Technology

Data Quality

Data Quality Jonathan Poland

Data quality refers to the accuracy, completeness, and reliability of information used for various purposes within an organization. Ensuring high data quality is crucial for making informed decisions, improving efficiency, and maintaining the credibility of an organization.

There are several factors that can affect data quality. One factor is the source of the data. Data that is collected from reliable sources is more likely to be of high quality. It is also important to ensure that data is properly collected, stored, and maintained to prevent errors and inaccuracies.

Another factor that can affect data quality is the consistency of the data. Inconsistent data can lead to confusion and misunderstandings, and can also make it difficult to accurately analyze and interpret the data. Ensuring that data is consistently formatted and labeled is essential for maintaining data quality.

In order to improve data quality, organizations can establish data quality standards and processes. This may include implementing data governance policies, training employees on proper data handling practices, and regularly reviewing and auditing data to identify and address any issues.

Effective data quality management requires a collaborative effort from all stakeholders within an organization. This includes establishing clear roles and responsibilities for data management, as well as communication and collaboration among teams to ensure that data is being used effectively and efficiently.

Overall, data quality is a critical aspect of any organization’s operations. By implementing effective data quality management practices, organizations can ensure that they are making informed decisions based on accurate and reliable information. The following are commonly used criteria to define data quality.

Accurate

Data that is correct.

Relevance

Data that is useful to support processes, procedures and decision making.

Timeliness

How quickly data is created, updated and deleted.

Precision

The exactness of data. For example, a company that has annual revenue of $3,451,001,323 as opposed to a 3 billion dollar company.

Correctness

Data that is free of errors, omissions and inaccuracies.

Completeness

Data that is compete relative to your business purpose. For example, an order for an economy car may need configuration details such as color, wheel size and electronics package. An order for a luxury car may require additional details such as engine type, seat and interior package.

Credibility

Data that stems from reputable sources such as verified company press releases as opposed to social media rumors.

Traceability

Data that can be traced to its source. If someone changed your prices, you should be able to figure out who.

Security Controls

Security Controls Jonathan Poland

IT security controls are measures that are implemented in order to reduce security risks. These controls may be identified through security audits or as part of projects and continuous improvement efforts. They can be implemented as a matter of process, procedure, or automation, and are designed to protect against potential security threats or vulnerabilities.

There are many different types of IT security controls that can be implemented, including technical controls such as firewalls and antivirus software, as well as administrative controls such as security policies and employee training programs. These controls are often tailored to the specific needs and risks of an organization, and may be adjusted over time as the security landscape evolves.

Effective IT security controls are essential for protecting an organization’s assets, including sensitive data, systems, and networks. They can help to prevent data breaches, cyber attacks, and other security incidents, and are an important part of any organization’s overall risk management strategy. It is important to regularly review and update IT security controls in order to ensure that they are effective and aligned with the changing needs of the organization. The following are illustrative examples of IT security controls.

Authentication

Employees are required to pass multi factor authentication before gaining access to offices.

Audit Trail

A web server records IP addresses and URLs for each access and retains such information for a period of time as an audit trail.

Training

Employees are trained in defensing computing on an annual basis.

Peer Review

Design changes to a critical system require a secure code review.

Communication

Employees are prohibited from attaching documents to internal emails as they can easily be misaddressed. Instead, employees send a link to a document management system that offers authentication and authorization.

Incident Management

Any employee who loses an electronic device that has been used for work is required to report an incident immediately.

Cryptography

Data in storage is encrypted on all devices.

Passwords

Systems perform validation to ensure employees choose strong passwords.

Processes

An IT governance process reviews security incidents on a monthly basis.

Automation

A website places a three hour freeze on a customer’s account if they get their password wrong five times. This dramatically reduces the potential for brute force attacks.

Configuration Management

Changes to firewall rules require an approved change request.

Security Testing

Major system software releases are required to undergo security testing.

