POLITICAL CARTOONS

July 31, 2017


If you read my post on a regular basis you know I don’t concentrate on politics.  I try to stick to subjects involving the STEM professions—in other words, subjects I know something about and have an interest in.  There is nothing wrong with being a Democrat, Republican, Independent, Libertarian, etc.—there is everything wrong when our elected officials refuse to “throw together” to solve our most-pressing problems.  That is exactly where we are today and I’m probably not the one to solve that problem.

On a daily basis, our “state-of-the-nation” is displayed with remarkably creative and compelling political cartoons.  These guys and gals are truly good at what they do and provide a pictorial summary of where we are as a country.  A picture is truly worth a thousand words. Let’s take a very quick look.

As you well know, the Republican party is having, or has had, remarkable difficulty in fixing or repealing the Affordable Healthcare Act—or Obamacare as it has come to be known as.  I suspect, but do not know, it may be because there is no suitable replacement.

The cartoon above provides a glimpse into a terrible situation existing in our country today. Opioid-related deaths have reached an all-time high in the United States. More than 47,000 people died in 2014, and the numbers are rising. The Centers for Disease Control and Prevention this month released prescribing guidelines to help primary care physicians safely treat chronic pain while reducing opioid dependency and abuse.  That’s where we are in this country.

Senator John McCain cast the deciding vote that killed Congressional efforts to repeal the HCA.  It was dramatic and certainly made the point.  The JPEG below tells the story also.

Our new Director of Communications for the Fed is Anthony Scaramucci and boy does he know how to make a first impression.  I’m probably one of an ever-growing few who remember my mama telling me she was going to wash my mouth out with soap if I did not mind my peas and ques.   Maybe Anthony needs to listen to my mama.  Do we really need another trash-talker in la Casa Blanca?

Washington D.C. leaks like a fifteen-year-old garden hose.  I would definitely hate trying to keep a secret within the beltway.  Imagine you’re a somewhat senior government official — one who doesn’t get a lot of face time with the president, but who has access to pretty important information — and you need to send a message to President Donald Trump. You can try to write him a memo, or get the message into a briefing paper his staff is preparing. But the staff is trying to squeeze a ton of information into the incredibly narrow aperture of “what the president is actually going to read.  Your message had better be less than a page (ideally a lot less, so that it can fit on a page with all the other messages all the other officials like you are trying to send). It had better include a visual aid — a map is good.  Or you can go the easier route: You can just leak the information to someone so that it ends up on Fox & Friends.

The picture above is one of my favorite.  Senator Jeff Sessions was the very first to indorse Donald John Trump for the Presidency.  Apparently, loyalty does not work both ways. If I were Sessions, I would be cleaning out my desk right now.

As always, I welcome your comments.

 


All of my life I have heard phrases, jokes, sayings about a load, this load, a full load, etc etc.   Let’s take a look at just a few phrases heard over the years and see if we can improve our understanding.

  • That’s a load of crap.
  • Get a load of that.
  • THAT is a load off my mind.
  • THAT is a load of baloney.
  • We need this to lighten our load.
  • That boy is one brick shy of a full load.

It makes you wonder—just what is a load?  What quantity constitutes a load or a “full load”?  The following digital pictures just might hold the key, then I have several conclusions.

CONCLUSIONS:

You will notice that all of the digital pictures show individuals in what we would call third-world countries but I like to look at it in the following manner:

  • People the world over have enough “smarts” to overcome most if not all obstacles.
  • Where there is a will there is a way.
  • One individual can really accomplish tremendous feats if challenged.
  • Most of life’s situations would represent a “new normal” in the eyes of Western civilization.
  • We all have the urge to “get-er-done”.
  • The difficult we do immediately, the impossible takes a little longer.

