Coming to DC, One-Day Delivery from Jeff Bezos

If you read this blog you care about government and technology. And whether you’re a technologist or not, you can see the tech forces shaping and sharpening the uses of digital capabilities in accomplishing the ends of government, whether that’s citizen-service delivery and local law enforcement, or global diplomacy and nation-state combat. I’ve worked on and written about them all – from intelligence to space to AI, or the quantification of Supreme Court humor, even “Punk Rock and Moore’s Law.”

Understanding and forecasting that radical pace of external change is difficult for government professionals, and they need help doing that. Let’s say you wanted to tap someone to offer insight. Who’d be on your dream list? At the top of my dream list – my absolute “if-only-I-could-ask” list – would be Jeff Bezos, founder of Amazon and Blue Origin.

So I’m going to sit down with Jeff Bezos on stage later this month, at the annual AFCEA Intelligence Symposium, for a conversation about areas where technology critically intersects with the nation’s response to enduring challenges and opportunities, such as artificial intelligence, digital innovation, the revolution in cloud computing, and commercial space operations. (I serve as national Vice Chairman of the Intelligence Committee at AFCEA, the 35,000-member Armed Forces Communications & Electronics Association.)

photo: AFCEA Symposium Invitation

The 2017 Symposium features, as usual, a stellar line-up of top leaders in national security, with panels on Advanced Conventional Threats, the Contested Environment of Space, Terrorism, Cyber Threats from Nation-States and Non-State Entities, and Gray-Zone Conflicts/Hybrid Warfare (topic of last year’s Defense Science Board study on which I sat). All sessions feature senior thought-leaders from government and industry.

Jeff Bezos might be new in that particular mix, but you can understand why we invited him. He has been TIME Magazine’s Person of the Year (early in his career in 1999), Fortune Magazine’s Businessperson of the Year, topped the Forbes annual list of “World’s Greatest Leaders,” and our rationale for this conversation is his long track record of revolutionary contributions to international technological/economic advance, as well as to US national security. AWS is now of central importance to the public sector (including intelligence), and the broader contributions of Amazon and Blue Origin to the nation’s economic future and success are incalculable.

Jeff Bezos Space

 

If you have a Top Secret/SI/TK clearance, you can attend the Symposium – register. [Update: sorry, 2017 Symposium = sold out]

There’s a longstanding meme that government should be “run like a business.” I typically don’t think in precisely those terms, having been on both sides and recognizing the significant differences in intent and stakeholders.

photo: Lewis Shepherd; Gen. “Wheels” Wheeler (Ret.) of DIUx; Russell Stern, CEO SolarflarePanel on Defense Innovation and DIUx

I’ve been more interested in helping each sector understand the unique contributions of the other, and the complexities inherent in their relationship. (See for example my recent post on DoD Innovation and DIUx in Silicon Valley.)

But the “run government like a business” impetus is understandable here in the United States as a reflection of dissatisfaction with government performance in meeting its own goals, and the expectations of the citizens it serves. President Trump recently assigned Jared Kushner to lead a new White House Office of American Innovation, and Kushner told the Washington Post “We should have excellence in government. The government should be run like a great American company.” Graph - Govt like a BusinessThe Washington Post (coincidentally owned by, yes, Jeff Bezos) ran a piece exploring the history of that thinking, dating its surge in popularity to the early 1980s under President Reagan – a timeline borne out by running the phrase through Google’s Ngram Viewer (see chart).

The last time I invited a smart young billionaire to come speak to Intelligence Community leaders, it worked out pretty well for the audience (see Burning Man and AI: What Elon Musk told me and the role of Art). So I’m aiming even higher this year…

If you don’t have a Top Secret clearance, you can’t get into the Symposium, and won’t be able to hear Bezos firsthand on April 27. But here’s a substitute, nearly as good: this week Bezos published his annual Letter to Shareholders of Amazon. Most people in the business world know about his legendary 1997 “first annual letter to shareholders” in which he laid out an extraordinary long-term vision for his company. The 2017 version is also extraordinary, and I urge you to read it in full. My friend Jeff Jonas, former IBM Chief Scientist for Context Computing and now founder/Chief Scientist at Senzing, calls it “the most impressive annual letter to shareholders I’ve ever read; this line of thinking leads to greatness.”