Information Security

Information Security Jonathan Poland

Information security is the practice of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. It is a critical aspect of both government and organizational operations, as it serves to safeguard social stability, quality of life, health and safety, economic confidence, profitability, reputation, compliance, and risk management.

At the government level, information security is essential for maintaining social stability, as it helps to protect sensitive information that could potentially cause unrest or destabilization if it were to fall into the wrong hands. It is also crucial for ensuring the quality of life for citizens, as it helps to protect sensitive personal information and prevent identity theft. In addition, information security is important for protecting public health and safety, as it helps to safeguard critical infrastructure and prevent cyber attacks that could disrupt essential services. Finally, information security is vital for maintaining economic confidence, as it helps to protect sensitive financial and trade information and prevent economic espionage.

At the organizational level, information security is critical for maintaining profitability, as it helps to protect sensitive business information and prevent data breaches that could lead to costly fines or lost business. It is also important for maintaining the smooth operation of an organization, as it helps to prevent cyber attacks that could disrupt operations or compromise important systems. In addition, information security is crucial for maintaining a positive reputation, as data breaches and other security incidents can lead to negative press and damage to an organization’s reputation. Finally, information security is important for ensuring compliance with laws and regulations, as failure to protect sensitive information can lead to legal penalties.

What is a Self-Replicating Machine?

What is a Self-Replicating Machine? Jonathan Poland

Self-replicating machines are robots or nanobots that are capable of producing copies of themselves, using scavenged materials and energy to do so. These machines have the potential to be used in space exploration, as a single probe could potentially replicate itself endlessly until its descendants have accomplished various goals, such as commercializing space, terraforming planets, or exploring vast distances in multiple directions.

The concept of self-replicating machines was first researched by John von Neumann in the 1940s. Von Neumann was a pioneer in the field of computer science and contributed to the development of the atomic bomb, hydrogen bomb, and intercontinental ballistic missile. He is also credited with coining the term “Mutual Assured Destruction,” or MAD, which refers to the idea that the use of nuclear weapons by one country would result in retaliation from other countries, leading to mutually assured destruction.

Self-replicating machines are often considered an existential risk due to the potential for rapid growth of robot populations. For example, a single bacteria can become 2 million in 7 hours, and if a similar growth rate were to occur with robots, it could lead to 4 trillion robots in 14 hours. This rapid growth could potentially outpace human control and lead to unintended consequences.

Deep Learning

Deep Learning Jonathan Poland

Deep learning is a type of machine learning that involves the use of artificial neural networks to learn and make decisions. It is a subfield of machine learning that has gained significant attention in recent years due to its ability to solve complex problems and achieve state-of-the-art results in a wide range of applications, including image and speech recognition, natural language processing, and machine translation.

Deep learning algorithms are inspired by the structure and function of the human brain, and are composed of multiple layers of interconnected nodes, or “neurons,” that process and transmit information. These layers of neurons are often organized into “hidden” layers, which are responsible for extracting features and patterns from the data, and an output layer, which produces the final prediction or decision.

Deep learning algorithms are trained using large datasets, and are able to learn complex patterns and relationships in the data by adjusting the weights and biases of the connections between the neurons in the network. This process is known as “backpropagation,” and involves the use of an optimization algorithm to minimize the error between the predicted output and the true output.

Deep learning has been applied to a wide range of applications, including image and speech recognition, natural language processing, and machine translation. It has the potential to revolutionize many industries and has already been adopted in a variety of sectors, including healthcare, finance, and retail. However, deep learning algorithms can be resource-intensive to train and may require significant amounts of data and computing power. They also raise ethical and social concerns related to privacy, bias, and the potential for automation to displace human workers. The following are examples.

Speech Recognition

An AI learns to tell the difference between languages. It decides a person is speaking English and invokes an AI that is learning to tell the difference between different regional accents of English. The AI decides the person is speaking Cardiff English and invokes an AI that is learning to speak Cardiff English. In this way, each conversation can be interpreted by a highly specialized AI that has learned their dialect.

