Platt Perspective on Business and Technology

Ubiquitous computing and communications – everywhere all the time 2

This is a continuation page for my ongoing discussion of issues connected to our changing capacity to both individually and collectively process and share information. This is one of the emerging defining features of both our social and private lives, and our work lives and it is permanently changing the face and the nature of business. You can find earlier postings and series on this at Ubiquitous Computing and Communications – everywhere all the time, and I note in that context that several series listed for earlier installments on that page continue for later ones onto this.

189.  Information  systems security and the ongoing consequences of always being reactive – 5:  moving towards proactive controls 3.
190. Information systems security and the ongoing consequences of always being reactive – 6: moving towards proactive controls 4.
191. Human Resources and adaptation to change 9: in a deeply interconnected and interdependent context. See HR and Personnel, postings 137 and loosely following for the rest of this series.
192. Moving past early stage and the challenge of scalability 23: ubiquitous communications and computation as an enabler of business scalability 1. You can find the rest of this series at Startups and Early Stage Businesses as postings 96 and loosely following.
193. Information systems security and the ongoing consequences of always being reactive – 7: moving towards proactive controls 5.
194. Moving past early stage and the challenge of scalability 24: ubiquitous communications and computation as an enabler of business scalability 2. You can find the rest of this series at Startups and Early Stage Businesses as postings 96 and loosely following.
195. Information systems security and the ongoing consequences of always being reactive – 8: moving towards proactive controls 6.
196. Moving past early stage and the challenge of scalability 25: answering to the innovation imperative.
197. Information systems security and the ongoing consequences of always being reactive – 9: developing a more proactive layered defense approach.
198. Information systems security and the ongoing consequences of always being reactive – 10: publically sharing vulnerability information between businesses and communities.
199. Information systems security and the ongoing consequences of always being reactive – 11: governments as white and black hat hackers, and the threat and reality of cyber-warfare.
200. Information systems security and the ongoing consequences of always being reactive – 12: defensive and offensive systems and the large grey area in between.
201. Citizenship in an increasingly global context 1: shareholder value, stakeholder value, and openly-sourced social value.
202. Information systems security and the ongoing consequences of always being reactive – 13: putting the puzzle together as a strategic and operational process 1.
203. Citizenship in an increasingly global context 2: membership, citizenship, loyalty and belonging.
204. Information systems security and the ongoing consequences of always being reactive – 14: putting the puzzle together as a strategic and operational process 2.
205. Citizenship in an increasingly global context 3: cultural identity as a source of pushback.
206. Information systems security and the ongoing consequences of always being reactive – 15: putting the puzzle together as a strategic and operational process 3.
207. Big data 8: redefining the group demographic 1. See Ubiquitous Computing and Communications – everywhere all the time, postings 177 and following for Parts 1-7.
208. Information systems security and the ongoing consequences of always being reactive – 16: the internet of things and the emergence of next generation DDoS attacks.
209. Big data 9: redefining the group demographic 2.
210. Information systems security and the ongoing consequences of always being reactive – 17: incentivizing more secure software and information systems.
211. Some thought concerning a rapidly emerging internet of things 1: starting a new series.
212. Big data 10: redefining the group demographic 3.
213. Bringing cyberspace and day to day life and reality together as one.
214. Some thought concerning a rapidly emerging internet of things 2: barcodes, RFID’s and the passive network.
215. Big data 11: living and working in an increasingly transparent world.
216. Some thought concerning a rapidly emerging internet of things 3: the active and interactively connected network.
217. Some thought concerning a rapidly emerging internet of things 4: the active and interactively connected home of the future, and the home SCADA network.
218. Some thought concerning a rapidly emerging internet of things 5: the active and interactively connected complex and mission-critical SCADA network.
219. Some thought concerning a rapidly emerging internet of things 6: identifying and harnessing the power of ad hoc systems 1.
220. Some thought concerning a rapidly emerging internet of things 7: identifying and harnessing the power of ad hoc systems 2.
221. Some thought concerning a rapidly emerging internet of things 8: fully automated systems and the implications of effective removal of direct human oversight 1.
222. Some thought concerning a rapidly emerging internet of things 9: fully automated systems and the implications of effective removal of direct human oversight 2.
223. Some thought concerning a rapidly emerging internet of things 10: fully automated systems and the implications of effective removal of direct human oversight 3.
224. Some thought concerning a rapidly emerging internet of things 11: networks of things, networks of people, and blurring boundaries.
225. John Peter Zenger, Henry L. Stimson, Edward J. Snowden and the challenge of free speech.
226. Digital art and the challenge of technological change 1.
227. Learnable lessons from Manning, Snowden and inevitable others 1 – understanding what barn doors you are locking after the horse has escaped 1.
