SlideShare une entreprise Scribd logo
1  sur  101
Télécharger pour lire hors ligne
Accelerating
Breakthrough
Business Technologies
in Atlanta
Jack Shaw
@jackshaw
May 6, 2014
Making predictions
is very hard,
especially about the
future.
Yogi Berra
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Queen Elizabeth
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Boeing 707
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The First Four Waves of
Business Technology
Mainframe
70s
Internet
2000s
PC
80s
Client/Server
90s
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Each Wave of
Business Technology
• Requires deployment of a critical mass of
its predecessor wave to achieve rapid growth
and broad acceptance.
• Introduces new:
– Concepts
– Terminology
– Opportunities
– Concerns
• Has an exponentially greater impact on
business and society than its predecessor.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Bandwidth Cost
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Computing Cost
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Storage Cost
World's First 4
TB 2.5-inch SSD
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Mobile phones vs. toothbrushes
• There are 7 billion people in the world.
• 4 billion use mobile phones.
• Just 3.5 billion own toothbrushes.
Atlanta Technology Companies
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Marketing Technology Stack
CMS Anywhere
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How does CMS Anywhere work?
1. Visitor requests a page from
an affiliate server.
2. Page with CMS Anywhere
tag script is returned to the
browser.
3. Tag script requests the
beacon script from the
CMS Anywhere server.
4. The affiliate hit is registered
in Sitecore Analytics.
5. The beacon script is formed
and delivered to the browser.
6. The beacon script fires
stylers and replacers in the
page.
7. The beacon script fires
pixels to report additional
information to the CMS
Anywhere server.
Lorem ipsum dolor sit amet
Vestibulum ultricies viverra viverra. Proin laoreet velit in erat sollicitudin
iaculis. Ut et vehicula leo. Curabitur non dolor elit. Morbi ac ante volutpat ante
sollicitudin posuere. Sed ut nibh ut felis hendrerit vulputate at vel tortor.
Suspendisse dui nibh, rutrum nec tempus vestibulum, tristique eget mauris.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut at mollis eros.
Suspendisse potenti. Duis ornare ornare tincidunt. Donec pellentesque aliquet
urna in facilisis. In hac habitasse platea dictumst. Proin tempor ultricies velit, sit
amet aliquam nunc aliquet eget.
<TAG> Lorem ipsum dolor sit amet
Donec dapibus accumsan pellentesque. Proin ullamcorper egestas ultricies.
Nam ac nulla lacus. Ut lorem tortor, dictum eu massa eget, aliquet ultrices
lectus. Nam ac dui gravida, dictum nulla et, convallis nisl. Cras fermentum
feugiat diam, quis gravida eros elementum eget. Ut gravida magna nunc, id
semper libero condimentum sit amet. Pellentesque laoreet dictum nulla vel
tempor
Werwerg
Werg
Werrwer
Wrht
Rwehjt
Wthjwtjrjeyrjjyrj
Etyj
Etyjeytjetyyjejye
Teyjtyje
Eyjyytjyjyukyukyujhghfdjihjdifhnojnoirhjneroijrnoejiojrhoirjejoihjeriojhoierj
hoihjojoe
Jeigheoihgieurhgherhjgoeingioejnoiejrnoe
Gijhijhiuohoiwhfjiojeoigjoiwerguj
Ssdg
Affiliate
Server
CMS
Anywhere
Server
<BEACON>
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Before CMS Anywhere
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
After CMS Anywhere
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
More Than Just Page Styling
CMS Anywhere
www.arke.com
Trust-Free Security
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Heartbleed
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Heartbleed Bug Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
• $194
– Average Cost Per
Record Per Breach
in the USA.
Interesting Security Facts
• 28,765
– Average US Breach
Exposed Records
– Excludes “Mega
Breaches” (>100k)
• $5,403,644
– Average Total
Organizational Cost of
Data Breach in the
USA.
• 461
– Average Number of
Days Between
Breach and Discovery
Source: Ponemon Institute, 2013 Cost of Data Breach Study
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Castle and Moat Security
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
True End-End Encryption
• Browser-Based
• Platform / File Size / File Type Agnostic
• Client-Side Encryption/Decryption
• Encrypted Data –
At Rest AND In Transmission
• Zero Knowledge
• Provenance Attestation
& Irrefutable Time Stamp
• Full Audit Trail, “Chain of Custody”
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Current SafelyLocked Products:
– Truly Secure Managed File Transfer (SMFT)
– End/End Encryption
– Complete & Certifiable Audit Trail
– “Ad Hoc” and Registered User Sending Options
– Truly Secure Folder/File Sharing
– End/End Encryption
– Complete & Certifiable Audit Trail
– Multiple Upload/Download/Collaboration Options
– Combines SafelySendIt & SafelyShareIt into
Unified UI with all the features of both
plus
Trust-free Security
http://www.safelylocked.com/
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Internet of Things
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Exponential Growth
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Smart Wine Shelf
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Smart Wine Shelf
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Smart Wine Shelf
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
What is Augmented Reality?
Augmented Reality
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Marketing Applications
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Technician Support
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Component Identification
Augmented Reality
www.merlinar.com
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Internet of Transportation “Things”
Road Traffic Video Analytics
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Traffic & Safety Concerns
46
Wasted Time & Energy: In urban areas, over 30% of
drive-time (and fuel) is consumed in stalled traffic!
Crowded Space: an assortment of undifferentiated app’s
& devices aim to alert & divert drivers & routes
Poor Data: all current “app’s & devices” rely upon spotty
and/or otherwise inaccurate, in short, too-little data
Expensive Upgrades: real-time big traffic data has
entailed large investments in new/better sensing devices
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
MetroTech Solution
47
Video Analytics: converts existing video cameras into
multi-dimensional traffic sensors running in the cloud.
Traffic Analytics: aggregates & analyzes traffic data and
broadcasts to open APIs on AT&T-managed networks
Predictive Analytics: “searches the future”— e.g.,
for emerging congestion, planning, zoning, etc
Big Traffic Data: High Definition (HD) real-time, cloud-
based information aggregation & publishing
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The IntelliSection™
Optional Wireless
Video Camera
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Metro-wide Real-time Info
• Vehicle
Integration
• Mobile
Application
• Traffic Data
Analytics
49
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Video Analytics in Buckhead
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Peachtree and Piedmont: 4-Way
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
