SlideShare a Scribd company logo
Lisa Yaoxochitl Martinez
UN Commons Cluster - Member
 The right to equal treatment under the law
 The right to develop to the full potential and desires of the
person choice
 The right to meaningful work
 The right to be counted once (as opposed to many identity
records in many companies in many parts of the world)
 The right to self determination – a right to choose and
responsibility to manage our physical and digital persona’s.
◦ Technology CAN do just about anything, the question would be what
it should or shouldn’t do.
 Understanding how to interact with
a person with the right to self
determination.
◦ Technology Transfers must avoid over
production and collection of person
data that can identity or locate a
person.
◦ The objective would be to ensure the
physical to digital worlds are 1:1 in
identity and no personal identifiable
information sharing.
 Assume a private cloud with
different representations
◦ A citizen oversight data center (may be
a server in a remote part of the world.
My Per
Cloud
My Local Community
(Civil Society)
My International Segment
Cooperative or Marketplace
My Public
Profile
 Privacy allows each of us to have a right to choose what we share
and what others know about us.
◦ No, it’s not just about the government spying on us.
 Sure, the government might need to protect us.
◦ No, it’s not about whether you are doing something wrong or have
something to hide.
 Assume we are all being good citizens and we do not break the law.
 It’s about our 4th amendment rights
 It’s about not being profiled because we live in poverty or live in a wealthy
neighborhood.
 It’s about making mistakes and being able to overcome those mistakes
 It’s about not revealing more than we have to so the bad guys don’t prey on our
weakness or take advantage of us.
 Its about not being judged and not judging others
Self Determination
Private local storage for photos, videos and
IP
An ability to publish to WordPress
A device
An email
Storage for pictures and records
A personal domain
Intimacy Gradient Levels (NIEM group)
 Whole government moves from high cost low
enforcement and low effectiveness in government
 action ready using EA as the transformation opportunity
A hierarchy of authority implies the top level rules are adopted at the lowest level
 Intimacy gradient level 3 Federal
 Intimacy gradient level 4 state
 Intimacy gradient level 5 county
 Intimacy gradient level 6 city
 Intimacy gradient level 7 community
 assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access
to minimal viable information based on NIEM adoption.
Local control would only be achieved through adoption of standards universally
Access Group X
Tax Debt X
Healthcare X
Education X
Justice System X
Federal, State, Local X
 By Lisa Martinez Copyright 2015 @ Wicked Design Solutions
 Far less resources are used in transforming the offer
development process (life cycle) into a sustainable
development model.
◦ All businesses publish to a market place for Business to Business
(B2B)
◦ All public sector services into a cooperative which is non-taxable
 Public and Private sector partnerships collaborate in a
sharing caring economy feeding both the cooperative and
marketplace
◦ Donations are non-taxable to enable poverty reduction
Enable Presentation of Information Enable billing internal or externally
 An organization hierarchy
◦ The structured content grouping people
to a people manager from the lowest
level to the C-Level and CEO or
Executive Director
 Enables the key control from master
records to transaction records which
become variables
 Every expense must be approved
before issuance of a purchase order
to a vendor/supplier
◦ Present the department budget to all
users or people managers based on
commitments agreed upon in strategic
planning
 Output from the planning or BP1
 The users have an assigned
people manager
 The users have an assigned
department code
◦ The users have an assigned offer
group or specialty (role nets and
role sets) associated with a
general ledger code
◦ A department will have a ledger
code associated for internal and
external cost segmentation
Software as a Service (SaaS) Types
Data
Raw Format
Applications
(information
and
Knowledge)
Content
Knowledge
(Content and
Information)
Information
(Documents)
Records
Display
User Transactional
User
Management
user
Company LDAP
or AD account
X X –Restricted
group see
Sarbanes Oxley
rules
Network IP and
Host
X X
Secure access
certificate or Key
X X
Monitor and
Design
Key Controls
SOD
404 Assurances
Any financial
Management,
based on roles
based access
Any create, read,
update or archive
Financial
Management
Quality
Management
Employee
Performance
All request are
pre-authorized
and validated
All approvals are
approved or
delegated to a
person with same
or greater
authority.
Asset Device Any organization
or agency
supplied
Any organization
or agency
supplied
WICKED 2014@copyright Lisa Martinez 408.638.9016