ENTITLED DEPENDENCE

June 25, 2017


I’m generally a little behind the curve relative to changes in social phenomena.  I suspect this is due to my age and the fact that I’m just not that savvy with Social Media such as Face Book, Instagram, Snap Chat, etc etc.  I do have a Face Book account and LinkedIn account but do not spend that much time on either.  Social Media can be a “black hole” time-wise so I try to avoid sitting behind my computer hour-after-hour telling people I don’t even know what’s “shaking”.  It’s just me.  (Please note: I’m not critical of those who choose to participate.  That’s their deal and who am I to tell anyone what to do?  I do acknowledge is great to communicate and I do so with a limited number of friends and family.)  With that being the case, I came upon a new “trend” in social activity called the “Peter Pan” Syndrome or “entitled dependence”.

In many countries, the phenomenon is so widespread that other new terms have developed to describe it: bamboccioni [literally, big babies] in Italy, [living at] “hotel mama” in Germany, boomerang children in Australia, parasaito shinguru [single parasite] in Japan. These young men and women don’t leave home and don’t get married, because they only want to buy brand names and enjoy themselves and to live, as an ideology, at their parents’ expense. It’s nothing less than a pandemic.  My generation always said, “I can’t wait till the kids leave home and the dog dies”.  Maybe that’s not always the case anymore.

Psychologist Professor Haim Omer describes the world-wide phenomenon of a dependence on parents that doesn’t stop.  For the past few years psychologists have been dealing with a new social phenomenon, they sometimes call “entitled dependence.” Instead of leaving home to embark on an independent life, young adults remain dependent on their parents, not only asking for but actually demanding benefits from them.  Please note: the term “young adults” is used to describe this trend in living.  We are talking about twenty to early thirties age wise.  If we look at the manifestations, we see the following:

  • An unwillingness to get working or stay working when you’re not motivated. If you’re only willing to work hard when you feel like it, you won’t feel like it often enough. Working hard must be something you do; it’s not a decision to make. It’s foundational. The American work ethic is legendary.  We work hard in this country to the point that sometimes we are criticized for being “workaholics”.
  • Dabbling:being unwilling to stay focused on becoming sufficiently expert at anything. Brilliant people can achieve excellence in many areas but most people can’t. (This also is a new term to me.  I’m sure it’s in the Oxford Dictionary of the English Language 😊.)
  • Networking aversion. Not having taken the time to develop the deep connections with the right people that, alas, often are needed to land and succeed at a good job. You must admit, having a good, if not great, network of professional people and friends can be the key to landing a good if not great job.  That’s just the way it works.
  • Betting on longshot dreams: becoming a self-supporting actor, artist, documentary filmmaker, sports marketer, environmental activist, fashion executive, etc. Yes, obviously, some people have achieved such goals but unless you are unusually talented and driven (ideally with great connections,) your chances are small. Yet some people cling to their longshot dream, sometimes as an excuse for not doing the work required to launch a more realistic career.  I came to the conclusion some time ago that I’m not Jack Welch, Bill Gates, Jeff Bezos, Mark Zuckerberg, etc. I’m a blue-collar engineer—a worker.
  • Abusing alcohol or drugs. Enough said on this one.
  • Blaming your failure on something your parents, spouse, or former employer did to you. Many people who were terribly abused–including, for example, many survivors of the Holocaust or of Japanese internment camps–did just fine. You’ve probably suffered a lot less. Unless you suffer from a severe physiologically caused mental illness, you too can probably triumph over your past. You can look at politicians, both Republicans, Democrats and Independents to see the “blame game” is in full flower.  (OK, I do not know why Hillary is not president.)
  • Doing an insufficiently thorough job search.Here’s what a thorough job search looks like: identifying 50 people not advertising an on-target job but with the power to hire you for your target job or create one for you, and you not only pitch yourself to them but make the effort to build a relationship with them over months. You must also regularly contact your extended personal network to get leads and build the relationship, have a good LinkedIn profile, craft many top-of-the-heap job applications, including collateral material such as a white paper, a portfolio, and substantive follow-ups after job interviews, for example, a mini business plan describing what you’d do if hired.

