One of the fascinating predictions of all time that eventually came true is that the everyday person would communicate to another person with a personal device without wires. This was the dream of Nikola Tesla, who shared this prediction with the New York Times in 1909! (Sterbenz, 2013). Nikola wasn't a very practical businessman, so his patents responsible for the proliferation of radio broadcasting and alternative current were never attributed to him. In addition, he had lofty ideals, including a preference not to publish in academic journals and a desire to provide energy for free to people all over the world that clashed with modern capitalism.
Today Tesla would be pleased to see that most persons in the modern world have access to a device (our smartphones) that allows us to send messages, share pictures, movies, and access information without wires. It took approximately eighteen years for the first pictures to be broadcast wireless through a television (Vlku, n.d.). Part of the dream of Tesla is now commonplace in the developed world. But what had to happen for the proliferation of mobile messaging and personal communication devices? Technological innovation is a significant force required before the capabilities for smartphones were possible. The continuous improvements in microprocessors, the development of plastic, advanced software, and the mass adoption of cellular towers required ongoing enhancements in technological innovation. In addition, the practicality and accessibility of the Internet allowed smartphones to provide a utility that many people sought. Yet as Nikola Tesla learned, technology alone does not let something be successful. In addition to the technological advancements required for smartphones and wireless communications, there also needed to be economical and social forces present. Social demand for the capabilities to communicate with other people using a small device was a prominent business driver for all the supply chain companies that feed into mobile phones components, phone producers, and the telecommunication industry. The demand for on-demand messaging, faster communications, data transfers, and multimedia streaming continues to drive telecommunication providers and smartphone manufacturers to innovate by developing more advanced chips and ways to accommodate expectations. Tesla understood the human desire to communicate easily with a simple "apparatus." He was a genius of his time, creating patents for radio broadcasting and electricity delivery under Thomas Edison's Edison company. His knowledge of physics allowed him to envision the ability to transmit electromagnetic radiation from one device and receive it on another device. He may not have had the foresight to see that the microchip, software, and telecommunication companies would be the required components to achieve this feat, but he knew it was possible. I believe that those of us who work in various industries and have the knowledge, skills, and imagination about where our future innovations will lead society are often capable of making informed predictions. These predictions can come to reality more quickly when businesses couple experts in their fields (the visionaries) with business prowess and the ability to sell goods people may not even know they need (salespersons). It is a rare gift when an innovator with imagination can also identify and leverage business drivers to deliver goods into customers' hands and make dreams into reality! References Esferize. (n.d.). StackPath. Www.esferize.com. Retrieved January 16, 2022, from https://www.esferize.com/en/nikola-tesla-the-forerunner-of-wireless-communications/ Sterbenz, C. (2013, September 3). 16 Of The Most Impressive Predictions Of All Time. Business Insider. https://www.businessinsider.com/predictions-from-the-past-that-came-true-2013-9#from-1909-nikola-tesla-predicted-personal-wireless-devices-7 Vlku, N. (n.d.). The History of Television (or, How Did This Get So Big?). Www.cs.cornell.edu. http://www.cs.cornell.edu/~pjs54/Teaching/AutomaticLifestyle-S02/Projects/Vlku/history.html#:~:text=The%20first%20%22television%22%20system%20broadcast
0 Comments
When I wake up in the morning, at some moment I am presented with a choice in how to approach the day. The choices I make determine, to some extent, how any given day will unfold. Some mornings I pause and think about the day ahead. I recall past occurrences, review my calendars for activities, and map out a course of action to accomplish tasks. I envision a story about how the day will unfold, and I examine the day as it unravels. During the day, I observe how activities are progressing. Are meetings running longer than anticipated? Did an unexpected school incident affect our children? Did an unexpected automobile accident prevent a timely route to a scheduled activity with the family? These types of signs require me to adjust future appointments or change my course of action throughout the day. In a small way, I am doing my scenario planning. Scenario planning requires an abstraction of the future, positing what may occur throughout time. It works best in scenarios described as "high uncertainty-high complexity" (Koehler & Harvey, 2004). In reality, my daily activities could hardly be described as uncertain or highly complex. Scenario planning works best for complex activities with multiple variables. It uses qualitative and quantitative data and determines a response to various scenarios (Saulsgiver, 2021).