– – – – –

For some parting eye-candy, here’s video from last week’s annual Space Symposium in Colorado Springs, where attendees got a first-hand look at the historic Blue Origin New Shepard rocket booster (first to land vertically after spaceflight, first to relaunch again, and now a five-time-reuse trophy), and an inside tour of the crew capsule with “the largest windows in space travel.”

 

 

Inside Cyber Warfare

One year ago, the buzz across the government/technology nexus was focused on a pair of political guessing games. Neophytes mostly engaged in debating over whom the newly-elected President would name to be the nation’s first Chief Technology Officer. Grizzled Pentagon veterans and the more sober Silicon Valley types wondered instead who would get the nod as President Obama’s “Cyber Czar.”

Continue reading

The Cyber Trough of Disillusionment

I’ll call the moment: the cyber security field is now past its giddy buzzword peak.

Gartner is well known for preparing “hype cycle” analysis of technology sectors, as in their recent publication of the 2009 “Hype Cycle for Social Software.” That report got a lot of attention on Twitter and in blogs, naturally; social medians are nothing if not self-reflective regarding their community. I thought an interesting take was by an IBM developer, who compared the 2008 version against the new one, measuring the changes in predicted “time to maturity” for individual technologies, and thereby coming up with something like a measure of acceleration. By that measure, individual blogging and social search made the most rapid gains.

But I notice something missing on the full list of 79 Gartner hype cycle reports: there’s not one about “cyber security.”

Continue reading

Three cool new projects in Microsoft Research

[April Fool’s Edition]   I haven’t blogged in a little while – been a little busy – so I’ll make up for it with a burst of three cool new things coming out of the inventive lab work at Microsoft Research – improving Twitter, computer performance, and mobile phones.

MegaNano: New High-End Camera for Cellphones

Many people are dissatisfied with the fuzzy quality of photos taken with their built-in cellphone cameras. So Microsoft will be rolling out this summer the most advanced built-in mobile phone-cam on the market, based on a fantastic prototype now in final user testing at Microsoft Research’s Beijing lab.

MegaNanoDubbed the “MegaNano,” the sylish but diminutive camera boasts 72 megapixel resolution and a shutter-speed setting range from 0.003 seconds all the way up to seven hours.

The itty-bitty MegaNano will be launched simultaneously with the new Microsoft Mobile Apps Store, bundled with a nice selection of jackets and outerware with specially reinforced pouch-pockets and backpacks designed to hold the tiny device. 

I know you’ll want one. One beta-tester says, “It’s so small yet so powerful!  I have to remind myself sometimes that the weight on my shoulders is actually a tiny camera!”

Continue reading

Way Ahead and Far Behind

Today’s Washington Post has a story on its front page: “Staff Finds White House in the Technological Dark Ages.”

Two years after launching the most technologically savvy presidential campaign in history, Obama officials ran smack into the constraints of the federal bureaucracy yesterday, encountering a jumble of disconnected phone lines, old computer software, and security regulations forbidding outside e-mail accounts.”

“What does that mean in 21st-century terms? No Facebook to communicate with supporters. No outside e-mail log-ins. No instant messaging. Hard adjustments for a staff that helped sweep Obama to power through, among other things, relentless online social networking.”  -Washington Post

Some say that whoever has been responsible for information technology in the White House itself should be fired — but then perhaps the change of Administration just took care of that  🙂 

Overall, this situation is familiar to anyone who has worked in what I call “Big-G  IT” or the information technology of a federal government agency. I’ve argued about its challenges and sub-optimality before: see my previous pieces on “Roadmap for Innovation: From the Center to the Edge,” and more specifically “Puncturing Circles of Bureaucracy.”  In that latter piece back in March of 2008, I wrote about the “the defensive perimeters of overwhelming bureaucratic torpor,” and the frustrating reality within much of Big Government: “Federal employees have an entire complex of bizarrely-incented practices and career motivations, which make progress on technology innovation very difficult, not to mention general business-practice transformation as a whole.”

Here’s the truly frustrating, mind-bending part: it isn’t always true!  Other elements of the White House have cutting-edge, world-class technologies operating day in, day out.

Continue reading

San Francisco’s Wild and Wacky World of Technology

Fact: San Francisco’s municipal IT continues to self-destruct, according to new reports this weekend.  According to an IDG story (San Francisco hunts for mystery device on city network), “With costs related to a rogue network administrator’s hijacking of the city’s network now estimated at $1 million, city officials say they are searching for a mysterious networking device hidden somewhere on the network. The device, referred to as a terminal server in court documents, appears to be a router that was installed to provide remote access to the city’s Fiber WAN network, which connects municipal computer and telecommunication systems throughout the city. City officials haven’t been able to log in to the device, however, because they do not have the username and password. In fact, the city’s Department of Telecommunications and Information Services (DTIS) isn’t even certain where the device is located, court filings state.”

Continue reading

Click on My Head and You’re Classified 2.0

Fact: According to the latest McKinsey Global Survey report, “Building the Web 2.0 Enterprise,” many companies find themselves actually changing organizationally, both internally and externally, as a result of adopting Web 2.0 tools and practices. 

Continue reading

If Google Executives were Presidential Candidates…

Sometimes tech executives skate away with hubris (look up Larry Ellison), but more often they run the risk of their words coming back to haunt them. 

Just a little example this week – what a difference a day makes, from Tuesday to Wednesday. I’m sympathetic to politicians and executives who put their words on the line in public, opening themselves to the hazard of after-the-fact Monday morning quarterbacks.   But this is an interesting case with lessons for cloud computing…

Dateline: Tuesday August 5

Dave Girouard, president of Google’s Enterprise unit, was energetically promoting Google Apps at the Pacific Crest Technology Leadership Forum, quoted by TechCrunch and PC Retail Mag: Continue reading

IPsec, IPv6, and Security at Your House

Just had a great meeting in Redmond introducing some government friends to Steve Riley, one of Microsoft’s “technical evangelists” on security – network, app, data security and most of all, IP security.  He’s great at the big-picture integrated view of security, including physical security right up through the IP stack – here’s a video of a recent talk he gave at Microsoft’s TechNet called “The Fortified Data Center in Your Future.”

Check out his blog and you’ll see the kind of topics he works on; just one example of obvious value is a recent post full of real-world down-to-earth security advice for securing your environment at home (home networking, email use, internet browsing, etc for family and friends).

Oh, he’s also been on Twitter for almost a month now, where he mixes interesting finds on security news with offbeat political commentary 🙂  Yet another example of some of the bright people I meet back at the mothership in Redmond….

Email this post to a friend

AddThis Social Bookmark Button

Tradecraft in the Long Tail

Fact: Chris Anderson, WIRED editor in chief and author of the Internet-era classic book “The Long Tail,” also runs a couple of Ning social networks focusing on what the intelligence community would call IMINT, or imagery intelligence – specifically DIY Drones, “a site for all things about amateur Unmanned Aerial Vehicles (UAVs): How-to’s, videos, discussion and more,” and PictEarth, “a Social Network used to collect, link and geotag RC, UAV/UAS or Kite derived Earth imagery for use in 3D Globe Programs including Google Earth, Virtual Earth, World Wind and ArcGIS Explorer.”

Analysis:  With these sites, Chris Anderson is promoting what he calls “Crowdsourced Aerial Imagery.”  In the mission statement for DIY Drones, he writes that “Reasons to make your own UAV range from a fun technical challenge, student contests, aerial photography and mapping (what we call “GeoCrawling”), and scientific sensing. We are primarily interested in civilian, not military, UAV uses here.” (Emphasis is in the original.)

Let’s presume that individual DoD or intelligence-agency personnel have an interest in such issues, and maybe even in spending their personal time by keeping current and following the crowd’s interest in such topics, by participating in these new social networks.  One can then assume that others from foreign intelligence might have some interest in tracking those very IC personnel, by observing their activities within social networks (and not just Ning ones).  No spectacular logic needed for that.

The CIA has had some challenges in understanding their field presence within the Long Tail. 

Continue reading

%d bloggers like this: