• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Tim Cooke
  • Campbell Ritchie
  • Ron McLeod
  • Junilu Lacar
  • Liutauras Vilda
Sheriffs:
  • Paul Clapham
  • Jeanne Boyarsky
  • Henry Wong
Saloon Keepers:
  • Tim Moores
  • Tim Holloway
  • Stephan van Hulst
  • Piet Souris
  • Carey Brown
Bartenders:
  • Jesse Duncan
  • Frits Walraven
  • Mikalai Zaikin

A day at work in the year 2013

 
Ranch Hand
Posts: 167
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
It's 7:00 am. Gregor Samson, a recently hired project director in the office of the CIO at 8X Corp., parks his car in the company garage and heads for his office. An embedded sensor in the car confirms that Gregor has arrived and is parked in his assigned spot.
The door to reach the lobby opens automatically as Gregor's RFID (Radio Frequency Identification) tag and facial patterns are recognized. He heads for the coffee station to rev up for the day. The coffee maker knows his preferences from his RFID and starts cranking out a double latte with lowfat milk. The economy is tough, so the company is charging a nominal fee for beverages. The coffee machine wirelessly communicates the charge to Gregor's account. It's not so bad--every 10th beverage is free.
As Gregor walks down the hallway, he scans his PDA, which is fitted on his left wrist, for the latest messages and sports scores. Sensors in his eyeglasses allow him to scroll without touching the device. The San Francisco Giants are in first place, and Tiger Woods shot an 86 in the first round of the Masters tournament. Whoopi Goldstein is atop the leader board with a 68.
8X has deployed three-factor security. As Gregor passes by the facial and iris scanners to confirm his identity, the door to his office opens on voice command. His presence is communicated throughout the network, as prescribed by the company's security policies, and his synchronization state is rated at 100 percent. His hardware and software systems configurations are checked for vulnerabilities.
Gregor's modest office is dominated by two large, wall-mounted displays. The left display recognizes Gregor and brings up his portal showing the latest business intelligence, task lists, and calendar for the day. At 7:30 am he clicks into a video conference with his team, scattered around the globe, to get a status report on his most important project--installing a new information retrieval system, called Gogol, to deal with the multi-exabyte database of user profiles.
Meanwhile, in 8X's underground CSI (Corporate Support Infrastructure) facility, Jules Borges has been ensconced in his seat in front of the large displays for several hours. Jules is the director of 8X's CIS department, which is charged with protecting the company's digital assets.
Modeled after research from the Defense Advanced Research Projects Agency (DARPA), 8X employs a system with sensors embedded in every device, piece of furniture and wall. A network of miniature, pin-sized cameras scan the campus, and each employee or visitor is outfitted with an intelligent RFID that communicates with the campus environment and the central hub.
In fact, 8X is the leading company offering tracking and profiling systems. The company's latest customer project is outfitting theatre seats with sensors to gauge the reaction of viewers to various forms of entertainment and marketing. 8X's own corporate offices have more than a 100,000 sensors tracking various activities and modifying the behavior of systems. For example, employee PDAs provide navigation through the maze of corridors at 8X, and present data about other employees when they come within range.
The sensors at 8X are designed to provide convenience and security, performing functions such as allowing access privileges and tracking capital equipment. The sensors also track the location of each employee and visitor, recording various behaviors, and looking for patterns that could signal a breach in security or sub-optimized productivity.
On this day, at 8:30 am, Gregor Samson will receive his first "referral," an auto-generated, monthly employee report from the CSI. The report informs him that in the last 30 days he has spent 6 percent of his time browsing non-authorized Web locations, 23 percent in video conferences, 1.33 percent in the 4th floor lavatory, and 6 percent at the nearby Starbucks coincident with another 8x employee. He is also made aware that he is over budget in his application usage, which is metered by the minute.
In addition, Gregor is reminded that the corporate spamination system has groomed 42.3 GB of spam from his inbox but that 23 messages are still in an auto-deletion holding pattern pending his review. He also broke security policy by taking 11 classified documents, each with its own unique object tag, from his office to his home. All of this information is communicated to Gregor's manager.
Needless to say, Gregor is not pleased.
 
She'll be back. I'm just gonna wait here. With this tiny ad:
Free, earth friendly heat - from the CodeRanch trailboss
https://www.kickstarter.com/projects/paulwheaton/free-heat
reply
    Bookmark Topic Watch Topic
  • New Topic