Mobile And IOT Technologies Are Inside The Curve Of Human Time.

We humans have a finite speed at which we can think, analyze and make decisions.  We can only focus on a small set of data before we are overwhelmed.  

When important decisions must be made, our brains need time, significant time, to weigh all the variables, pros and cons and possible outcomes in order to arrive at a good decision.  In times of high stress where making fast decisions is required, many of us don’t perform at our peak.  In addition, weak humans that we are - need sleep.  We are not always available; we require daily downtime in order to function.

Humans operate in human time, a biological time influenced by the environment and universe that we live in.  Computers, though, are not subject to these human limitations and can act on algorithms and pre-determined decision trees 24/7 in milliseconds.

Human time challenges and limitations are not going away.  As IoT sensors and mobile devices proliferate, so also does the volume of real-time data and required analysis.  Humans, already at their limit, must somehow augment their capabilities to handle the massive increases in the volume and complexity of data.  Many believe, as do I, that the competitive marketplaces of today and tomorrow will be won by those with better and faster information logistics systems.  Systems that can collect larger quantities of data, analyze and execute relevant actions faster.

The new F-35 fighter jet in the USA’s arsenal has over 24 million lines of software code running it.  Why? It requires sensors, computers and software just to keep it in the air. Code is required to process all the data fast enough to augment the pilot’s skills.  In addition, the F-35 comes with a $500,000 custom helmet that provides a 360-degree view of the operational environment, and displays so much data pilots have reported suffering dizziness from information overload.  We have hit the wall of human capabilities, and we are only getting started.

The late military strategist and US Air force Colonel John Boyd, taught a key advantage in air combat was to get “inside” an opponent's decision curve. That means to understand the true situation faster, and then make better decisions quicker than an opponent.  He taught that humans need a simple formula for quick thinking.  His formula was OODA (observe, orient, decide and act). He taught a continuous cycle of observing a situation, orienting or understanding it, deciding what needs to happen and then acting quickly.  He taught that competitors executing OODA cycles faster than opponents had the advantage.  The OODA quick thinking process is proven, and has now made the leap from human time to computer time via artificial intelligence.

The leap from human time to computer time has relevance in business today, especially in the age of Mobile Me, where consumer’s expectations for mobile app performances demand instant responses.   Mobile apps and real-time consumer interactions are now in the realm of the F-35.  Consumers today demand more real-time information processing, decision-making and business process execution than are humanly possible without computer and software augmentation operating beyond the limitations of human time, and into the future of computer time.

Kevin Benedict is Senior Analyst at Cognizant's Center for the Future of Work

Follow Kevin Benedict Twitter @krbenedict

« Tor: Mystery Spike In Hidden Addresses
UK Government Goes Ahead With Revised Surveillance Bill »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Kasada

Kasada

Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

National Security Services Group (NSSG) - Oman

National Security Services Group (NSSG) - Oman

National Security Services Group (NSSG) is Oman's leading and only proprietary Cybersecurity consultancy firm and Managed Security Services Provider.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.