Welcome!

Cognitive Computing Authors: Pat Romanski, Carmen Gonzalez, Elizabeth White, Yeshim Deniz, Kevin Jackson

Related Topics: Containers Expo Blog, Java IoT, Microservices Expo, Cognitive Computing , Agile Computing, Cloud Security

Containers Expo Blog: Blog Feed Post

How Many Degrees Separate You and Your Information?

Degrees of separation refer to how you are connected to other people

In case you are not familiar, degrees of separation refer to how you are connected to other people.

When you know somebody directly then you are a first connection, and you are a second degree of separation from people that they are directly connected to. The theory goes that via a mix of the number of people you are directly connected to, as well as how well they are connected to others, that you are only so many degrees of connection separation from many (if not millions of people) and if you go out seven degrees, that could be billions.

If you are familiar with or use Linked In and are directly connected to somebody like myself, which is a first degree. For example in the following image, person A is a first or 1 degree connection to person B, person B is a direct or first degree connection to person C who in turn is a direct connection to person D. Person A is 2 degree from person C and three degree from person D.

Image degrees of seperation

The reason I bring this up is not to say or play games around who is connected to whom, or compare contacts or the number of them, rather to use the idea of degrees of separation in the context of where and how you get your information. For example, you may get your information, insight or experience directly from what you do. On the other hand, you may get information or knowledge directly from the source or person involved with it, which would be 1 degree of separation.

Image degrees of seperation

You could also get the information from somebody else such as a friend, coworker, blogger, analyst, consultant, media journalist, reporter, vendor, VAR or other person who got it directly from the source, which would be 2 degrees of separation. Another example would be you get your information from somebody who cites a report, study, survey or some research that came from another source that involved another party who collected and analyzed the data.

At each point, there is the potential for the information to be changed, adjusted, reinterpreted, misunderstood, or simply adapted to meet particularly needs. What if person A gets their information from person B who in turn got their information from source C, and that comes from person D who got it directly from person E? Assuming that the information was collected and passed along as is, person A should get what was given from person E to person D. However, along the way, various interpretations, more material and views can be applied resulting in a different message.

Image degrees of seperation and information transformation

There is also another variation, which are your spheres of influence or circles of contacts. For example I get to talk with lots of IT pros around the world live in person, virtually and via different venues, those would be direct or no separation. When I hear from a vendor or PR or some pundit telling me what they heard direct, that's 1 degree however if they heard it from their marketing who heard it from a sales rep or other source then it's at least two.

image of ssd technology evolution

Another example of degrees of separation is where you are in relation to technology timelines, evolution, revolution, industry adoption vs. customer deployment. For example, if you are a researcher or development engineer, you are further along on a technology evolution curve than others are. Somebody then takes the researchers work and productize it including making it manufacture able on a cost-effective basis. Along the lines there is also the different degrees of separation between the researcher, initial publicity of a technology breakthrough, general industry adoption and later customer deploy and subsequent success stories. For example, to a research something that they did many years along with those who follow at that point may view what is emerging for real customer deploy as old and yesterday's news.

StorageIO industry trends cloud, virtualization and big data

On the other hand, for customers getting ready to deploy a new technology, product or service, some breaking research may be interesting to hear about, however it may be out several years at best from customer actual use. Also on that theme, the customer of a component can be a manufacturer that in turn test, qualifies and sells a finished solution to their customers. Thus, there are different degrees of separation between industry adoption (e.g. talking about and awareness) and customer deployment (actually buying and using on a mainstream basis) in the technology supply chain.

image of you and your big data and little data and cloud

Yet another degree of separation is between you and your information or data. Some of that data is very close in your own memory (e.g. brain), perhaps others written on note pads (physical or digital) with a copy local or remote including at the cloud. Depending on how your data and information are backed up or protected, there can be added degrees of separation between you and your information.

image of data protection from cloud and virtual data storage networking

Thus, there are different degrees of separation between you and your various forms of information.

Your ability to learn and share information, meet and interact with various people from across different sections of environments is bound by what you are willing to engage via various mediums including social media involvement.

StorageIO industry trends cloud, virtualization and big data

If you are comfortable with where you are at, or what you know, then stay in your comfort zone, or sphere of influence, otherwise, take a chance, venture out, learn what you do not know, meet who you do not know, interact and see new things, or have some dejavu and share what you have seen or experienced before.

After all, knowledge not shared with others is useless if kept only to you. Of course, for NDA material, what is not generally known about, or understood is not discussed and let us leave sleeping dogs lay where they rest. ;)

How good or reliable is your information or G2 that you might be using for forming opinions or making informed decisions around?

Feel free to expand your network getting closer by a degree or two, if not directly too different sources. You can connect with me via Twitter (@storageio), Goggle+, Linked In and Facebook among other means here. Likewise, check out the StorageIO events calendar here for upcoming virtual and live activities. These activities include seminars, web casts, video chats along with in person events while out and about in North America as well as Europe.

Ok, nuff said.

Cheers Gs

Greg Schulz - Author Cloud and Virtual Data Storage Networking (CRC Press, 2011), The Green and Virtual Data Center (CRC Press, 2009), and Resilient Storage Networks (Elsevier, 2004)

twitter @storageio

All Comments, (C) and (TM) belong to their owners/posters, Other content (C) Copyright 2006-2012 StorageIO All Rights Reserved

Read the original blog entry...

More Stories By Greg Schulz

Greg Schulz is founder of the Server and StorageIO (StorageIO) Group, an IT industry analyst and consultancy firm. Greg has worked with various server operating systems along with storage and networking software tools, hardware and services. Greg has worked as a programmer, systems administrator, disaster recovery consultant, and storage and capacity planner for various IT organizations. He has worked for various vendors before joining an industry analyst firm and later forming StorageIO.

In addition to his analyst and consulting research duties, Schulz has published over a thousand articles, tips, reports and white papers and is a sought after popular speaker at events around the world. Greg is also author of the books Resilient Storage Network (Elsevier) and The Green and Virtual Data Center (CRC). His blog is at www.storageioblog.com and he can also be found on twitter @storageio.

@ThingsExpo Stories
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Have you ever noticed how some IT people seem to lead successful, rewarding, and satisfying lives and careers, while others struggle? IT author and speaker Don Crawley uncovered the five principles that successful IT people use to build satisfying lives and careers and he shares them in this fast-paced, thought-provoking webinar. You'll learn the importance of striking a balance with technical skills and people skills, challenge your pre-existing ideas about IT customer service, and gain new in...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, I provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading the...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets. By creating abundant, high-quality editorial content across more than 140 highly targeted technology-specific websites, TechTarget attracts and nurtures communities of technology buyers researching their companies' information technology needs. By understanding these buyers' content consumption behaviors, TechTarget creates the purchase inte...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business. Though, IoT is far more complex than most firms expected with a majority of IoT projects having failed. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, Chief IoTologist at Wipro, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology portfolios and business models to adopt and leverage IoT. He will delve in...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.