Now, let’s face facts—things in life are sometimes uncontrollable.  We just do not know when issues arise that need to be handled by caring parents or grandparents.  Our family is now a case in point.  Our oldest son recently had a very serious medical condition.  We are taking care of our oldest grandson and will be taking care of our oldest son when he leaves therapy.  His care will continue the remainder of this year and into the 2018 year.  As parents and grandparents, we DID sign up for this.  This is what families do.  What I’m talking about here is a child’s unwillingness to engage society. Wanting to live a life of relative ease with no vision for the future with minimum stress and anxiety.  If you work for a living, no matter what the job, that life is not available to you on an on-going basis.  It ain’t going to happen.  Stress can certainly be a good thing in moderation.  It motivates us to succeed although too much can even be life-threatening.

As always, I welcome your comments.

CLOUD COMPUTING

May 20, 2017


OK, you have heard the term over and over again but, just what is cloud computing? Simply put, cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics, and more—over the Internet (“the cloud”). Companies offering these computing services are called cloud providers and typically charge for cloud computing services based on usage, similar to how you’re billed for water or electricity at home. It is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources (e.g., computer networks, servers, storage, applications and services), which can be rapidly provisioned and released with minimal management effort. Cloud computing and storage solutions provide users and enterprises with various capabilities to store and process their data in either privately owned, or third-party data centers that may be located far from the user–ranging in distance from across a city to across the world. Cloud computing relies on sharing of resources to achieve coherence and economy of scale, similar to a utility (like the electricity grid) over an electricity network.

ADVANTAGES AND DISADVANTAGES:

Any new technology has an upside and downside. There are obviously advantages and disadvantages when using the cloud.  Let’s take a look.

 Advantages

  • Lower cost for desktop clients since the applications are running in the cloud. This means clients with smaller hard drive requirements and possibly even no CD or DVD drives.
  • Peak computing needs of a business can be off loaded into cloud applications saving the funds normally used for additional in-house servers.
  • Lower maintenance costs. This includes both hardware and software cost reductions since client machine requirements are much lower cost and software purchase costs are being eliminated altogether for applications running in the cloud.
  • Automatic application software updates for applications in the cloud. This is another maintenance savings.
  • Vastly increased computing power availability. The scalability of the server farm provides this advantage.
  • The scalability of virtual storage provides unlimited storage capacity.

 Disadvantages

  • Requires an “always on” Internet connection.
  • There are clearly concerns with data security. e.g. questions like: “If I can get to my data using a web browser, who else can?”
  • Concerns for loss of data.
  • Reliability. Service interruptions are rare but can happen. Google has already had an outage.

MAJOR CLOUD SERVICE PROVIDERS:

The following names are very recognizable.  Everyone know the “open-market” cloud service providers.

  • AMAZON
  • SALESFORCE
  • GOOGLE
  • IBM
  • MICROSOFT
  • SUN MICROSYSTEMS
  • ORACLE
  • AT & T

PRIVATE CLOUD SERVICE PROVIDERS:

With all the interest in cloud computing as a service, there is also an emerging concept of private clouds. It is a bit reminiscent of the early days of the Internet and the importing that technology into the enterprise as intranets. The concerns for security and reliability outside corporate control are very real and troublesome aspects of the otherwise attractive technology of cloud computing services. The IT world has not forgotten about the eight hour down time of the Amazon S3 cloud server on July, 20, 2008. A private cloud means that the technology must be bought, built and managed within the corporation. A company will be purchasing cloud technology usable inside the enterprise for development of cloud applications having the flexibility of running on the private cloud or outside on the public clouds? This “hybrid environment” is in fact the direction that some believe the enterprise community will be going and some of the products that support this approach are listed below.

