Posts

Showing posts from 2010

Connected systems

I saw a presentation given by an HP colleague, working at HP's Office of Technologists, discussing the information explosion and the challenges in deriving timely business value from the explosion of data.  One thing he mentioned especially got me thinking:   He suggested that there was more than a fighting chance that the requirements of cloud computing could be served by mobile devices working on a peer-to-peer basis.  Given the ever increasing processing power of the devices and the sophistication of the software running, this is more than a likely scenario (in my opinion). Imagine your entire existence (memories in all six senses, plus any equivalents downloaded - either from friends, work colleagues, or just vicariously from myexperience.com tm)  being held on an infinitensimally small device - for example the size of a dust mote.... The biggest stumbling block in my mind is the limited real estate available on the device for input/output - ie keyboard and screen. Whil

retentive

I met a person today who had to try to peel every bit of the label off the nescafe lid before he felt he could make the coffee... In one go, or his day was ruined...

Record Managament and International Security post Abdul Mudallad

So here we are with information management on the back of the attempted bombing of a Detroit-bound Delta Airline Flight a hot topic. We just heard that full body scanners capable of capturing video or images of you as if you were naked are to be installed within three weeks of this posting at Heathrow airport (although not at the other UK international airports yet, according to Alan Johnson, bizarrely). I just listened to the US ex-head of homeland security saying the problem with the Nigerian / Yemen-sourced bomb plot on a Delta Airline flight was not with the intelligence that was gathered, but with the (in)ability to synthesise it at the right time and place. This makes sense when you consider that the US - watch list contains approaching 1,000,000 names, while the "No-fly" list is maintained separately. Apparently the bomber - Abdul Mudallad - appeared in the Watch list, but not the no fly list, so his movements were effectively only limited by his inability to trav