Mobile And IOT Technologies Are Inside The Curve Of Human Time.

We humans have a finite speed at which we can think, analyze and make decisions.  We can only focus on a small set of data before we are overwhelmed.  

When important decisions must be made, our brains need time, significant time, to weigh all the variables, pros and cons and possible outcomes in order to arrive at a good decision.  In times of high stress where making fast decisions is required, many of us don’t perform at our peak.  In addition, weak humans that we are - need sleep.  We are not always available; we require daily downtime in order to function.

Humans operate in human time, a biological time influenced by the environment and universe that we live in.  Computers, though, are not subject to these human limitations and can act on algorithms and pre-determined decision trees 24/7 in milliseconds.

Human time challenges and limitations are not going away.  As IoT sensors and mobile devices proliferate, so also does the volume of real-time data and required analysis.  Humans, already at their limit, must somehow augment their capabilities to handle the massive increases in the volume and complexity of data.  Many believe, as do I, that the competitive marketplaces of today and tomorrow will be won by those with better and faster information logistics systems.  Systems that can collect larger quantities of data, analyze and execute relevant actions faster.

The new F-35 fighter jet in the USA’s arsenal has over 24 million lines of software code running it.  Why? It requires sensors, computers and software just to keep it in the air. Code is required to process all the data fast enough to augment the pilot’s skills.  In addition, the F-35 comes with a $500,000 custom helmet that provides a 360-degree view of the operational environment, and displays so much data pilots have reported suffering dizziness from information overload.  We have hit the wall of human capabilities, and we are only getting started.

The late military strategist and US Air force Colonel John Boyd, taught a key advantage in air combat was to get “inside” an opponent's decision curve. That means to understand the true situation faster, and then make better decisions quicker than an opponent.  He taught that humans need a simple formula for quick thinking.  His formula was OODA (observe, orient, decide and act). He taught a continuous cycle of observing a situation, orienting or understanding it, deciding what needs to happen and then acting quickly.  He taught that competitors executing OODA cycles faster than opponents had the advantage.  The OODA quick thinking process is proven, and has now made the leap from human time to computer time via artificial intelligence.

The leap from human time to computer time has relevance in business today, especially in the age of Mobile Me, where consumer’s expectations for mobile app performances demand instant responses.   Mobile apps and real-time consumer interactions are now in the realm of the F-35.  Consumers today demand more real-time information processing, decision-making and business process execution than are humanly possible without computer and software augmentation operating beyond the limitations of human time, and into the future of computer time.

Kevin Benedict is Senior Analyst at Cognizant's Center for the Future of Work

Follow Kevin Benedict Twitter @krbenedict

« Tor: Mystery Spike In Hidden Addresses
UK Government Goes Ahead With Revised Surveillance Bill »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

National Cybersecurity Agency (ANCS) - Tunisia

National Cybersecurity Agency (ANCS) - Tunisia

ANCS (L'Agence Nationale de la Cybersécurité) is the national cybersecurity agency for Tunisia.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Ministry of Information and Communications (MIC) - Vietnam

Ministry of Information and Communications (MIC) - Vietnam

The Ministry of Information & Communications of Vietnam is the policy making and regulatory body in the field of information technology and national information and and communication infrastructure.

QuoLab

QuoLab

QuoLab empowers security professionals to analyze, investigate and respond to threats within an integrated ecosystem.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

ShieldApps

ShieldApps

ShieldApps comprehensive suite of products is designed to protect your personal devices from privacy threats, including hacking attempts, online tracking, fingerprinting, phishing, malware, and more.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

Intellinexus

Intellinexus

Intellinexus turns data into actionable insights to revolutionise decision-making in your business.

Barrier Networks

Barrier Networks

Barrier Networks are a Cyber Security Managed Service Provider that specialises in Network and Application security.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.

TestifySec

TestifySec

TestifySec is an evidence-driven security and compliance platform that turns every software build into cryptographic proof, letting teams ship secure, audit-ready software.