2. Enterprise and Business Architecture Cloud Video Data
-
Upload
mrsalways-right -
Category
Leadership & Management
-
view
454 -
download
1
description
Transcript of 2. Enterprise and Business Architecture Cloud Video Data
Part II Communication, Cloud, Video and Data
Lisa Martinez 408.638.9016 @ 2014 Copyright Wicked
A – We must truly understand the limitations and approaches people use to push some new idea. ◦ Innovation is rarely invention, as an example we can review Big Data
Data>Information>Knowledge>Wisdom
B – Delivery in a distributed architecture federated and promoted by Students ◦ Communication Strategy
C - We must ensure we focus on innovation in an objective manner. ◦ Objective Research through student led engagements in a shared
service model
WICKED 2014@copyright Lisa Martinez 408.638.9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
There are industry standard being
overlooked.
WICKED 2014@copyright Lisa Martinez 408.638.9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
WICKED 2014@copyright Lisa Martinez 408.638.9016
Between end points – service provider
Beyond end points – within a public cloud
Within the private clouds
Before Changes
Mega Trunks
Super Trunks
Fiber Optic
Fiber Channels
Analog
IP
Wireless ◦ Drones
Broadband ◦ Telecommunications
◦ Security
◦ Machine to Machine
WICKED 2014@copyright Lisa Martinez 408.638.9016
Device
Voice
Video
Data/Applications
Unreliable aspirations to encrypt data and we must assume we
are not finding proven video encryption providers.
• Isolation and containment are simply smarter
IG Layer
Access
Control Links
(ACL)
inbound and
outbound
connectivity
model
isolates
threats into
three
segments
while making
each gradient
layer less
accessible
WICKED 2014@copyright Lisa Martinez 408.638.9016
Applications which are not dropping software on the device.
Accessible as an on Premise, Hybrid or fully Hosted Cloud solution.
WICKED 2014@copyright Lisa Martinez 408.638.9016
3rd party solutions with remote management features ◦ Video Conferencing or Telepresence
◦ Most meeting solutions – Maestro, Skype, Google Hangouts and Webex as examples
3rd party cloud services ◦ SFDC offers a CRM capability – many features are hosted, co-located
or on premise
◦ ERP in a cloud
◦ Intuit offers many
◦ Cisco offers many
Developed in house or SDN and Gaming are all described in the context of Big Data.
WICKED 2014@copyright Lisa Martinez 408.638.9016
Understanding the common variables with an application of search
tags to enable multi-generational and cross-border association of
the shared for a minimum viable system model. ◦ Experience based learning in a model designed for rapid expansion and
local customization.
◦ Teaching students with hands on learning using open source solutions from
the wisdom of the most recognized experts in these various fields.
◦ Understanding the semantics and stage of an existing practice does not
need its own standard.
In fact, using the approach will cause a train wreck.
Big data offers an example of the subject
WICKED 2014@copyright Lisa Martinez 408.638.9016
Community Outreach
Social Media as a Channel
Supported By
Mentored By
Zero to Five
K-5th 6-8th 9-12th 13-20th Workforce Seniors
1. Design Vision and Strategy WICKED 2014@copyright Lisa Martinez 408.638.9016
Systems for People in IDENTITY minimum viable system
Students
Employee Supplier Customer
MC.1. Party Management Capability
MC.2. Offer Management Capability
BP.1. Design Strategy and Vision
MC.3. Financial Management Capability
408.638.9016 Lisa Martinez 2014 @ Copyright WICKED Design Solutions
Offer
IaaS
PaaS
SaaS
Content Id
no private information
public life
Private life
economic life
social life
family life
health and safety
life
408.638.9016 Lisa Martinez 2014 @ Copyright WICKED Design Solutions
Type 2 diabetic
Physician
A manager in retail
A major retailer
IGL6 - 7 Public
IGL1-3
Private
IGL4-5
Private
From offices around the world, InfoComm serves its members and the industry through: ◦ Education, including technical and business courses, in the classroom and
online ◦ Resources, such as AV standards, thought pieces, and market research ◦ Events, including local roundtables and international trade shows
Established in 1939, InfoComm has more than 5,000 members, including manufacturers, systems integrators, dealers and distributors, independent consultants, programmers, rental and staging companies, end-users and multimedia professionals from more than 80 countries.
