Mais conteĂșdo relacionado Semelhante a Accelerating breakthrough business technologies in atlanta, tag featured speaker series, 2014 05-06 (20) Mais de Melanie Brandt (20) Accelerating breakthrough business technologies in atlanta, tag featured speaker series, 2014 05-063. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Queen Elizabeth
4. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Boeing 707
5. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The First Four Waves of
Business Technology
Mainframe
70s
Internet
2000s
PC
80s
Client/Server
90s
6. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Each Wave of
Business Technology
âą Requires deployment of a critical mass of
its predecessor wave to achieve rapid growth
and broad acceptance.
âą Introduces new:
â Concepts
â Terminology
â Opportunities
â Concerns
âą Has an exponentially greater impact on
business and society than its predecessor.
7. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Bandwidth Cost
8. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Computing Cost
9. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Storage Cost
World's First 4
TB 2.5-inch SSD
10. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Mobile phones vs. toothbrushes
âą There are 7 billion people in the world.
âą 4 billion use mobile phones.
âą Just 3.5 billion own toothbrushes.
13. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Marketing Technology Stack
15. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How does CMS Anywhere work?
1. Visitor requests a page from
an affiliate server.
2. Page with CMS Anywhere
tag script is returned to the
browser.
3. Tag script requests the
beacon script from the
CMS Anywhere server.
4. The affiliate hit is registered
in Sitecore Analytics.
5. The beacon script is formed
and delivered to the browser.
6. The beacon script fires
stylers and replacers in the
page.
7. The beacon script fires
pixels to report additional
information to the CMS
Anywhere server.
Lorem ipsum dolor sit amet
Vestibulum ultricies viverra viverra. Proin laoreet velit in erat sollicitudin
iaculis. Ut et vehicula leo. Curabitur non dolor elit. Morbi ac ante volutpat ante
sollicitudin posuere. Sed ut nibh ut felis hendrerit vulputate at vel tortor.
Suspendisse dui nibh, rutrum nec tempus vestibulum, tristique eget mauris.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut at mollis eros.
Suspendisse potenti. Duis ornare ornare tincidunt. Donec pellentesque aliquet
urna in facilisis. In hac habitasse platea dictumst. Proin tempor ultricies velit, sit
amet aliquam nunc aliquet eget.
<TAG> Lorem ipsum dolor sit amet
Donec dapibus accumsan pellentesque. Proin ullamcorper egestas ultricies.
Nam ac nulla lacus. Ut lorem tortor, dictum eu massa eget, aliquet ultrices
lectus. Nam ac dui gravida, dictum nulla et, convallis nisl. Cras fermentum
feugiat diam, quis gravida eros elementum eget. Ut gravida magna nunc, id
semper libero condimentum sit amet. Pellentesque laoreet dictum nulla vel
tempor
Werwerg
Werg
Werrwer
Wrht
Rwehjt
Wthjwtjrjeyrjjyrj
Etyj
Etyjeytjetyyjejye
Teyjtyje
Eyjyytjyjyukyukyujhghfdjihjdifhnojnoirhjneroijrnoejiojrhoirjejoihjeriojhoierj
hoihjojoe
Jeigheoihgieurhgherhjgoeingioejnoiejrnoe
Gijhijhiuohoiwhfjiojeoigjoiwerguj
Ssdg
Affiliate
Server
CMS
Anywhere
Server
<BEACON>
16. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Before CMS Anywhere
17. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
After CMS Anywhere
18. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
More Than Just Page Styling
21. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Heartbleed
22. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
23. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
24. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
25. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
26. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
27. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
28. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
âą $194
â Average Cost Per
Record Per Breach
in the USA.
Interesting Security Facts
âą 28,765
â Average US Breach
Exposed Records
â Excludes âMega
Breachesâ (>100k)
âą $5,403,644
â Average Total
Organizational Cost of
Data Breach in the
USA.
âą 461
â Average Number of
Days Between
Breach and Discovery
Source: Ponemon Institute, 2013 Cost of Data Breach Study
29. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Castle and Moat Security
30. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
True End-End Encryption
âą Browser-Based
âą Platform / File Size / File Type Agnostic
âą Client-Side Encryption/Decryption
âą Encrypted Data â
At Rest AND In Transmission
âą Zero Knowledge
âą Provenance Attestation
& Irrefutable Time Stamp
âą Full Audit Trail, âChain of Custodyâ
31. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Current SafelyLocked Products:
â Truly Secure Managed File Transfer (SMFT)
â End/End Encryption
â Complete & Certifiable Audit Trail
â âAd Hocâ and Registered User Sending Options
â Truly Secure Folder/File Sharing
â End/End Encryption
â Complete & Certifiable Audit Trail
â Multiple Upload/Download/Collaboration Options
â Combines SafelySendIt & SafelyShareIt into
Unified UI with all the features of both
plus
33. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Internet of Things
34. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Exponential Growth
35. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Smart Wine Shelf
36. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Smart Wine Shelf
37. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Smart Wine Shelf
38. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
What is Augmented Reality?
40. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Marketing Applications
41. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Technician Support
42. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Component Identification
44. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Internet of Transportation âThingsâ
46. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Traffic & Safety Concerns
46
Wasted Time & Energy: In urban areas, over 30% of
drive-time (and fuel) is consumed in stalled traffic!
Crowded Space: an assortment of undifferentiated appâs
& devices aim to alert & divert drivers & routes
Poor Data: all current âappâs & devicesâ rely upon spotty
and/or otherwise inaccurate, in short, too-little data
Expensive Upgrades: real-time big traffic data has
entailed large investments in new/better sensing devices
47. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
MetroTech Solution
47
Video Analytics: converts existing video cameras into
multi-dimensional traffic sensors running in the cloud.
Traffic Analytics: aggregates & analyzes traffic data and
broadcasts to open APIs on AT&T-managed networks
Predictive Analytics: âsearches the futureââ e.g.,
for emerging congestion, planning, zoning, etc
Big Traffic Data: High Definition (HD) real-time, cloud-
based information aggregation & publishing
48. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The IntelliSectionâą
Optional Wireless
Video Camera
49. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Metro-wide Real-time Info
âą Vehicle
Integration
âą Mobile
Application
âą Traffic Data
Analytics
49
50. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Video Analytics in Buckhead
51. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Peachtree and Piedmont: 4-Way
52. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Pâtree and Piedmont: Close-Up
53. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
End-User
Devices
Video Analytics In the Cloud
53
Existingand/orNew
DOT&PublicSafety
VideoFeeds
Legacy Investments
Cloud Computing Traffic
Information Service
Optical Fiber MAN
and/or FTE Wireless
New Value
HD Traffic Data Aggregation
HD Big Traffic Data Publishing
55. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Internet of Health âThingsâ
57. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Non-Contact Patient Monitoring
58. SENSIOTECâS VIRTUAL MEDICAL ASSISTANTÂź
The Future of Remote Patient
Monitoring
The Worldâs First FDA-
Cleared Truly Non-Contact
Vital Signs Monitor
Measures Heart and Lung
Function, Torso Movement
and Bed Exit
High Value, Low Cost,
Location-Agnostic Patient
Care
59. PERSONAL
DATA
SOLUTION
Instantly Relays Real-Time Data
Vitals Monitoring: Alerts Caregivers to Abnormal
Cardiorespiratory Activity
Pressure Ulcer Prevention: Compels Caregivers
to Respond to Absence of Movement
Fall Prevention: Alerts Caregivers to
Imminent Bed Exit
User-Centered Design
Powerful Patient Management Tools
Captures, Records and Delivers Continuous Real-time
Data to Nursesâ Stations, Tablets or Smartphones
Trends data for predictive management
Highlights Abnormalities
Alerts audibly and visually
WEB
SERVER
MEANINGFUL
DATA
SENSOR
PANEL
DECISION
SUPPORT
DEPERSONALIZED
BIGDATA
PHARMA2ns
EMR
60. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
In Development
If this baby was being monitored by
Sensiotecâs technology . . .
. . . he would look like this.
62. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How Do We Pay?
63. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
ACCEPT BITCOIN
BitPay
65. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Blockchain Works
66. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Blockchain Works II
67. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Lower Cost
THAN CREDIT CARDS
Lower Risk
NO FRAUD OR
CHARGEBACKS
Sell Globally
BORDERLESS
PAYMENTS
Why Accept Bitcoin?
68. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BitPayâs Model
âą Payment Processor
âą Contract with
Merchant as
Merchantâs Agent
to receive and
settle payments
âą Tools for
E-commerce,
Billing, and Retail Customer
Merchant
Checkout
BitPay
Payment
Gateway
Payment
Instructions
Payment
Confirmation
69. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BitPay Funds Flow
Customer
Wallet
Bitcoin
Network
BitPay
Wallet
BitPay
Bank
F/X
Exchange
Merchantâs
Bank
70. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BitPay Reduces Risk
Guaranteed Exchange
Rate
Daily Bank Settlement
to 33 countries
Accounting Import
GAAP Reporting
71. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
All-Inclusive Pricing
FLAT MONTHLY FEE
Plans from$30-$3000/month
0% TRANSACTION FEES
72. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BIT INC
73. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
ACCEPT BITCOIN
https://bitpay.com/
74. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
75. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
76. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
77. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
78. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
79. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Digital Artwork
80. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Fifth Wave
Mainframe
60s â 70s
Intelligent Systems
2010s
Internet
2000s
PC
80s
Client/Server
90s
82. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Autonomous Systems
83. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Monitoring and Planning Loop
Planning
â What
should be
done?
Executing
Plans
Observations
The
Real
World
ActionsUpdated
Plans
What to Look For
What has happened?
Instructions
Notifications
Signals
Assessing
Changing
State of
World
Data
84. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
AI techniques differ on âhow they
thinkâ as well as âhow they actâ
84
THINKING RATIONALLYTHINKING HUMANLY
ACTING RATIONALLYACTING HUMANLY
PERFORMANCE MEASUREMENT
vs. People vs. Ideal (Rationality)
Thought Process/
Reasoning
Behavior
FOCUS
Associative
Memory
Neural
Networks
Expert/Rule
Systems
Intelligent
Agents
Fuzzy
Logic
Machine
Learning
©2012 VELOXITI, Inc. - Used with permission
85. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Intelligent Systems Can Accelerate and
Improve Business Decision-making
Intelligent Systems
Must be
processed
Generates
Continually
Processing
Learns
Machine
Learning
Associative
Memory
Provides
Input
Think, Decide, Act
to solve a Business
Problem
Business
Infrastructure Big Data
Natural
Language
Processing©2012-14 VELOXITI, Inc.
86. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Intelligent Agents can be used
to improve performance
86
2
IAâs can leverage
expert knowledge
to the rest of
organization â
âshiftingâ
performance curve
1
In any organization,
best performance â
decisions â is by
handful of âexpertsâ
3
Further, having IAâs
âassistâ Experts for
data-intensive thinking
can improve their
performance also
©2012-14 VELOXITI, Inc.
87. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Driverless Car
88. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
ZipCar
90. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Fasten Your Seatbelts
91. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Global Autonomous
Supply Chains
âą Autonomous Processes
âą Autonomous Enterprisesâą
âą Autonomous Supply Chains
92. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Dynamic Pricing
93. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Business Ecosystems
94. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Complex Adaptive Ecosystem
95. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Self-Configuring
Business Ecosystems
96. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Autonomous Taxi
97. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Distributed Autonomous
Corporations I
âą Distributed âno central points of control or failure
that can be attacked.
âą Autonomous â once up to speed; they no longer
need (or heed) their creators.
âą Corporations â They are, and of a right ought to be,
free independent entities.
âą Transparent â their books and business rules are
auditable by all.
âą Confidential â customer information is securely
(and incorruptibly) protected.
98. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Distributed Autonomous
Corporations II
âą Trustworthy â because no interaction with
them depends on trust.
âą Fiduciaries â acting solely in their customersâ and
shareholdersâ interests.
âą Self-regulating â they obey their own rules like,
well, robots.
âą Incorruptible â no one can exercise seductive or
coercive influence over them.
âą Sovereign â over their digital resources. They donât
need governments to exist.
99. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
2025
100. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Atlanta Technology
Companies of the Future
www.arke.com
www.safelylocked.com/
www.merlinar.com
metrotech-net.com
https://bitpay.com/
http://sensiotec.com
www.veloxiti.com
101. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Follow Up
âą Jack Shaw, President
Breakthrough Business Technologies
âą M: 770-910-5969
âą Jack@e-com.com
âą www.e-com.com
âą www.gplus.to/JackShaw
âą www.Twitter.com/JackShaw
âą www.YouTube.com/user/JackShaw4728
âą www.facebook.com/JackShawTechnology
âą www.LinkedIn.com/in/JackShawTechnology
âą www.BusinessTechnologyFuturist.WordPress.com