228. Digital art and the challenge of technological change 2.
229. Learnable lessons from Manning, Snowden and inevitable others 2 – understanding what barn doors you are locking after the horse has escaped 2.
230. Learnable lessons from Manning, Snowden and inevitable others 3 – some thoughts on possible lessons themselves 1.
231. Putting change in perspective 1 – thresholds of change and disruption.
232. Learnable lessons from Manning, Snowden and inevitable others 4 – some thoughts on possible lessons themselves 2.
233. Putting change in perspective 2 – taking a 360 degree view 1.
234. Learnable lessons from Manning, Snowden and inevitable others 5 – the myth of the technically sweet solution, or of the quick procedural fix.
235. Putting change in perspective 3 – identifying disruptive change when it first begins to emerge 1.
236. Learnable lessons from Manning, Snowden and inevitable others 6 – the myth of the technically sweet solution, or of the quick procedural fix, continued.
237. Putting change in perspective 4 – identifying disruptive change when it first begins to emerge 2.
238. Learnable lessons from Manning, Snowden and inevitable others 7 – rethinking threats and response systems.
239. Putting change in perspective 5 – widening the range of change indicators and developing effective benchmarks for them.
240. Learnable lessons from Manning, Snowden and inevitable others 8 – rethinking classified intelligence and national security as it is built from it 1.
241. Putting change in perspective 6 – taking a 360 degree view 2.
242. Learnable lessons from Manning, Snowden and inevitable others 9 – rethinking classified intelligence and national security as it is built from it 2.
243. Putting change in perspective 7 – adding in the positive or negative valence of change 1.
244. Learnable lessons from Manning, Snowden and inevitable others 10 – thinking ahead 1.
245. Putting change in perspective 8 – adding in the positive or negative valence of change 2.
246. Learnable lessons from Manning, Snowden and inevitable others 11 – thinking ahead 2.
247. Rethinking normal 8: looking ahead and at currently emerging change 1. And also see Reexamining the Fundamentals, Section III for other postings to this series.
248. Rethinking normal 9: looking ahead and at currently emerging change 2.
249. Learnable lessons from Manning, Snowden and inevitable others 12 – thoughts on the limits to the achievable created by attempted absolute control.
250. Rethinking normal 10: looking ahead and at currently emerging change 3.
251. Learnable lessons from Manning, Snowden and inevitable others 13 – thoughts on the likely impact of perceived open-ended government surveillance on businesses and the marketplace.
252. Rethinking normal 11: looking ahead and at currently emerging change 4.
253. Rethinking normal 12: looking ahead and at currently emerging change 5.
254. Navigating bring your own cloud as an emerging trend 1: identifying and thinking through the basic challenge.
255. Navigating bring your own cloud as an emerging trend 2: thinking through the parameters for more effective resolutions to this 1.
256. Learnable lessons from Manning, Snowden and inevitable others 14 – when fear collides with expediency.
257. Developing critical infrastructure from a human and a societal perspective 1.
258. Navigating bring your own cloud as an emerging trend 3: thinking through the parameters for more effective resolutions to this 2.
259. Developing critical infrastructure from a human and a societal perspective 2.
260. Developing critical infrastructure from a human and a societal perspective 3.
261. Developing critical infrastructure from a human and a societal perspective 4.
262. Developing critical infrastructure from a human and a societal perspective 5.
263. Learnable lessons from Manning, Snowden and inevitable others 15 – the fallacy of absolute security and its allure 1.
264. Developing critical infrastructure from a human and a societal perspective 6.
265. Learnable lessons from Manning, Snowden and inevitable others 16 – the fallacy of absolute security and its allure 2.
266. Big data and the assembly of global insight out of small scale, local and micro-local data 1: assembling big pictures out of little pieces in three examples.
267. Learnable lessons from Manning, Snowden and inevitable others 17 – the fallacy of absolute security and its allure 3.
268. Big data and the assembly of global insight out of small scale, local and micro-local data 2: local and micro-local data.
269. Learnable lessons from Manning, Snowden and inevitable others 18 – the relationship between US government-run national security and private sector businesses.
270. Big data and the assembly of global insight out of small scale, local and micro-local data 3: demographics-based and other descriptive and predictive models.
271. Learnable lessons from Manning, Snowden and inevitable others 19 – challenges to credibility while seeking increased power and authority 1.
272. Big data and the assembly of global insight out of small scale, local and micro-local data 4: some thoughts on where this is headed 1.
273. Leveraging information technology to revitalize mature industries and marketplaces 1: reconsidering business evaluations and categorizations.
274. Big data and the assembly of global insight out of small scale, local and micro-local data 5: some thoughts on where this is headed 2.
275. Leveraging information technology to revitalize mature industries and marketplaces 2: rethinking and implementing new and emergent.
276. Big data and the assembly of global insight out of small scale, local and micro-local data 6: developing synergies between ubiquitous computing and communications, and open-access big data.
277. Leveraging information technology to revitalize mature industries and marketplaces 3: adding the underlying business model into this discussion 1.
278. Big data and the assembly of global insight out of small scale, local and micro-local data 7: reconsidering the digital divide 1.
279. Leveraging information technology to revitalize mature industries and marketplaces 4: adding the underlying business model into this discussion 2.
280. Big data and the assembly of global insight out of small scale, local and micro-local data 8: reconsidering the digital divide 2.
281. Leveraging information technology to revitalize mature industries and marketplaces 5: adding the underlying business model into this discussion 3.
282. Learnable lessons from Manning, Snowden and inevitable others 20 – challenges to credibility while seeking increased power and authority 2.
283. Leveraging information technology to revitalize mature industries and marketplaces 6: adding in a competitive context 1.
284. Leveraging information technology to revitalize mature industries and marketplaces 7: adding in a competitive context 2.
285. Leveraging information technology to revitalize mature industries and marketplaces 8: adding in a competitive context 3.
286. Leveraging information technology to revitalize mature industries and marketplaces 9: adding in a competitive context 4.
287. Learnable lessons from Manning, Snowden and inevitable others 21 – picking up the pieces.
288. Leveraging information technology to revitalize mature industries and marketplaces 10: adding in a competitive context 5.
289. Learnable lessons from Manning, Snowden and inevitable others 22 – rethinking NSA’s own information infrastructure.
290. Learnable lessons from Manning, Snowden and inevitable others 23 – the Obama legacy 1.
291. Learnable lessons from Manning, Snowden and inevitable others 24 – the Obama legacy 2.
292. Learnable lessons from Manning, Snowden and inevitable others 25 – the Obama legacy 3.
293. Learnable lessons from Manning, Snowden and inevitable others 26 – thoughts concerning the emerging Obama cyber-doctrine 1.
294. Learnable lessons from Manning, Snowden and inevitable others 27 – thoughts concerning the emerging Obama cyber-doctrine 2.
295. Ubiquitous virtual reality and embracing the real-time online catalog: a case study in cross-channel sales coordination 1.
296. From stuxnet to heartbleed – the operational side of national cybersecurity and its issues 1: part 16 in a series on better understanding and resolving cyber conflict. See Ubiquitous Computing and Communications, postings 58 and loosely following for parts 1-15.
297. Ubiquitous virtual reality and embracing the real-time online catalog: a case study in cross-channel sales coordination 2.
298. From stuxnet to heartbleed – the operational side of national cybersecurity and its issues 2: part 17 in a series on better understanding and resolving cyber conflict.
299. Deciphering net neutrality and the concept of an open-range internet 1.
300. Learnable lessons from Manning, Snowden and inevitable others 28 –the emerging Obama cyber-doctrine 3 and a news update.
301. Ubiquitous virtual reality and embracing the real-time online catalog: a case study in cross-channel sales coordination 3.
302. From stuxnet to heartbleed – the operational side of national cybersecurity and its issues 3: part 18 in a series on better understanding and resolving cyber conflict.
303. Learnable lessons from Manning, Snowden and inevitable others 29 – when a search for absolute security becomes the norm.
304. Deciphering net neutrality and the concept of an open-range internet 2.
305. Zeno’s paradox, Moravec’s paradox and rethinking how we project forward in our planning 1.
306. From stuxnet to heartbleed – the impact of US national cybersecurity doctrine and practices on businesses and markets 1: part 19 in a series on better understanding and resolving cyber conflict.
307. Zeno’s paradox, Moravec’s paradox and rethinking how we project forward in our planning 2.
308. Deciphering net neutrality and the concept of an open-range internet 3.
309. From stuxnet to heartbleed – a late-breaking news update, added in as a supplemental installment. Part 20 in this series.
310. From stuxnet to heartbleed – the impact of US national cybersecurity doctrine and practices on businesses and markets 2. Part 21 in this series.
311. Asking the fundamental questions when considering North Korea’s cyber-espionage and cyber-warfare capabilities.
312. Asking the fundamental questions when considering North Korea’s cyber-espionage and cyber-warfare capabilities 2.
313. Zeno’s paradox, Moravec’s paradox and rethinking how we project forward in our planning 3.
314. Deciphering net neutrality and the concept of an open-range internet 4.
315. From stuxnet to heartbleed – the impact of US national cybersecurity doctrine and practices on businesses and markets 3. Part 22 of this series.
316. Big data and the assembly of global insight out of small scale, local and micro-local data 9: rethinking potential operational strengths and weaknesses.