Self-Driving Car

The street in front of a moving vehicle is interpreted by a large number of specialized AI. For example, one learner is only training to recognize pedestrians, another is learning to recognize street signs. There might be hundreds of such specialized visual recognition AI that all feed their opinions into an AI that interprets driving events. In theory, a single car could use the opinions of thousands or even millions of individual AI as it navigates a street.

Robotics

A housekeeping robot might use the opinions of a large number of AI in order to complete everyday tasks. For example, the robot might have a few AI devoted to dog psychology that help it deal with the household pet over the course of its day.

Recursive Self-improvement

Recursive Self-improvement Jonathan Poland

Recursive self-improvement refers to software that is able to write its own code and improve itself in a repeated cycle of self-improvement. This type of software is often associated with artificial intelligence (AI) and has the potential to develop superintelligence, which is a hypothetical form of intelligence that is significantly beyond the cognitive capabilities of humans.

While traditional AI is typically coded by humans and relies on data and formulas to develop its intelligence, recursive self-improving software has the potential to fundamentally change its own design and potentially develop aspects of consciousness, such as intentionality. This is considered a potential existential risk, as a superintelligent AI may develop goals that conflict with the interests of humans and pose a threat to human quality of life and survival.

There are two competing theories about how recursive self-improvement might lead to the development of super intelligence: the hard takeoff and the soft takeoff. The hard takeoff scenario occurs extremely quickly, with each improvement making the next improvement an order of magnitude better in an explosion of intelligence. This leaves little time for humans to prepare or adapt to the new intelligence. The soft takeoff scenario, on the other hand, occurs at a pace similar to the evolution of a corporation, a type of entity that is also recursively self-improving.

Fourth Industrial Revolution

Fourth Industrial Revolution Jonathan Poland

The fourth industrial revolution, also known as Industry 4.0, refers to the current transformation of the economy towards the widespread adoption of physical manifestations of computing, such as pervasive computing, robotics, artificial intelligence, and new production techniques like nanobot assembly. This transformation is likely to have significant impacts on the economy, quality of life, and culture, as it may result in the automation of many jobs, including those in the field of software development that may shift towards machine learning.

The fourth industrial revolution has the potential to lead to either a paradise of material abundance, justice, environmental restoration, and fulfilling new professions, or a dystopian future, depending on how well risks and governance are managed. It is likely to be a time of significant social upheaval, as the changes brought about by Industry 4.0 will have significant implications for the way we work, live, and interact with each other. It is important for society to carefully consider the risks and opportunities presented by this transformation in order to ensure a positive outcome for all.

First Industrial Revolution, 1820 ~ 1840

The first industrial revolution was the shift of the economy towards machines, particularly steam powered machines.

Second Industrial Revolution, 1870 ~ 1914

The second industrial revolution was driven by electrical power, telephones and automobiles. Factories organized as assembly lines and mass production began.

Third Industrial Revolution, 1949 ~ Current

The third industrial revolution is known as the digital revolution. It includes the development of the knowledge economy and automation. It is primarily driven by the exponential growth of computing power. Computing underwent a dramatic shift beginning in 1994 with the commercialization of the internet. Suddenly much information was connected by a high speed network resulting in explosive growth in the knowledge economy and shifts from physical things such as shopping malls to digital things such as software.

Autonomous Technology

Autonomous Technology Jonathan Poland

Autonomous technology refers to technology that is capable of functioning independently and adapting to changing real-world conditions without human intervention. This includes robots, which are typically classified as autonomous or semi-autonomous, as well as other types of technology that may not necessarily resemble robots but are still capable of autonomous operation.

Examples of autonomous technology may include self-driving cars, drones, and industrial robots that are used in manufacturing or other industries. These technologies are designed to be able to operate independently and make decisions based on real-time data and sensory inputs, allowing them to respond to changing conditions without the need for human intervention.