As an ANSI Accredited Standards Development Organization (SDO), InfoComm offers the Certified Technology Specialist™ (CTS®) program — the only audiovisual certification ANSI accredited under the International Standard ISO/IEC 17024.
Cable IP4/IP6 IP address 16.21.165.01
Our view into our television
was once a one way view
Our view into the world was
once a one way view
400 lines of
resolution
1100 lines of
resolution
May 2014 Report
to the President
Restores Civil
Liberties with
Virtual Life
WICKED 2014@copyright Lisa Martinez 408.638.9016
Before Now video is sent and received
May 2014 Report
to the President
Restores Civil
Liberties with
Virtual Life
WICKED 2014@copyright Lisa Martinez 408.638.9016
Personal Investment Carrier Service Contract
I choose a carrier and I purchase the device with an understanding
(a contractual agreement) between me and the mobile carrier
Any Cell phone service
provider
My Device
Carrier supplies a service to
use my device
WICKED 2014@copyright Lisa Martinez 408.638.9016
Within my home, I am still private and protected. Right?
“No”, but you can trust us.
May 2014 Report
to the President
Restores Civil
Liberties with
Virtual Life
WICKED 2014@copyright Lisa Martinez 408.638.9016
Let students work through the details of the new technology innovations ◦ Have a limited group of stakeholders “wisdom” reviews and advisors ◦ The report to the president did not appear to get into the subject
The opportunity for students to protect themselves, although the potential is high for teachers and police to force students to turn off the devices... ◦ Attendance in class – an ideal way to check in ◦ Bullying Prevention – Students are far less likely to be cruel ◦ Replay experiences – how many times have your notes been complete. ◦ Participate in Experience Based projects – working with at risk populations ◦ Safety – a way for your parents to find you at all times ◦ Safety – a way to replay your abduction or human trafficking kidnapping
A way to prove you told the truth when someone doesn’t trust you.
WICKED 2014@copyright Lisa Martinez 408.638.9016
Records
the view
you see Records the
way you
respond to
what you see.
Google Glasses
Wearable Mobile Technology
Presents
Gaming as
an option
virtual or
augmented
reality
Records the
way you
respond to
what you see.
Content and Logging Sensor Data
Sensor Data/Logging/Metadata or Raw Data from Video, Audio and Web Activity or Texting
WICKED 2014@copyright Lisa Martinez 408.638.9016
Many of us don’t realize data is the raw
or technical form of all methods of
communication
Data is no longer trustworthy Nor do the experts get invited
Data is information or just data Data is knowledge or just data Data is Wisdom or just data it is
not evidence nor intelligence Data manipulated outside the
process is just data outside the process (fusion)
Data connected outside the process is just data connected (fusion)
Data tools and technology behave without controls supplied in 3rd party applications.
Data is not governed nor does it have any value when people who are not involved in the original format manipulate raw data. ◦ No one is expected to change, alter
or manipulate nor does massaging ever pass ethical standards
Data can be harmful if connected with other data, as it can easily be mis-represented, as facts. (Fusion)
In the case of big data we might ask ourselves, who was involved in and did the experts get invited?
WICKED 2014@copyright Lisa Martinez 408.638.9016
Data
Raw Format
Applications
(information and
Knowledge)
Content
Knowledge
(Content and Information)
Information
(Documents)
Records
Display
User Transactional
User
Management
user
Company LDAP
or AD account
X X –Restricted
group see
Sarbanes Oxley
rules
Network IP and
Host
X X
Secure access
certificate or Key
X X
Monitor and
Design
Key Controls
SOD
404 Assurances
Any financial
Management,
based on roles
based access
Any create, read,
update or archive
Financial
Management
Quality
Management
Employee
Performance
All request are
pre-authorized
and validated
All approvals are
approved or
delegated to a
person with same
or greater
authority.
Asset Device Any organization
or agency
supplied
Any organization
or agency
supplied WICKED 2014@copyright Lisa Martinez 408.638.9016
Two dimensions that “do not” integrate within many organizations ◦ Not in recognized as a Technology domain, Business Process nor EA
◦ Not in the Business Intelligence and EDW are not always integrated
◦ Not in the Master Data with the BI or Technology
An application qualifies for SDLC change control threat analysis
every time a “get” or “create” command is used in an API (games,
data only subscriptions, legacy applications, custom in house
applications, BI Developed Applications, any minor change with
such commands = application).
Audio, Images and Video are now part of the Big Data size big.
WICKED 2014@copyright Lisa Martinez 408.638.9016
Assume the conceptual model will converge through to data
and potentially be returned or converted to another form. ◦ In these materials we assume data represents content in many forms
when presented as an application or video or game.
◦ The point and assumption must be users are unaware of the technical
details.
◦ The following table suggest a person will potentially never understand
and not need to understanding that the four domains are also data.
View(s) Organization
or Agency
Content Information Knowledge Records
Person as
an individual
No Video or Audio
or digital data in
an application
or other form of
presentation
Video or Audio or
digital data in an
application or
other form of
presentation
Video or Audio
or digital data in
an application
or other form of
presentation
An official recording of an
event or transaction which
requires validation and
reporting to regulatory
authorities.
Person as
an Agent
Yes Video or Audio
or digital data in
an application
or other form of
presentation
Video or Audio or
digital data in an
application or
other form of
presentation
Video or Audio
or digital data in
an application
or other form of
presentation
An official recording of an
event or transaction which
requires validation and
reporting to regulatory
authorities.
WICKED 2014@copyright Lisa Martinez 408.638.9016
Adoption of a Service Management Model for Business Services enables focus on the business which doesn’t require Technical Changes ◦ Expands upon an IT Service Management model with human wellness to crisis
capabilities.
◦ Factors the many forms of digital information to aid in the wellness of citizens or consumers for the Public and Private sectors.
◦ Low effort to adoption-builds upon IT in most organizations ITIL ITSM has been adopted and adds the person centered design concept.
◦ Common method to prevent and protect versus cause and effect
Benefit “outcomes” effectively measure Privacy and Security
Benefit “outcomes” effectively plan investments according to a baseline risk
Benefit “outcomes” effectively prepare, plan, mitigate, recover and restore in crisis situations
Benefit “outcomes” effectively supplies an expectation for measuring risk for citizens
WICKED 2014@copyright Lisa Martinez 408.638.9016
A single woman may take comfort in having a friendly eye watching over her. ◦ The only way to be comforted in such situations would be if the police commit to
responding if trouble is detected.
A woman would be far less likely to change in her room if she had a safe place to undress.
How friendly can a camera be if you were married or sexually active? ◦ You’d have to know and be able to control the device. ◦ Many camera’s appear to be off, they are actually on. ◦ Many audio conversations are recorded and distributed
Women are far more likely to be adversely effected by an intimate encounter if the video were ever released. ◦ Catalog and strong metadata management will absolutely enable retrieval of
images.
WICKED 2014@copyright Lisa Martinez 408.638.9016
While technology exist to promote intelligence for crime fighting, or fusion which results in false positives without having all the facts.
A person may have had their identity stolen once or twice in their lifetime. ◦ Instead of asking a person the person immediately is excluded from a potential
role in a project or company.
What if they have a common name and when you Google the name, suddenly mug shots are the first images you see? ◦ What if your name was so common and mysteriously was the name someone
arrested for fraud in nearly every state? Would you consider the candidate if you had to dig into the person’s life and rule out
so many criminals?
If you also were married more than twice, you might have a reason for name changes.
The number of times a person’s been married, may exclude a woman but you’d never know if it was a man.
WICKED 2014@copyright Lisa Martinez 408.638.9016