  • Elastra (http://www.elastra.com ) is developing a server that can be used as a private cloud in a data center. Tools are available to design applications that will run in both private and public clouds.
  • 3Tetra (http://www.3tetra.com ) is developing a grid operating system called ParaScale that will aggregate disk storage.
  • Cassatt(http://www.cassatt.com )will be offering technology that can be used for resource pooling.
  • Ncomputing ( http://www.ncomputing.com ) has developed standard desktop PC virtualization software system that allows up to 30 users to use the same PC system with their own keyboard, monitor and mouse. Strong claims are made about savings on PC costs, IT complexity and power consumption by customers in government, industry and education communities.

CONCLUSION:

OK, clear as mud—right?  For me, the biggest misconception is the terminology itself—the cloud.   The word “cloud” seems to imply a IT system in the sky.  The exact opposite is the case.  The cloud is an earth-based IT system serving as a universal host.  A network of computers. A network of servers.  No cloud.

WILL ROGERS

March 28, 2017


It seems as though our country, our great country, is now having difficulties sensible people could solve if they had the resolve to do so.  Republican, Democrat, Liberal, Conservative, Right, Left, Moderate, Independent, we just do not seem to want to come together to resolve our most pressing problems.  We are remarkably fortunate in this country to have a very “deep bench”.  We have people who can do things, do them properly, and do them correct the first time.  You would think with this reality, we could at least come together to discuss our differences.

Some countries simply do not have the capability to accomplish.  Hundreds, maybe thousands, of women travel miles each day just to “fetch” water for their families. Hundreds of children die each day due to malnutrition.  Little girls in some parts of the world still undergo the painful and humiliating process of Female Genital Mutilation.  Honor killings take the lives of hundreds each year.  Individuals seeking only to express freedoms we take for granted.

I think no one expresses our human condition better than Will Rogers. Will Rogers was an American humorist, actor and author best known for his Broadway and film performances, as well as his folksy persona. In 1905, Rogers began performing a lasso act on the vaudeville circuit. His charm and humor, along with his technical ability, made Rogers a star somewhat overnight. Audiences responded with enthusiasm to his off-the-cuff remarks delivered while performing elaborate roping tricks. Rogers parlayed his vaudeville success into a Broadway career. He debuted in New York in 1916, performing in The Wall Street Girl. This led to many more theatrical roles, including headlining appearances in the Ziegfeld Follies. Rogers also brought his act to the burgeoning medium of the moving picture. He appeared in dozens of silent films, often playing a country bumpkin trying to negotiate the modern world.

In addition to acting, Rogers became nationally known as a writer. He penned a column for the Saturday Evening Post that ran in newspapers across the country. His columns dealt with contemporary issues from a perspective of small town morality, emphasizing the integrity of working people. It was a viewpoint that resonated in the rapidly industrializing twentieth century United States. Many of his books, including The Cowboy Philosopher on Prohibition and There’s Not a Bathing Suit in Russia, achieved best-seller status.

Rogers’s fame had eclipsed his country bumpkin persona by 1930. No longer believable as an uneducated outsider, he was able to voice his characteristic wit and wisdom while playing a professional. Legendary director John Ford worked with Rogers on three of these later films—Doctor Bull, Judge Priest and The Steamboat Round the Bend. After filming concluded on the final Ford film, in 1935, Rogers set out on a trip to Alaska. An avid aviation enthusiast, he planned to explore remote stretches by plane as well as on foot.

A digital picture of Will Rogers is given below.  I have chosen this JPEG to give you some indication of his public persona.

One thing that greatly endeared Rogers to a loving audience was, as mentioned earlier, his off-the-cuff remarks.  I would like to indicate several of those now.

