If anything screams wireless…
There has got to be a better way.
One day people are going to laugh their heads off at they way we did technology.
(Credit Photo: Andy Blumenthal)
How About Google Fiber for Washington, D.C.?
– Lead, by example, the rest of the nation forward.
– Speed up the functioning of the government.
– Helpful for Emergency Management
– The Patriotic thing to do! 😉
All Opinions my own.
(Source Photo: here with attribution to Cameron Yee, & no idea why it’s in Spanish, but I like it!)
My wife took this photo today at The Drupal for Government Conference at NIH.
The man in the photo was not only participating in the conference, but also taking notes on his Apple Macbook Air.
It is incredible how technology is helping us do our jobs and be ever more productive.
This is the vision of technology taking us beyond the natural limits we all have and face.
I remember a few years ago when I was in the hospital for something and feeling bad about myself, and my wife brought me a laptop and said “Write!”–it was liberating and I believe helped me heal and recuperate.
I wonder if hospitals in the future will regularly provide computers and access to patients to not only keep them connected with their loved ones, but also let them have more options for entertainment, creativity, and even productivity, to the extent they can, while getting well.
Kudos to this gentleman–he is truly a role model and inspiration for us all.
(Source Photo: Dannielle Blumenthal)
Information Security, like all security, needs to be managed on a risk management basis.
This is a fundamental principle that was prior advocated for the Department of Homeland Security, by the former Secretary Michael Chertoff.
The basic premise is that we have limited resources to cover ever changing and expanding risks, and that therefore, we must put our security resources to the greatest risks first.
Daniel Ryan and Julie Ryan (1995) came up with a simple formula for determining risks, as follows:
– Threats = those who wish do you harm.
– Vulnerabilities = inherent weaknesses or design flaws.
– Countermeasures = the things you do to protect against the dangers imposed.
[Together, threats and vulnerabilities, offset by any countermeasures, is the probability or likelihood of a potential (negative) event occurring.]
– Impacts = the damage or potential loss that would be done.
Of course, in a perfect world, we would like to reduce risk to zero and be completely secure, but in the real world, the cost of achieving total risk avoidance is cost prohibitive.
For example, with information systems, the only way to hypothetically eliminate all risk is by disconnecting (and turning off) all your computing resources, thereby isolating yourself from any and all threats. But as we know, this is counterproductive, since there is a positive correlation between connectivity and productivity. When connectivity goes down, so does productivity.
Thus, in the absence of being able to completely eliminate risk, we are left with managing risk and particularly with securing critical infrastructure protection (CIP) through the prioritization of the highest security risks and securing these, going down that list until we exhaust our available resources to issue countermeasures with.
In a sense, being unable to “get rid of risk” or fully secure ourselves from anything bad happening to us is a philosophically imperfect answer and leaves me feeling unsatisfied–in other words, what good is security if we can’t ever really have it anyway?
I guess the ultimate risk we all face is the risk of our own mortality. In response all we can do is accept our limitations and take action on the rest.
(Source Photo: here with attribution to martinluff)
I’ve always been interested in maps, geography, and geospatial information systems (GIS).
Forget James Bond gadgets or Dick Tracy 2-way wrist-watches, the new concept iWatch is the one to drool over.
>Information technology is not just about data centers, desktops, and handheld devices anymore. These days, technology is everywhere—embedded in all sorts of devices from cars and toaster ovens to traffic lights and nuclear power plants. Technology is pervasive in every industry from telecommunications to finance and from healthcare to consumer electronics.
Generally, embedded systems are dedicated to specific tasks, while general-purpose computers can be used for a variety of functions. In either case, the systems are vital for our everyday functioning.
Government Computer News, 15 December 2008 reports that “thanks to the plummeting cost of microprocessors, computing…now happens in automobiles, Global Positioning Systems, identification cards and even outer space.
The challenge with embedded systems are that they “must operate on limited resources—small processors, tiny memory and low power.”
Rob Oshana, director of engineering at Freescale Semiconductor says that “With embedded it’s about doing as much as you can with as little as you can.”
What’s new—haven’t we had systems embedded in automobiles for years?
“Although originally designed for interacting with the real world, such systems are increasingly feeding information into larger information systems,” according to Wayne Wolf, chair of embedded computing systems at Georgia Institute of Technology.
According to Wolf, “What we are starting to see now is [the emergence] of what the National Science Foundation is called cyber-physical systems.”
In other words, embedded systems are used for command and control or information capture in the physical domain (like in a car or medical imaging machine), but then they can also share information over a network with others (think OnStar or remote medical services).
When the information is shared from the car to the Onstar service center, information about an accident can be turned into dispatch of life-saving responders. Similarly, when scans from a battlefield MRI is shared with medical service providers back in the States, quality medical services can be provided, when necessary, from thousands of miles away.
As we should hopefully have all come to learn after 9-11, information hoarding is faux power. But when information is shared, the power is real because it can be received and used by others and others, so that its influence is exponential.
Think for example, of the Mars Rover, which has embedded systems for capturing environmental samples. Left alone, the information is contained to a physical device millions of miles away, but sharing the information back to remote tracking stations here on Earth, the information can be analyzed, shared, studied, and so forth with almost endless possibilities for ongoing learning and growth.
The world has changed from embedded systems to a universe of connected systems.
Think distributed computing and the internet. With distributed computing, we are silos or separate domains of information, but by connecting the islands of information using the internet for example, we can all harness the vast amounts of information out there and in turn process it within our own lives and contribute back information to others.
The connection and sharing is our strength.
In the intelligence world, information is often referred to as dots, and it is the connection of the dots that make for viable and actionable intelligence.
As people, we are also proverbially just little dots in this big world of ours.
But as we have learnt with social media, we are able to grow as individuals and become more potent and more fulfilled human beings by being connected with others—we’ve gone from doing this in our limited physical geographies to a much larger population in cyberspace.
In the end, information resides in people or can be embedded in machines, but connecting the information to with other humans and machines is the true power of the information technology.