/ii_kahn.htm
http://www.velocityguide.com/internet-history/lawrence-roberts.html
http://www.let.leidenuniv.nl/history/ivh/chap2.htm
http://www.fmsasg.com/SocialNetworkAnalysis/
http://www.web-censorship.org/congratiolation-piratpartiet-pirate-party/
http://farm3.static.flickr.com/2027/2449663234_ea24706dc8_o.png
http://www.opensource.org/
http://itunes.apple.com/us/app/seeclickfix-plus/id348529764?mt=8
http://www.how-why.com/ph510/index.html
http://www.ukuleleman.net/uploaded_images/Bush%20Faces%20of%20the%20dead-795931.jpg
The Corporate Enterprise
In the Network Age
http://www.acsu.buffalo.edu/~jconte/Images/Sheeler_American_Landscape.jpg
http://swik.net/Technology-News+infrastructure
http://worldwidegoodnews.com/blog/?p=194
http://connect.in.com/gravitational-force/photos-gravitational-20force-13347ed2bc4673f6.html
http://www.calacirian.org/?p=725
Becoming Agile
(and Emergent)
Intentional Emergence
Surroundings
Generativity = “a system’s capacity to
produce unanticipated change through
unfiltered contributions from broad and
varied audiences.”
http://21gov.net/about/press-release/
Thoughts on Risk
Consumerization of IT
Interconnected networks
Integrated suppliers
Outsourcing
Identity
App prolilferation
Transactional relationships
Third party contractors
http://www.walyou.com/blog/2008/10/05/usb-security-gadget-lock-up-your-gadgets/
Work pushed here
http://complexity.orconhosting.net.nz/history.html
“…information is important as a stage in the continuous
process by which we observe the outer world, and act
effectively upon it.” … “There is no Maginot line of the
brain.”
“In anything like a normal situation, it is both far more
difficult and far more important for us to ensure that we
have an adequate knowledge than to ensure that some
enemy does not have it.”
“We need to emphasize our ability to observe and
process the world, rather than protect what we know.”
Bias toward Safe Enablement
http://www.mxcsoft.com/Man_Securing%20Your%20Emails.htm
http://mapandcounters.blogspot.com/2010/05/tahgc-france-1940-1972.html
Thanks!
Jim Stogdill
James.stogdill@accenture.com
@jstogdill
backups
http://ifisc.uib-csic.es/img/Bio.jpg
http://upflysoft.com/2010/05/29/yahoo-weather-3-0-freeware-2/
http://venturebeat.com/wp-content/uploads/2009/03/28811286_e1671e30a9.jpg
Further Reading
From: http://kl.zensci.dk/industrial-revolution
http://www.autolife.umd.umich.edu/Race/R_Overview/Rouge_Plant.htm

More Related Content

Similar to Agility and security

Comportamientos digitales!
Comportamientos digitales! Comportamientos digitales!
Comportamientos digitales!
NathaliaFonseca
 
Complex Event Processing
Complex Event ProcessingComplex Event Processing
Complex Event Processing
Matthew McCullough
 
Cloud Conf Varna: Vagrant and Amazon
Cloud Conf Varna: Vagrant and AmazonCloud Conf Varna: Vagrant and Amazon
Cloud Conf Varna: Vagrant and Amazon
Dimitar Danailov
 
Softuni.bg - Microservices
Softuni.bg - MicroservicesSoftuni.bg - Microservices
Softuni.bg - Microservices
Dimitar Danailov
 
Python + NoSQL in Animations
Python + NoSQL in AnimationsPython + NoSQL in Animations
Python + NoSQL in Animations
Shuen-Huei Guan
 
Why Hacking Isn't Always Bad
Why Hacking Isn't Always BadWhy Hacking Isn't Always Bad
Why Hacking Isn't Always Bad
Carrie Kelly
 
Thaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona ProjectThaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona Project
Terrill Marshall
 
Exercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical IssuesExercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical Issues
clemwj
 
Spotting
SpottingSpotting
Spotting
Keith Lyons
 
Taming the Monolith - Microservices Meetup Hamburg
Taming the Monolith - Microservices Meetup HamburgTaming the Monolith - Microservices Meetup Hamburg
Taming the Monolith - Microservices Meetup Hamburg
Dennis Traub
 
Trust at the Interface of Start-up and Enterprise
Trust at the Interface of Start-up and EnterpriseTrust at the Interface of Start-up and Enterprise
Trust at the Interface of Start-up and Enterprise
Benjamin Elias
 
Papaya webinar: leveraging lifecycle
Papaya webinar: leveraging lifecyclePapaya webinar: leveraging lifecycle
Papaya webinar: leveraging lifecycle
PapayaMobile
 
Automated Interactions With WorldCat: A Look at OCLC’s WorldCat Metadata API
Automated Interactions With WorldCat:  A Look at OCLC’s WorldCat Metadata APIAutomated Interactions With WorldCat:  A Look at OCLC’s WorldCat Metadata API
Automated Interactions With WorldCat: A Look at OCLC’s WorldCat Metadata API
Terry Reese
 
MicroServices: Advantages ans Disadvantages
MicroServices: Advantages ans DisadvantagesMicroServices: Advantages ans Disadvantages
MicroServices: Advantages ans Disadvantages
Dimitar Danailov
 
Ransomware Presentation
Ransomware PresentationRansomware Presentation
Ransomware Presentation
jpetrocelli528
 
Eng 104 presentation
Eng 104 presentationEng 104 presentation
Eng 104 presentationzhb15048
 
Technology Careers v2.0 SP1 Ultimate Edition
Technology Careers v2.0 SP1 Ultimate EditionTechnology Careers v2.0 SP1 Ultimate Edition
Technology Careers v2.0 SP1 Ultimate Edition
John Bristowe
 
Hack The Capitol - The Unlikely Romance - Critical Infrastructure Edition
Hack The Capitol - The Unlikely Romance - Critical Infrastructure EditionHack The Capitol - The Unlikely Romance - Critical Infrastructure Edition
Hack The Capitol - The Unlikely Romance - Critical Infrastructure Edition
Casey Ellis
 

Similar to Agility and security (20)

Comportamientos digitales!
Comportamientos digitales! Comportamientos digitales!
Comportamientos digitales!
 
Final ppt
Final pptFinal ppt
Final ppt
 
Complex Event Processing
Complex Event ProcessingComplex Event Processing
Complex Event Processing
 
Cloud Conf Varna: Vagrant and Amazon
Cloud Conf Varna: Vagrant and AmazonCloud Conf Varna: Vagrant and Amazon
Cloud Conf Varna: Vagrant and Amazon
 
Softuni.bg - Microservices
Softuni.bg - MicroservicesSoftuni.bg - Microservices
Softuni.bg - Microservices
 
Python + NoSQL in Animations
Python + NoSQL in AnimationsPython + NoSQL in Animations
Python + NoSQL in Animations
 
Why Hacking Isn't Always Bad
Why Hacking Isn't Always BadWhy Hacking Isn't Always Bad
Why Hacking Isn't Always Bad
 
Thaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona ProjectThaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona Project
 
Exercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical IssuesExercise 1.4 Social Impacts and Ethical Issues
Exercise 1.4 Social Impacts and Ethical Issues
 
Cite sources
Cite sourcesCite sources
Cite sources
 
Spotting
SpottingSpotting
Spotting
 
Taming the Monolith - Microservices Meetup Hamburg
Taming the Monolith - Microservices Meetup HamburgTaming the Monolith - Microservices Meetup Hamburg
Taming the Monolith - Microservices Meetup Hamburg
 
Trust at the Interface of Start-up and Enterprise
Trust at the Interface of Start-up and EnterpriseTrust at the Interface of Start-up and Enterprise
Trust at the Interface of Start-up and Enterprise
 
Papaya webinar: leveraging lifecycle
Papaya webinar: leveraging lifecyclePapaya webinar: leveraging lifecycle
Papaya webinar: leveraging lifecycle
 
Automated Interactions With WorldCat: A Look at OCLC’s WorldCat Metadata API
Automated Interactions With WorldCat:  A Look at OCLC’s WorldCat Metadata APIAutomated Interactions With WorldCat:  A Look at OCLC’s WorldCat Metadata API
Automated Interactions With WorldCat: A Look at OCLC’s WorldCat Metadata API
 
MicroServices: Advantages ans Disadvantages
MicroServices: Advantages ans DisadvantagesMicroServices: Advantages ans Disadvantages
MicroServices: Advantages ans Disadvantages
 
Ransomware Presentation
Ransomware PresentationRansomware Presentation
Ransomware Presentation
 
Eng 104 presentation
Eng 104 presentationEng 104 presentation
Eng 104 presentation
 
Technology Careers v2.0 SP1 Ultimate Edition
Technology Careers v2.0 SP1 Ultimate EditionTechnology Careers v2.0 SP1 Ultimate Edition
Technology Careers v2.0 SP1 Ultimate Edition
 
Hack The Capitol - The Unlikely Romance - Critical Infrastructure Edition
Hack The Capitol - The Unlikely Romance - Critical Infrastructure EditionHack The Capitol - The Unlikely Romance - Critical Infrastructure Edition
Hack The Capitol - The Unlikely Romance - Critical Infrastructure Edition
 

More from jstogdill

Devops and Intentional Emergence - Velocity Conference
Devops and Intentional Emergence - Velocity ConferenceDevops and Intentional Emergence - Velocity Conference
Devops and Intentional Emergence - Velocity Conference
jstogdill
 
Corporate Evolution (Strata NY 2013)
Corporate Evolution (Strata NY 2013)Corporate Evolution (Strata NY 2013)
Corporate Evolution (Strata NY 2013)
jstogdill
 
The intentionally emergent enterprise
The intentionally emergent enterpriseThe intentionally emergent enterprise
The intentionally emergent enterprisejstogdill
 
W-JAX Keynote - Big Data and Corporate Evolution
W-JAX Keynote - Big Data and Corporate EvolutionW-JAX Keynote - Big Data and Corporate Evolution
W-JAX Keynote - Big Data and Corporate Evolution
jstogdill
 
SOA, OTD, and Web 2.0 = Collaboration
SOA, OTD, and Web 2.0 = CollaborationSOA, OTD, and Web 2.0 = Collaboration
SOA, OTD, and Web 2.0 = Collaboration
jstogdill
 
Open Source in the DoD; Build It
Open Source in the DoD; Build ItOpen Source in the DoD; Build It
Open Source in the DoD; Build It
jstogdill
 
Coding Is Maneuver
Coding Is  ManeuverCoding Is  Maneuver
Coding Is Maneuver
jstogdill
 

More from jstogdill (7)

Devops and Intentional Emergence - Velocity Conference
Devops and Intentional Emergence - Velocity ConferenceDevops and Intentional Emergence - Velocity Conference
Devops and Intentional Emergence - Velocity Conference
 
Corporate Evolution (Strata NY 2013)
Corporate Evolution (Strata NY 2013)Corporate Evolution (Strata NY 2013)
Corporate Evolution (Strata NY 2013)
 
The intentionally emergent enterprise
The intentionally emergent enterpriseThe intentionally emergent enterprise
The intentionally emergent enterprise
 
W-JAX Keynote - Big Data and Corporate Evolution
W-JAX Keynote - Big Data and Corporate EvolutionW-JAX Keynote - Big Data and Corporate Evolution
W-JAX Keynote - Big Data and Corporate Evolution
 
SOA, OTD, and Web 2.0 = Collaboration
SOA, OTD, and Web 2.0 = CollaborationSOA, OTD, and Web 2.0 = Collaboration
SOA, OTD, and Web 2.0 = Collaboration
 
Open Source in the DoD; Build It
Open Source in the DoD; Build ItOpen Source in the DoD; Build It
Open Source in the DoD; Build It
 
Coding Is Maneuver
Coding Is  ManeuverCoding Is  Maneuver
Coding Is Maneuver
 

Recently uploaded

The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 

Recently uploaded (20)

The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 

Agility and security

Editor's Notes

  1. A political working class.
  2. James Watt and his contemporaries thought they were inventing a form of locomotion, but they were unleashing social gravitational forces.
  3. The machine led to political movements around the world. May 4th movement in China pictured.
  4. Reductionism, a new mode of thought, came from the machine.
  5. Leonard Kleinrock, Lawrence Roberts, Robert Kahn, and Vint Cerf thought they were building a computer network…
  6. It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  7. It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  8. It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  9. It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  10. It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  11. It is ushering in a period of decentralized organizations, global interdependencies, strained national sovereignty, geo-spanning niche cultures, long tail enablement, surprising forms of collective production, new forms of political participation, complex non-linear systems, non-state (or tacitly-state-sponsored) cyber conflict and on and on…
  12. Modernism and reductionism already took a drubbing in the postmodern counter-culture of the 70’s, and now they are in their final steep decline. They are being supplanted by a new kind of network empiricism that will exert its own gravitational force on our social and organizational fabric.
  13. Rouge River Ford plant by Sheeler – corporations became ever larger, compelled by economies of scale and concentration of capital.
  14. Frederick Taylor. Harbinger of reductionism, planning, and control.
  15. Data processing
  16. Connective backplane
  17. Waggle dance for consensu
  18. The brain of the corpus enterprise
  19. The brain of the corpus enterprise
  20. Stand knee deep cursing the tide?
  21. Aside: My mom knows fractals, she grows these in her garden.