enabling science, technology and innovation with per cloud

26
Enabling science, technology and innovation with per-cloud explained Lisa Yaoxochitl Martinez UN Commons Cluster - Member

Upload: mrsalways-right

Post on 15-Aug-2015

19 views

Category:

Design


0 download

TRANSCRIPT

Enabling science, technology and innovation with per-cloud explained

Lisa Yaoxochitl MartinezUN Commons Cluster - Member

The right to equal treatment under the law The right to develop to the full potential and desires of the

person choice The right to meaningful work The right to be counted once (as opposed to many identity

records in many companies in many parts of the world) The right to self determination – a right to choose and

responsibility to manage our physical and digital persona’s.◦ Technology CAN do just about anything, the question would be what

it should or shouldn’t do.

Human Rights for Civil Society

Understanding how to interact with a person with the right to self determination. ◦ Technology Transfers must avoid over

production and collection of person data that can identity or locate a person.

◦ The objective would be to ensure the physical to digital worlds are 1:1 in identity and no personal identifiable information sharing.

Assume a private cloud with different representations◦ A citizen oversight data center (may be a

server in a remote part of the world.

Truth Statements – A Private Cloud

My Per Cloud

My Local Community (Civil Society)

My International SegmentCooperative or Marketplace

My Public Profile

Privacy allows each of us to have a right to choose what we share and what others know about us. ◦ No, it’s not just about the government spying on us.

Sure, the government might need to protect us. ◦ No, it’s not about whether you are doing something wrong or have something

to hide. Assume we are all being good citizens and we do not break the law. It’s about our 4th amendment rights It’s about not being profiled because we live in poverty or live in a wealthy

neighborhood. It’s about making mistakes and being able to overcome those mistakes It’s about not revealing more than we have to so the bad guys don’t prey on our

weakness or take advantage of us. Its about not being judged and not judging others

What is privacy? Protecting students from the power of the internet

Benefits to a Per Cloud Usera consistent method in which to

manage your digital personaSelf DeterminationPrivate local storage for photos, videos and IPAn ability to publish to WordPress

A device

An email

Storage for pictures and records

A personal domain

Intimacy Gradient Levels (NIEM group) Whole government moves from high cost low

enforcement and low effectiveness in government action ready using EA as the transformation opportunity

A hierarchy of authority implies the top level rules are adopted at the lowest level Intimacy gradient level 3 Federal Intimacy gradient level 4 state Intimacy gradient level 5 county Intimacy gradient level 6 city Intimacy gradient level 7 community

assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access to minimal viable information based on NIEM adoption.

Local control would only be achieved through adoption of standards universally

Pattern Language for Access Groups In Government

Access Group X

Tax Debt X

Healthcare X

Education X

Justice System X

Federal, State, Local X

By Lisa Martinez Copyright 2015 @ Wicked Design Solutions

Commons Platforms a universal means to delivery cooperatives and marketplace

Far less resources are used in transforming the offer development process (life cycle) into a sustainable development model. ◦ All businesses publish to a market place for Business to Business

(B2B) ◦ All public sector services into a cooperative which is non-taxable

Public and Private sector partnerships collaborate in a sharing caring economy feeding both the cooperative and marketplace◦ Donations are non-taxable to enable poverty reduction

Economic Services – Strong HierarchiesService components derived from hierarchies enable different nodes to connect

Enable Presentation of Information Enable billing internal or externally

An organization hierarchy◦ The structured content grouping people to a

people manager from the lowest level to the C-Level and CEO or Executive Director

Enables the key control from master records to transaction records which become variables

Every expense must be approved before issuance of a purchase order to a vendor/supplier◦ Present the department budget to all users

or people managers based on commitments agreed upon in strategic planning Output from the planning or BP1

The users have an assigned people manager

The users have an assigned department code◦ The users have an assigned offer

group or specialty (role nets and role sets) associated with a general ledger code

◦ A department will have a ledger code associated for internal and external cost segmentation

Software as a Service (SaaS) Types

Data

Raw Format

Applications

(information and Knowledge)

Content

Knowledge

(Content and Information)

Information

(Documents)

Records

Display

Data and Technology Domains – Dual ParadigmsContent, Information, Knowledge and Broadcast Audio Visual Systems

User Transactional User

Management user

Company LDAP or AD account

X X –Restricted group see

Sarbanes Oxley rules

Network IP and Host

X X

Secure access certificate or Key

X X

Monitor and DesignKey ControlsSOD404 Assurances

Any financial Management, based on roles based access

Any create, read, update or archive

Financial Management Quality Management Employee Performance

All request are pre-authorized and validated

All approvals are approved or delegated to a person with same or greater authority.

Asset Device Any organization or agency supplied

Any organization or agency supplied

WICKED 2014@copyright Lisa Martinez 408.638.9016

Sustainable Development Goals and Targets

How the per cloud (private) empowers people?

Regional Laws – Conceptual ViewDoes not force change(“as is”)-an option with discreet or indiscreet models

AMERICA’s

AFRICAAUSTRALIA EUROPE

Copyright @2015 Wicked Design SolutionsLisa Martinez 408-638-9016

Person to Planet Truth Statements

Civil society and a per cloud a physical to digital association

Every person is associated with a location in a state, in a nation

A per cloud infers a persons right to choose (opt out)◦ The right to protect their intellectual

property and to maintain privacy in their health, education, economic and social life.

◦ The right to protect themselves from unlawful discrimination and a right to remedies in the event others violate law

The right to visibility into what data is used or published about them.

Infrastructure for Energy for all (SDG)

1st Requirement Energy for All Opportunities

Any technology solution requires a device which needs either AC power or Battery Power◦ Energy from AC adapters ◦ Energy from portable energy

adapters◦ Energy from rechargeable battery

stations◦ Energy from saltwater – reducing

the melting water and rising threats to coastal borders

Considering the threats to the power grid with cyber attacks, we want to consider a renewable energy model with fewer opportunities in a targeted attack.◦ Solar Panels may offer benefits with

a sub-domain into local storage for small hard to reach populations.

◦ Renewable sources (Arizona) ◦ Saltwater energy sources

Infrastructure for Internet for All –(SDG)

2nd Requirement Internet for all Opportunities

Requires a constant power source before we begin to deliver Internet for all◦ Bio-diversity protections must be

factored before using traditional infrastructure practices

Long haul low power emitting concepts should be explored◦ Private clouds for the per cloud

users in civil society where poverty is the greatest risk

Opportunity to enable economic growth for PPPs in solutions where the protection of the bio-diversity outweighs any desire to modernize to industrialized practices. ◦ Poverty is measured differently in these parts of

the world. Build the per cloud for in community

oversight of private clouds that interoperate. ◦ Consider floating data centers and access to

internet in floating◦ Trucks driven to communities◦ Unarmed Drones as wireless access points

Improve upon aerial footage with wireless access

A device

An email

Storage for pictures and records

A personal domain

2nd Requirement Sustainable Technology

Device

Voice

Video

Data/Applications

Secure and Contained Connectivity-PaaS In the new world we understand the different threats require different connections

We aspire to encrypt data and we must assume we are not finding proven video encryption providers.

• Isolation and containment are simply smarter

IG Layer Access

Control Links (ACL)

Prevent and Monitor

inbound and outbound

connectivity model isolates

threats into three

segmentswhile making each gradient

layer less accessible

PaaS-Connectivity between end points-applies

to all

Copyright @2015 Wicked Design SolutionsLisa Martinez 408-638-9016

2nd Requirement Sustainable Technology

Regional Data Centers by Segments-IaaSGrouping by education segment by district, county and state into a nation

Copyright @2015 Wicked Design SolutionsLisa Martinez 408-638-9016

2nd Requirement Sustainable Technology

iCAAN –Internet Addresses

Opportunities Benefits

The proliferation of Internet addresses grows faster than we would manage.◦ We will run out of addresses within

the next 10 years Every solar panel installation Every personal computer or

device Every smart TV Every smart Appliance

A per cloud enables a single domain with sub-domains for the many possibilities ◦ the Internet of Things (IoT)◦ A person has household energy use and

local storage A new solar panel installation creates a

network connection for the tracking of usage. Today, the panels and tracking are outside

the view of the homeowner and passed back via the panel vendor

A new appliance-Smart TV and Smart Refrigerator are constantly using energy to communicate with the IoT services.

A per cloud enables each person a domain name, the person may replace their device or move from one state, country or continents across the world. ◦ The domain name stays the same.

You may keep your appliances or may buy new In all situations, you want to limit the exposure from outside threats on your

network… A private domain with sub-domains for each of the primary stakeholders

in my SMART devices Limit the access points in a persons home. Limit my cell phone data usage

Network Domains and Sub-DomainsCyber security access points into our homes where our children live

Technology Changed the Cyberspace Away from our ControlCompanies need to get technology back to the way

it was before.

My View Technology Solutions

Device to device tunneling

Control my device camera

BYOD-destroy my device (wipe)

My Carrier

My Assets

Copyright @2015 Wicked Design SolutionsLisa Martinez 408-638-9016

User Worker(Person)

Application Services

Master Data Identity

Dashboard Intranet

Network connectivity

An common identity service for workers

Configuration Management db

1 Process Functional Application bundle

2 Monitoring Service and Logging

3 Master Data Identity Service

4 Predefined In process and historical information

5 Network Connectivity-vpn, access key service

Data into these sources does not change often and is governed as P1 services critical to business, operations, systems and technology

The end

Urban Planning Segmented for financial integrityA filter for addressing a wicked mess with a wicked solution toolbox

Segmentation for Urban Planning to Citizen(s)

Social Media Pages by segmentsModeled in Facebook and Google+ (prototypes)