Mobile And IOT Technologies Are Inside The Curve Of Human Time.

We humans have a finite speed at which we can think, analyze and make decisions.  We can only focus on a small set of data before we are overwhelmed.  

When important decisions must be made, our brains need time, significant time, to weigh all the variables, pros and cons and possible outcomes in order to arrive at a good decision.  In times of high stress where making fast decisions is required, many of us don’t perform at our peak.  In addition, weak humans that we are - need sleep.  We are not always available; we require daily downtime in order to function.

Humans operate in human time, a biological time influenced by the environment and universe that we live in.  Computers, though, are not subject to these human limitations and can act on algorithms and pre-determined decision trees 24/7 in milliseconds.

Human time challenges and limitations are not going away.  As IoT sensors and mobile devices proliferate, so also does the volume of real-time data and required analysis.  Humans, already at their limit, must somehow augment their capabilities to handle the massive increases in the volume and complexity of data.  Many believe, as do I, that the competitive marketplaces of today and tomorrow will be won by those with better and faster information logistics systems.  Systems that can collect larger quantities of data, analyze and execute relevant actions faster.

The new F-35 fighter jet in the USA’s arsenal has over 24 million lines of software code running it.  Why? It requires sensors, computers and software just to keep it in the air. Code is required to process all the data fast enough to augment the pilot’s skills.  In addition, the F-35 comes with a $500,000 custom helmet that provides a 360-degree view of the operational environment, and displays so much data pilots have reported suffering dizziness from information overload.  We have hit the wall of human capabilities, and we are only getting started.

The late military strategist and US Air force Colonel John Boyd, taught a key advantage in air combat was to get “inside” an opponent's decision curve. That means to understand the true situation faster, and then make better decisions quicker than an opponent.  He taught that humans need a simple formula for quick thinking.  His formula was OODA (observe, orient, decide and act). He taught a continuous cycle of observing a situation, orienting or understanding it, deciding what needs to happen and then acting quickly.  He taught that competitors executing OODA cycles faster than opponents had the advantage.  The OODA quick thinking process is proven, and has now made the leap from human time to computer time via artificial intelligence.

The leap from human time to computer time has relevance in business today, especially in the age of Mobile Me, where consumer’s expectations for mobile app performances demand instant responses.   Mobile apps and real-time consumer interactions are now in the realm of the F-35.  Consumers today demand more real-time information processing, decision-making and business process execution than are humanly possible without computer and software augmentation operating beyond the limitations of human time, and into the future of computer time.

Kevin Benedict is Senior Analyst at Cognizant's Center for the Future of Work

Follow Kevin Benedict Twitter @krbenedict

« Tor: Mystery Spike In Hidden Addresses
UK Government Goes Ahead With Revised Surveillance Bill »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

BA-CSIRT

BA-CSIRT

BA-CSIRT is a center which is dedicated to assist and raise awareness among citizens and the Government of the City of Buenos Aires in everything related to information security.

Cloud Managed Networks

Cloud Managed Networks

Cloud Managed Networks provides enterprise grade IT network solutions for cloud-based and on premise network security, Wi-Fi, data switching, collaboration, device management and more.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

Yarix

Yarix

Yarix is the leading company in Var Group’s Digital Security division and one of the most recognised, innovative and authoritative Italian companies in the IT security sector.

X-PHY

X-PHY

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core.

SKADI Cyber Defense

SKADI Cyber Defense

At SKADI Cyber Defense, we specialize in enterprise-grade cybersecurity solutions tailored for small to medium businesses.