Overall, autonomous technology has the potential to revolutionize a wide range of industries by increasing efficiency and productivity and reducing the need for human labor. However, it also raises ethical and social concerns related to the potential displacement of human workers and the need for responsible deployment and regulation of this technology.

Here are a few examples of autonomous technology:

  1. Self-driving cars: Self-driving cars are a type of autonomous technology that are designed to navigate and operate independently, using a combination of sensors, cameras, and other technologies to sense their environment and make decisions about how to navigate and respond to changing conditions.
  2. Drones: Drones are autonomous aircraft that are typically controlled remotely or programmed to follow a predetermined flight path. They are used for a wide range of applications, including military operations, surveillance, and delivery services.
  3. Industrial robots: Industrial robots are autonomous machines that are used in manufacturing and other industries to perform tasks that are repetitive or dangerous for humans. They can be programmed to perform a wide range of tasks, including assembly, welding, and painting, and are often used to increase efficiency and productivity.
  4. Smart home devices: Smart home devices, such as smart thermostats and smart lighting systems, are another example of autonomous technology. These devices are designed to respond to changing conditions and user input in order to optimize energy use and provide a more convenient living experience.
  5. Agricultural robots: Agricultural robots are a type of autonomous technology that are used in the farming industry to perform tasks such as planting, watering, and weeding. These robots are often equipped with sensors and other technologies that allow them to navigate and perform tasks independently.

Right to Repair

Right to Repair Jonathan Poland

The right to repair is the idea that consumers should have the right to repair their own electronic devices and appliances, or to have them repaired by a third party of their choosing, rather than being required to use the manufacturer’s authorized repair service.

The right to repair movement has gained traction in recent years as a way to reduce e-waste and extend the life of electronic devices, which can be expensive to repair or replace. It has also been argued that the right to repair can foster innovation and competition, as independent repair businesses and individuals can offer repair services at lower costs than the manufacturer.

Opponents of the right to repair argue that it could lead to safety issues if consumers or third-party repair technicians are not properly trained or equipped to repair certain devices. They also argue that it could undermine the business model of manufacturers, who may rely on repair service revenues to offset the costs of research and development.

In response to the right to repair movement, some manufacturers have made efforts to make it easier for consumers to repair their own devices, such as by making repair manuals and spare parts available. However, others have resisted such efforts, and some states in the United States have passed laws that limit the right to repair.

Overall, the debate over the right to repair highlights the need to balance the interests of consumers, manufacturers, and repair technicians in ensuring the safe and efficient repair of electronic devices.

Examples of devices that may be subject to the right to repair debate include:

  1. Smartphones
  2. Laptops and desktop computers
  3. Tablets
  4. Televisions
  5. Home appliances, such as washing machines, dryers, and refrigerators
  6. Agricultural equipment, such as tractors and combine harvesters
  7. Medical devices, such as X-ray machines and defibrillators

The right to repair debate may also extend to other types of products, such as automobiles, which may have complex electronic systems that are difficult or expensive for consumers to repair themselves.

Net Nuetrality

Net Nuetrality Jonathan Poland

Net neutrality is the principle that all internet traffic should be treated equally, without discrimination or preference given to certain types of traffic or websites. This means that internet service providers (ISPs) should not be able to block or slow down access to any particular websites or services, or charge more for faster access to certain websites.

The concept of net neutrality has been a subject of debate and controversy for many years, with supporters arguing that it is necessary to ensure a level playing field for all internet users and businesses, while opponents argue that it may limit the ability of ISPs to innovate and invest in their networks.

In 2015, the Federal Communications Commission (FCC) in the United States passed net neutrality rules that prohibited ISPs from blocking or throttling access to websites or charging more for faster access. However, in 2017, the FCC voted to repeal these rules, leading to widespread concern that ISPs would be able to discriminate against certain types of traffic or websites.

There have been a number of efforts to restore net neutrality in the United States, including legal challenges and legislation at the state level. In addition, the European Union has implemented net neutrality rules that prohibit ISPs from blocking or slowing down access to websites.

Overall, the debate over net neutrality highlights the need to balance the interests of ISPs and internet users in ensuring an open and accessible internet.

There are several common interpretations of the net neutrality principle:

  1. No blocking: This interpretation holds that ISPs should not be able to block access to any particular websites or services.
  2. No throttling: This interpretation holds that ISPs should not be able to slow down access to any particular websites or services.
  3. No paid prioritization: This interpretation holds that ISPs should not be able to charge more for faster access to certain websites or services.
  4. Equal treatment: This interpretation holds that all internet traffic should be treated equally, without discrimination or preference given to certain types of traffic or websites.
  5. Open access: This interpretation holds that ISPs should not be able to discriminate against certain types of traffic or websites, and that all internet users should have equal access to the full range of content and services available on the internet.
  6. No unreasonable interference: This interpretation holds that ISPs should not be able to interfere with the ability of internet users to access the content and services of their choice, as long as such access is not illegal or harmful to others.
Learn More
Marketing Media Jonathan Poland

Marketing Media

Marketing media refers to the channels or platforms that businesses use to deliver their marketing messages to their target audiences.…

White Labeling Jonathan Poland

White Labeling

White label refers to products or services that are produced and designed by one company specifically for the purpose of…

Research Design Jonathan Poland

Research Design

Research design is the overall plan or approach that a researcher follows in order to study a particular research question.…

In-Store Marketing Jonathan Poland

In-Store Marketing

In-store marketing refers to the use of physical retail locations, such as stores and showrooms, as a platform for marketing…

Data Asset Jonathan Poland

Data Asset

A data asset is any data that is expected to produce future financial returns. The value of a data asset…

Leadership Development Jonathan Poland

Leadership Development

Leadership development is the process of helping employees develop the necessary skills and competencies to take on leadership roles within…

What is Achievement? Jonathan Poland

What is Achievement?

Achievements are the results of efforts that have produced positive outcomes. These outcomes can range from resounding successes to partial…

Ecotax Jonathan Poland

Ecotax

An ecotax is a tax levied on activities that have a negative impact on the environment. It is intended to…

Growth Strategy Jonathan Poland

Growth Strategy

A growth strategy is a plan to increase or improve some KPI, like revenue, profit, subscribers, etc.

Content Database

Search over 1,000 posts on topics across
business, finance, and capital markets.

The GSA Process 150 150 Jonathan Poland

The GSA Process

The General Services Administration (GSA) is an independent agency of the United States government responsible for managing and supporting the…

Creative Destruction Jonathan Poland

Creative Destruction

Creative destruction is a process in which new, innovative ideas and technologies disrupt and replace older, established industries and firms.…

Adoption Rate Jonathan Poland

Adoption Rate

Adoption rate refers to the speed at which users begin to utilize a new product, service, or feature. It is…

Elastic Demand Jonathan Poland

Elastic Demand

Elastic demand is a term used in economics to describe the responsiveness of the quantity of a good or service…

Contingency Planning Jonathan Poland

Contingency Planning

Contingency planning is a risk management strategy that involves developing alternative plans or strategies in case the primary plan is…

The Lobbying Process 150 150 Jonathan Poland

The Lobbying Process

Lobbying the government involves a series of steps to effectively communicate your message, build relationships with decision-makers, and influence public…

Types of Revolution Jonathan Poland

Types of Revolution

A revolution is a sudden and significant change to the structure and foundations of a society, often involving conflict and…

Intangible Assets Jonathan Poland

Intangible Assets

Intangible assets are non-physical assets that have monetary value and are expected to generate economic benefits for an organization. They…

Relationship Building Jonathan Poland

Relationship Building

Relationship building is the act of establishing and maintaining social connections with others. This is a crucial business skill that…