Scenario planning is not what I typically do when I wake up in the morning. What I usually do is more akin to forecasting. When I wake, I use past experiences to determine the day's events. Koehler and Harvey describe forecasting as an activity that "…involves making predictions about an unknown question or issue" (Koehler & Harvey, 2004, pp. 274). Some days, I react to events using life experience without anticipating and planning for various outcomes. Forecasting is similar to this activity because it takes past quantitative data and predicts future performance. For my day-to-day life, forecasting seems to get the job done. However, there are some times when scenario planning will ensure I have a more successful day. For example, if my day requires me to take an airplane across the country for a critical business meeting. The advantages to each type of planning activity are that forecasting is it uses real data and requires less time. Forecasting analyzes concrete facts from the past to anticipate the future. Forecasting is often performed to predict short periods in the future. The disadvantage of forecasting is that it is less responsive to unexpected changes. For example, if I expected revenues to be significantly higher based on a forecast, and I performed no planning around the scenario if income is low, then I may be in severe financial trouble. Scenario planning anticipates multiple outcomes and maps them to stories. These stories have signs and markers that adjust the narrative as it flows. The scenarios use quantitative and qualitative data to develop a narrative that could happen or the opposite. The process anticipates a variety of outcomes well into the future. One disadvantage of scenario planning is that it requires a significant investment in resources and time. Also, scenario planning may be far from accurate given that it is used to predict outcomes many years into the future. In most cases, scenario planning is best performed by many experts (e.g., my wife, children, coworkers) to anticipate the outcomes of the day. This is not always possible and may drive said experts nuts. Forecasting my day is something that is easier to do, and it keeps the experts happy. However, when a complex vacation travel agenda needs to be made, then scenario planning may be the best activity to perform. After all, you never know when Coronavirus pandemics may come along to rain on your Disney Cruise line parade! References Koehler, D. J., & Harvey, N. (2004). Blackwell handbook of judgment and decision making. Blackwell Pub. Saulsgiver, W. (2021, August 20). Scenario Planning versus Forecasting. Schultz Financial Group Inc. https://sfginc.com/scenario-planning-versus-forecasting/ Carbon Nanotubes and our Future“Accidents happen!” Although the phrase may have a negative connotation, it is because of accidents and errors that humans discovered world-changing technologies. For example, vulcanized rubber and penicillin were discovered by accident (The Editors of Encyclopedia Britannica, 2018a) (The Editors of Encyclopedia Britannica, 2018b). These two technologies have provided the capability to create impact-resistant materials, automobile and bicycle tires, durable shoes, and a new class of medicine that has saved lives. Carbon nanotubes (CNT) include a list of materials accidentally discovered and showed the potential to create new materials and save lives! In 1991 a researcher, Sumio Iijima, fascinated with carbon materials and atomic structure, analyzed materials using an electron microscope. During his analysis, he recognized cylindric-shaped carbon structures that appeared to be “…extremely thin needle-like material…” (International Balzan Prize Foundation, 2007). Upon further inspection, Iijima realized that the structure was shaped like a tube and named the materials “carbon nanotubes.” Iijima’s finding was not the first time CNT was created; however, it was the first time a researcher reported their structure and potential applications (Iijima, 1991).
The discovery and further research regarding CNT applications have promised a boon of new materials, medical applications, and computer circuitry. CNT innovation and research are driven by numerous creation forces, including economic pressure to improve computer circuitry (Graham et al., 2005), medicine (Prato et al., 2008), create new materials, and drive innovation in green technology. CNT has the potential to drastically increase electric vehicle battery efficiency and capabilities and provide new materials to use in microchips. However, there remain challenges preventing whole scale application of CNT. CNT are incredibly strong and flexible, which drives a desire to use them in new materials for buildings, vehicles, and structures. However, Lu et al. share technological challenges to produce this microscopic miracle at a scale that is economically useful (Lu et al., 2012). Currently, industrial-scale manufacturing of CNT in quantities to support a new material revolution is one of the primary challenges of using CNT. In addition, using CNT for transistors is hindered by subtle defects in the tube structures themselves. A methodology to create a more uniform CNT will need to be developed before the next computer generation using CNT as transistors. CNT, nonetheless, have