Post on 08-Sep-2014
description
Accelerating Breakthrough
Business Technologies in Atlanta
Jack Shaw @jackshaw May 6, 2014
Making predictions
is very hard,
especially about the
future.
Yogi Berra
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Queen Elizabeth
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Boeing 707
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The First Four Waves of
Business Technology
Mainframe
70s
Internet
2000s
PC
80s
Client/Server
90s
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Each Wave of
Business Technology
• Requires deployment of a critical mass of its predecessor wave to achieve rapid growth and broad acceptance.
• Introduces new:
– Concepts
– Terminology
– Opportunities
– Concerns
• Has an exponentially greater impact on business and society than its predecessor.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Bandwidth Cost
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Computing Cost
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Storage Cost
World's First 4
TB 2.5-inch SSD
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Mobile phones vs. toothbrushes
• There are 7 billion people in the world.
• 4 billion use mobile phones.
• Just 3.5 billion own toothbrushes.
Atlanta Technology Companies
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Marketing Technology Stack
CMS Anywhere
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How does CMS Anywhere work?
1. Visitor requests a page from
an affiliate server.
2. Page with CMS Anywhere
tag script is returned to the
browser.
3. Tag script requests the
beacon script from the
CMS Anywhere server.
4. The affiliate hit is registered
in Sitecore Analytics.
5. The beacon script is formed
and delivered to the browser.
6. The beacon script fires
stylers and replacers in the
page.
7. The beacon script fires
pixels to report additional
information to the CMS
Anywhere server.
Lorem ipsum dolor sit amet
Vestibulum ultricies viverra viverra. Proin laoreet velit in erat sollicitudin
iaculis. Ut et vehicula leo. Curabitur non dolor elit. Morbi ac ante volutpat ante
sollicitudin posuere. Sed ut nibh ut felis hendrerit vulputate at vel tortor.
Suspendisse dui nibh, rutrum nec tempus vestibulum, tristique eget mauris.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut at mollis eros.
Suspendisse potenti. Duis ornare ornare tincidunt. Donec pellentesque aliquet
urna in facilisis. In hac habitasse platea dictumst. Proin tempor ultricies velit, sit
amet aliquam nunc aliquet eget.
<TAG> Lorem ipsum dolor sit amet
Donec dapibus accumsan pellentesque. Proin ullamcorper egestas ultricies.
Nam ac nulla lacus. Ut lorem tortor, dictum eu massa eget, aliquet ultrices
lectus. Nam ac dui gravida, dictum nulla et, convallis nisl. Cras fermentum
feugiat diam, quis gravida eros elementum eget. Ut gravida magna nunc, id
semper libero condimentum sit amet. Pellentesque laoreet dictum nulla vel
tempor
Werwerg
Werg
Werrwer
Wrht
Rwehjt
Wthjwtjrjeyrjjyrj
Etyj
Etyjeytjetyyjejye
Teyjtyje
Eyjyytjyjyukyukyujhghfdjihjdifhnojnoirhjneroijrnoejiojrhoirjejoihjeriojhoierj
hoihjojoe
Jeigheoihgieurhgherhjgoeingioejnoiejrnoe
Gijhijhiuohoiwhfjiojeoigjoiwerguj
Ssdg
Affiliate
Server
CMS
Anywhere
Server
<BEACON>
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Before CMS Anywhere
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
After CMS Anywhere
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
More Than Just Page Styling
Trust-Free Security
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Heartbleed
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
• $194
– Average Cost Per
Record Per Breach
in the USA.
Interesting Security Facts
• 28,765
– Average US Breach Exposed Records
– Excludes “Mega Breaches” (>100k)
• $5,403,644 – Average Total
Organizational Cost of
Data Breach in the
USA.