  • Everything is funny, as long as it’s happening to somebody else.
  • Good judgment comes from experience, and a lot of that comes from bad judgment.
  • If advertisers spent the same amount of money on improving their products as they do on advertising then they wouldn’t have to advertise them.
  • Chaotic action is preferable to orderly inaction.
  • An onion can make people cry but there’s never been a vegetable that can make people laugh.
  • Take the diplomacy out of war and the thing would fall flat in a week.
  • If Stupidity got us into this mess, then why can’t it get us out?
  • Liberty doesn’t work as well in practice as it does in speeches.
  • A remark generally hurts in proportion to its truth.
  • If I studied all my life, I couldn’t think up half the number of funny things passed in one session of congress.
  • This country has come to feel the same when Congress is in session as when the baby gets hold of a hammer.
  • Our constitution protects aliens, drunks and U.S. Senators.
  • People who fly into a rage always make a bad landing
  • If you ever injected truth into politics you have no politics.
  • About all I can say for the United States Senate is that it opens with a prayer and closes with an investigation.
  • What the country needs is dirtier fingernails and cleaner minds.
  • There ought to be one day – just one – when there is open season on senators.
  • The only difference between death and taxes is that death doesn’t get worse every time Congress meets.
  • When the Oakies left Oklahoma, and moved to California, it raised the I.Q. of both states.
  • If you want to be successful, it’s just this simple. Know what you are doing. Love what you are doing. And believe in what you are doing.
  • A fool and his money are soon elected
  • The man with the best job in the country is the vice-president. All he has to do is get up every morning and say, ‘How is the president?’
  • Live in such a way that you would not be ashamed to sell your parrot to the town gossip.

There are many many others but you can see his brand of humor is right on the money especially with today’s political climate.  A little humor never really hurt anyone.


FACTS:

  • 707,758 motor vehicles were reported stolen in the United States in 2015, up three point one (3.1) percent from 2014, according to the FBI.
  • A motor vehicle was stolen in the United States every forty-five (45) seconds in 2015.
  • Eight of the top ten cities with the highest rate of vehicle theft in 2015 were in California, according to the National Insurance Crime Bureau.
  • Nationwide, the 2015 motor vehicle theft rate per 100,000 people was 220.2, up two point two (2.2) percent from 2015.2 in 2014. The highest rate was reported in the West, 371.5 or up eight point two (8.2) percent from 342.2 in 2014.
  • In 2015, only thirteen point one (13.1) percent of motor vehicle thefts were cleared, either by arrests or by exceptional mean, compared with 2014 percent for arson and nineteen point four (19.4) percent for all property crimes. Very disappointing statistics indeed.
  • Autos accounted for 74.7 percent of all motor vehicles stolen in 2015, trucks and buses accounted for 14.8 percent and other vehicles for 10.5 percent.

Given below are the cities in which most vehicles are stolen:

top-10-cities-for-stolen-vehicles

TOP TEN VEHICLES STOLEN:

The National Insurance Crime Bureau ranked the 10 most stolen vehicles in the country with data from the NCIC. Let’s take a look.  The actual numbers are in parentheses.

  1. Honda Accord (52,244)
  2. Honda Civic(49,430)
  3. Ford pickup (full size) (29,396)
  4. Chevrolet pickup (full size) (27,771)
  5. Toyota Camry (15,466)
  6. Ram pickup (full size) (11,212)
  7. Toyota Corolla(10,547)
  8. Nissan Altima (10,374)
  9. Dodge Caravan (9,798)
  10. Chevrolet Impala(9,225)

Automotive engineers continue to examine smartphone system and design to provide models for the development of an increasingly sophisticated user experience, with large center information displays and capacitive touchscreen being a good example.  Now designers are adding another smartphone feature, the fingerprint sensor to enhance modernization of the driver’s interface to functions in and beyond the automobile. This and other forms of biometric authentication, show great promise if implemented with sensitivity to user privacy and the extremes of the automotive operating environment.

BIOMETRICS:

Just what is the science of Biometrics?

Biometrics may be a fairly new term to some individuals so it is entirely appropriate at this time to define the technology.  This will lay the groundwork for the discussion to follow.  According to the International Biometric Society:

“Biometrics is used to refer to the emerging field of technology devoted to identification of individuals using biological traits, such as those based on retinal or iris scanning, fingerprints, or face recognition.”

The terms “Biometrics” and “Biometry” have been used since early in the 20th century to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences.

From the Free Dictionary, we see the following definition:

  • The statistical study of biological phenomena.
  • The measurement of physical characteristics, such as fingerprints, DNA, or retinal patterns for use in verifying the identity of individuals.
  • Biometricsrefers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body.  Examples include, but are not limited to fingerprint, palm veins and odor/scent.  Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, and voice.  Some researchers have coined the term behaviometrics to describe the latter class of biometrics.

More traditional means of access control include token-based identification systems, such as a driver’s license or passport, and knowledge-based identification systems, such as a password or personal identification number.  Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information.

The oldest biometric identifier is facial recognition. The dimensions, proportions and physical attributes of a person’s face are unique and occur very early in infants.   A child will (obviously) recognize a parent, a brother or sister.  It is only since the advent of computers and accompanying software that the ability to quantify facial features has become possible.

The FBI has long been a leader in biometrics and has used various forms of biometric identification since the very earliest day.  This Federal institution assumed responsibility for managing the national fingerprint collection in 1924.  As you know, fingerprints vary from person to person (even identical twins have different prints) and don’t change over time. As a result, they are an effective way of identifying fugitives and helping to prove both guilt and innocence.

AUTOMOTIVE BIOMETRICS USING FINGERPRINT TECHNOLOGY:

What areas of a typical vehicle might benefit from specifically identifying a human being and matching that person to a particular car? Several possibilities come to mind:

  • Secure Access;
    ● Ignition Permission;
    ● Seat Reservations;
    ● On board communication systems;
    ● Anti-Theft programs;
    ● Driving license suspension programs.

All of these would insure privacy and access.  The two digital photographs below will serve to indicate how this methodology might work for an automobile.

starting-the-car

The fingerprint reader can be located in the steering wheel so the driver can concentrate in a better fashion.  This definitely desirable if biometric fingerprints are used for purposes other than starting the vehicle.

starting-the-car2

With this in mind, there are three mainstream fingerprint-sensing technologies available for automotive applications. These are as follows:

  • Capacitive Sensing—This is used in the world’s best-selling smartphones due to very small size: a sensing pad a few tens of microns thick and a small controller allow for very low power consumption.
  • Optical Fingerprint Sensing—Optical sensors are highly reliable and accurate, and so are widely used at border crossings. However, the sensors require a backlight to illuminate the finer.  They are still comparatively bulky compared to capacitive solutions.
  • Ultrasonic Sensing—This offers reliable detection of fingerprints in 3 D but has not found its way into mainstream mobile devices and is relative expensive.

CONCLUSIONS:

I believe biometrics will play a much bigger role in the automotive industry over the next few years.  Biometric fingerprinting could be used in a host of areas including:

  • Access to cabin compartment
  • Starting
  • Accessing cellphone communications
  • Allowing for application software located on cellphone so warm up in very cold climates could be made possible.

Now—here is the downside.  Someone has to be capable of troubleshooting a failed device and fix same if difficulties arise.  As complexity grows, we move more toward replace than fix.  Replace is costly.

As always, I welcome your comments.


Forbes Magazine recently published what they consider to be the top ten (10) trends in technology.  It’s a very interesting list and I could not argue with any item. The writer of the Forbes article is David W. Cearley.  Mr. Cearley is the vice president and Gartner Fellow at Gartner.  He specializes in analyzing emerging and strategic business and technology trends and explores how these trends shape the way individuals and companies derive value from technology.   Let’s take a quick look.