found their way into drinking water filters, sports equipment, batteries, and for use in the delivery of medicine (Cambridge, 2014). In addition, CNT is being produced in larger and larger quantities each year with a “..tenfold..” increase between 2006 and 2014. CNT, discovered by accident, could be the future material to follow a string of materials that were accidentally found and driven to the markets by economic and technological forces. It seems humans have a knack for discovering new materials, whether it be Charles Goodyear's vulcanized rubber or Leo Baekeland’s synthetic plastic. References Cambridge, U. of. (2014, March 31). Carbon nanotubes find real world applications. Phys.org. https://phys.org/news/2014-03-carbon-nanotubes-real-world-applications.html Graham, A. P., Duesberg, G. S., Seidel, R. V., Liebau, M., Unger, E., Pamler, W., Kreupl, F., & Hoenlein, W. (2005). Carbon Nanotubes for Microelectronics? Small, 1(4), 382–390. https://doi.org/10.1002/smll.200500009 Iijima, S. (1991). Helical microtubules of graphitic carbon. Nature, 354(6348), 56–58. https://doi.org/10.1038/354056a0 International Balzan Prize Foundation. (2007, November 22). The Discovery of Carbon Nanotubes - Basle, 22.11.2007. Www.balzan.org. https://www.balzan.org/en/prizewinners/sumio-iijima/the-discovery-of-carbon-nanotubes-iijima Lu, W., Zu, M., Byun, J.-H., Kim, B.-S., & Chou, T.-W. (2012). State of the Art of Carbon Nanotube Fibers: Opportunities and Challenges. Advanced Materials, 24(14), 1805–1833. https://doi.org/10.1002/adma.201104672 Prato, M., Kostarelos, K., & Bianco, A. (2008). Functionalized Carbon Nanotubes in Drug Design and Discovery. Accounts of Chemical Research, 41(1), 60–68. https://doi.org/10.1021/ar700089b The Editors of Encyclopedia Britannica. (2018a). Vulcanization | rubber manufacturing. In Encyclopædia Britannica. https://www.britannica.com/technology/vulcanization The Editors of Encyclopedia Britannica. (2018b). penicillin | Discovery, Mechanism of Action, & Uses. In Encyclopædia Britannica. https://www.britannica.com/science/penicillin If you have ever gone out to lunch with a large group of people, you may have experienced how challenging it is for a group of people to make a group decision. Maybe your colleagues and friends are different, but for me, it can be a real pain in the neck to find a lunch destination that everyone is happy to visit. Consensus-building methods for formal settings loosely applicable to a group lunch destination decision exist that are more appropriate for complex issues. Two group decision-making models are the Delphi method and the Structured Design (Dialogic) (SDD) method. Both group decision-making methods ensure that group decisions are objective. In addition, both ways strive to include introverts, balance contributions from extroverts, and have all perspectives. The ideal results of each method include group decisions with holistic viewpoints rather than decisions based on who was the loudest or more senior person in a group. The strategy should reflect the issue's complexity, so I would prefer to use SDD over Delphi for complex problems. The Delphi Method begins with a series of open-ended questions about the decisions to be made. Participants then discuss the answers until a consensus is reached (Sekayi & Kennedy, 2017). For example, in our lunch destination scenario, participants may begin by asking if anyone has any food allergies or specific types of food that are strictly off-limits. The group can then eliminate some destinations to narrow down the lunch destination. Each person provides information about their preferences and slowly whittle down potential destinations. Unfortunately, this technique may still "out-vote" one or more person's preferences and rely on a majority vote, leaving someone less vocal stuck eating Thai food when they hate Thai food. Alternatively, Structured Design (Dialogic) (or Structured Dialogical Design) (SDD) may be more appropriate for complicated strategies and plans. In SDD, the persons most concerned or affected by the issue(s) are the primary participants. Triggering questions (TQ) focus the decision, followed by statements responding to the TQs. Next, further clarification narrows outcomes, and the group then comes up with comparison and contrasting options (e.g., clustering). Following the grouping of choices, the participants select their preferences and explore their relations. Finally, interpretation of those relationships occurs, and the group plans to move forward (Laouris & Romm, 2021). I would not want to use SDD to develop a lunch destination; however, a verbal version may be used to ensure that all stakeholders' interests are taken into consideration. The similarities between the Delphi method and SDD are that both ways use framing or, as Laouris and Romm describe it, focus on the problem or issue of interest. They also involve a discussion of participants and aim to eliminate less desired options. The two methods differ most drastically in the analysis and proper selection of group preferences and a deeper exploration of potential solutions that occurs in SDD. SDD aims to explore as many relationships between the group decision choice and build consensus through metrics analysis and choice relationship analysis.
