enabling science, technology and innovation with per cloud
TRANSCRIPT
Enabling science, technology and innovation with per-cloud explained
Lisa Yaoxochitl MartinezUN Commons Cluster - Member
The right to equal treatment under the law The right to develop to the full potential and desires of the
person choice The right to meaningful work The right to be counted once (as opposed to many identity
records in many companies in many parts of the world) The right to self determination – a right to choose and
responsibility to manage our physical and digital persona’s.◦ Technology CAN do just about anything, the question would be what
it should or shouldn’t do.
Human Rights for Civil Society
Understanding how to interact with a person with the right to self determination. ◦ Technology Transfers must avoid over
production and collection of person data that can identity or locate a person.
◦ The objective would be to ensure the physical to digital worlds are 1:1 in identity and no personal identifiable information sharing.
Assume a private cloud with different representations◦ A citizen oversight data center (may be a
server in a remote part of the world.
Truth Statements – A Private Cloud
My Per Cloud
My Local Community (Civil Society)
My International SegmentCooperative or Marketplace
My Public Profile
Privacy allows each of us to have a right to choose what we share and what others know about us. ◦ No, it’s not just about the government spying on us.
Sure, the government might need to protect us. ◦ No, it’s not about whether you are doing something wrong or have something
to hide. Assume we are all being good citizens and we do not break the law. It’s about our 4th amendment rights It’s about not being profiled because we live in poverty or live in a wealthy
neighborhood. It’s about making mistakes and being able to overcome those mistakes It’s about not revealing more than we have to so the bad guys don’t prey on our
weakness or take advantage of us. Its about not being judged and not judging others
What is privacy? Protecting students from the power of the internet
Benefits to a Per Cloud Usera consistent method in which to
manage your digital personaSelf DeterminationPrivate local storage for photos, videos and IPAn ability to publish to WordPress
Intimacy Gradient Levels (NIEM group) Whole government moves from high cost low
enforcement and low effectiveness in government action ready using EA as the transformation opportunity
A hierarchy of authority implies the top level rules are adopted at the lowest level Intimacy gradient level 3 Federal Intimacy gradient level 4 state Intimacy gradient level 5 county Intimacy gradient level 6 city Intimacy gradient level 7 community
assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access to minimal viable information based on NIEM adoption.
Local control would only be achieved through adoption of standards universally
Pattern Language for Access Groups In Government
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
By Lisa Martinez Copyright 2015 @ Wicked Design Solutions
Commons Platforms a universal means to delivery cooperatives and marketplace
Far less resources are used in transforming the offer development process (life cycle) into a sustainable development model. ◦ All businesses publish to a market place for Business to Business
(B2B) ◦ All public sector services into a cooperative which is non-taxable
Public and Private sector partnerships collaborate in a sharing caring economy feeding both the cooperative and marketplace◦ Donations are non-taxable to enable poverty reduction
Economic Services – Strong HierarchiesService components derived from hierarchies enable different nodes to connect
Enable Presentation of Information Enable billing internal or externally
An organization hierarchy◦ The structured content grouping people to a
people manager from the lowest level to the C-Level and CEO or Executive Director
Enables the key control from master records to transaction records which become variables
Every expense must be approved before issuance of a purchase order to a vendor/supplier◦ Present the department budget to all users
or people managers based on commitments agreed upon in strategic planning Output from the planning or BP1
The users have an assigned people manager
The users have an assigned department code◦ The users have an assigned offer
group or specialty (role nets and role sets) associated with a general ledger code
◦ A department will have a ledger code associated for internal and external cost segmentation
Data
Raw Format
Applications
(information and Knowledge)
Content
Knowledge
(Content and Information)
Information
(Documents)
Records
Display
Data and Technology Domains – Dual ParadigmsContent, Information, Knowledge and Broadcast Audio Visual Systems
User Transactional User
Management user
Company LDAP or AD account
X X –Restricted group see
Sarbanes Oxley rules
Network IP and Host
X X
Secure access certificate or Key
X X
Monitor and DesignKey ControlsSOD404 Assurances
Any financial Management, based on roles based access
Any create, read, update or archive
Financial Management Quality Management Employee Performance
All request are pre-authorized and validated
All approvals are approved or delegated to a person with same or greater authority.
Asset Device Any organization or agency supplied
Any organization or agency supplied
WICKED 2014@copyright Lisa Martinez 408.638.9016
Regional Laws – Conceptual ViewDoes not force change(“as is”)-an option with discreet or indiscreet models
AMERICA’s
AFRICAAUSTRALIA EUROPE
Copyright @2015 Wicked Design SolutionsLisa Martinez 408-638-9016
Person to Planet Truth Statements
Civil society and a per cloud a physical to digital association
Every person is associated with a location in a state, in a nation
A per cloud infers a persons right to choose (opt out)◦ The right to protect their intellectual
property and to maintain privacy in their health, education, economic and social life.
◦ The right to protect themselves from unlawful discrimination and a right to remedies in the event others violate law
The right to visibility into what data is used or published about them.
Infrastructure for Energy for all (SDG)
1st Requirement Energy for All Opportunities
Any technology solution requires a device which needs either AC power or Battery Power◦ Energy from AC adapters ◦ Energy from portable energy
adapters◦ Energy from rechargeable battery
stations◦ Energy from saltwater – reducing
the melting water and rising threats to coastal borders
Considering the threats to the power grid with cyber attacks, we want to consider a renewable energy model with fewer opportunities in a targeted attack.◦ Solar Panels may offer benefits with
a sub-domain into local storage for small hard to reach populations.
◦ Renewable sources (Arizona) ◦ Saltwater energy sources
Infrastructure for Internet for All –(SDG)
2nd Requirement Internet for all Opportunities
Requires a constant power source before we begin to deliver Internet for all◦ Bio-diversity protections must be
factored before using traditional infrastructure practices
Long haul low power emitting concepts should be explored◦ Private clouds for the per cloud
users in civil society where poverty is the greatest risk
Opportunity to enable economic growth for PPPs in solutions where the protection of the bio-diversity outweighs any desire to modernize to industrialized practices. ◦ Poverty is measured differently in these parts of
the world. Build the per cloud for in community
oversight of private clouds that interoperate. ◦ Consider floating data centers and access to
internet in floating◦ Trucks driven to communities◦ Unarmed Drones as wireless access points
Improve upon aerial footage with wireless access
A device
An email
Storage for pictures and records
A personal domain
2nd Requirement Sustainable Technology
Device
Voice
Video
Data/Applications
Secure and Contained Connectivity-PaaS In the new world we understand the different threats require different connections
We aspire to encrypt data and we must assume we are not finding proven video encryption providers.
• Isolation and containment are simply smarter
IG Layer Access
Control Links (ACL)
Prevent and Monitor
inbound and outbound
connectivity model isolates
threats into three
segmentswhile making each gradient
layer less accessible
PaaS-Connectivity between end points-applies
to all
Copyright @2015 Wicked Design SolutionsLisa Martinez 408-638-9016
2nd Requirement Sustainable Technology
Regional Data Centers by Segments-IaaSGrouping by education segment by district, county and state into a nation
Copyright @2015 Wicked Design SolutionsLisa Martinez 408-638-9016
2nd Requirement Sustainable Technology
iCAAN –Internet Addresses
Opportunities Benefits
The proliferation of Internet addresses grows faster than we would manage.◦ We will run out of addresses within
the next 10 years Every solar panel installation Every personal computer or
device Every smart TV Every smart Appliance
A per cloud enables a single domain with sub-domains for the many possibilities ◦ the Internet of Things (IoT)◦ A person has household energy use and
local storage A new solar panel installation creates a
network connection for the tracking of usage. Today, the panels and tracking are outside
the view of the homeowner and passed back via the panel vendor
A new appliance-Smart TV and Smart Refrigerator are constantly using energy to communicate with the IoT services.
A per cloud enables each person a domain name, the person may replace their device or move from one state, country or continents across the world. ◦ The domain name stays the same.
You may keep your appliances or may buy new In all situations, you want to limit the exposure from outside threats on your
network… A private domain with sub-domains for each of the primary stakeholders
in my SMART devices Limit the access points in a persons home. Limit my cell phone data usage
Network Domains and Sub-DomainsCyber security access points into our homes where our children live
Technology Changed the Cyberspace Away from our ControlCompanies need to get technology back to the way
it was before.
My View Technology Solutions
Device to device tunneling
Control my device camera
BYOD-destroy my device (wipe)
My Carrier
My Assets
Copyright @2015 Wicked Design SolutionsLisa Martinez 408-638-9016
User Worker(Person)
Application Services
Master Data Identity
Dashboard Intranet
Network connectivity
An common identity service for workers
Configuration Management db
1 Process Functional Application bundle
2 Monitoring Service and Logging
3 Master Data Identity Service
4 Predefined In process and historical information
5 Network Connectivity-vpn, access key service
Data into these sources does not change often and is governed as P1 services critical to business, operations, systems and technology
Urban Planning Segmented for financial integrityA filter for addressing a wicked mess with a wicked solution toolbox
Segmentation for Urban Planning to Citizen(s)