• 461 – Average Number of
Days Between
Breach and Discovery
Source: Ponemon Institute, 2013 Cost of Data Breach Study
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Castle and Moat Security
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
True End-End Encryption
• Browser-Based
• Platform / File Size / File Type Agnostic
• Client-Side Encryption/Decryption
• Encrypted Data –
At Rest AND In Transmission
• Zero Knowledge
• Provenance Attestation
& Irrefutable Time Stamp
• Full Audit Trail, “Chain of Custody”
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Current SafelyLocked Products:
– Truly Secure Managed File Transfer (SMFT)
– End/End Encryption
– Complete & Certifiable Audit Trail
– “Ad Hoc” and Registered User Sending Options
– Truly Secure Folder/File Sharing
– End/End Encryption
– Complete & Certifiable Audit Trail
– Multiple Upload/Download/Collaboration Options
– Combines SafelySendIt & SafelyShareIt into
Unified UI with all the features of both
plus
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Internet of Things
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Exponential Growth
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Smart Wine Shelf
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Smart Wine Shelf
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Smart Wine Shelf
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
What is Augmented Reality?
Augmented Reality
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Marketing Applications
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Technician Support
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Component Identification
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Internet of Transportation “Things”
Road Traffic Video Analytics
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Traffic & Safety Concerns
46
Wasted Time & Energy: In urban areas, over 30% of drive-time (and fuel) is consumed in stalled traffic!
Crowded Space: an assortment of undifferentiated app’s & devices aim to alert & divert drivers & routes
Poor Data: all current “app’s & devices” rely upon spotty and/or otherwise inaccurate, in short, too-little data
Expensive Upgrades: real-time big traffic data has entailed large investments in new/better sensing devices
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
MetroTech Solution
47
Video Analytics: converts existing video cameras into multi-dimensional traffic sensors running in the cloud.
Traffic Analytics: aggregates & analyzes traffic data and broadcasts to open APIs on AT&T-managed networks
Predictive Analytics: “searches the future”— e.g., for emerging congestion, planning, zoning, etc
Big Traffic Data: High Definition (HD) real-time, cloud-based information aggregation & publishing
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The IntelliSection™
Optional Wireless
Video Camera
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Metro-wide Real-time Info
• Vehicle
Integration
• Mobile
Application
• Traffic Data
Analytics
49
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Video Analytics in Buckhead
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Peachtree and Piedmont: 4-Way
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
P’tree and Piedmont: Close-Up
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
End
-Use
r D
evic
es
Video Analytics In the Cloud
53
Exis
tin
g a
nd
/or
New
D
OT
& P
ub
lic S
afe
ty
Vid
eo F
eed
s
Legacy Investments
Cloud Computing Traffic Information Service
Optical Fiber MAN and/or FTE Wireless
New Value
HD Traffic Data Aggregation
HD Big Traffic Data Publishing
Road Traffic Video Analytics
metrotech-net.com
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Internet of Health “Things”
Remote Non-Contact
Patient Monitoring
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Non-Contact Patient Monitoring
SENSIOTEC’S VIRTUAL MEDICAL ASSISTANT®
The Future of Remote Patient
Monitoring
The World’s First FDA-
Cleared Truly Non-Contact
Vital Signs Monitor
Measures Heart and Lung
Function, Torso Movement
and Bed Exit
High Value, Low Cost,
Location-Agnostic Patient
Care
PERSONAL
DATA
SOLUTION
Instantly Relays Real-Time Data
Vitals Monitoring: Alerts Caregivers to Abnormal
Cardiorespiratory Activity
Pressure Ulcer Prevention: Compels Caregivers to Respond to Absence of Movement
Fall Prevention: Alerts Caregivers to
Imminent Bed Exit User-Centered Design
Powerful Patient Management Tools
Captures, Records and Delivers Continuous Real-time
Data to Nurses’ Stations, Tablets or Smartphones
Trends data for predictive management
Highlights Abnormalities
Alerts audibly and visually
WEB
SERVER
MEANINGFUL
DATA
SENSOR
PANEL DECISION
SUPPORT
DEPERSONALIZED
BIG DATA PHARMA 2 ns
EMR
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
In Development
If this baby was being monitored by
Sensiotec’s technology . . . . . . he would look like this.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How Do We Pay?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
ACCEPT BITCOIN
BitPay
What Is Bitcoin?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Blockchain Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Blockchain Works II
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Lower Cost THAN CREDIT CARDS
Lower Risk NO FRAUD OR
CHARGEBACKS
Sell Globally BORDERLESS
PAYMENTS
Why Accept Bitcoin?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BitPay’s Model
• Payment Processor
• Contract with
Merchant as
Merchant’s Agent
to receive and
settle payments
• Tools for
E-commerce,
Billing, and Retail Customer
Merchant
Checkout
BitPay
Payment
Gateway
Payment
Instructions
Payment
Confirmation
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BitPay Funds Flow
Customer
Wallet
Bitcoin
Network
BitPay
Wallet
BitPay
Bank
F/X
Exchange
Merchant’s
Bank
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BitPay Reduces Risk
Guaranteed Exchange
Rate
Daily Bank Settlement
to 33 countries
Accounting Import
GAAP Reporting
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
All-Inclusive Pricing
FLAT MONTHLY FEE
Plans from$30-$3000/month
0% TRANSACTION FEES
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BIT INC
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
ACCEPT BITCOIN
https://bitpay.com/
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Digital Artwork
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Fifth Wave
Mainframe
60s – 70s
Intelligent Systems
2010s
Internet
2000s
PC
80s
Client/Server
90s
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Autonomous Systems
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Monitoring and Planning Loop
Planning
– What
should be
done?
Executing
Plans
Observations
The
Real
World
Actions Updated
Plans
What to Look For
What has happened?
Instructions Notifications
Signals
Assessing
Changing
State of
World
Data
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
AI techniques differ on “how they
think” as well as “how they act”
84
THINKING RATIONALLY THINKING HUMANLY
ACTING RATIONALLY ACTING HUMANLY
PERFORMANCE MEASUREMENT
vs. People vs. Ideal (Rationality)
Thought Process/
Reasoning
Behavior
FO
CU
S
Associative
Memory
Neural
Networks
Expert/Rule
Systems
Intelligent
Agents
Fuzzy Logic
Machine Learning
©2012 VELOXITI, Inc. - Used with permission
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Intelligent Systems Can Accelerate and
Improve Business Decision-making
Intelligent Systems
Must be
processed Generates
Continually Processing
Learns
Machine Learning
Associative Memory
Provides Input
Think, Decide, Act to solve a Business
Problem
Business Infrastructure Big Data
Natural Language
Processing ©2012-14 VELOXITI, Inc.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Intelligent Agents can be used
to improve performance
86
2 IA’s can leverage expert knowledge
to the rest of organization –
“shifting” performance curve
1 In any organization, best performance –
decisions – is by handful of “experts”
3 Further, having IA’s “assist” Experts for
data-intensive thinking can improve their performance also
©2012-14 VELOXITI, Inc.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Driverless Car
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
ZipCar
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Fasten Your Seatbelts
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Global Autonomous
Supply Chains
• Autonomous Processes
• Autonomous Enterprises™
• Autonomous Supply Chains
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Dynamic Pricing
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Business Ecosystems
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Complex Adaptive Ecosystem
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Self-Configuring
Business Ecosystems
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Autonomous Taxi
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Distributed Autonomous
Corporations I
• Distributed –no central points of control or failure that can be attacked.
• Autonomous – once up to speed; they no longer need (or heed) their creators.
• Corporations – They are, and of a right ought to be, free independent entities.
• Transparent – their books and business rules are auditable by all.
• Confidential – customer information is securely (and incorruptibly) protected.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Distributed Autonomous
Corporations II
• Trustworthy – because no interaction with them depends on trust.
• Fiduciaries – acting solely in their customers’ and shareholders’ interests.
• Self-regulating – they obey their own rules like, well, robots.
• Incorruptible – no one can exercise seductive or coercive influence over them.
• Sovereign – over their digital resources. They don’t need governments to exist.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
2025
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Atlanta Technology
Companies of the Future
www.arke.com
www.safelylocked.com/
www.merlinar.com
metrotech-net.com
https://bitpay.com/
http://sensiotec.com
www.veloxiti.com
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Follow Up
• Jack Shaw, President Breakthrough Business Technologies
• M: 770-910-5969
• Jack@e-com.com
• www.e-com.com
• www.gplus.to/JackShaw
• www.Twitter.com/JackShaw
• www.YouTube.com/user/JackShaw4728
• www.facebook.com/JackShawTechnology
• www.LinkedIn.com/in/JackShawTechnology
• www.BusinessTechnologyFuturist.WordPress.com