In the case of SDD, it would not make a very effective method for determining a trivial group decision-making method because it requires extensive analysis. The Delphi method or a modified version works best for a more rapid decision-making process. The SDD method value is more inherent with groups such as Think Tanks, business strategy planning, or scenario planning for organizations. For now, I think I'll stick with conceding to eat at a Thai restaurant when lunching with a group instead of turning the decision-making process into an academic exercise. Unless you're into that sort of thing? Happy trails! References Sekayi, D., & Kennedy, A. (2017). Qualitative delphi method: A four round process with a worked example. The Qualitative Report, 22(10), 2755-2763. Yiannis, Laouris, Norma RA Romm. (2021). Structured dialogical design as a problem structuring method illustrated in a Re-invent democracy project. European Journal of Operational Research, 2021, ISSN 0377-2217, https://doi.org/10.1016/j.ejor.2021.11.046. Information security is a challenging field for organizations made more difficult because it is prone to the constant change in information technology. Higher education institutions thrive with open access to information and collaboration. Yet, higher education institutions also store and process sensitive data such as student records, student health records, credit card data, and State and Federal government data. An essential aspect of information security professionals' roles is to know what types of data they have and where data is located. However, a technological trend identified by the 2021 EDUCAUSE Horizon Report: Information Security Edition identified expanding and borderless network boundaries (EDUCAUSE, 2021). Networks without well-defined borders are complicated for information security teams to protect. As organizations migrate data to cloud-hosted solutions and data is accessed by organizational users, devices not managed by the organization could access that data. For example, personal and mobile devices may access cloud-hosted and controlled data stored or processed across devices subject to different laws, regulations, and endpoint security access controls. Information security teams will need to identify and monitor a device accessing their data and ensure that it is free from malicious software and can safely access sensitive data. The societal and cultural trends amplified by the remote work lifestyles to accommodate COVID-19 safety protocols have compounded information security challenges. Information security teams can detect and respond to security incidents on endpoint devices such as computers, tablets, and other mobile devices as long as end-users comply with security requirements on personal devices. For example, end-users will need to install endpoint protection software and maintain their devices with security updates. However, users today want the convenience of access to data and, though aware, may not be as vigilant about information security practices. The Horizon Report identified the deployment of cloud-based endpoint protection platforms (EPPs) as an important technological trend to manage the security of organizational data. EPP will be required to provide information security as users continue to access data from personal and public networks due to COVID safety protocols and the convenience of remote work. COVID and cultural trends pushed network boundaries out of organizational-controlled network infrastructure and into a wider borderless networked world. An example of the increased number of remote students based on a survey performed by the National Center for Education Statistics identified 7,313,623 students enrolled in distance education courses from post-secondary institutions in 2019 (Institute of Education Sciences, 2015).
To maintain the visibility of mobile and remote devices, information security teams must have a window into the network security and device security posture to identify potential abuse and breaches. Higher education information security teams can use EPP provided to end-users to monitor these remote systems accessing organizational data. The organizations will have to work through legal and licensing challenges with vendors that may complicate software deployment of organizational purchased software to personally owned devices. In addition, software must remain easy to deploy, maintain, and use to ensure that convenient access to data is not subject to technological barriers and thus decrease the chances of user adoption and use. In my past role on a higher education information security team, the organization was able to work with vendors to provide EPP to students, faculty, staff, and affiliates without a significant increase in product cost. In addition, open and transparent participation and communication with faculty, staff, students, and affiliates to develop policy that specified how organizational software on personal devices could and would be used improved willingness to install and comply with information security requirements. Even though the network boundaries are shifting and appear borderless, higher education organizations will find that they can benefit by using EPP that is widely deployed to continue providing information security benefits across the spectrum of devices accessing organizational data. References EDUCAUSE. (2021). Information Security Edition (p. 10). EDUCAUSE 2021. https://library.educause.edu/-/media/files/library/2021/2/2021_horizon_report_infosec.pdf?la=en&hash=6F5254070245E2F4234C3FDE6AA1AA00ED7960FB Institute of Education Sciences. (2015). The NCES Fast Facts Tool provides quick answers to many education questions (National Center for Education Statistics). Ed.gov; National Center for Education Statistics. https://nces.ed.gov/fastfacts/display.asp?id=80 |
AuthorI am a Doctoral Scholar at Colorado Technical University and a graduate of the Cyber Security Operations and Leadership program from the University of San Diego. I work in cybersecurity, and have accumulated twenty years in the IT industry. There are few IT roles I have not performed, which gives me great insights into making sense of all the IT confusion. Archives
February 2022
Categories
All
|