Mobile And IOT Technologies Are Inside The Curve Of Human Time.

We humans have a finite speed at which we can think, analyze and make decisions.  We can only focus on a small set of data before we are overwhelmed.  

When important decisions must be made, our brains need time, significant time, to weigh all the variables, pros and cons and possible outcomes in order to arrive at a good decision.  In times of high stress where making fast decisions is required, many of us don’t perform at our peak.  In addition, weak humans that we are - need sleep.  We are not always available; we require daily downtime in order to function.

Humans operate in human time, a biological time influenced by the environment and universe that we live in.  Computers, though, are not subject to these human limitations and can act on algorithms and pre-determined decision trees 24/7 in milliseconds.

Human time challenges and limitations are not going away.  As IoT sensors and mobile devices proliferate, so also does the volume of real-time data and required analysis.  Humans, already at their limit, must somehow augment their capabilities to handle the massive increases in the volume and complexity of data.  Many believe, as do I, that the competitive marketplaces of today and tomorrow will be won by those with better and faster information logistics systems.  Systems that can collect larger quantities of data, analyze and execute relevant actions faster.

The new F-35 fighter jet in the USA’s arsenal has over 24 million lines of software code running it.  Why? It requires sensors, computers and software just to keep it in the air. Code is required to process all the data fast enough to augment the pilot’s skills.  In addition, the F-35 comes with a $500,000 custom helmet that provides a 360-degree view of the operational environment, and displays so much data pilots have reported suffering dizziness from information overload.  We have hit the wall of human capabilities, and we are only getting started.

The late military strategist and US Air force Colonel John Boyd, taught a key advantage in air combat was to get “inside” an opponent's decision curve. That means to understand the true situation faster, and then make better decisions quicker than an opponent.  He taught that humans need a simple formula for quick thinking.  His formula was OODA (observe, orient, decide and act). He taught a continuous cycle of observing a situation, orienting or understanding it, deciding what needs to happen and then acting quickly.  He taught that competitors executing OODA cycles faster than opponents had the advantage.  The OODA quick thinking process is proven, and has now made the leap from human time to computer time via artificial intelligence.

The leap from human time to computer time has relevance in business today, especially in the age of Mobile Me, where consumer’s expectations for mobile app performances demand instant responses.   Mobile apps and real-time consumer interactions are now in the realm of the F-35.  Consumers today demand more real-time information processing, decision-making and business process execution than are humanly possible without computer and software augmentation operating beyond the limitations of human time, and into the future of computer time.

Kevin Benedict is Senior Analyst at Cognizant's Center for the Future of Work

Follow Kevin Benedict Twitter @krbenedict

« Tor: Mystery Spike In Hidden Addresses
UK Government Goes Ahead With Revised Surveillance Bill »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

CERT-IS

CERT-IS

CERT-IS is the national Computer Emergency Response Team for Iceland.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

BooleBox

BooleBox

Boolebox is the innovative suite of enterprise data protection applications that preserve the integrity and confidentiality of data from any unauthorized access.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

DataTribe

DataTribe

DataTribe is a cyber startup foundry, leveraging deep experience and expertise to build and launch successful product companies.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

SterlingRisk Programs

SterlingRisk Programs

SterlingRisk’s Cyber practice brings experience working with a wide array of clients across a broad spectrum of industries.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Secur-Serv

Secur-Serv

Secur-Serv is a security-first managed services provider. We provides Managed IT, Managed Print, Managed Device, and Cybersecurity services to companies of every size.

Black Duck Software

Black Duck Software

Black Duck (formerly the Synopsys Software Integrity Group) is the market leader in application security testing (AST).

Motive Managed Services

Motive Managed Services

Motive Managed Services take the complexity out of IT, Cybersecurity, and Network Operations, so you can focus on growing your business.