2. enterprise and business architecture cloud video data

33
Part II Communication, Cloud, Video and Data Lisa Martinez 408.638.9016 @ 2014 Copyright Wicked

Upload: mrsalways-right

Post on 09-May-2015

454 views

Category:

Leadership & Management


1 download

DESCRIPTION

Cloud with Video and association with Data - Raw data everything digital Part II

TRANSCRIPT

Page 1: 2. Enterprise and Business Architecture Cloud Video Data

Part II Communication, Cloud, Video and Data

Lisa Martinez 408.638.9016 @ 2014 Copyright Wicked

Page 2: 2. Enterprise and Business Architecture Cloud Video Data

A – We must truly understand the limitations and approaches people use to push some new idea. ◦ Innovation is rarely invention, as an example we can review Big Data

Data>Information>Knowledge>Wisdom

B – Delivery in a distributed architecture federated and promoted by Students ◦ Communication Strategy

C - We must ensure we focus on innovation in an objective manner. ◦ Objective Research through student led engagements in a shared

service model

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 3: 2. Enterprise and Business Architecture Cloud Video Data

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 4: 2. Enterprise and Business Architecture Cloud Video Data

There are industry standard being

overlooked.

Page 5: 2. Enterprise and Business Architecture Cloud Video Data

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 6: 2. Enterprise and Business Architecture Cloud Video Data

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 7: 2. Enterprise and Business Architecture Cloud Video Data

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 8: 2. Enterprise and Business Architecture Cloud Video Data

Between end points – service provider

Beyond end points – within a public cloud

Within the private clouds

Page 9: 2. Enterprise and Business Architecture Cloud Video Data

Before Changes

Mega Trunks

Super Trunks

Fiber Optic

Fiber Channels

Analog

IP

Wireless ◦ Drones

Broadband ◦ Telecommunications

◦ Security

◦ Machine to Machine

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 10: 2. Enterprise and Business Architecture Cloud Video Data

Device

Voice

Video

Data/Applications

Unreliable aspirations to encrypt data and we must assume we

are not finding proven video encryption providers.

• Isolation and containment are simply smarter

IG Layer

Access

Control Links

(ACL)

inbound and

outbound

connectivity

model

isolates

threats into

three

segments

while making

each gradient

layer less

accessible

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 11: 2. Enterprise and Business Architecture Cloud Video Data

Applications which are not dropping software on the device.

Accessible as an on Premise, Hybrid or fully Hosted Cloud solution.

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 12: 2. Enterprise and Business Architecture Cloud Video Data

3rd party solutions with remote management features ◦ Video Conferencing or Telepresence

◦ Most meeting solutions – Maestro, Skype, Google Hangouts and Webex as examples

3rd party cloud services ◦ SFDC offers a CRM capability – many features are hosted, co-located

or on premise

◦ ERP in a cloud

◦ Intuit offers many

◦ Cisco offers many

Developed in house or SDN and Gaming are all described in the context of Big Data.

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 13: 2. Enterprise and Business Architecture Cloud Video Data

Understanding the common variables with an application of search

tags to enable multi-generational and cross-border association of

the shared for a minimum viable system model. ◦ Experience based learning in a model designed for rapid expansion and

local customization.

◦ Teaching students with hands on learning using open source solutions from

the wisdom of the most recognized experts in these various fields.

◦ Understanding the semantics and stage of an existing practice does not

need its own standard.

In fact, using the approach will cause a train wreck.

Big data offers an example of the subject

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 14: 2. Enterprise and Business Architecture Cloud Video Data

Community Outreach

Social Media as a Channel

Supported By

Mentored By

Zero to Five

K-5th 6-8th 9-12th 13-20th Workforce Seniors

1. Design Vision and Strategy WICKED 2014@copyright Lisa Martinez 408.638.9016

Systems for People in IDENTITY minimum viable system

Students

Page 15: 2. Enterprise and Business Architecture Cloud Video Data

Employee Supplier Customer

MC.1. Party Management Capability

MC.2. Offer Management Capability

BP.1. Design Strategy and Vision

MC.3. Financial Management Capability

408.638.9016 Lisa Martinez 2014 @ Copyright WICKED Design Solutions

Offer

IaaS

PaaS

SaaS

Page 16: 2. Enterprise and Business Architecture Cloud Video Data

Content Id

no private information

public life

Private life

economic life

social life

family life

health and safety

life

408.638.9016 Lisa Martinez 2014 @ Copyright WICKED Design Solutions

Type 2 diabetic

Physician

A manager in retail

A major retailer

IGL6 - 7 Public

IGL1-3

Private

IGL4-5

Private

Page 17: 2. Enterprise and Business Architecture Cloud Video Data

From offices around the world, InfoComm serves its members and the industry through: ◦ Education, including technical and business courses, in the classroom and

online ◦ Resources, such as AV standards, thought pieces, and market research ◦ Events, including local roundtables and international trade shows

Established in 1939, InfoComm has more than 5,000 members, including manufacturers, systems integrators, dealers and distributors, independent consultants, programmers, rental and staging companies, end-users and multimedia professionals from more than 80 countries.

As an ANSI Accredited Standards Development Organization (SDO), InfoComm offers the Certified Technology Specialist™ (CTS®) program — the only audiovisual certification ANSI accredited under the International Standard ISO/IEC 17024.

Page 18: 2. Enterprise and Business Architecture Cloud Video Data

Cable IP4/IP6 IP address 16.21.165.01

Our view into our television

was once a one way view

Our view into the world was

once a one way view

400 lines of

resolution

1100 lines of

resolution

May 2014 Report

to the President

Restores Civil

Liberties with

Virtual Life

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 19: 2. Enterprise and Business Architecture Cloud Video Data

Before Now video is sent and received

May 2014 Report

to the President

Restores Civil

Liberties with

Virtual Life

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 20: 2. Enterprise and Business Architecture Cloud Video Data

Personal Investment Carrier Service Contract

I choose a carrier and I purchase the device with an understanding

(a contractual agreement) between me and the mobile carrier

Any Cell phone service

provider

My Device

Carrier supplies a service to

use my device

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 21: 2. Enterprise and Business Architecture Cloud Video Data

Within my home, I am still private and protected. Right?

“No”, but you can trust us.

May 2014 Report

to the President

Restores Civil

Liberties with

Virtual Life

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 22: 2. Enterprise and Business Architecture Cloud Video Data

Let students work through the details of the new technology innovations ◦ Have a limited group of stakeholders “wisdom” reviews and advisors ◦ The report to the president did not appear to get into the subject

The opportunity for students to protect themselves, although the potential is high for teachers and police to force students to turn off the devices... ◦ Attendance in class – an ideal way to check in ◦ Bullying Prevention – Students are far less likely to be cruel ◦ Replay experiences – how many times have your notes been complete. ◦ Participate in Experience Based projects – working with at risk populations ◦ Safety – a way for your parents to find you at all times ◦ Safety – a way to replay your abduction or human trafficking kidnapping

A way to prove you told the truth when someone doesn’t trust you.

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 23: 2. Enterprise and Business Architecture Cloud Video Data

Records

the view

you see Records the

way you

respond to

what you see.

Google Glasses

Wearable Mobile Technology

Presents

Gaming as

an option

virtual or

augmented

reality

Records the

way you

respond to

what you see.

Content and Logging Sensor Data

Sensor Data/Logging/Metadata or Raw Data from Video, Audio and Web Activity or Texting

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 24: 2. Enterprise and Business Architecture Cloud Video Data

Many of us don’t realize data is the raw

or technical form of all methods of

communication

Page 25: 2. Enterprise and Business Architecture Cloud Video Data

Data is no longer trustworthy Nor do the experts get invited

Data is information or just data Data is knowledge or just data Data is Wisdom or just data it is

not evidence nor intelligence Data manipulated outside the

process is just data outside the process (fusion)

Data connected outside the process is just data connected (fusion)

Data tools and technology behave without controls supplied in 3rd party applications.

Data is not governed nor does it have any value when people who are not involved in the original format manipulate raw data. ◦ No one is expected to change, alter

or manipulate nor does massaging ever pass ethical standards

Data can be harmful if connected with other data, as it can easily be mis-represented, as facts. (Fusion)

In the case of big data we might ask ourselves, who was involved in and did the experts get invited?

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 26: 2. Enterprise and Business Architecture Cloud Video Data

Data

Raw Format

Applications

(information and

Knowledge)

Content

Knowledge

(Content and Information)

Information

(Documents)

Records

Display

User Transactional

User

Management

user

Company LDAP

or AD account

X X –Restricted

group see

Sarbanes Oxley

rules

Network IP and

Host

X X

Secure access

certificate or Key

X X

Monitor and

Design

Key Controls

SOD

404 Assurances

Any financial

Management,

based on roles

based access

Any create, read,

update or archive

Financial

Management

Quality

Management

Employee

Performance

All request are

pre-authorized

and validated

All approvals are

approved or

delegated to a

person with same

or greater

authority.

Asset Device Any organization

or agency

supplied

Any organization

or agency

supplied WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 27: 2. Enterprise and Business Architecture Cloud Video Data

Two dimensions that “do not” integrate within many organizations ◦ Not in recognized as a Technology domain, Business Process nor EA

◦ Not in the Business Intelligence and EDW are not always integrated

◦ Not in the Master Data with the BI or Technology

An application qualifies for SDLC change control threat analysis

every time a “get” or “create” command is used in an API (games,

data only subscriptions, legacy applications, custom in house

applications, BI Developed Applications, any minor change with

such commands = application).

Audio, Images and Video are now part of the Big Data size big.

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 28: 2. Enterprise and Business Architecture Cloud Video Data

Assume the conceptual model will converge through to data

and potentially be returned or converted to another form. ◦ In these materials we assume data represents content in many forms

when presented as an application or video or game.

◦ The point and assumption must be users are unaware of the technical

details.

◦ The following table suggest a person will potentially never understand

and not need to understanding that the four domains are also data.

View(s) Organization

or Agency

Content Information Knowledge Records

Person as

an individual

No Video or Audio

or digital data in

an application

or other form of

presentation

Video or Audio or

digital data in an

application or

other form of

presentation

Video or Audio

or digital data in

an application

or other form of

presentation

An official recording of an

event or transaction which

requires validation and

reporting to regulatory

authorities.

Person as

an Agent

Yes Video or Audio

or digital data in

an application

or other form of

presentation

Video or Audio or

digital data in an

application or

other form of

presentation

Video or Audio

or digital data in

an application

or other form of

presentation

An official recording of an

event or transaction which

requires validation and

reporting to regulatory

authorities.

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 29: 2. Enterprise and Business Architecture Cloud Video Data

Adoption of a Service Management Model for Business Services enables focus on the business which doesn’t require Technical Changes ◦ Expands upon an IT Service Management model with human wellness to crisis

capabilities.

◦ Factors the many forms of digital information to aid in the wellness of citizens or consumers for the Public and Private sectors.

◦ Low effort to adoption-builds upon IT in most organizations ITIL ITSM has been adopted and adds the person centered design concept.

◦ Common method to prevent and protect versus cause and effect

Benefit “outcomes” effectively measure Privacy and Security

Benefit “outcomes” effectively plan investments according to a baseline risk

Benefit “outcomes” effectively prepare, plan, mitigate, recover and restore in crisis situations

Benefit “outcomes” effectively supplies an expectation for measuring risk for citizens

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 30: 2. Enterprise and Business Architecture Cloud Video Data
Page 31: 2. Enterprise and Business Architecture Cloud Video Data
Page 32: 2. Enterprise and Business Architecture Cloud Video Data

A single woman may take comfort in having a friendly eye watching over her. ◦ The only way to be comforted in such situations would be if the police commit to

responding if trouble is detected.

A woman would be far less likely to change in her room if she had a safe place to undress.

How friendly can a camera be if you were married or sexually active? ◦ You’d have to know and be able to control the device. ◦ Many camera’s appear to be off, they are actually on. ◦ Many audio conversations are recorded and distributed

Women are far more likely to be adversely effected by an intimate encounter if the video were ever released. ◦ Catalog and strong metadata management will absolutely enable retrieval of

images.

WICKED 2014@copyright Lisa Martinez 408.638.9016

Page 33: 2. Enterprise and Business Architecture Cloud Video Data

While technology exist to promote intelligence for crime fighting, or fusion which results in false positives without having all the facts.

A person may have had their identity stolen once or twice in their lifetime. ◦ Instead of asking a person the person immediately is excluded from a potential

role in a project or company.

What if they have a common name and when you Google the name, suddenly mug shots are the first images you see? ◦ What if your name was so common and mysteriously was the name someone

arrested for fraud in nearly every state? Would you consider the candidate if you had to dig into the person’s life and rule out

so many criminals?

If you also were married more than twice, you might have a reason for name changes.

The number of times a person’s been married, may exclude a woman but you’d never know if it was a man.

WICKED 2014@copyright Lisa Martinez 408.638.9016