Exponential Functions Exponential functions Geometric Sequences.
Going #Exponential: Public Service and the Internet of Everything in 15 Minutes or Less.
-
Upload
david-bray -
Category
Leadership & Management
-
view
781 -
download
0
Transcript of Going #Exponential: Public Service and the Internet of Everything in 15 Minutes or Less.
Personal Views @fcc_cio
Going #Exponential
Public Service and the Internet of Everything
in 15 Minutes or Less
Going #Exponential
Public Service= What “We The People”
Do Together
“in his locis scorpiones nascuntur”(in these places scorpions are born)
1969
Going #Exponential
1982
Going #Exponential
1993
2007
2010
the Internet of Everything
the Internet of Everything
the Internet of Everything
vs. the Internet of ‘Things’ b/c Internet ‘Things’ Already Here
When ~Everything is Connected
vs. the Internet of ‘Things’ b/c Internet ‘Things’ Already Here
Huge Opportunities & Challenges
Huge Opportunities & Challenges
Including What Happens If We Lose Connectivity?
Confront An Average Internet Minute
204,000,000+ emails sent globally (2014)4,000,000+ Google search queries
Confront An Average Internet Minute
204,000,000+ emails sent globally (2014)4,000,000+ Google search queries
2,460,000+ pieces of Facebook content shared 72+ hours of new YouTube video uploaded
Confront An Average Internet Minute
204,000,000+ emails sent globally (2014)4,000,000+ Google search queries
2,460,000+ pieces of Facebook content shared 72+ hours of new YouTube video uploaded
48,000+ iOS apps downloaded (per Domo.com)_______________________________________________________________________________________________________________________________
_
stats will grow exponentially in the years ahead
Confront An Average Internet Minute
McAfee: 200+ new threat vectors/minute (2013)FireEye: new malware every 3 mins (2013)
Confront An Average Internet Minute
McAfee: 200+ new threat vectors/minute (2013)FireEye: new malware every 3 mins (2013)
DOE/NNSA: receives 6,940+ attacks/min (2015)DoD: 85% of emails received = spam (2015)
Confront An Average Internet Minute
McAfee: 200+ new threat vectors/minute (2013)FireEye: new malware every 3 mins (2013)
DOE/NNSA: receives 6,940+ attacks/min (2015)DoD: 85% of emails received = spam (2015)
and receives 13,800+ nefarious emails/minute_______________________________________________________________________________________________________________________________
_
stats will grow exponentially in the years ahead
If We Take the 232 (~4.3 billion) Numbers Addressable by IPv4 & Put Them Into a Beach Ball
The 2128 (~340 Followed By 36 zeros) Numbers Addressable by IPv6
= The Volume of Our Sun
While in Australia and Taiwan
Was Asked Who Will Protect Your Grandmother’s Car or Her Internet-Enabled Home?
While in Australia and Taiwan
Was Asked Who Will Have the Motivation to Act on These Long-Term Issues in Public Service?
#ChangeAgents Needed Now
Leaders Who “Illuminate the Way”Work to Understand Narratives
Within and Across Organizations
#ChangeAgents Needed Now
Leaders Who “Illuminate the Way”Manage Friction of Stepping Outside
the Status Quo
Going #Exponential
Taking a Risk:Manage Friction of Stepping Outside
the Status Quo
Going #Exponential
Taking a Risk: ABCs of Public Service and
the Internet of Everything
A is Always-On Access
Accessibility Affordability
We All Must Addressthe Digital Divide
B is Bring Your Own _Blank_
Be it Earpieces, Glasses, or Watches
What We Wear Will Be Online
C is Careful Caution
Correlations Cross Connected Data
Crucial We
Protect Privacy
D is Data Deluge
Global Data in 2020
Should Exceed All Words Humanity Ever Said
Exponential Everywhere
Everyone
Everything
From Fourteen Billion Devices Now
In Five Years: Fifty Billion
Or More Around Our World
G is Great Opportunities
Greater Results and
Government Reinvented
H is How Best to Engage the Public?
How Best with Local Governments?
How Best to Help Each Other?
It Is Important to Include
All Perspectives In Initiatives
Including Those Who Opt-Out of Internet Use
Just Because Data Sources
Can Be JoinedDoesn’t Mean We Should
Joint Discussions With the Public On Privacy By Design
Key to Keep in Mind
The Public Will HelpRegularly Remind
That We Must Serve Benevolently and Kind
Letting Anyone Reuse our Code
License Liberties Will Promote More Trust
Leverage Future Reuse Across Our Efforts
Makers Movement Means
More Can Manufacture
Mass Fabricated Tools Affordably
Notions of What Nations Solely Did
Near Future May Challenge
New Tech is About Networks
Open Sourceand Security
Open Design and APIs
Open Choices, For Us All
Promoting Positive Change
Perhaps the Perplexing Part: Legacy Processes
Future Depends on Purposeful Transformations
Quite Simply:
Tech Changes How We Organize
Quite the Question: How Will We?
R is Raising Questions:
Regarding the Future of Security?
Rational Online Discussions? Representative Democracy?
S is Scale of Change
Since It Is Not LinearIt’s Exponential
Search By Keywords One Day Will No Longer Suffice
T is Trying to Tell
What is ImportantIn the Data Deluge
Techniques, Tools, and Tactics Transform How We Will Work
Ultimately it’s About Uses
Use By HumansTrusting Humans, and
Use By MachinesTrusting Machines
V is Volume
Velocity Variety
VolatilityVeracity
With the Coming Future
We’re Going WhereWe’ve Never Been
We Will Need New Ways To Adapt
X is eXponential
eXperiments
to eXchangeeXpertise
Y is You Matter More Than Ever
You Can Help Transform Our #PublicService and
You Can Be Positive #ChangeAgents
Zeros and OnesIt’s Much More Than That
Zooming Towards The Future While Remaining True To
“We The People”
We The People
Going #Exponential
We The People
Going #Exponential