317. Zeno’s paradox, Moravec’s paradox and rethinking how we project forward in our planning 4.
318. Deciphering net neutrality and the concept of an open-range internet 5.
319. From stuxnet to heartbleed – the impact of US national cybersecurity doctrine and practices on businesses and markets 4. Part 23 of this series.
320. Big data and the assembly of global insight out of small scale, local and micro-local data 10: Bayesian statistics and the power of predictive modeling 1.
321. Zeno’s paradox, Moravec’s paradox and rethinking how we project forward in our planning 5.
322. Deciphering net neutrality and the concept of an open-range internet 6.
323. From stuxnet to heartbleed – the impact of US national cybersecurity doctrine and practices on businesses and markets 5. Part 24 of this series.
324. Big data and the assembly of global insight out of small scale, local and micro-local data 11: Bayesian statistics and the power of predictive modeling 2. I cite in this posting a national security-oriented big data example that fits into the same narrative discussed in my series: Learnable Lessons from Manning, Snowden and Inevitable Others (see this directory page, postings 227 and loosely following for its installments.)
325. Zeno’s paradox, Moravec’s paradox and rethinking how we project forward in our planning 6.
326. Deciphering net neutrality and the concept of an open-range internet 7.
327. Big data and the assembly of global insight out of small scale, local and micro-local data 12: data granularity and quality as costs/benefits and due diligence considerations.
328. Rethinking vertical integration in the 21st century context 1.
329. Rethinking vertical integration in the 21st century context 2.
330. Rethinking vertical integration in the 21st century context 3.
331. Rethinking vertical integration in the 21st century context 4.
332. Rethinking vertical integration in the 21st century context 5.
333. Rethinking vertical integration in the 21st century context 6.
334. Rethinking vertical integration in the 21st century context 7.
335. Rethinking vertical integration in the 21st century context 8.
336. Rethinking vertical integration in the 21st century context 9.
337. What do potlatches, bagpipes and indigenous languages hold in common – the challenge of uniformity and loss of cultural identity.
338. Rethinking vertical integration in the 21st century context 10.
339. Rethinking vertical integration in the 21st century context 11.
340. Rethinking vertical integration in the 21st century context 12.
341. Innovation, disruptive innovation and market volatility 29: innovative development at the business-to-marketplace collaboration level 7. See Macroeconomics and Business, posting 173 and loosely following for Parts 1-5 and Macroeconomics and Business 2, posting 203 and loosely following for other postings to this series.
342. Meshing innovation, product development and production, marketing and sales as a virtuous cycle 1.
343. When the tool you most compelling lack is a hammer, everything can begin to look like nails.
344. Rethinking vertical integration in the 21st century context 13.
345. Innovation, disruptive innovation and market volatility 30: innovative development at the business-to-marketplace collaboration level 8.
346. Meshing innovation, product development and production, marketing and sales as a virtuous cycle 2.
347. Rethinking vertical integration in the 21st century context 14.
348. Innovation, disruptive innovation and market volatility 31: innovative business development and the tools that drive it 1.
349. Meshing innovation, product development and production, marketing and sales as a virtuous cycle 3.
350. Rethinking online security in an age of the internet of things: the more things change, the more they stay the same.
351. Rethinking vertical integration in the 21st century context 15.
352. Innovation, disruptive innovation and market volatility 32: innovative business development and the tools that drive it 2.
353. Meshing innovation, product development and production, marketing and sales as a virtuous cycle 4.
354. Rethinking national security in a post-2016 US presidential election context: conflict and cyber-conflict in an age of social media 1.
355. Rethinking vertical integration in the 21st century context 16.
356. Innovation, disruptive innovation and market volatility 33: innovative business development and the tools that drive it 3.
357. Meshing innovation, product development and production, marketing and sales as a virtuous cycle 5.
358. Rethinking national security in a post-2016 US presidential election context: conflict and cyber-conflict in an age of social media 2.
359. Rethinking vertical integration in the 21st century context 17.
360. Innovation, disruptive innovation and market volatility 34: innovative business development and the tools that drive it 4.
361. Meshing innovation, product development and production, marketing and sales as a virtuous cycle 6.
362. Rethinking national security in a post-2016 US presidential election context: conflict and cyber-conflict in an age of social media 3.
363. Innovation, disruptive innovation and market volatility 35: innovative business development and the tools that drive it 5.
364. Meshing innovation, product development and production, marketing and sales as a virtuous cycle 7.
365. Rethinking national security in a post-2016 US presidential election context: conflict and cyber-conflict in an age of social media 4.
365. Innovation, disruptive innovation and market volatility 36: innovative business development and the tools that drive it 6.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: