Mobile And IOT Technologies Are Inside The Curve Of Human Time.

We humans have a finite speed at which we can think, analyze and make decisions.  We can only focus on a small set of data before we are overwhelmed.  

When important decisions must be made, our brains need time, significant time, to weigh all the variables, pros and cons and possible outcomes in order to arrive at a good decision.  In times of high stress where making fast decisions is required, many of us don’t perform at our peak.  In addition, weak humans that we are - need sleep.  We are not always available; we require daily downtime in order to function.

Humans operate in human time, a biological time influenced by the environment and universe that we live in.  Computers, though, are not subject to these human limitations and can act on algorithms and pre-determined decision trees 24/7 in milliseconds.

Human time challenges and limitations are not going away.  As IoT sensors and mobile devices proliferate, so also does the volume of real-time data and required analysis.  Humans, already at their limit, must somehow augment their capabilities to handle the massive increases in the volume and complexity of data.  Many believe, as do I, that the competitive marketplaces of today and tomorrow will be won by those with better and faster information logistics systems.  Systems that can collect larger quantities of data, analyze and execute relevant actions faster.

The new F-35 fighter jet in the USA’s arsenal has over 24 million lines of software code running it.  Why? It requires sensors, computers and software just to keep it in the air. Code is required to process all the data fast enough to augment the pilot’s skills.  In addition, the F-35 comes with a $500,000 custom helmet that provides a 360-degree view of the operational environment, and displays so much data pilots have reported suffering dizziness from information overload.  We have hit the wall of human capabilities, and we are only getting started.

The late military strategist and US Air force Colonel John Boyd, taught a key advantage in air combat was to get “inside” an opponent's decision curve. That means to understand the true situation faster, and then make better decisions quicker than an opponent.  He taught that humans need a simple formula for quick thinking.  His formula was OODA (observe, orient, decide and act). He taught a continuous cycle of observing a situation, orienting or understanding it, deciding what needs to happen and then acting quickly.  He taught that competitors executing OODA cycles faster than opponents had the advantage.  The OODA quick thinking process is proven, and has now made the leap from human time to computer time via artificial intelligence.

The leap from human time to computer time has relevance in business today, especially in the age of Mobile Me, where consumer’s expectations for mobile app performances demand instant responses.   Mobile apps and real-time consumer interactions are now in the realm of the F-35.  Consumers today demand more real-time information processing, decision-making and business process execution than are humanly possible without computer and software augmentation operating beyond the limitations of human time, and into the future of computer time.

Kevin Benedict is Senior Analyst at Cognizant's Center for the Future of Work

Follow Kevin Benedict Twitter @krbenedict

« Tor: Mystery Spike In Hidden Addresses
UK Government Goes Ahead With Revised Surveillance Bill »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

AdNovum Informatik

AdNovum Informatik

AdNovum Informatik provides a full set of IT services, ranging from consulting, the conception and implementation of customized business and security solutions to maintenance and support.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

SAIFE

SAIFE

SAIFE has adapted a Software Defined Perimeter approach and paired it with a Zero Trust model that defines access by the user, their device, and where they are located.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

Symptai Consulting

Symptai Consulting

Symptai Consulting is a leading Cyber Security, Digital Transformation and Anti-Money Laundering firm serving the Caribbean and the wider world.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

Kobalt.io

Kobalt.io

Kobalt are bringing the monitoring capabilities of enterprise-class security teams to smaller organizations.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.