How the per cloud (private) empowers
people?
AMERICA’s
AFRICA
AUSTRALIA EUROPE
Copyright @2015 Wicked Design Solutions
Lisa Martinez 408-638-9016
Civil society and a per cloud a
physical to digital association
Every person is associated with a
location in a state, in a nation
 A per cloud infers a persons right
to choose (opt out)
◦ The right to protect their intellectual
property and to maintain privacy in
their health, education, economic
and social life.
◦ The right to protect themselves from
unlawful discrimination and a right to
remedies in the event others violate
law
 The right to visibility into what
data is used or published about
them.
1st Requirement Energy for All Opportunities
 Any technology solution
requires a device which needs
either AC power or Battery
Power
◦ Energy from AC adapters
◦ Energy from portable energy
adapters
◦ Energy from rechargeable battery
stations
◦ Energy from saltwater – reducing
the melting water and rising
threats to coastal borders
 Considering the threats to the
power grid with cyber attacks,
we want to consider a
renewable energy model with
fewer opportunities in a
targeted attack.
◦ Solar Panels may offer benefits
with a sub-domain into local
storage for small hard to reach
populations.
◦ Renewable sources (Arizona)
◦ Saltwater energy sources
2nd Requirement Internet for all Opportunities
 Requires a constant power
source before we begin to
deliver Internet for all
◦ Bio-diversity protections must be
factored before using traditional
infrastructure practices
 Long haul low power emitting
concepts should be explored
◦ Private clouds for the per cloud
users in civil society where poverty
is the greatest risk
 Opportunity to enable economic growth
for PPPs in solutions where the
protection of the bio-diversity outweighs
any desire to modernize to
industrialized practices.
◦ Poverty is measured differently in these
parts of the world.
 Build the per cloud for in community
oversight of private clouds that
interoperate.
◦ Consider floating data centers and access
to internet in floating
◦ Trucks driven to communities
◦ Unarmed Drones as wireless access points
 Improve upon aerial footage with wireless
access
A device
An email
Storage for pictures and records
A personal domain
2nd Requirement Sustainable Technology
Device
Voice
Video
Data/Applications
We aspire to encrypt data and we must assume we are not
finding proven video encryption providers.
• Isolation and containment are simply smarter
IG Layer
Access
Control Links
(ACL)
Prevent and
Monitor
inbound and
outbound
connectivity
model
isolates
threats into
three
segments
while making
each gradient
layer less
accessible
PaaS-
Connectivity
between end
points-applies
to all
Copyright @2015 Wicked Design Solutions
Lisa Martinez 408-638-9016
2nd Requirement Sustainable Technology
Copyright @2015 Wicked Design Solutions
Lisa Martinez 408-638-9016
2nd Requirement Sustainable Technology
Opportunities Benefits
 The proliferation of Internet
addresses grows faster than
we would manage.
◦ We will run out of addresses within
the next 10 years
 Every solar panel installation
 Every personal computer or
device
 Every smart TV
 Every smart Appliance
 A per cloud enables a single
domain with sub-domains for the
many possibilities
◦ the Internet of Things (IoT)
◦ A person has household energy use
and local storage
 A new solar panel installation creates
a network connection for the tracking
of usage.
 Today, the panels and tracking are
outside the view of the homeowner
and passed back via the panel vendor
 A new appliance-Smart TV and Smart
Refrigerator are constantly using
energy to communicate with the IoT
services.
 A per cloud enables each person a domain name, the person
may replace their device or move from one state, country or
continents across the world.
◦ The domain name stays the same.
 You may keep your appliances or may buy new
 In all situations, you want to limit the exposure from outside threats on your
network…
 A private domain with sub-domains for each of the primary stakeholders
in my SMART devices
 Limit the access points in a persons home.
 Limit my cell phone data usage
Technology Changed the Cyberspace Away from our Control
Companies need to get technology back to the way
it was before.
My View
Technology
Solutions
Copyright @2015 Wicked Design Solutions
Lisa Martinez 408-638-9016
User
Worker
(Person)
Application
Services
Master Data
Identity
Dashboard
Intranet
Network
connectivity
Configuration Management db
1 Process Functional Application bundle
2 Monitoring Service and Logging
3 Master Data Identity Service
4 Predefined In process and historical
information
5 Network Connectivity-vpn, access key
service
Data into these sources does not
change often and is governed as P1
services critical to business,
operations, systems and technology
Enabling science, technology and innovation with per cloud
Segmentation for Urban Planning
to Citizen(s)
Enabling science, technology and innovation with per cloud

More Related Content

PDF
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
PDF
Future of value of data singapore.compressed
DOCX
Quality Metrics In Ubiquitous Computing
PDF
IoTMeetupGuildford#1: IOT participation plot - Gill Wildman (Plot London)
PPTX
IoT.ppt
PDF
Presentation to Halsall & Associates
PDF
Ubiquitous computing Paper
PDF
A future security landscape
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Future of value of data singapore.compressed
Quality Metrics In Ubiquitous Computing
IoTMeetupGuildford#1: IOT participation plot - Gill Wildman (Plot London)
IoT.ppt
Presentation to Halsall & Associates
Ubiquitous computing Paper
A future security landscape

What's hot (20)

PDF
Pervasive Computing: Vision and Challenges
PPTX
Pervasive Computing
PPT
Positive intellectual rights and information exchange
PPTX
Trends in Law Practice Management – Calculating the Risks
PPTX
BYOD - Bringing Technology to work | Sending Data Everywhere
PDF
NASSCOM Design4India Design Summit & Awards 2019 - Designing for Blockchain -...
PPTX
Pervasive Computing
PPTX
How Artificial Intelligence Will Make Technology Disappear
PPTX
The Accidental Cloud: Privacy and Security Issues in a BYOD World
PDF
The Evolution of Internet of Things
PDF
The ethics of cloud and mobile computing for lawyers
PDF
Cisco mortensen
PDF
The Internet of Everything: Tom Lee, Stanford School of Engineering
PPTX
Ch # 5, CISM
PDF
Internet Of Things
PDF
HSD Digital Citizenship Framework
PDF
Cybersecurity and Data Privacy Update
PPTX
Ethics in development of Information Technology
PPT
Ubiquitous Computing
PDF
The internet of everything
Pervasive Computing: Vision and Challenges
Pervasive Computing
Positive intellectual rights and information exchange
Trends in Law Practice Management – Calculating the Risks
BYOD - Bringing Technology to work | Sending Data Everywhere
NASSCOM Design4India Design Summit & Awards 2019 - Designing for Blockchain -...
Pervasive Computing
How Artificial Intelligence Will Make Technology Disappear
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Evolution of Internet of Things
The ethics of cloud and mobile computing for lawyers
Cisco mortensen
The Internet of Everything: Tom Lee, Stanford School of Engineering
Ch # 5, CISM
Internet Of Things
HSD Digital Citizenship Framework
Cybersecurity and Data Privacy Update
Ethics in development of Information Technology
Ubiquitous Computing
The internet of everything
Ad

Similar to Enabling science, technology and innovation with per cloud (20)

PDF
Mobility innovation and unknowns
PDF
Scot Cloud 2016
PPTX
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
DOCX
Security and Privacy considerations in Internet of Things
PDF
WF-IOT-2014, Seoul, Korea, 06 March 2014
PDF
Introduction to Decentralized Finance (DeFi)
PPTX
Putting data science into perspective
PPT
LoanResolve Brief Presentation
PPTX
Machine learning presentation in using pyhton
PPT
24 7 internet of Everything Everywhere
PPTX
Innovation in the public sector
PPTX
Internet of things ecosystem: The quest for value
PDF
BYOD: Device Control in the Wild, Wild, West
PDF
Michael Josephs
PDF
9. Beechwood Reverse Pitch FINALISTS 6.14.17
PDF
Ocean Protocol Presentation by CEO Bruce Pon 20171129
PDF
Building the Global "Cloud 2"
PDF
"Realize the Potential of Customer Data through the Power of Consent", Stuart...
PPTX
Cloud computing
PDF
LF Decentralized Trust: A Bigger Tent for Projects, Labs, Members, and Commun...
Mobility innovation and unknowns
Scot Cloud 2016
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
Security and Privacy considerations in Internet of Things
WF-IOT-2014, Seoul, Korea, 06 March 2014
Introduction to Decentralized Finance (DeFi)
Putting data science into perspective
LoanResolve Brief Presentation
Machine learning presentation in using pyhton
24 7 internet of Everything Everywhere
Innovation in the public sector
Internet of things ecosystem: The quest for value
BYOD: Device Control in the Wild, Wild, West
Michael Josephs
9. Beechwood Reverse Pitch FINALISTS 6.14.17
Ocean Protocol Presentation by CEO Bruce Pon 20171129
Building the Global "Cloud 2"
"Realize the Potential of Customer Data through the Power of Consent", Stuart...
Cloud computing
LF Decentralized Trust: A Bigger Tent for Projects, Labs, Members, and Commun...
Ad

More from MrsAlways RigHt (20)

PPTX
Human development cost of quality in a quantified world
PPTX
Setting up an International Innovation Incubator
PPTX
Bmsqms revisedwithchevrons
PPTX
9. foundation ea to 2 use cases
PDF
5. shared service business offers capacity and crisis
PPTX
6. cloud offers hca edu doj
PDF
1. design strategy and vision for crisis management
PDF
2. Enterprise and Business Architecture Cloud Video Data
PDF
4. Five Capability
PDF
3. Identity, Awareness and Design Patterns
PDF
Socialmediadashboard
PDF
A system approach to cyber security
PDF
Retail SWOT v.2
PDF
Crisis prevention and readinessv2foundation pmc
PPTX
Just wicked
PDF
High risk populations with NIEM
PDF
Patterns within patterns in architecture v2
PDF
Standards for a blue ocean
PDF
A wicked problem with perceptions
PDF
Pcd gov v3
Human development cost of quality in a quantified world
Setting up an International Innovation Incubator
Bmsqms revisedwithchevrons
9. foundation ea to 2 use cases
5. shared service business offers capacity and crisis
6. cloud offers hca edu doj
1. design strategy and vision for crisis management
2. Enterprise and Business Architecture Cloud Video Data
4. Five Capability
3. Identity, Awareness and Design Patterns
Socialmediadashboard
A system approach to cyber security
Retail SWOT v.2
Crisis prevention and readinessv2foundation pmc
Just wicked
High risk populations with NIEM
Patterns within patterns in architecture v2
Standards for a blue ocean
A wicked problem with perceptions
Pcd gov v3

Recently uploaded (20)

PDF
Integrated-2D-and-3D-Animation-Bridging-Dimensions-for-Impactful-Storytelling...
PPTX
Entrepreneur intro, origin, process, method
PPT
WHY_R12 Uaafafafpgradeaffafafafaffff.ppt
PDF
SEVA- Fashion designing-Presentation.pdf
PPTX
areprosthodontics and orthodonticsa text.pptx
PDF
YOW2022-BNE-MinimalViableArchitecture.pdf
PPTX
joggers park landscape assignment bandra
PDF
BRANDBOOK-Presidential Award Scheme-Kenya-2023
DOCX
The story of the first moon landing.docx
PDF
Trusted Executive Protection Services in Ontario — Discreet & Professional.pdf
PPTX
Complete Guide to Microsoft PowerPoint 2019 – Features, Tools, and Tips"
PPTX
Wisp Textiles: Where Comfort Meets Everyday Style
PDF
Phone away, tabs closed: No multitasking
PPTX
Fundamental Principles of Visual Graphic Design.pptx
PDF
Urban Design Final Project-Context
PPT
EGWHermeneuticsffgggggggggggggggggggggggggggggggg.ppt
PPTX
DOC-20250430-WA0014._20250714_235747_0000.pptx
PPTX
BSCS lesson 3.pptxnbbjbb mnbkjbkbbkbbkjb
PDF
Urban Design Final Project-Site Analysis
PPT
Machine printing techniques and plangi dyeing
Integrated-2D-and-3D-Animation-Bridging-Dimensions-for-Impactful-Storytelling...
Entrepreneur intro, origin, process, method
WHY_R12 Uaafafafpgradeaffafafafaffff.ppt
SEVA- Fashion designing-Presentation.pdf
areprosthodontics and orthodonticsa text.pptx
YOW2022-BNE-MinimalViableArchitecture.pdf
joggers park landscape assignment bandra
BRANDBOOK-Presidential Award Scheme-Kenya-2023
The story of the first moon landing.docx
Trusted Executive Protection Services in Ontario — Discreet & Professional.pdf
Complete Guide to Microsoft PowerPoint 2019 – Features, Tools, and Tips"
Wisp Textiles: Where Comfort Meets Everyday Style
Phone away, tabs closed: No multitasking
Fundamental Principles of Visual Graphic Design.pptx
Urban Design Final Project-Context
EGWHermeneuticsffgggggggggggggggggggggggggggggggg.ppt
DOC-20250430-WA0014._20250714_235747_0000.pptx
BSCS lesson 3.pptxnbbjbb mnbkjbkbbkbbkjb
Urban Design Final Project-Site Analysis
Machine printing techniques and plangi dyeing

Enabling science, technology and innovation with per cloud

  • 1. Lisa Yaoxochitl Martinez UN Commons Cluster - Member
  • 2.  The right to equal treatment under the law  The right to develop to the full potential and desires of the person choice  The right to meaningful work  The right to be counted once (as opposed to many identity records in many companies in many parts of the world)  The right to self determination – a right to choose and responsibility to manage our physical and digital persona’s. ◦ Technology CAN do just about anything, the question would be what it should or shouldn’t do.
  • 3.  Understanding how to interact with a person with the right to self determination. ◦ Technology Transfers must avoid over production and collection of person data that can identity or locate a person. ◦ The objective would be to ensure the physical to digital worlds are 1:1 in identity and no personal identifiable information sharing.  Assume a private cloud with different representations ◦ A citizen oversight data center (may be a server in a remote part of the world. My Per Cloud My Local Community (Civil Society) My International Segment Cooperative or Marketplace My Public Profile
  • 4.  Privacy allows each of us to have a right to choose what we share and what others know about us. ◦ No, it’s not just about the government spying on us.  Sure, the government might need to protect us. ◦ No, it’s not about whether you are doing something wrong or have something to hide.  Assume we are all being good citizens and we do not break the law.  It’s about our 4th amendment rights  It’s about not being profiled because we live in poverty or live in a wealthy neighborhood.  It’s about making mistakes and being able to overcome those mistakes  It’s about not revealing more than we have to so the bad guys don’t prey on our weakness or take advantage of us.  Its about not being judged and not judging others
  • 5. Self Determination Private local storage for photos, videos and IP An ability to publish to WordPress
  • 6. A device An email Storage for pictures and records A personal domain
  • 7. Intimacy Gradient Levels (NIEM group)  Whole government moves from high cost low enforcement and low effectiveness in government  action ready using EA as the transformation opportunity A hierarchy of authority implies the top level rules are adopted at the lowest level  Intimacy gradient level 3 Federal  Intimacy gradient level 4 state  Intimacy gradient level 5 county  Intimacy gradient level 6 city  Intimacy gradient level 7 community  assume Facebook, Google+, Twitter, Yahoo, Instagram, About.me with public access to minimal viable information based on NIEM adoption. Local control would only be achieved through adoption of standards universally Access Group X Tax Debt X Healthcare X Education X Justice System X Federal, State, Local X  By Lisa Martinez Copyright 2015 @ Wicked Design Solutions
  • 8.  Far less resources are used in transforming the offer development process (life cycle) into a sustainable development model. ◦ All businesses publish to a market place for Business to Business (B2B) ◦ All public sector services into a cooperative which is non-taxable  Public and Private sector partnerships collaborate in a sharing caring economy feeding both the cooperative and marketplace ◦ Donations are non-taxable to enable poverty reduction
  • 9. Enable Presentation of Information Enable billing internal or externally  An organization hierarchy ◦ The structured content grouping people to a people manager from the lowest level to the C-Level and CEO or Executive Director  Enables the key control from master records to transaction records which become variables  Every expense must be approved before issuance of a purchase order to a vendor/supplier ◦ Present the department budget to all users or people managers based on commitments agreed upon in strategic planning  Output from the planning or BP1  The users have an assigned people manager  The users have an assigned department code ◦ The users have an assigned offer group or specialty (role nets and role sets) associated with a general ledger code ◦ A department will have a ledger code associated for internal and external cost segmentation
  • 10. Software as a Service (SaaS) Types
  • 11. Data Raw Format Applications (information and Knowledge) Content Knowledge (Content and Information) Information (Documents) Records Display User Transactional User Management user Company LDAP or AD account X X –Restricted group see Sarbanes Oxley rules Network IP and Host X X Secure access certificate or Key X X Monitor and Design Key Controls SOD 404 Assurances Any financial Management, based on roles based access Any create, read, update or archive Financial Management Quality Management Employee Performance All request are pre-authorized and validated All approvals are approved or delegated to a person with same or greater authority. Asset Device Any organization or agency supplied Any organization or agency supplied WICKED 2014@copyright Lisa Martinez 408.638.9016
  • 12. How the per cloud (private) empowers people?
  • 13. AMERICA’s AFRICA AUSTRALIA EUROPE Copyright @2015 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 14. Civil society and a per cloud a physical to digital association Every person is associated with a location in a state, in a nation  A per cloud infers a persons right to choose (opt out) ◦ The right to protect their intellectual property and to maintain privacy in their health, education, economic and social life. ◦ The right to protect themselves from unlawful discrimination and a right to remedies in the event others violate law  The right to visibility into what data is used or published about them.
  • 15. 1st Requirement Energy for All Opportunities  Any technology solution requires a device which needs either AC power or Battery Power ◦ Energy from AC adapters ◦ Energy from portable energy adapters ◦ Energy from rechargeable battery stations ◦ Energy from saltwater – reducing the melting water and rising threats to coastal borders  Considering the threats to the power grid with cyber attacks, we want to consider a renewable energy model with fewer opportunities in a targeted attack. ◦ Solar Panels may offer benefits with a sub-domain into local storage for small hard to reach populations. ◦ Renewable sources (Arizona) ◦ Saltwater energy sources
  • 16. 2nd Requirement Internet for all Opportunities  Requires a constant power source before we begin to deliver Internet for all ◦ Bio-diversity protections must be factored before using traditional infrastructure practices  Long haul low power emitting concepts should be explored ◦ Private clouds for the per cloud users in civil society where poverty is the greatest risk  Opportunity to enable economic growth for PPPs in solutions where the protection of the bio-diversity outweighs any desire to modernize to industrialized practices. ◦ Poverty is measured differently in these parts of the world.  Build the per cloud for in community oversight of private clouds that interoperate. ◦ Consider floating data centers and access to internet in floating ◦ Trucks driven to communities ◦ Unarmed Drones as wireless access points  Improve upon aerial footage with wireless access
  • 17. A device An email Storage for pictures and records A personal domain 2nd Requirement Sustainable Technology
  • 18. Device Voice Video Data/Applications We aspire to encrypt data and we must assume we are not finding proven video encryption providers. • Isolation and containment are simply smarter IG Layer Access Control Links (ACL) Prevent and Monitor inbound and outbound connectivity model isolates threats into three segments while making each gradient layer less accessible PaaS- Connectivity between end points-applies to all Copyright @2015 Wicked Design Solutions Lisa Martinez 408-638-9016 2nd Requirement Sustainable Technology
  • 19. Copyright @2015 Wicked Design Solutions Lisa Martinez 408-638-9016 2nd Requirement Sustainable Technology
  • 20. Opportunities Benefits  The proliferation of Internet addresses grows faster than we would manage. ◦ We will run out of addresses within the next 10 years  Every solar panel installation  Every personal computer or device  Every smart TV  Every smart Appliance  A per cloud enables a single domain with sub-domains for the many possibilities ◦ the Internet of Things (IoT) ◦ A person has household energy use and local storage  A new solar panel installation creates a network connection for the tracking of usage.  Today, the panels and tracking are outside the view of the homeowner and passed back via the panel vendor  A new appliance-Smart TV and Smart Refrigerator are constantly using energy to communicate with the IoT services.
  • 21.  A per cloud enables each person a domain name, the person may replace their device or move from one state, country or continents across the world. ◦ The domain name stays the same.  You may keep your appliances or may buy new  In all situations, you want to limit the exposure from outside threats on your network…  A private domain with sub-domains for each of the primary stakeholders in my SMART devices  Limit the access points in a persons home.  Limit my cell phone data usage
  • 22. Technology Changed the Cyberspace Away from our Control Companies need to get technology back to the way it was before. My View Technology Solutions Copyright @2015 Wicked Design Solutions Lisa Martinez 408-638-9016
  • 23. User Worker (Person) Application Services Master Data Identity Dashboard Intranet Network connectivity Configuration Management db 1 Process Functional Application bundle 2 Monitoring Service and Logging 3 Master Data Identity Service 4 Predefined In process and historical information 5 Network Connectivity-vpn, access key service Data into these sources does not change often and is governed as P1 services critical to business, operations, systems and technology
  • 25. Segmentation for Urban Planning to Citizen(s)