P’tree and Piedmont: Close-Up
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
End-User
Devices
Video Analytics In the Cloud
53
Existingand/orNew
DOT&PublicSafety
VideoFeeds
Legacy Investments
Cloud Computing Traffic
Information Service
Optical Fiber MAN
and/or FTE Wireless
New Value
HD Traffic Data Aggregation
HD Big Traffic Data Publishing
Road Traffic Video Analytics
metrotech-net.com
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Internet of Health “Things”
Remote Non-Contact
Patient Monitoring
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Non-Contact Patient Monitoring
SENSIOTEC’S VIRTUAL MEDICAL ASSISTANT®
The Future of Remote Patient
Monitoring
The World’s First FDA-
Cleared Truly Non-Contact
Vital Signs Monitor
Measures Heart and Lung
Function, Torso Movement
and Bed Exit
High Value, Low Cost,
Location-Agnostic Patient
Care
PERSONAL
DATA
SOLUTION
Instantly Relays Real-Time Data
Vitals Monitoring: Alerts Caregivers to Abnormal
Cardiorespiratory Activity
Pressure Ulcer Prevention: Compels Caregivers
to Respond to Absence of Movement
Fall Prevention: Alerts Caregivers to
Imminent Bed Exit
User-Centered Design
Powerful Patient Management Tools
Captures, Records and Delivers Continuous Real-time
Data to Nurses’ Stations, Tablets or Smartphones
Trends data for predictive management
Highlights Abnormalities
Alerts audibly and visually
WEB
SERVER
MEANINGFUL
DATA
SENSOR
PANEL
DECISION
SUPPORT
DEPERSONALIZED
BIGDATA
PHARMA2ns
EMR
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
In Development
If this baby was being monitored by
Sensiotec’s technology . . .
. . . he would look like this.
Remote Non-Contact
Patient Monitoring
http://sensiotec.com
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How Do We Pay?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
ACCEPT BITCOIN
BitPay
What Is Bitcoin?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Blockchain Works
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
How the Blockchain Works II
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Lower Cost
THAN CREDIT CARDS
Lower Risk
NO FRAUD OR
CHARGEBACKS
Sell Globally
BORDERLESS
PAYMENTS
Why Accept Bitcoin?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BitPay’s Model
• Payment Processor
• Contract with
Merchant as
Merchant’s Agent
to receive and
settle payments
• Tools for
E-commerce,
Billing, and Retail Customer
Merchant
Checkout
BitPay
Payment
Gateway
Payment
Instructions
Payment
Confirmation
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BitPay Funds Flow
Customer
Wallet
Bitcoin
Network
BitPay
Wallet
BitPay
Bank
F/X
Exchange
Merchant’s
Bank
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BitPay Reduces Risk
Guaranteed Exchange
Rate
Daily Bank Settlement
to 33 countries
Accounting Import
GAAP Reporting
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
All-Inclusive Pricing
FLAT MONTHLY FEE
Plans from$30-$3000/month
0% TRANSACTION FEES
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BIT INC
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
ACCEPT BITCOIN
https://bitpay.com/
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
BUT, Why Just Money?
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Digital Artwork
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Fifth Wave
Mainframe
60s – 70s
Intelligent Systems
2010s
Internet
2000s
PC
80s
Client/Server
90s
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Autonomous Systems
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
The Monitoring and Planning Loop
Planning
– What
should be
done?
Executing
Plans
Observations
The
Real
World
ActionsUpdated
Plans
What to Look For
What has happened?
Instructions
Notifications
Signals
Assessing
Changing
State of
World
Data
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
AI techniques differ on “how they
think” as well as “how they act”
84
THINKING RATIONALLYTHINKING HUMANLY
ACTING RATIONALLYACTING HUMANLY
PERFORMANCE MEASUREMENT
vs. People vs. Ideal (Rationality)
Thought Process/
Reasoning
Behavior
FOCUS
Associative
Memory
Neural
Networks
Expert/Rule
Systems
Intelligent
Agents
Fuzzy
Logic
Machine
Learning
©2012 VELOXITI, Inc. - Used with permission
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Intelligent Systems Can Accelerate and
Improve Business Decision-making
Intelligent Systems
Must be
processed
Generates
Continually
Processing
Learns
Machine
Learning
Associative
Memory
Provides
Input
Think, Decide, Act
to solve a Business
Problem
Business
Infrastructure Big Data
Natural
Language
Processing©2012-14 VELOXITI, Inc.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Intelligent Agents can be used
to improve performance
86
2
IA’s can leverage
expert knowledge
to the rest of
organization –
“shifting”
performance curve
1
In any organization,
best performance –
decisions – is by
handful of “experts”
3
Further, having IA’s
“assist” Experts for
data-intensive thinking
can improve their
performance also
©2012-14 VELOXITI, Inc.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Driverless Car
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
ZipCar
www.veloxiti.com
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Fasten Your Seatbelts
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Global Autonomous
Supply Chains
• Autonomous Processes
• Autonomous Enterprises™
• Autonomous Supply Chains
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Dynamic Pricing
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Business Ecosystems
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Complex Adaptive Ecosystem
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Self-Configuring
Business Ecosystems
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Autonomous Taxi
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Distributed Autonomous
Corporations I
• Distributed –no central points of control or failure
that can be attacked.
• Autonomous – once up to speed; they no longer
need (or heed) their creators.
• Corporations – They are, and of a right ought to be,
free independent entities.
• Transparent – their books and business rules are
auditable by all.
• Confidential – customer information is securely
(and incorruptibly) protected.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Distributed Autonomous
Corporations II
• Trustworthy – because no interaction with
them depends on trust.
• Fiduciaries – acting solely in their customers’ and
shareholders’ interests.
• Self-regulating – they obey their own rules like,
well, robots.
• Incorruptible – no one can exercise seductive or
coercive influence over them.
• Sovereign – over their digital resources. They don’t
need governments to exist.
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
2025
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Atlanta Technology
Companies of the Future
www.arke.com
www.safelylocked.com/
www.merlinar.com
metrotech-net.com
https://bitpay.com/
http://sensiotec.com
www.veloxiti.com
© 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved
Follow Up
• Jack Shaw, President
Breakthrough Business Technologies
• M: 770-910-5969
• Jack@e-com.com
• www.e-com.com
• www.gplus.to/JackShaw
• www.Twitter.com/JackShaw
• www.YouTube.com/user/JackShaw4728
• www.facebook.com/JackShawTechnology
• www.LinkedIn.com/in/JackShawTechnology
• www.BusinessTechnologyFuturist.WordPress.com

Contenu connexe

Tendances

Ip Office Master Customer Presentation
Ip Office Master Customer PresentationIp Office Master Customer Presentation
Ip Office Master Customer PresentationBennet Communications
 
Broadband Management & Billing Solutions for Telco, ISP & Enterprise
Broadband Management & Billing Solutions for Telco, ISP & EnterpriseBroadband Management & Billing Solutions for Telco, ISP & Enterprise
Broadband Management & Billing Solutions for Telco, ISP & Enterpriseinventum_marketing
 
Swift Mail Communications Ltd. Franchisee Opportunity
Swift Mail Communications Ltd. Franchisee OpportunitySwift Mail Communications Ltd. Franchisee Opportunity
Swift Mail Communications Ltd. Franchisee OpportunityShailendra Yadav
 
Panamax Corporate Profile 3.C
Panamax Corporate Profile 3.CPanamax Corporate Profile 3.C
Panamax Corporate Profile 3.CMahavir Shah
 
Etail 2012 Akamai Chief Scientist keynote
Etail 2012 Akamai Chief Scientist keynoteEtail 2012 Akamai Chief Scientist keynote
Etail 2012 Akamai Chief Scientist keynoteLiz Bradley
 
Telestax Telecom API Workshop Presentation
Telestax Telecom API Workshop PresentationTelestax Telecom API Workshop Presentation
Telestax Telecom API Workshop PresentationAlan Quayle
 
Company Profile For Per
Company Profile For PerCompany Profile For Per
Company Profile For PerPerceptio
 
White Paper In 2012 Why Every Enterprise Needs A World Class Speech Enable...
White Paper    In 2012 Why Every Enterprise Needs A World Class Speech Enable...White Paper    In 2012 Why Every Enterprise Needs A World Class Speech Enable...
White Paper In 2012 Why Every Enterprise Needs A World Class Speech Enable...Lyrix
 
Teknosor Technology Support Services
Teknosor Technology Support ServicesTeknosor Technology Support Services
Teknosor Technology Support ServicesFatih Boran Berber
 
Cns Full Overview 2009 Linked In (2)
Cns Full Overview 2009 Linked In (2)Cns Full Overview 2009 Linked In (2)
Cns Full Overview 2009 Linked In (2)brianhenger
 
CNS Overview 2009
CNS Overview 2009CNS Overview 2009
CNS Overview 2009jhartcns
 
VPS Fortune Company Profile
VPS Fortune Company ProfileVPS Fortune Company Profile
VPS Fortune Company ProfileVPS Fortune
 
Kcreativez Inc.Outsourcing Profile
Kcreativez Inc.Outsourcing Profile Kcreativez Inc.Outsourcing Profile
Kcreativez Inc.Outsourcing Profile Kcreativez Inc
 

Tendances (20)

Ip Office Master Customer Presentation
Ip Office Master Customer PresentationIp Office Master Customer Presentation
Ip Office Master Customer Presentation
 
PROFILE
PROFILEPROFILE
PROFILE
 
Full packet
Full packetFull packet
Full packet
 
SmartOffice Full packet
SmartOffice Full packetSmartOffice Full packet
SmartOffice Full packet
 
SmartOffice USA Full Packet
SmartOffice USA Full PacketSmartOffice USA Full Packet
SmartOffice USA Full Packet
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
Broadband Management & Billing Solutions for Telco, ISP & Enterprise
Broadband Management & Billing Solutions for Telco, ISP & EnterpriseBroadband Management & Billing Solutions for Telco, ISP & Enterprise
Broadband Management & Billing Solutions for Telco, ISP & Enterprise
 
Swift Mail Communications Ltd. Franchisee Opportunity
Swift Mail Communications Ltd. Franchisee OpportunitySwift Mail Communications Ltd. Franchisee Opportunity
Swift Mail Communications Ltd. Franchisee Opportunity
 
Panamax Corporate Profile 3.C
Panamax Corporate Profile 3.CPanamax Corporate Profile 3.C
Panamax Corporate Profile 3.C
 
Etail 2012 Akamai Chief Scientist keynote
Etail 2012 Akamai Chief Scientist keynoteEtail 2012 Akamai Chief Scientist keynote
Etail 2012 Akamai Chief Scientist keynote
 
Telestax Telecom API Workshop Presentation
Telestax Telecom API Workshop PresentationTelestax Telecom API Workshop Presentation
Telestax Telecom API Workshop Presentation
 
Company Profile For Per
Company Profile For PerCompany Profile For Per
Company Profile For Per
 
White Paper In 2012 Why Every Enterprise Needs A World Class Speech Enable...
White Paper    In 2012 Why Every Enterprise Needs A World Class Speech Enable...White Paper    In 2012 Why Every Enterprise Needs A World Class Speech Enable...
White Paper In 2012 Why Every Enterprise Needs A World Class Speech Enable...
 
Teknosor Technology Support Services
Teknosor Technology Support ServicesTeknosor Technology Support Services
Teknosor Technology Support Services
 
Cns Full Overview 2009 Linked In (2)
Cns Full Overview 2009 Linked In (2)Cns Full Overview 2009 Linked In (2)
Cns Full Overview 2009 Linked In (2)
 
CNS Overview 2009
CNS Overview 2009CNS Overview 2009
CNS Overview 2009
 
VPS Fortune Company Profile
VPS Fortune Company ProfileVPS Fortune Company Profile
VPS Fortune Company Profile
 
Onstate cloud-cc-webinar3
Onstate cloud-cc-webinar3Onstate cloud-cc-webinar3
Onstate cloud-cc-webinar3
 
SmartConnect-GenesysPS
SmartConnect-GenesysPSSmartConnect-GenesysPS
SmartConnect-GenesysPS
 
Kcreativez Inc.Outsourcing Profile
Kcreativez Inc.Outsourcing Profile Kcreativez Inc.Outsourcing Profile
Kcreativez Inc.Outsourcing Profile
 

En vedette

Presentations seeking angel investment presentation (charlie paparelli)
Presentations   seeking angel investment presentation (charlie paparelli)Presentations   seeking angel investment presentation (charlie paparelli)
Presentations seeking angel investment presentation (charlie paparelli)Melanie Brandt
 
Open text tag_bpm 04-12 v3
Open text tag_bpm 04-12 v3Open text tag_bpm 04-12 v3
Open text tag_bpm 04-12 v3Melanie Brandt
 
International Panelist, part 2
International Panelist, part 2International Panelist, part 2
International Panelist, part 2Melanie Brandt
 
TAG Recruiting, 4/19/11, Monster
TAG Recruiting, 4/19/11, MonsterTAG Recruiting, 4/19/11, Monster
TAG Recruiting, 4/19/11, MonsterMelanie Brandt
 
Tag it enablement workstream lc meet 051810
Tag it enablement workstream lc meet 051810Tag it enablement workstream lc meet 051810
Tag it enablement workstream lc meet 051810Melanie Brandt
 
Presentations seeking angel investment presentation (charlie paparelli)
Presentations   seeking angel investment presentation (charlie paparelli)Presentations   seeking angel investment presentation (charlie paparelli)
Presentations seeking angel investment presentation (charlie paparelli)Melanie Brandt
 

En vedette (13)

Presentations seeking angel investment presentation (charlie paparelli)
Presentations   seeking angel investment presentation (charlie paparelli)Presentations   seeking angel investment presentation (charlie paparelli)
Presentations seeking angel investment presentation (charlie paparelli)
 
Open text tag_bpm 04-12 v3
Open text tag_bpm 04-12 v3Open text tag_bpm 04-12 v3
Open text tag_bpm 04-12 v3
 
International Panelist, part 2
International Panelist, part 2International Panelist, part 2
International Panelist, part 2
 
Ron hutchins ga_tech
Ron hutchins ga_techRon hutchins ga_tech
Ron hutchins ga_tech
 
Scott wilson hp_cfs
Scott wilson hp_cfsScott wilson hp_cfs
Scott wilson hp_cfs
 
TAG Recruiting, 4/19/11, Monster
TAG Recruiting, 4/19/11, MonsterTAG Recruiting, 4/19/11, Monster
TAG Recruiting, 4/19/11, Monster
 
Steve hammond nrel
Steve hammond nrelSteve hammond nrel
Steve hammond nrel
 
Gary Conaway 6-21-11
Gary Conaway 6-21-11Gary Conaway 6-21-11
Gary Conaway 6-21-11
 
Colors
ColorsColors
Colors
 
Tag it enablement workstream lc meet 051810
Tag it enablement workstream lc meet 051810Tag it enablement workstream lc meet 051810
Tag it enablement workstream lc meet 051810
 
March 2010
March 2010March 2010
March 2010
 
Presentations seeking angel investment presentation (charlie paparelli)
Presentations   seeking angel investment presentation (charlie paparelli)Presentations   seeking angel investment presentation (charlie paparelli)
Presentations seeking angel investment presentation (charlie paparelli)
 
Colors
ColorsColors
Colors
 

Similaire à Accelerating breakthrough business technologies in atlanta, tag featured speaker series, 2014 05-06

Implementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudImplementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudEmtec Inc.
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 
Creating the Borderless Workplace
Creating the Borderless WorkplaceCreating the Borderless Workplace
Creating the Borderless WorkplaceCA Technologies
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...VMware Tanzu
 
Why DevOps Matters To The CIO
Why DevOps Matters To The CIOWhy DevOps Matters To The CIO
Why DevOps Matters To The CIObenjaminwootton
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Rediscover Software Development Edward Hieatt Web Summit 2014
Rediscover Software Development Edward Hieatt Web Summit 2014Rediscover Software Development Edward Hieatt Web Summit 2014
Rediscover Software Development Edward Hieatt Web Summit 2014VMware Tanzu
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Leverage Automated Video Streaming to Secure Media Testing.pptx
Leverage Automated Video Streaming to Secure Media Testing.pptxLeverage Automated Video Streaming to Secure Media Testing.pptx
Leverage Automated Video Streaming to Secure Media Testing.pptxMichaelPerez407505
 
How to Align API Metrics to Product Objectives.pdf
How to Align API Metrics to Product Objectives.pdfHow to Align API Metrics to Product Objectives.pdf
How to Align API Metrics to Product Objectives.pdfDerric Gilling
 
A Guide to Cross-Browser Functional Testingv
A Guide to Cross-Browser Functional TestingvA Guide to Cross-Browser Functional Testingv
A Guide to Cross-Browser Functional TestingvTechWell
 
Migrating from Big Data Architecture to Spring Cloud
Migrating from Big Data Architecture to Spring CloudMigrating from Big Data Architecture to Spring Cloud
Migrating from Big Data Architecture to Spring CloudVMware Tanzu
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...AirTight Networks
 
Karmick Solution Corporate Profile 2010 11
Karmick Solution Corporate Profile 2010 11Karmick Solution Corporate Profile 2010 11
Karmick Solution Corporate Profile 2010 11Partho Sarkar
 
MindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_PresentationMindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_PresentationBrad Skeel
 
Mind surf2014 sddc_presentation
Mind surf2014 sddc_presentationMind surf2014 sddc_presentation
Mind surf2014 sddc_presentationBrad Skeel
 
AutoZone and the Road to Cloud Native
AutoZone and the Road to Cloud NativeAutoZone and the Road to Cloud Native
AutoZone and the Road to Cloud NativeVMware Tanzu
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 

Similaire à Accelerating breakthrough business technologies in atlanta, tag featured speaker series, 2014 05-06 (20)

Implementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the CloudImplementing PeopleSoft 9.2 During the Age of the Cloud
Implementing PeopleSoft 9.2 During the Age of the Cloud
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 
Creating the Borderless Workplace
Creating the Borderless WorkplaceCreating the Borderless Workplace
Creating the Borderless Workplace
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...
Pivotal CenturyLink Cloud Platform Seminar Presentations: Software Kept Eatin...
 
Why DevOps Matters To The CIO
Why DevOps Matters To The CIOWhy DevOps Matters To The CIO
Why DevOps Matters To The CIO
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Rediscover Software Development Edward Hieatt Web Summit 2014
Rediscover Software Development Edward Hieatt Web Summit 2014Rediscover Software Development Edward Hieatt Web Summit 2014
Rediscover Software Development Edward Hieatt Web Summit 2014
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Leverage Automated Video Streaming to Secure Media Testing.pptx
Leverage Automated Video Streaming to Secure Media Testing.pptxLeverage Automated Video Streaming to Secure Media Testing.pptx
Leverage Automated Video Streaming to Secure Media Testing.pptx
 
How to Align API Metrics to Product Objectives.pdf
How to Align API Metrics to Product Objectives.pdfHow to Align API Metrics to Product Objectives.pdf
How to Align API Metrics to Product Objectives.pdf
 
A Guide to Cross-Browser Functional Testingv
A Guide to Cross-Browser Functional TestingvA Guide to Cross-Browser Functional Testingv
A Guide to Cross-Browser Functional Testingv
 
Migrating from Big Data Architecture to Spring Cloud
Migrating from Big Data Architecture to Spring CloudMigrating from Big Data Architecture to Spring Cloud
Migrating from Big Data Architecture to Spring Cloud
 
Unlocking Generative AI for Accelerated Content Velocity Today - Asya Ivanova...
Unlocking Generative AI for Accelerated Content Velocity Today - Asya Ivanova...Unlocking Generative AI for Accelerated Content Velocity Today - Asya Ivanova...
Unlocking Generative AI for Accelerated Content Velocity Today - Asya Ivanova...
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
Karmick Solution Corporate Profile 2010 11
Karmick Solution Corporate Profile 2010 11Karmick Solution Corporate Profile 2010 11
Karmick Solution Corporate Profile 2010 11
 
MindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_PresentationMindSurf2014_SDDC_Presentation
MindSurf2014_SDDC_Presentation
 
Mind surf2014 sddc_presentation
Mind surf2014 sddc_presentationMind surf2014 sddc_presentation
Mind surf2014 sddc_presentation
 
AutoZone and the Road to Cloud Native
AutoZone and the Road to Cloud NativeAutoZone and the Road to Cloud Native
AutoZone and the Road to Cloud Native
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 

Plus de Melanie Brandt

Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Melanie Brandt
 
Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Melanie Brandt
 
TAG infrastructure society logistics presentation by Page Siplon
TAG infrastructure society logistics presentation by Page SiplonTAG infrastructure society logistics presentation by Page Siplon
TAG infrastructure society logistics presentation by Page SiplonMelanie Brandt
 
So co water - energy tag ses 120716 final
So co   water - energy tag ses 120716 finalSo co   water - energy tag ses 120716 final
So co water - energy tag ses 120716 finalMelanie Brandt
 
Ras ses water energy july 26 2012 final
Ras   ses water energy july 26 2012 finalRas   ses water energy july 26 2012 final
Ras ses water energy july 26 2012 finalMelanie Brandt
 
Yogendra joshi ga_tech
Yogendra joshi ga_techYogendra joshi ga_tech
Yogendra joshi ga_techMelanie Brandt
 
Wally phelps adaptiv_cool
Wally phelps adaptiv_coolWally phelps adaptiv_cool
Wally phelps adaptiv_coolMelanie Brandt
 
Ga techsusthpc patterson
Ga techsusthpc pattersonGa techsusthpc patterson
Ga techsusthpc pattersonMelanie Brandt
 
Pmg tag bpm_presentation
Pmg tag bpm_presentationPmg tag bpm_presentation
Pmg tag bpm_presentationMelanie Brandt
 
The Tipping Point by Software AG
The Tipping Point by Software AGThe Tipping Point by Software AG
The Tipping Point by Software AGMelanie Brandt
 
Tag Young Professionals - Merrill Lynch Presentation
Tag Young Professionals - Merrill Lynch PresentationTag Young Professionals - Merrill Lynch Presentation
Tag Young Professionals - Merrill Lynch PresentationMelanie Brandt
 
Becker businessgamesv6
Becker businessgamesv6Becker businessgamesv6
Becker businessgamesv6Melanie Brandt
 

Plus de Melanie Brandt (20)

Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014
 
Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014
 
TAG infrastructure society logistics presentation by Page Siplon
TAG infrastructure society logistics presentation by Page SiplonTAG infrastructure society logistics presentation by Page Siplon
TAG infrastructure society logistics presentation by Page Siplon
 
So co water - energy tag ses 120716 final
So co   water - energy tag ses 120716 finalSo co   water - energy tag ses 120716 final
So co water - energy tag ses 120716 final
 
Ras ses water energy july 26 2012 final
Ras   ses water energy july 26 2012 finalRas   ses water energy july 26 2012 final
Ras ses water energy july 26 2012 final
 
Gbr ge panel 07 26-12
Gbr ge panel 07 26-12Gbr ge panel 07 26-12
Gbr ge panel 07 26-12
 
Mc kenneys gatech
Mc kenneys gatechMc kenneys gatech
Mc kenneys gatech
 
Mc kenneys gatech
Mc kenneys gatechMc kenneys gatech
Mc kenneys gatech
 
Kevin burke apc
Kevin burke apcKevin burke apc
Kevin burke apc
 
Yogendra joshi ga_tech
Yogendra joshi ga_techYogendra joshi ga_tech
Yogendra joshi ga_tech
 
Wally phelps adaptiv_cool
Wally phelps adaptiv_coolWally phelps adaptiv_cool
Wally phelps adaptiv_cool
 
Ortiz internap
Ortiz internapOrtiz internap
Ortiz internap
 
Mc kenneys gatech
Mc kenneys gatechMc kenneys gatech
Mc kenneys gatech
 
Kevin burke apc
Kevin burke apcKevin burke apc
Kevin burke apc
 
Ga techsusthpc patterson
Ga techsusthpc pattersonGa techsusthpc patterson
Ga techsusthpc patterson
 
E3 s binghamton
E3 s binghamtonE3 s binghamton
E3 s binghamton
 
Pmg tag bpm_presentation
Pmg tag bpm_presentationPmg tag bpm_presentation
Pmg tag bpm_presentation
 
The Tipping Point by Software AG
The Tipping Point by Software AGThe Tipping Point by Software AG
The Tipping Point by Software AG
 
Tag Young Professionals - Merrill Lynch Presentation
Tag Young Professionals - Merrill Lynch PresentationTag Young Professionals - Merrill Lynch Presentation
Tag Young Professionals - Merrill Lynch Presentation
 
Becker businessgamesv6
Becker businessgamesv6Becker businessgamesv6
Becker businessgamesv6
 

Dernier

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Dernier (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Accelerating breakthrough business technologies in atlanta, tag featured speaker series, 2014 05-06

  • 2. Making predictions is very hard, especially about the future. Yogi Berra
  • 3. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved The Queen Elizabeth
  • 4. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Boeing 707
  • 5. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved The First Four Waves of Business Technology Mainframe 70s Internet 2000s PC 80s Client/Server 90s
  • 6. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Each Wave of Business Technology • Requires deployment of a critical mass of its predecessor wave to achieve rapid growth and broad acceptance. • Introduces new: – Concepts – Terminology – Opportunities – Concerns • Has an exponentially greater impact on business and society than its predecessor.
  • 7. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Bandwidth Cost
  • 8. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Computing Cost
  • 9. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Storage Cost World's First 4 TB 2.5-inch SSD
  • 10. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Mobile phones vs. toothbrushes • There are 7 billion people in the world. • 4 billion use mobile phones. • Just 3.5 billion own toothbrushes.
  • 12.
  • 13. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Marketing Technology Stack
  • 15. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved How does CMS Anywhere work? 1. Visitor requests a page from an affiliate server. 2. Page with CMS Anywhere tag script is returned to the browser. 3. Tag script requests the beacon script from the CMS Anywhere server. 4. The affiliate hit is registered in Sitecore Analytics. 5. The beacon script is formed and delivered to the browser. 6. The beacon script fires stylers and replacers in the page. 7. The beacon script fires pixels to report additional information to the CMS Anywhere server. Lorem ipsum dolor sit amet Vestibulum ultricies viverra viverra. Proin laoreet velit in erat sollicitudin iaculis. Ut et vehicula leo. Curabitur non dolor elit. Morbi ac ante volutpat ante sollicitudin posuere. Sed ut nibh ut felis hendrerit vulputate at vel tortor. Suspendisse dui nibh, rutrum nec tempus vestibulum, tristique eget mauris. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut at mollis eros. Suspendisse potenti. Duis ornare ornare tincidunt. Donec pellentesque aliquet urna in facilisis. In hac habitasse platea dictumst. Proin tempor ultricies velit, sit amet aliquam nunc aliquet eget. <TAG> Lorem ipsum dolor sit amet Donec dapibus accumsan pellentesque. Proin ullamcorper egestas ultricies. Nam ac nulla lacus. Ut lorem tortor, dictum eu massa eget, aliquet ultrices lectus. Nam ac dui gravida, dictum nulla et, convallis nisl. Cras fermentum feugiat diam, quis gravida eros elementum eget. Ut gravida magna nunc, id semper libero condimentum sit amet. Pellentesque laoreet dictum nulla vel tempor Werwerg Werg Werrwer Wrht Rwehjt Wthjwtjrjeyrjjyrj Etyj Etyjeytjetyyjejye Teyjtyje Eyjyytjyjyukyukyujhghfdjihjdifhnojnoirhjneroijrnoejiojrhoirjejoihjeriojhoierj hoihjojoe Jeigheoihgieurhgherhjgoeingioejnoiejrnoe Gijhijhiuohoiwhfjiojeoigjoiwerguj Ssdg Affiliate Server CMS Anywhere Server <BEACON>
  • 16. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Before CMS Anywhere
  • 17. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved After CMS Anywhere
  • 18. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved More Than Just Page Styling
  • 21. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Heartbleed
  • 22. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved How the Heartbleed Bug Works
  • 23. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved How the Heartbleed Bug Works
  • 24. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved How the Heartbleed Bug Works
  • 25. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved How the Heartbleed Bug Works
  • 26. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved How the Heartbleed Bug Works
  • 27. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved How the Heartbleed Bug Works
  • 28. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved • $194 – Average Cost Per Record Per Breach in the USA. Interesting Security Facts • 28,765 – Average US Breach Exposed Records – Excludes “Mega Breaches” (>100k) • $5,403,644 – Average Total Organizational Cost of Data Breach in the USA. • 461 – Average Number of Days Between Breach and Discovery Source: Ponemon Institute, 2013 Cost of Data Breach Study
  • 29. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Castle and Moat Security
  • 30. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved True End-End Encryption • Browser-Based • Platform / File Size / File Type Agnostic • Client-Side Encryption/Decryption • Encrypted Data – At Rest AND In Transmission • Zero Knowledge • Provenance Attestation & Irrefutable Time Stamp • Full Audit Trail, “Chain of Custody”
  • 31. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Current SafelyLocked Products: – Truly Secure Managed File Transfer (SMFT) – End/End Encryption – Complete & Certifiable Audit Trail – “Ad Hoc” and Registered User Sending Options – Truly Secure Folder/File Sharing – End/End Encryption – Complete & Certifiable Audit Trail – Multiple Upload/Download/Collaboration Options – Combines SafelySendIt & SafelyShareIt into Unified UI with all the features of both plus
  • 33. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved The Internet of Things
  • 34. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Exponential Growth
  • 35. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved The Smart Wine Shelf
  • 36. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved The Smart Wine Shelf
  • 37. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved The Smart Wine Shelf
  • 38. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved What is Augmented Reality?
  • 40. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Marketing Applications
  • 41. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Technician Support
  • 42. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Component Identification
  • 44. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Internet of Transportation “Things”
  • 45. Road Traffic Video Analytics
  • 46. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Traffic & Safety Concerns 46 Wasted Time & Energy: In urban areas, over 30% of drive-time (and fuel) is consumed in stalled traffic! Crowded Space: an assortment of undifferentiated app’s & devices aim to alert & divert drivers & routes Poor Data: all current “app’s & devices” rely upon spotty and/or otherwise inaccurate, in short, too-little data Expensive Upgrades: real-time big traffic data has entailed large investments in new/better sensing devices
  • 47. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved MetroTech Solution 47 Video Analytics: converts existing video cameras into multi-dimensional traffic sensors running in the cloud. Traffic Analytics: aggregates & analyzes traffic data and broadcasts to open APIs on AT&T-managed networks Predictive Analytics: “searches the future”— e.g., for emerging congestion, planning, zoning, etc Big Traffic Data: High Definition (HD) real-time, cloud- based information aggregation & publishing
  • 48. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved The IntelliSection™ Optional Wireless Video Camera
  • 49. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Metro-wide Real-time Info • Vehicle Integration • Mobile Application • Traffic Data Analytics 49
  • 50. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Video Analytics in Buckhead
  • 51. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Peachtree and Piedmont: 4-Way
  • 52. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved P’tree and Piedmont: Close-Up
  • 53. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved End-User Devices Video Analytics In the Cloud 53 Existingand/orNew DOT&PublicSafety VideoFeeds Legacy Investments Cloud Computing Traffic Information Service Optical Fiber MAN and/or FTE Wireless New Value HD Traffic Data Aggregation HD Big Traffic Data Publishing
  • 54. Road Traffic Video Analytics metrotech-net.com
  • 55. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Internet of Health “Things”
  • 57. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Non-Contact Patient Monitoring
  • 58. SENSIOTEC’S VIRTUAL MEDICAL ASSISTANT® The Future of Remote Patient Monitoring The World’s First FDA- Cleared Truly Non-Contact Vital Signs Monitor Measures Heart and Lung Function, Torso Movement and Bed Exit High Value, Low Cost, Location-Agnostic Patient Care
  • 59. PERSONAL DATA SOLUTION Instantly Relays Real-Time Data Vitals Monitoring: Alerts Caregivers to Abnormal Cardiorespiratory Activity Pressure Ulcer Prevention: Compels Caregivers to Respond to Absence of Movement Fall Prevention: Alerts Caregivers to Imminent Bed Exit User-Centered Design Powerful Patient Management Tools Captures, Records and Delivers Continuous Real-time Data to Nurses’ Stations, Tablets or Smartphones Trends data for predictive management Highlights Abnormalities Alerts audibly and visually WEB SERVER MEANINGFUL DATA SENSOR PANEL DECISION SUPPORT DEPERSONALIZED BIGDATA PHARMA2ns EMR
  • 60. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved In Development If this baby was being monitored by Sensiotec’s technology . . . . . . he would look like this.
  • 62. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved How Do We Pay?
  • 63. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved ACCEPT BITCOIN BitPay
  • 65. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved How the Blockchain Works
  • 66. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved How the Blockchain Works II
  • 67. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Lower Cost THAN CREDIT CARDS Lower Risk NO FRAUD OR CHARGEBACKS Sell Globally BORDERLESS PAYMENTS Why Accept Bitcoin?
  • 68. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved BitPay’s Model • Payment Processor • Contract with Merchant as Merchant’s Agent to receive and settle payments • Tools for E-commerce, Billing, and Retail Customer Merchant Checkout BitPay Payment Gateway Payment Instructions Payment Confirmation
  • 69. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved BitPay Funds Flow Customer Wallet Bitcoin Network BitPay Wallet BitPay Bank F/X Exchange Merchant’s Bank
  • 70. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved BitPay Reduces Risk Guaranteed Exchange Rate Daily Bank Settlement to 33 countries Accounting Import GAAP Reporting
  • 71. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved All-Inclusive Pricing FLAT MONTHLY FEE Plans from$30-$3000/month 0% TRANSACTION FEES
  • 72. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved BIT INC
  • 73. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved ACCEPT BITCOIN https://bitpay.com/
  • 74. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved BUT, Why Just Money?
  • 75. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved BUT, Why Just Money?
  • 76. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved BUT, Why Just Money?
  • 77. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved BUT, Why Just Money?
  • 78. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved BUT, Why Just Money?
  • 79. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Digital Artwork
  • 80. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved The Fifth Wave Mainframe 60s – 70s Intelligent Systems 2010s Internet 2000s PC 80s Client/Server 90s
  • 81.
  • 82. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Autonomous Systems
  • 83. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved The Monitoring and Planning Loop Planning – What should be done? Executing Plans Observations The Real World ActionsUpdated Plans What to Look For What has happened? Instructions Notifications Signals Assessing Changing State of World Data
  • 84. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved AI techniques differ on “how they think” as well as “how they act” 84 THINKING RATIONALLYTHINKING HUMANLY ACTING RATIONALLYACTING HUMANLY PERFORMANCE MEASUREMENT vs. People vs. Ideal (Rationality) Thought Process/ Reasoning Behavior FOCUS Associative Memory Neural Networks Expert/Rule Systems Intelligent Agents Fuzzy Logic Machine Learning ©2012 VELOXITI, Inc. - Used with permission
  • 85. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Intelligent Systems Can Accelerate and Improve Business Decision-making Intelligent Systems Must be processed Generates Continually Processing Learns Machine Learning Associative Memory Provides Input Think, Decide, Act to solve a Business Problem Business Infrastructure Big Data Natural Language Processing©2012-14 VELOXITI, Inc.
  • 86. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Intelligent Agents can be used to improve performance 86 2 IA’s can leverage expert knowledge to the rest of organization – “shifting” performance curve 1 In any organization, best performance – decisions – is by handful of “experts” 3 Further, having IA’s “assist” Experts for data-intensive thinking can improve their performance also ©2012-14 VELOXITI, Inc.
  • 87. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Driverless Car
  • 88. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved ZipCar
  • 90. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Fasten Your Seatbelts
  • 91. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Global Autonomous Supply Chains • Autonomous Processes • Autonomous Enterprises™ • Autonomous Supply Chains
  • 92. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Dynamic Pricing
  • 93. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Business Ecosystems
  • 94. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Complex Adaptive Ecosystem
  • 95. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Self-Configuring Business Ecosystems
  • 96. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Autonomous Taxi
  • 97. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Distributed Autonomous Corporations I • Distributed –no central points of control or failure that can be attacked. • Autonomous – once up to speed; they no longer need (or heed) their creators. • Corporations – They are, and of a right ought to be, free independent entities. • Transparent – their books and business rules are auditable by all. • Confidential – customer information is securely (and incorruptibly) protected.
  • 98. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Distributed Autonomous Corporations II • Trustworthy – because no interaction with them depends on trust. • Fiduciaries – acting solely in their customers’ and shareholders’ interests. • Self-regulating – they obey their own rules like, well, robots. • Incorruptible – no one can exercise seductive or coercive influence over them. • Sovereign – over their digital resources. They don’t need governments to exist.
  • 99. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved 2025
  • 100. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Atlanta Technology Companies of the Future www.arke.com www.safelylocked.com/ www.merlinar.com metrotech-net.com https://bitpay.com/ http://sensiotec.com www.veloxiti.com
  • 101. © 2014, Confidential and Proprietary Information of Breakthrough Business Technologies, LLC, All Rights Reserved Follow Up • Jack Shaw, President Breakthrough Business Technologies • M: 770-910-5969 • Jack@e-com.com • www.e-com.com • www.gplus.to/JackShaw • www.Twitter.com/JackShaw • www.YouTube.com/user/JackShaw4728 • www.facebook.com/JackShawTechnology • www.LinkedIn.com/in/JackShawTechnology • www.BusinessTechnologyFuturist.WordPress.com