  • DEVICE MESH—This trend takes us far beyond our desktop PC, Tablet or even our cell phone.  The trend encompasses the full range of endpoints with which humans might interact. In other words, just about anything you interact with could possibly be linked to the internet for instant access.  This could mean individual devices interacting with each other in a fashion desired by user programming.  Machine to machine, M2M.
  • AMBIENT USER EXPERIENCE–All of our digital interactions can become synchronized into a continuous and ambient digital experience that preserves our experience across traditional boundaries of devices, time and space. The experience blends physical, virtual and electronic environments, and uses real-time contextual information as the ambient environment changes or as the user moves from one place to another.
  • 3-D PRINTING MATERIALS—If you are not familiar with “additive manufacturing” you are really missing a fabulous technology. Right now, 3-D Printing is somewhat in its infancy but progress is not just weekly or monthly but daily.  The range of materials that can be used for the printing process improves in a remarkable manner. You really need to look into this.
  • INFORMATION OF EVERYTHING— Everything surrounding us in the digital mesh is producing, using and communicating with virtually unmeasurable amounts of information. Organizations must learn how to identify what information provides strategic value, how to access data from different sources, and explore how algorithms leverage Information of Everything to fuel new business designs. I’m sure by now you have heard of “big data”.  Information of everything will provide mountains of data that must be sifted through so usable “stuff” results.  This will continue to be an ever-increasing task for programmers.
  • ADVANCED MACHINE LEARNING– Rise of the Machines.  Machines talking to each other and learning from each other.  (Maybe a little more frightening that it should be.) Advanced machine learning gives rise to a spectrum of smart machine implementations — including robots, autonomous vehicles, virtual personal assistants (VPAs) and smart advisors — that act in an autonomous (or at least semiautonomous) manner. This feeds into the ambient user experience in which an autonomous agent becomes the main user interface. Instead of interacting with menus, forms and buttons on a smartphone, the user speaks to an app, which is really an intelligent agent.
  • ADAPTIVE SECURITY ARCHITECTURE— The complexities of digital business and the algorithmic economy, combined with an emerging “hacker industry,” significantly increase the threat surface for an organization. IT leaders must focus on detecting and responding to threats, as well as more traditional blocking and other measures to prevent attacks. I don’t know if you have ever had your identity stolen but it is NOT fun.  Corrections are definitely time-consuming.
  • ADVANCED SYSTEM ARCHITECTURE–The digital mesh and smart machines require intense computing architecture demands to make them viable for organizations. They’ll get this added boost from ultra-efficient-neuromorphic architectures. Systems built on graphics processing units (GPUs) and field-programmable gate-arrays (FPGAs) will function more like human brains that are particularly suited to be applied to deep learning and other pattern-matching algorithms that smart machines use. FPGA-based architecture will allow distribution with less power into the tiniest Internet of Things (IoT) endpoints, such as homes, cars, wristwatches and even human beings.
  • Mesh App and Service ArchitectureThe mesh app and service architecture are what enable delivery of apps and services to the flexible and dynamic environment of the digital mesh. This architecture will serve users’ requirements as they vary over time. It brings together the many information sources, devices, apps, services and microservices into a flexible architecture in which apps extend across multiple endpoint devices and can coordinate with one another to produce a continuous digital experience.
  • INTERNET OF THINGS (IoT) and ARCHITECTURE PLATFORMS– IoT platforms exist behind the mesh app and service architecture. The technologies and standards in the IoT platform form a base set of capabilities for communicating, controlling, managing and securing endpoints in the IoT. The platforms aggregate data from endpoints behind the scenes from an architectural and a technology standpoint to make the IoT a reality.
  • Autonomous Agents and ThingsAdvanced machine learning gives rise to a spectrum of smart machine implementations — including robots, autonomous vehicles, virtual personal assistants (VPAs) and smart advisors — that act in an autonomous (or at least semiautonomous) manner. This feeds into the ambient user experience in which an autonomous agent becomes the main user interface. Instead of interacting with menus, forms and buttons on a smartphone, the user speaks to an app, which is really an intelligent agent.

CONCLUSIONS:  You have certainly noticed by now that ALL of the trends, with the exception of 3-D Printing are rooted in Internet access and Internet protocols.  We are headed towards a totally connected world in which our every move is traceable.  Traceable unless we choose to fly under the radar.

%d bloggers like this: