This document summarizes Richard Thomas' presentation on emerging technologies anchored in the cloud. It discusses the challenges faced by the biopharma industry related to regulatory pressures, faster development timelines, and rising costs. It then outlines Quintiles' approach to addressing these challenges through a flexible cloud-based platform that allows access from any device, collaboration across systems, social media integration, and management of services rather than individual devices. The platform aims to standardize systems, allow bring your own IT, enable common sense social media use, implement a policy of trust but verify, and continue building out the Quintiles cloud.
The document discusses emerging technologies anchored in the cloud and the challenges faced by the biopharma industry in regulatory development and financial areas. It then provides details on FlexDesk, a solution that allows single click device provisioning from any location along with examples of how FlexDesk helped Quintiles respond effectively to various crises situations around the world such as earthquakes in Chile and Japan as well as civil unrest in Egypt.
Las vitaminas son compuestos heterogéneos esenciales para la vida que deben ingerirse de forma equilibrada y en dosis adecuadas para promover el correcto funcionamiento fisiológico. Se clasifican en hidrosolubles como las vitaminas del grupo B y la C, y liposolubles como las vitaminas A, D, E y K. Cumplen funciones vitales como la visión, coagulación, absorción de calcio y defensa ante infecciones.
Assistencia de media e alta complexidade no SUSFisioterapeuta
A integralidade da assistência à saúde no SUS significa que o sistema deve garantir atendimento completo para todos os cidadãos, sem limitações, por meio de ações e serviços preventivos e curativos, individuais e coletivos, nos diferentes níveis de complexidade do sistema de saúde. Isso inclui tanto a atenção básica quanto a atenção de média e alta complexidade. A Constituição Federal e a lei que regulamentou o SUS estabeleceram a integralidade como um princípio fundamental do sistema.
Crocodile asks various animals to look at his sore tooth but they refuse, fearing he will eat them. Ostrich agrees to help. When she puts her head in his mouth, Crocodile snaps down due to being hungry. As Ostrich pulls her head out, her neck stretches longer and longer until she escapes. Ostrich is left with a long neck that allows her to reach high berries and see far, while Crocodile apologizes for hurting her due to his hunger.
Want to know the secret of success? What to get that job? Do you crave financial freedom? Are you NOT at the level you know you can be at? This presentation will propel you to greater heights......... Money, wisdom, youth, potentials, leaderships etc are wrapped up in this presentation. This has been given to thousands of young people who have transformed their lives. So can you!
The document discusses emerging technologies anchored in the cloud and the challenges faced by the biopharma industry in regulatory development and financial areas. It then provides details on FlexDesk, a solution that allows single click device provisioning from any location along with examples of how FlexDesk helped Quintiles respond effectively to various crises situations around the world such as earthquakes in Chile and Japan as well as civil unrest in Egypt.
Las vitaminas son compuestos heterogéneos esenciales para la vida que deben ingerirse de forma equilibrada y en dosis adecuadas para promover el correcto funcionamiento fisiológico. Se clasifican en hidrosolubles como las vitaminas del grupo B y la C, y liposolubles como las vitaminas A, D, E y K. Cumplen funciones vitales como la visión, coagulación, absorción de calcio y defensa ante infecciones.
Assistencia de media e alta complexidade no SUSFisioterapeuta
A integralidade da assistência à saúde no SUS significa que o sistema deve garantir atendimento completo para todos os cidadãos, sem limitações, por meio de ações e serviços preventivos e curativos, individuais e coletivos, nos diferentes níveis de complexidade do sistema de saúde. Isso inclui tanto a atenção básica quanto a atenção de média e alta complexidade. A Constituição Federal e a lei que regulamentou o SUS estabeleceram a integralidade como um princípio fundamental do sistema.
Crocodile asks various animals to look at his sore tooth but they refuse, fearing he will eat them. Ostrich agrees to help. When she puts her head in his mouth, Crocodile snaps down due to being hungry. As Ostrich pulls her head out, her neck stretches longer and longer until she escapes. Ostrich is left with a long neck that allows her to reach high berries and see far, while Crocodile apologizes for hurting her due to his hunger.
Want to know the secret of success? What to get that job? Do you crave financial freedom? Are you NOT at the level you know you can be at? This presentation will propel you to greater heights......... Money, wisdom, youth, potentials, leaderships etc are wrapped up in this presentation. This has been given to thousands of young people who have transformed their lives. So can you!
This document outlines a proposed intervention project to improve the attitude towards reading of a Year 2 student with Autism. The student, named Alex, has a poor attitude towards reading and avoids literacy tasks. The intervention will involve creating five multimodal "readers" tailored to Alex's science interests over ten days. Data on Alex's reading attitude will be collected before and after through tests and observations to analyze the effectiveness of student-directed texts in improving his reading attitude. Relevant literature on reading attitude, Autism, and mobile technologies will inform the project's design.
Las proteínas son biomoléculas orgánicas formadas por la unión de aminoácidos que cumplen funciones estructurales, contráctiles, de transporte, bioquímicas y otras en los seres vivos. Poseen un papel esencial en la construcción y reparación de tejidos y en la regulación del metabolismo. Un exceso de proteínas puede sobrecargar el hígado y los riñones y causar problemas cardiovasculares y obesidad, mientras que una falta de ellas provoca debilidad muscular y vulnerabilidad a infe
Fisioterapia na Mobilização Precoce na UTI Fisioterapeuta
O documento descreve um estudo que avaliou a influência da mobilização precoce no tempo de internação em Unidade de Terapia Intensiva. O estudo incluiu 14 pacientes em um grupo de mobilização precoce e 14 em um grupo controle, e avaliou métricas como força muscular, níveis de funcionalidade e tempo de internação. Embora não tenha encontrado redução no tempo de internação, o grupo de mobilização precoce apresentou melhorias na força respiratória e nível funcional.
El documento trata sobre el agua y los electrolitos en el cuerpo humano. Explica que el agua es esencial para la vida y desempeña funciones como solvente y transportista de sustancias. Los electrolitos, como el sodio, potasio y cloro, mantienen la presión osmótica y el equilibrio ácido-base. Un exceso o déficit de agua o electrolitos puede causar deshidratación, edemas, alteraciones en la presión arterial y otros problemas.
Principles and theories of Learning( Social Constructivism, Multiple Intellig...Christian Sario
This document discusses principles and theories of learning, including social constructivism, multiple intelligences, and brain-based learning. It provides details on social constructivism, outlining its key assumptions that knowledge is socially constructed through human interaction and culture, and learning is a social activity. The document also summarizes Lev Vygotsky, Jean Piaget, and Jerome Bruner's contributions to social constructivism. It describes perspectives on facilitating social constructivist learning and instructional models based on this perspective, emphasizing collaboration. The theory of multiple intelligences identifying eight types of intelligence is overviewed.
Keynote presentation for NoSQL Now! 2014 conference.
* Why there will be Internet of Things as commonly conceived
* The IoT as a Big Data problem
* The rise of Big Metadata
* Imagining the Internet of Light Bulbs
* Systems Thinking and Light Bulb Architecture
* The 'WItnesses' Principle
* Security and Privacy with the IoT
* A Species and its Data
How to Measure the Security of your Network DefensesPECB
To defend networks, we should be able to measure their security performance. I’m going to show you the exact techniques to measure the security of portions of your internal networks, such as anti-virus, malware and anomalous event detection. Then we will apply the same techniques to compare the security of classes of protective security products even though vendors don’t supply such specifications.
Main points covered:
• How to measure security and compare the effectiveness of protective devices as a function of time
• The internal process mechanism is immaterial to system measurement; signature-based A/V, rule-based binary decision making, heuristics, deep learning or any possible hybrid
• Attendees will be introduced and receive the math, the tools, charts and schematics on how to measure their own security
Presenter:
Winn has lived Security since 1983, and now says, “I think, maybe, I’m just starting to understand it.” His predictions about the internet & security have been scarily spot on. He coined the term “Electronic Pearl Harbor” while testifying before Congress in 1991 and showed the world how and why massive identify theft, cyber-espionage, nation-state hacking and cyber-terrorism would be an integral part of our future. He was named the “Civilian Architect of Information Warfare,” by Admiral Tyrrell of the British MoD.
Recorded webinar link: https://youtu.be/F8Fs4yE_CUU
This document discusses how telecommunications companies can survive and prosper in the 21st century. It notes that technology, competition, and customer demands are changing rapidly. Companies that hold onto the past will die. The document recommends that telecom companies recognize changes that have already happened and are still to come, look for big opportunities, and change their business models. It suggests stopping dumb questions and assumptions about things like bandwidth needs, network control, and customer behavior. The document predicts major changes like voice services being killed by VOIP, networks bypassed by wireless, and anyone providing network services. It recommends moving to all-IP networks and fiber deployment to drastically reduce costs. The biggest predictions are positioning systems surpassing communications, sensor networks becoming all
Taking the Long View: ICT Trends & DevelopmentsKristjan Rebane
Presentation to the foreign and exchange students at the Tallinn Technical University about the technological development in the world and technology trends as seen in 2011
BSidesHSV 2020 - Keynote - 2030: The Next DecadeChris Sistrunk
Infosec has seen a lot of change...from the 90s, 2000s, and 2010s...so much has happened. Yet, some things remain the same (and why all of us have jobs). Now that we've crossed into 2020...what are our lessons learned and how can we apply them?
Let's take a look forward to Security 2030: the next decade.
The Internet of Things - Taking the Web to the EverydayMartin Spindler
The document discusses the emerging concept of the Internet of Things, where everyday objects are connected to the internet and able to send and receive data. It notes that the number of internet-connected devices is growing rapidly and will exceed 40 billion by 2020. Examples discussed include smart home devices, sensors that monitor energy usage, and health monitors worn on the body. The document argues that this proliferation of connected devices will weave the internet into the very fabric of daily life.
Learn how the history of the Web relates to your online marketing success. The presentation covers the history of the Internet from the launch of Sputnik up to 2013.
For speaking engagements please contact me via: http://vimi.co/contact/
Ubicomp+Sustainability October 2015, Keynote at euc2015Adrian Friday
ICT itself now accounts for 10% of global energy demand - and climbing - controlling this impact is not yet a factor in systems design or in most CS curricula. I’m drawn by Computer Science's potential for addressing large scale societal challenges, such as climate change. In this talk I firstly offer a glimpse at the insights for Ubicomp and human-computer system design through the lens of our recent studies of energy use in the home, and of mobile data demand; and secondly, discuss ways in which we might evolve such systems to more profoundly challenge ‘the normal way’ energy is used.
The Future of Your Cybersecurity Career: Market Demand VS Talent ShortagePECB
The Future of Your Cybersecurity Career: Market Demand VS Talent Shortage
The world is currently lacking some 2 million cybersecurity experts. That number is expected to double shortly, as more cyber-kinetic and anthro-cyber-kinetic (people, cyber and physical) systems are productized for industry and mass consumption.
At the same time, cybersecurity practitioners have become laser-focused on insanely complex, highly verticalized, specific subsets of our industry. Rough translation: we tend to train and hire skill-set specialists versus security generalists. Security professionals often have trouble talking to each other because so many specializations use different nomenclatures, terms, and acronyms; dozens of technically disparate lingua francas. We have forgotten about teaching strategic generalities and interdisciplinarianism. Overspecialization and isolation from other technical fields are two clear recipes for failure.
This webinar examines a variety of skills and knowledge that will greatly assist the professional and benefit the cybersecurity field as well, by dealing in higher levels of abstraction versus highly specialized knowledge and practice.
Main points covered:
Presenter:
Our presenter for this webinar Winn Schwartau is one of the world’s top experts on security, privacy, infowar, cyber-terrorism, and related topics. Provocative, informed, challenging, he’s on the leading edge of thinking, writing and speaking. Highly technical security subjects are made understandable, entertaining, engaging and thought-provoking. Audiences find themselves challenged with original ideas which are related through historical analogy and metaphor and made relevant to the present and future world. He is the founder of The Security Awareness Company.
Organizer: Ardian Berisha
Date: July 10th, 2019
Recorded Webinar: https://youtu.be/uRsARV3ULy4
How European start-ups can make a business out of the US shut-down of privacy...Moldova ICT Summit
How European start-ups can make a business out of the US shut-down of privacy by the NSA, Robert Knapp, Co-founder and CEO, CyberGhost, Germany-Romania
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...adamdeja
As the air gap between our daily lives and the Internet continues to shrink the security of our personal data and devices grows in importance. We are facing the daily threat of putting 2000s era computers bolted to toasters online while expecting them to defend against 2017 capable attackers. This talk will explore the continuing trend of IoT, discuss how we’ve been here before, and layout strategies for keeping pace with attackers in the future. This talk will focus on enumerating this risk, discuss the challenges involved, and explore solutions.
First, we will examine this history of how we got here, and what it means to say “security is a snapshot in time.” We then introduce the idea of shared ken – the range of one’s knowledge or sight – and how it impacts security. Third, we discuss the influence of data as code, the meta game, and secrecy as a way of mastering impact and ken.
This talk will allow attendees to walk away with
A holistic view of the history of computer security and how it impacts them today
The importance of extending the range of collective vision to reduce blind spots
Practical advice for BSiders to grow their mindset and improve their impact
Adam is a founding partner and Chief Executive Officer at Deja vu Security. He is dedicated to the leadership and relentless innovation in Deja’s products and services. Previously he has lead teams conducting application and hardware penetration tests for the Fortune 500 technology firms. Adam is a contributing author to multiple security books, benchmarks, tools, and DARPA research projects. Adam holds a degree in Computer Science and a Masters from Carnegie Mellon University in Information Networking.
The Evolving Data Sphere - David Orban - H+ Summit @ HarvardHumanity Plus
David Orban
Chairman, Humanity+
Advisor, Singularity University
Founder & Chief Evangelist, WideTag, Inc.
Intelligence Augmentation, Decision Power, And The Emerging Data Sphere
Human civilization depends on our ability to manage its increasing complexity. Behaviors, processes, and decisions that in the past were tolerated by the complex adaptive system we call Earth, are now more and more showing unforeseen consequences in unexpected places.
Many of our theories about the workings of the world are hampered in their predictive power by the lack of data, and suffer garbage-in, garbage-out effects. New interconnected sensor networks, fast, and ubiquitous communications, and the parallel power of our massive software systems are the never too soon answer to this need, and promise to revolutionize the way we understand, and act upon the planet.
The data sphere we are building, developing through every traceable action of millions of people, and billions, soon trillions of devices, designs a fine-grained picture of necessary understanding, and empowers us to believe that we can indeed aim to evolve our civilization, and to move it to the next levels of complexity, and achievement of human potential.
David Orban is an entrepreneur and visionary. He is Chairman of Humanity+, Advisor of the Singularity University, a Founder of WideTag, Inc., a high technology start-up company providing the infrastructure for an open Internet of Things. David shapes the strategic vision of its technologies by developing the policies and communication steps necessary to enable constructive progress. He is further a Scientific Advisory Board Member for the Lifeboat Foundation. David cuts across the limits of deep specialization to contribute to the new renaissance. He explains, “My vision is at the crossroads of technology and society as defined by their co-evolution.” David Orban’s personal motto is, “What is the question I should be asking?” This concept is his vehicle to accelerating cycles of invention and innovation in order to build the new world ahead.
The document provides information about contributing content to the magazine 2600. It requests various types of articles and information, such as profiles of long distance companies and computer systems, reviews of security devices, lists of phone numbers and reference books, tutorials on computer topics, true stories, maps of computer networks, and analyses of new legislation. It also requests access to computer networks, continued comments and questions from readers, and clippings from local papers. The document offers small payments for writers and those who obtain advertising. All contributions should be sent to the magazine's PO Box.
This document outlines a proposed intervention project to improve the attitude towards reading of a Year 2 student with Autism. The student, named Alex, has a poor attitude towards reading and avoids literacy tasks. The intervention will involve creating five multimodal "readers" tailored to Alex's science interests over ten days. Data on Alex's reading attitude will be collected before and after through tests and observations to analyze the effectiveness of student-directed texts in improving his reading attitude. Relevant literature on reading attitude, Autism, and mobile technologies will inform the project's design.
Las proteínas son biomoléculas orgánicas formadas por la unión de aminoácidos que cumplen funciones estructurales, contráctiles, de transporte, bioquímicas y otras en los seres vivos. Poseen un papel esencial en la construcción y reparación de tejidos y en la regulación del metabolismo. Un exceso de proteínas puede sobrecargar el hígado y los riñones y causar problemas cardiovasculares y obesidad, mientras que una falta de ellas provoca debilidad muscular y vulnerabilidad a infe
Fisioterapia na Mobilização Precoce na UTI Fisioterapeuta
O documento descreve um estudo que avaliou a influência da mobilização precoce no tempo de internação em Unidade de Terapia Intensiva. O estudo incluiu 14 pacientes em um grupo de mobilização precoce e 14 em um grupo controle, e avaliou métricas como força muscular, níveis de funcionalidade e tempo de internação. Embora não tenha encontrado redução no tempo de internação, o grupo de mobilização precoce apresentou melhorias na força respiratória e nível funcional.
El documento trata sobre el agua y los electrolitos en el cuerpo humano. Explica que el agua es esencial para la vida y desempeña funciones como solvente y transportista de sustancias. Los electrolitos, como el sodio, potasio y cloro, mantienen la presión osmótica y el equilibrio ácido-base. Un exceso o déficit de agua o electrolitos puede causar deshidratación, edemas, alteraciones en la presión arterial y otros problemas.
Principles and theories of Learning( Social Constructivism, Multiple Intellig...Christian Sario
This document discusses principles and theories of learning, including social constructivism, multiple intelligences, and brain-based learning. It provides details on social constructivism, outlining its key assumptions that knowledge is socially constructed through human interaction and culture, and learning is a social activity. The document also summarizes Lev Vygotsky, Jean Piaget, and Jerome Bruner's contributions to social constructivism. It describes perspectives on facilitating social constructivist learning and instructional models based on this perspective, emphasizing collaboration. The theory of multiple intelligences identifying eight types of intelligence is overviewed.
Keynote presentation for NoSQL Now! 2014 conference.
* Why there will be Internet of Things as commonly conceived
* The IoT as a Big Data problem
* The rise of Big Metadata
* Imagining the Internet of Light Bulbs
* Systems Thinking and Light Bulb Architecture
* The 'WItnesses' Principle
* Security and Privacy with the IoT
* A Species and its Data
How to Measure the Security of your Network DefensesPECB
To defend networks, we should be able to measure their security performance. I’m going to show you the exact techniques to measure the security of portions of your internal networks, such as anti-virus, malware and anomalous event detection. Then we will apply the same techniques to compare the security of classes of protective security products even though vendors don’t supply such specifications.
Main points covered:
• How to measure security and compare the effectiveness of protective devices as a function of time
• The internal process mechanism is immaterial to system measurement; signature-based A/V, rule-based binary decision making, heuristics, deep learning or any possible hybrid
• Attendees will be introduced and receive the math, the tools, charts and schematics on how to measure their own security
Presenter:
Winn has lived Security since 1983, and now says, “I think, maybe, I’m just starting to understand it.” His predictions about the internet & security have been scarily spot on. He coined the term “Electronic Pearl Harbor” while testifying before Congress in 1991 and showed the world how and why massive identify theft, cyber-espionage, nation-state hacking and cyber-terrorism would be an integral part of our future. He was named the “Civilian Architect of Information Warfare,” by Admiral Tyrrell of the British MoD.
Recorded webinar link: https://youtu.be/F8Fs4yE_CUU
This document discusses how telecommunications companies can survive and prosper in the 21st century. It notes that technology, competition, and customer demands are changing rapidly. Companies that hold onto the past will die. The document recommends that telecom companies recognize changes that have already happened and are still to come, look for big opportunities, and change their business models. It suggests stopping dumb questions and assumptions about things like bandwidth needs, network control, and customer behavior. The document predicts major changes like voice services being killed by VOIP, networks bypassed by wireless, and anyone providing network services. It recommends moving to all-IP networks and fiber deployment to drastically reduce costs. The biggest predictions are positioning systems surpassing communications, sensor networks becoming all
Taking the Long View: ICT Trends & DevelopmentsKristjan Rebane
Presentation to the foreign and exchange students at the Tallinn Technical University about the technological development in the world and technology trends as seen in 2011
BSidesHSV 2020 - Keynote - 2030: The Next DecadeChris Sistrunk
Infosec has seen a lot of change...from the 90s, 2000s, and 2010s...so much has happened. Yet, some things remain the same (and why all of us have jobs). Now that we've crossed into 2020...what are our lessons learned and how can we apply them?
Let's take a look forward to Security 2030: the next decade.
The Internet of Things - Taking the Web to the EverydayMartin Spindler
The document discusses the emerging concept of the Internet of Things, where everyday objects are connected to the internet and able to send and receive data. It notes that the number of internet-connected devices is growing rapidly and will exceed 40 billion by 2020. Examples discussed include smart home devices, sensors that monitor energy usage, and health monitors worn on the body. The document argues that this proliferation of connected devices will weave the internet into the very fabric of daily life.
Learn how the history of the Web relates to your online marketing success. The presentation covers the history of the Internet from the launch of Sputnik up to 2013.
For speaking engagements please contact me via: http://vimi.co/contact/
Ubicomp+Sustainability October 2015, Keynote at euc2015Adrian Friday
ICT itself now accounts for 10% of global energy demand - and climbing - controlling this impact is not yet a factor in systems design or in most CS curricula. I’m drawn by Computer Science's potential for addressing large scale societal challenges, such as climate change. In this talk I firstly offer a glimpse at the insights for Ubicomp and human-computer system design through the lens of our recent studies of energy use in the home, and of mobile data demand; and secondly, discuss ways in which we might evolve such systems to more profoundly challenge ‘the normal way’ energy is used.
The Future of Your Cybersecurity Career: Market Demand VS Talent ShortagePECB
The Future of Your Cybersecurity Career: Market Demand VS Talent Shortage
The world is currently lacking some 2 million cybersecurity experts. That number is expected to double shortly, as more cyber-kinetic and anthro-cyber-kinetic (people, cyber and physical) systems are productized for industry and mass consumption.
At the same time, cybersecurity practitioners have become laser-focused on insanely complex, highly verticalized, specific subsets of our industry. Rough translation: we tend to train and hire skill-set specialists versus security generalists. Security professionals often have trouble talking to each other because so many specializations use different nomenclatures, terms, and acronyms; dozens of technically disparate lingua francas. We have forgotten about teaching strategic generalities and interdisciplinarianism. Overspecialization and isolation from other technical fields are two clear recipes for failure.
This webinar examines a variety of skills and knowledge that will greatly assist the professional and benefit the cybersecurity field as well, by dealing in higher levels of abstraction versus highly specialized knowledge and practice.
Main points covered:
Presenter:
Our presenter for this webinar Winn Schwartau is one of the world’s top experts on security, privacy, infowar, cyber-terrorism, and related topics. Provocative, informed, challenging, he’s on the leading edge of thinking, writing and speaking. Highly technical security subjects are made understandable, entertaining, engaging and thought-provoking. Audiences find themselves challenged with original ideas which are related through historical analogy and metaphor and made relevant to the present and future world. He is the founder of The Security Awareness Company.
Organizer: Ardian Berisha
Date: July 10th, 2019
Recorded Webinar: https://youtu.be/uRsARV3ULy4
How European start-ups can make a business out of the US shut-down of privacy...Moldova ICT Summit
How European start-ups can make a business out of the US shut-down of privacy by the NSA, Robert Knapp, Co-founder and CEO, CyberGhost, Germany-Romania
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...adamdeja
As the air gap between our daily lives and the Internet continues to shrink the security of our personal data and devices grows in importance. We are facing the daily threat of putting 2000s era computers bolted to toasters online while expecting them to defend against 2017 capable attackers. This talk will explore the continuing trend of IoT, discuss how we’ve been here before, and layout strategies for keeping pace with attackers in the future. This talk will focus on enumerating this risk, discuss the challenges involved, and explore solutions.
First, we will examine this history of how we got here, and what it means to say “security is a snapshot in time.” We then introduce the idea of shared ken – the range of one’s knowledge or sight – and how it impacts security. Third, we discuss the influence of data as code, the meta game, and secrecy as a way of mastering impact and ken.
This talk will allow attendees to walk away with
A holistic view of the history of computer security and how it impacts them today
The importance of extending the range of collective vision to reduce blind spots
Practical advice for BSiders to grow their mindset and improve their impact
Adam is a founding partner and Chief Executive Officer at Deja vu Security. He is dedicated to the leadership and relentless innovation in Deja’s products and services. Previously he has lead teams conducting application and hardware penetration tests for the Fortune 500 technology firms. Adam is a contributing author to multiple security books, benchmarks, tools, and DARPA research projects. Adam holds a degree in Computer Science and a Masters from Carnegie Mellon University in Information Networking.
The Evolving Data Sphere - David Orban - H+ Summit @ HarvardHumanity Plus
David Orban
Chairman, Humanity+
Advisor, Singularity University
Founder & Chief Evangelist, WideTag, Inc.
Intelligence Augmentation, Decision Power, And The Emerging Data Sphere
Human civilization depends on our ability to manage its increasing complexity. Behaviors, processes, and decisions that in the past were tolerated by the complex adaptive system we call Earth, are now more and more showing unforeseen consequences in unexpected places.
Many of our theories about the workings of the world are hampered in their predictive power by the lack of data, and suffer garbage-in, garbage-out effects. New interconnected sensor networks, fast, and ubiquitous communications, and the parallel power of our massive software systems are the never too soon answer to this need, and promise to revolutionize the way we understand, and act upon the planet.
The data sphere we are building, developing through every traceable action of millions of people, and billions, soon trillions of devices, designs a fine-grained picture of necessary understanding, and empowers us to believe that we can indeed aim to evolve our civilization, and to move it to the next levels of complexity, and achievement of human potential.
David Orban is an entrepreneur and visionary. He is Chairman of Humanity+, Advisor of the Singularity University, a Founder of WideTag, Inc., a high technology start-up company providing the infrastructure for an open Internet of Things. David shapes the strategic vision of its technologies by developing the policies and communication steps necessary to enable constructive progress. He is further a Scientific Advisory Board Member for the Lifeboat Foundation. David cuts across the limits of deep specialization to contribute to the new renaissance. He explains, “My vision is at the crossroads of technology and society as defined by their co-evolution.” David Orban’s personal motto is, “What is the question I should be asking?” This concept is his vehicle to accelerating cycles of invention and innovation in order to build the new world ahead.
The document provides information about contributing content to the magazine 2600. It requests various types of articles and information, such as profiles of long distance companies and computer systems, reviews of security devices, lists of phone numbers and reference books, tutorials on computer topics, true stories, maps of computer networks, and analyses of new legislation. It also requests access to computer networks, continued comments and questions from readers, and clippings from local papers. The document offers small payments for writers and those who obtain advertising. All contributions should be sent to the magazine's PO Box.
This document contains 25 multiple choice quiz questions testing knowledge about various topics in technology. Some of the questions ask about specific companies, inventions, laws, and other concepts related to computers, the internet, and tech industry. The questions provide brief descriptions or context clues with the correct answers bolded and italicized to fill in the blanks.
Introduction to the TAO Uct Sig, a team working on computational intelligence...Olivier Teytaud
The document discusses research from Tao-Uctsig, a special interest group within Tao focused on artificial intelligence. Tao has 11 permanent staff and around 22 PhD students/postdocs working across various fields of mathematics, computer science, and sciences. The SIG works on problems where computers make decisions, particularly challenges where humans are currently better than computers. Their work involves games, important applications, and previously included mathematics. Specific applications discussed include controlling a robot arm, analyzing strategy in Pokemon and Urban Rivals, solving Minesweeper puzzles, and Go. Industrial applications include helping optimize France's major electricity industry.
Rich Antcliff, Chief Technologist at NASA Langley Research Center, gave a presentation titled "Innovating the Future". The presentation discussed exponential technological growth, reverse engineering the brain, impacts of ongoing IT revolution on society, augmented and virtual reality, and digital transparency. It also covered robotics, human augmentation, global demographics, climate change, energy issues, and the importance of innovation to economic leadership. The goal was to illustrate how rapidly technology is advancing and transforming society.
Ethics in development of Information TechnologyAnKit Mhatre
When people are asked to give their opinion about technology as a whole, they seem to think in a more of a black-and-white way, a binary approach. Many people express that technology is more of a ‘job-destroyer’, ‘something which enslaves humans by making them dependent on itself’, some also say that it ‘makes us lazy and equips us with God-ly powers’, etc. However, in contrast to these points, other people claim that it’s ‘something which induces progress into the society’, ‘something that saves human lives and feeds the starving and the poor’, ‘which increases the standard of living’, and ‘which creates interesting and rewarding jobs’.
Speaking about the development, we, as people who are studying Information Technology, have learnt that the enormous field of Internet of Things (IoT) focusses on developing internet-connected applications which will make our lives easier and comfortable. In addition to the principles and practices which are expected to be followed during the development of the applications, there are some lesser emphasized facts too. These facts include an important factor of ETHICS.
Humans are accustomed to follow some ethics right from our birth, rather we are induced these ethics by our elders. The reason is quite simple – for the betterment of the society and to avoid any evil exploitation of the lesser intelligent people. However, modern capitalism tends to bend the traditional ethics. People resort to ease and comfort over what is right.
A lot of subtopics fall under the wide section of Ethics. They include:
1. Characterizing the Internet of Things
2. Privacy (Of the users as well as their valuable data)
3. Control (Who actually controls the collected data)
4. Environment (Concerns about the environment and practices)
5. Solutions (for the preservation of the principle of Ethics)
In this slide show, we are going to emphasize on the initial couple of topics.
Daniel J. Boorstin warns that technology can overwhelm and replace knowledge if we are not careful. The document discusses several emerging technologies and their potential dangers, including how automobiles contribute to air pollution, how nuclear power poses safety and environmental risks, and how advances in robotics and artificial intelligence could displace human jobs and potentially pose other threats if not properly managed. The key message is that while technology provides benefits, its development and use must be responsible and sustainable to avoid harmful social and environmental consequences.
Similar to Charlotte Cio Executive Summit August 2011 (20)
9. Challenges
• Two corporate
standards
• Validated desktops
• Two laptops
• Two sets of systems
• Deals happen fast
• All about people
• Business Continuity
9
10. Challenges
• Two corporate
standards
• Validated desktops
• Two laptops
• Two sets of systems
• Deals happen fast
• All about people
• Business Continuity
10
12. Needed:
Single click
provisioning
Any device,
anywhere
• But, lacked strong
business case
• Network, Storage,
Server upgrades &
standardization
12
14. Any Personal Computer Speeding Through the
Me
Internet
And Through a
Scary Wall of Fire
My Work Stuff. (Security Stuff)
Safe and Secure To a Server Where All My
Anytime! Anywhere! Yay! Quintiles Stuff is
(Funny people in IT run this)
FlexDesk….Connect, Work….It’s That Simple
15. Any Personal Computer Speeding Through the
Me
Internet
And Through a
Scary Wall of Fire
My Work Stuff. (Security Stuff)
Safe and Secure To a Server Where All My
Anytime! Anywhere! Yay! Quintiles Stuff is
(Funny people in IT run this)
FlexDesk….Connect, Work….It’s That Simple
16. CRISIS 11/26/08
04/15/09
02/27/10
01/25/11
Mumbai
USA/WW H1N1
Chile
Egypt
02/22/11
03/11/11
08/07/11
08/27/11
New Zealand
Japan
Dublin
USA (Irene!)
Quintiles Central Lab
Quintiles Affiliated Central Lab
Quintiles Offices
16
18. CRISIS 02/27/10 Chile
Heavy damage to Quintiles offices
-13th floor in Santiago closed, IT equipment destroyed
90 minutes later fully operational
-Data recovered in the Quintiles Cloud
-All data and desktops available pre-quake
Chile staff worked from home
-unaware recovery executed
-observed “it seems a little faster than usual”
18
20. CRISIS 01/25/11 Cairo, Egypt
Phones & Internet cut by State
-Intermitted network access
-Local data via Quintiles Cloud and Flexdesk
-Communication challenges
-Satellite phones as alternate, but risky
Civil unrest widespread
-#1 concern : staff safety- worked from home
-Local Internet Provider facility destroyed
-3G air cards & dial-up modems issued
-Google Earth used extensively to monitor the situation
20
22. CRISIS 03/11/11 Japan
Quintiles Ops Center
Bangalore, India
-Tokyo Data Center Normal
-Japan network online
-Voice communications unavailable
-Instant message & email ok
22
24. In Toshio’s words
2:00 PM
We were spending busy Friday afternoon at the office.
2:46 PM
Advance earthquake alert signal rang on some of mobile phones.
2:46 PM
Suddenly, the office building moved & it was longer than usual.
The move continued more than 5 minutes and during that period
the building shake many times.
2:50PM
News on TV alerted to the possibility of
A huge tsunami & identified the
epicenter.
24
25. In Toshio’s words
2:52PM
Seems the earthquake stopped & we slowly started looking around.
I send quick SMS to my family & I was so glad to get back SMS.
2:54PM
We start checking for damage to our office and look around to
make sure everyone is safe
2:55PM
One of our fortunes was that we did not lose network connection or
power so we started checking news on the Internet to get more
information about the earthquake.
2:56PM
Right after earthquake, all elevators stopped & mobiles were
already hard to connect. 25
26. In Toshio’s words
2:58PM
We did not get any alerts from our systems so we recognized that
everything was working fine.
3:00PM
The company announced that everyone can go home.
3:02PM
I started working to check other floors and find some damage, but
not serious, while the first Tsunami
reached northern Japan.
3:20PM
Met with senior management and
reported no damage to IT.
After that when I look outside, I saw
smoke near our office. 26
27. In Toshio’s words
3:20PM
At same time as manager meeting, TV news told us that the huge
Tsunami was more than we expected and possibility of much death
in that area.
3:30PM
Back at my desk, some of our IT team start leaving office, but some
of them already decide to stay overnight at the office because
their homes were too far away to walk.
3:40PM
When they get outside of building they
see many people walking to their
homes with their emergency bag and
safety cap.
27
28. In Toshio’s words
3:46PM
1 hour past, TV news had been
showing us live image of northern
Japan & Tsunami. Death wave
destroy everything in that area, it was
hard to believe anyone could survive.
We were starting to realize that the
damage of this earthquake and
Tsunami were huge with the possibility
of more than 1,000 deaths.
5:00PM
In IT, most had now left the Office, 4 decided to stay because their
home was too far to walk.
28
29. In Toshio’s words
6:30PM
I left the office to find my family.
7:30PM
I met my family at the elementary school
which was our temporary shelter. All
of them were fine, even my 11 month old
baby. She was sleeping without knowing
what had happened on this day.
9:00PM
I could go to my home with my family. There was some damage on
the inside wall, glasses/dishes/plates broken & Books on floor.
However, I was really glad that I could be home with my family. I
know that there were thousands of people staying outside. <end>
29
32. SOCIAL : CRITICAL
Maps & apps to find shelters,
assess damage, navigate around
Twitter
search messages(invaluable)
Facebook & SNS
Not widely used, helped connect
while real-time communications out
especially with colleagues overseas
BUT - Radio was king! 32
33. Any Personal Computer Speeding Through the
Me
Internet
And Through a
Scary Wall of Fire
My Work Stuff. (Security Stuff)
Safe and Secure To a Server Where All My
Anytime! Anywhere! Yay! Quintiles Stuff is
(Funny people in IT run this)
FlexDesk….Connect, Work….It’s That Simple
34. Flexibility: any device anywhere
Collaborate: IP for everything
Social: open access
Manage: the service not device,
Quintiles cloud is transparent to
our users
-Standardize then virtualize
-Bring your own IT
-Common sense social media
-Trust but verify
-Cloud build out
35. Quintiles’ Expertise
Data
+
+ Source Systems
+
Process &
Integrated Range
of Capabilities
The platform that Powers the Biopharma Industry
Quick to implement, easy to use
Better solutions, faster decisions…powering the New Health
36. Thank you.
Richard Thomas
Chief Information Officer
Richard.Thomas@Quintiles.com