Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Are you thinking through system improvements after the Xmas Terror Attack?
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Big Data > Data Mining > Are you thinking through system improvements after the Xmas Terror Attack?
Business IntelligenceData Mining

Are you thinking through system improvements after the Xmas Terror Attack?

BobGourley
BobGourley
7 Min Read
SHARE

Information Technology in the federal enterprise does not work like it does in Hollywood.   Although there are plenty of success stories to go around, federal IT is more limited and constrained than we would all want, for lots of reasons. Some of the reasons are just do to complexities and limited budgets.  Some of the reasons are for security.  Some of the reasons are because of  the way the government funds its agencies and manages programs. And some of reasons are because we humans have designed things using the wrong models and implemented them to serve workflows that are flawed to begin with.

This last point is something that I hope enterprise technologists all try to improve on for all our systems.

But perhaps the most important systems to consider improving right now are the ones supporting our national security decision-makers in the field.  These systems will very likely be under review in as part of the investigation into the Xmas terror attack.

There are a huge number of data-focused systems involved that could have been part of stopping this event. The most famous of these are…

More Read

dreamstime l 132528154
Top Tips for Keeping Your AI Startup’s IT Staff Inspired
Social CRM: Take the Leap of Faith
The CODA is the outcome of the only Brown-RISD joint studio, Out…
Sales Models and Analytics
In Praise of Industry Models

Information Technology in the federal enterprise does not work like it does in Hollywood.   Although there are plenty of success stories to go around, federal IT is more limited and constrained than we would all want, for lots of reasons. Some of the reasons are just do to complexities and limited budgets.  Some of the reasons are for security.  Some of the reasons are because of  the way the government funds its agencies and manages programs. And some of reasons are because we humans have designed things using the wrong models and implemented them to serve workflows that are flawed to begin with.

This last point is something that I hope enterprise technologists all try to improve on for all our systems.

But perhaps the most important systems to consider improving right now are the ones supporting our national security decision-makers in the field.  These systems will very likely be under review in as part of the investigation into the Xmas terror attack.

There are a huge number of data-focused systems involved that could have been part of stopping this event. The most famous of these are the Terrorist Identities Datamart Environment (TIDE) and the Terrorist Screening Data Base (TSDB).  Other data sources that will need to be scrutinized exist at the Department of Homeland Security, Department of State (especially visa applications), and the intelligence community.

We can expect lots of thought will be put into how many very large enterprise grade data systems interconnect and interoperate together as part of the reviews and after actions underway right now.   I’m sure all concerned in the review of what went wrong in the national security community will realize the problems were not IT and the human element is absolutely the most important to understand.  But still there will be more that systems can smartly do to help humans do right.

I have two recommended pieces of reading for anyone involved in studying what went wrong and how to fix it. Both are from the same thinker, Jeff Jonas. Jeff publishes great thoughts on his blog at: http://jeffjonas.typepad.com, and frankly I recommend all enterprise technologists familiarize themselves with all his writings.  But two pieces stand out as being incredibly relevant to systems design to stop back actors:

Perpetual Analytics and You won’t have to ask– data will find data and relevance will find the user.

In the first piece on Perpetual Analytics Jeff describes the approach to data analytics most organizations find themselves in, where data is extracted from existing systems and secondary analysis is conducted on the extracted data across the entire enterprise whenever a question must be answered.  The ocean must be boiled every time a new analysis is conducted.  This boil the ocean approach does not scale.

He uses the term “perpetual analytics” to “…describe the process of performing real-time analytics on data streams.  Think of this like “directing the rain drops” as they fall into the ocean – placing each drop in the right place and measuring the ripples (i.e., finding relationships and relevance to the historical knowledge). Discovery is made during ingestion and relevant insight is published at that magical moment. ”

Check out the post for more, you will be glad you did, I’m sure.

The other piece I’d recommend you study is You won’t have to ask– data will find data and relevance will find the user .   It highlights a very important shift in approaches to getting the right data to find the right data and make relevance that will find a user. Here is how Jeff put it:

“Next generations of information management systems will not principally rely on users dreaming up smart questions to ask computers. Rather, this new breed of technology will make it possible for data to find itself and relevant discoveries to find the consumer (e.g., a user). And all in real time of course. While this will bring with it new policy debates like which data will be permitted to find which data and who is notified of what relevance, I am going to stay focused in this post on what this technology will enable.”

Another thing all of us who have ever worked in the federal IT business know, it can be very hard to change/improve legacy systems and legacy approaches.  But our existing systems are calling out for improvement, and I’m certain Jeff Jonas is spelling out a model that will improve upon the current approach.

Do you agree?

Link to original post

TAGGED:terrorism
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

dedicated servers for ai businesses
5 Reasons AI-Driven Business Need Dedicated Servers
Artificial Intelligence Exclusive News
data analytics for pharmacy trends
How Data Analytics Is Tracking Trends in the Pharmacy Industry
Analytics Big Data Exclusive
ai call centers
Using Generative AI Call Center Solutions to Improve Agent Productivity
Artificial Intelligence Exclusive
warehousing in the age of big data
Top Challenges Of Product Warehousing In The Age Of Big Data
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Data Mining and Terrorism… Counterpoint

4 Min Read

Could Data Governance Help the War on Terror?

6 Min Read

Anti-terror software glitches?

4 Min Read

The Statistics of Counter-Terrorism

2 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
data-driven web design
5 Great Tips for Using Data Analytics for Website UX
Big Data

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?