Welcome!

Government Cloud Authors: Pat Romanski, Elizabeth White, Dana Gardner, Liz McMillan, Gopala Krishna Behara

Related Topics: Government Cloud, Cloud Security

Government Cloud: Blog Feed Post

Are You Thinking Through System Improvements after the Xmas Terror Attack?

Information technology in the federal enterprise does not work like it does in Hollywood

Government Information Technology on Ulitzer

Information Technology in the federal enterprise does not work like it does in Hollywood.   Although there are plenty of success stories to go around, federal IT is more limited and constrained than we would all want, for lots of reasons. Some of the reasons are just do to complexities and limited budgets.  Some of the reasons are for security.  Some of the reasons are because of  the way the government funds its agencies and manages programs. And some of reasons are because we humans have designed things using the wrong models and implemented them to serve workflows that are flawed to begin with.

This last point is something that I hope enterprise technologists all try to improve on for all our systems.

But perhaps the most important systems to consider improving right now are the ones supporting our national security decision-makers in the field.  These systems will very likely be under review in as part of the investigation into the Xmas terror attack.

There are a huge number of data-focused systems involved that could have been part of stopping this event. The most famous of these are the Terrorist Identities Datamart Environment (TIDE) and the Terrorist Screening Data Base (TSDB).  Other data sources that will need to be scrutinized exist at the Department of Homeland Security, Department of State (especially visa applications), and the intelligence community.

We can expect lots of thought will be put into how many very large enterprise grade data systems interconnect and interoperate together as part of the reviews and after actions underway right now.   I’m sure all concerned in the review of what went wrong in the national security community will realize the problems were not IT and the human element is absolutely the most important to understand.  But still there will be more that systems can smartly do to help humans do right.

I have two recommended pieces of reading for anyone involved in studying what went wrong and how to fix it. Both are from the same thinker, Jeff Jonas. Jeff publishes great thoughts on his blog at: http://jeffjonas.typepad.com, and frankly I recommend all enterprise technologists familiarize themselves with all his writings.  But two pieces stand out as being incredibly relevant to systems design to stop back actors:

Perpetual Analytics and You won’t have to ask– data will find data and relevance will find the user.

In the first piece on Perpetual Analytics Jeff describes the approach to data analytics most organizations find themselves in, where data is extracted from existing systems and secondary analysis is conducted on the extracted data across the entire enterprise whenever a question must be answered.  The ocean must be boiled every time a new analysis is conducted.  This boil the ocean approach does not scale.

He uses the term “perpetual analytics” to “…describe the process of performing real-time analytics on data streams.  Think of this like “directing the rain drops” as they fall into the ocean – placing each drop in the right place and measuring the ripples (i.e., finding relationships and relevance to the historical knowledge). Discovery is made during ingestion and relevant insight is published at that magical moment. ”

Check out the post for more, you will be glad you did, I’m sure.

The other piece I’d recommend you study is You won’t have to ask– data will find data and relevance will find the user .   It highlights a very important shift in approaches to getting the right data to find the right data and make relevance that will find a user. Here is how Jeff put it:

“Next generations of information management systems will not principally rely on users dreaming up smart questions to ask computers. Rather, this new breed of technology will make it possible for data to find itself and relevant discoveries to find the consumer (e.g., a user). And all in real time of course. While this will bring with it new policy debates like which data will be permitted to find which data and who is notified of what relevance, I am going to stay focused in this post on what this technology will enable.”

Another thing all of us who have ever worked in the federal IT business know, it can be very hard to change/improve legacy systems and legacy approaches.  But our existing systems are calling out for improvement, and I’m certain Jeff Jonas is spelling out a model that will improve upon the current approach.

Do you agree?

Related posts:

  1. Protecting Federal Networks Against Cyber Attack
  2. How can we judge enterprise-class CTOs and CIOs? Rank them on the Kundra Scale
  3. Six Enterprise Mega Trends to watch in 2010

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

IoT & Smart Cities Stories
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in development and launches of disruptive technologies to create new market opportunities as well as enhance enterprise product portfolios with emerging technologies. His most recent venture was Octoblu, a cross-protocol Internet of Things (IoT) mesh network platform, acquired by Citrix. Prior to co-founding Octoblu, Chris was founder of Nodester, an open-source Node.JS PaaS which was acquired by AppFog and ...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...