Digital Future Planning

The digital age gets a little older every billionth of a second.  Do you know when the digital age started?

Here are some possible dates….

  • Decemeber 23, 1947
  • July 1948
  • Feb 14, 1946

Was it the invention of the Transistor in December 23, 1947 by William Shockley, Walter Brattain and John Bardeen developing an amplification technology for telephone calls?

Or was it the research paper written by Clause Shannon at Bell Labs in July of 1948 on the “Mathematical Theory of Communication”?

Maybe it was the the ENIAC Electronic Numerical Integrator and Calculator developed from 1943 and announced February 14, 1946?

The birth date may not be definitive but clearly can be traced to these events in the late 1940’s and the result of the need for more computational power due to advances in Science and Nuclear Weapons Technology.  The need for technology in the late 1940’s and early 1950’s was driven from cold war fears and strategic advantage.  (remember that none of this research was funded to give us smart phones, computer games or the Internet; they are the unintended consequence and unplanned results)

Have you ever wondered when the digital age will end or what will replace it?  If we don’t start planning it may be sooner than we think!

History defines the Epoch Ages as follows:

  • Pre-history (0-3000 bc)
  • Ancient History  (3000 bc – 200 ad)
  • Post Classical History (200 ad – 1500 ad)
  • Modern History (1500 ad – 1800 ad)
  • Machine Age (1880-1945)
  • Atomic Age ( after 1945)
  • Post Modern Age (1973-present)
    • Information Age (1973 – present)

The premise of this article is that the Digital Age is not likely to end any time soon.  The use of digital technology has become pervasive in every persons life. Now that we are 70 years into the epoch we need to start planning how we want to use technology in the Post Modern digital age.

The drivers of the digital age were never to deliver information on demand in the palm of your hand.  The drivers of the digital age were to ensure intelligence and reliable global communications, ability to build and accurately control weapon systems, and more and more to track and eliminate potential threats.  The escalation in the intelligence and tracking in the digital age have lead to more cyber-terrorism and “Big Brother” type sovereign governments.  It can easily be argued that we have created technology that can and has been used against those that have created it.  (Examples: stux-net in the wild; encryption battles, cyber terrorism; identity theft; ransomware etc)  The progression of this could be more disastrous than we imagine if we don’t start to look at the real problem.

It’s all about the information.

We seem to be driven to have accurate, reliable, trustworthy, timely and detailed information.

The first analog video signals carried 640 x 480 pixels of resolution.  Today we can purchase and watch programs recorded in 4000 x 2000 pixels of resolution.  That is a 26 times increase in the amount of information in a single frame of video.  Frame rates have gone from 16 frames per second in the Silent Film era to 300 frames per second with high-speed digital video.  This is almost a 20 times increase.  Together they represent an incredible amount of information in a relatively short period of time.  When analog video was first introduced we did not have recording technology to retain and playback what was broadcast.  In order to accommodate the increased amount of information required a breakthrough in recording technology.  Traditionally to record more information the size of the tape or speed of the tape would be increased.  To record video signals the size of reel of tape would be enormous and travel an incredible speed.  It was unmanageable and would required enormous space to store tapes. The solution was to “reverse the telescope” and find a way to make the recording / playback head spin very fast, wrap the tape around the head and engineer a solution that revolutionized the television industry.

Information needs have driven technology at an incredible pace.  It is not linear but follows an exponential growth curve.  Meaning that it is growing at a compound rate.  The conversion from analog to digital has been a big part of the growth curve.  As more and more data has been converted from analog to digital more storage, processing power and bandwidth have been added.  We are currently working in Petabytes of storage, on Gigabit networks with multi-core processors that run at 10’s of Gigahertz.   We are nearing limits of this technology and completely new technologies are being sought.  It is time to step back for a millisecond and see if that is the right direction to take.  It is possible that part of the problem we have is “information overload” and mis-management.

Rather than continuing on the same technology path it is possible to “reverse the telescope” again and take a fresh look at the problem.  It is possible to put information in accurate, secure, reliable and trustworthy storage containers in a transactional format and reduce our need for redundant power, processing, storage, memory and the associated security that is needed.  One of the technologies developed for the information age was the database.  Databases come in many different type.  Hierarchical, Relational, b-tree, etc….  They all have one common problem.  They are collections of information that are designed to manage one type of data for a large collection of things.  We need an information management technology that is designed for any type of data for a single collection. One database per person is another way to look at this.  That way we only need to keep “one” copy of each person’s information. (we need multiple copies for availability / redundancy due to murphy’s laws)

This may not sound right   (Just like the way things look when you reverse the telescope.) but  using a new type of information management technology actually solves a lot of problems.  By separating programming from the data by using this model data is no longer required to be copied for each different use. (for example you medical data and financial information can be stored in one place and used securely by different programs)  A transactional model can give us more accurate real-time information rather than the batch processing models we use today.  We can provide better security by having the data in a centralized security model.  There are many ways to do this.  This model will discourage hacking of personal data and almost eliminates identity theft.  It also allows for the enablement of our constitutional protections of our personal property.

For example, Apple and the FBI are dancing around the subject of digital property rights. Your digital property rights are not well defined and we have identified these as a core part of any digital future.

That future requires all parties in any legal process to be properly authenticated.  It also requires that any legal document be authenticated and partially automated as well.  All of this authentication and infrastructure needs to be accessible via public networks and requires strong encryption and non-repudiation (strict logging and audit-ability).

It requires digital storage devices to be able to be placed into a read-only forensic mode so that tampering is not possible at the beginning of a legal process.  That requires additional firmware and safeguards be put into place on most of our IoT, phones, computers, laptops, pads, disks, clouds, etc……

Any digital device should be able to be accessed in a legal process with the correct set of legal steps.  Most can be read today without any effort.  Some require a little effort.  Others require brute force and there are probably a few that may not be able to be “opened”.

This requires a cooperation between a large group of people.  It requires a new way to think about how we manage information.  (We are not doing it correctly today.)

PeaComputing, L.L.C. is aware of the problem and has a solution.  The solution is not an app and cannot be added to your device.  It requires forethought, planning and a significant realization that due process can be automated and followed in all things digital.  It should be a crime to remove or attempt to circumvent any system that is used to protect information by any individual including law enforcement with the proper execution of the legal steps.

We know we want to be secure in our homes, in our country and with our information.  We should not have to give up any of our protections or rights granted in our Constitution.  Our Government should be working to improve those protections as a core part of their charter.  We should follow the laws and work to make those laws work in a digital world.

Patent an idea? Leo Szilard did.

Leó Szilárd (Hungarian: Szilárd Leó, February 11, 1898 – May 30, 1964 German: Spitz, Leo until age 2) was a Hungarian American physicist and inventor who conceived the nuclear chain reaction in 1933, patented the idea of a nuclear reactor with Enrico Fermi, and in late 1939 wrote the letter for Albert Einstein‘s signature that resulted in the Manhattan Project that built the atomic bomb. He also conceived the electron microscope, the linear accelerator (1928, not knowing Gustav Ising‘s 1924 journal article and Rolf Widerøe‘s operational device) and the cyclotron.[1] Szilárd himself did not build all of these devices, or publish these ideas in scientific journals, and so their credit often went to others. As a result, Szilárd never received the Nobel Prize, but others were awarded the Prize as a result of their work on two of his inventions.[2]

He was born in Budapest in the Kingdom of Hungary, and died in La Jolla, California.

In an odd way the quest for atomic energy also drove the discovery of the “Bit” and the computer and information technology.  The Institute for Advanced Studies at Princeton was the center for research on atomic energy and also became the skunk works for one of the first computational computers by John von Neumann and Alan Turing.

The entropy of information and the entropy of matter are tied together in the expression the “Bit in IT”.  Every quantum state carries information along with spin and energy.  I think it is the information and the value of the information that really matters.  Personal Information matters most to the person from which it came.  The value to others is decreased similar to the way atomic isotopes decay.  Some information decays slowly and some information decays rapidly.  When information is converted to bits the value of those bits is proportional to the ability to reconstruct those bits into information.  When those bits are separated by distance the value of that information is proportional to the reconstruction and the transmission over some network.

Value of information=(bits ability to recombine into information) * (bits ability to transfer over a network in a resonable time) / time *

 

“The value of a network is proportional to the square of the number of it’s users.”  – Metcalf’s Law

“The value of a network is proportional to the value of the information it connects to.” – Truex’s Law

Little Data ™

Pea Computing thinks Big Data is wrong. We need less Big Data and more Little Data ™.

Little Data ™ is the direction we need to go.  As such, we are trademarking Little Data.

Big Data should never really exist.

We have a name for our product.  It is called Context ™.

 

 

New personal data education site

 

We have started the PersonalDataCoalition.org web site because just like learning any new skill we need education and a way to understand the component skills we need.  We need a way to learn and have time to practice and retain those skills.  If is not apparent this world needs a completely new information management paradigm….a big change.  The Personal Data Coalition is devoted to explaining the new information management skills we need.  Please take a moment to bookmark and visit that site.

Just like the change that happened just a few years ago….the record album and the digital music player our analog world of paper, film, movies, books etc…is being converted to a digital format.  That conversion is complex and can be disruptive in ways we may not have considered.  Most computer data is stored in electronic databases or in electronic files.

Relational Database technology fails all of the tests for personal data privacy.  It is the exact opposite of personal data privacy.  Relational databases are for aggregating information and analyzing information.  They are designed by enterprises to fix enterprise problems.

PEA Computing is proposing an entirely new paradigm for information management in an architecture, called the Single Object Datastore(TM) (SODs). We are “reversing the telescope” recommending the storing of all of our personal information in a datastore that has a single unique relationship or key….a datastore for each and every one of us…thus shifting the access and control of that data to the person that “owns” that data.

We know of no other entity that is trying to develop a personal data information management system that will give the individual control of their property…their personal information.  It is a cause.  It is a mission.  It has one goal.  Protect your personal data and give you control over your information…

This is where the Personal Data Coalition comes in.  Everyone today needs to change how they view information and we need laws that acknowledge and protect our data as personal property.  Everyone talks about privacy but that is just the “tip of the ice-berg”….really.  We encourage you to think about about the future….we need to update the constitution and our laws for the digital age.

We think sharing information is a personal choice.  It is very granular and the rules for sharing change rapidly.  You need granular controls that can be modified in real-time.  Your information is very valuable.  People will pay you for your information.  Stop giving it away.

In today’s technology world….applications and data….finally….don’t have to be in the same place.  Your data should never leave your control.  Once it does, you have no idea where it might go or how it might be used.