Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Means to Achieve a Nimble and Agile Government

Means to Achieve a Nimble and Agile Government

More Decks by Texas Natural Resources Information System

Other Decks in Technology

Transcript

  1. Lean development/the long tail •  Lean development •  Plug it

    in and duck •  Build, deploy, break, build better… •  Rapid cycles •  Pivot as needed •  The long tail of the Internet •  90% of all traffic happens in just 10% of the sites •  The other 90% is where it gets interesting
  2. Internet protocol (IP) level granularity We have developed a default

    protocol for communication. It is the IP packets we use to exchange data between things and across the Internet. Every packet carries its origin, its content, and its destination. It is now perfectly acceptable to reset your VCR from your phone and to receive maintenance emails from your car. …..IFTT “…if I am at my house, turn on my cell WiFi, if I am in my car, turn on my blue tooth…when I leave work, email my wife ‘leaving work’…”
  3. Commercial-off-the-shelf (COTS) The power and the wonder of technology is

    now available everywhere and it is low in cost. Popular mechanics and Popular science begat Heathkit, which begat Apple and Osborne, which begat Microsoft…….which begat DIY and Arduino, which begat Adafruit and Sparkfun, which begat Hackaday…. Etc.
  4. Nonproprietary = public/published standards •  Public standards means anyone can

    contribute, develop, and participate in the technology process. •  The flattened world means they can do so from anywhere on the planet. •  It also mean we can see the “guts” of the software and the hardware, and that means we can maintain it. L2ICNOFT2 N O N PR O PR IETAR Y $ STRONG A flat world means a customer service representative in India will take your next call, and they will do so for 1/10th the cost.
  5. Open source •  Approximately 450+ million lines of code (Slashdot

    2013) now estimated to be over 700+ million •  The backbone of the Internet (LAMP) •  Subject to constant vetting, validation, and updating •  Now available in 3D at Office Depot, Lowes, Frys, Radio Shack, etc.
  6. Fungible •  Build once, use, and reuse many times • 

    Every reuse divides the original cost and dilutes the investment •  Dedicated; built for one purpose hardware or software is the most expensive thing you can buy – and vendors like it that way
  7. Thin clients/True believers •  Thin clients •  With the workload

    being done in the cloud, thinner clients become more possible and available •  Watches, phone, cars, thermostats, etc. all become thin clients •  True believers •  Autonomy •  Mastery •  Purpose http://www.ted.com/talks/dan_pink_on_motivation?language=en
  8. EDS – detection Triggered by heat or motion a camera

    captures an image. The image is transmitted by cell phone and the Internet to a server and then to watchers in multiple locations on multiple devices.
  9. EDS – qualification On the basis of what they see,

    one of the watchers ignores or flags the image. Any of the watchers can flag or ignore an image and their actions are displayed for all the other watchers.
  10. EDS – notification Flagging an image presents a notification on

    the website for all the other watchers and sends an email with an image to the recipients associated with the camera.
  11. EDS – human in the loop A phone list is

    also presented and the watcher who flagged the image calls until they contact one or more individuals associated with the camera.
  12. Features of a typical camera Cell  phone   service  SIM

      card Cell  phone  module Camera  module External  cell  phone  antenna Passive  infrared  receiver  (PIR) Camera  lens SD  (secure  digital)  memory  card Batteries Indicator  light Day/night  detector Infrared  flash  (940  nm)
  13. •  Detection •  Heat •  Motion •  Qualification •  Flag

    •  Ignore •  Snooze •  Notification •  Email/s •  Human in the loop •  Phone call •  Guidance •  Map •  Ownership of trails •  Known traffic •  Gamification •  Intermittent reinforcement •  50:1 odds ~ about the same as Vegas Operational model
  14. •  Detection •  Heat •  Motion •  Qualification •  Flag

    •  Ignore •  Snooze •  Notification •  Email/s •  Human in the loop •  Phone call •  Guidance •  Map •  Ownership of trails •  Known traffic •  Gamification •  Intermittent reinforcement •  50:1 odds ~ about the same as Vegas Operational model
  15. •  Detection •  Heat •  Motion •  Qualification •  Flag

    •  Ignore •  Snooze •  Notification •  Email/s •  Human in the loop •  Phone call •  Guidance •  Map •  Ownership of trails •  Known traffic •  Gamification •  Intermittent reinforcement •  50:1 odds ~ about the same as Vegas Operational model
  16. Drawbridge – 2015/04/27 •  Deployed the length of the Texas/Mexico

    border 1,252 miles (2,015 kilometers), •  Funded by Texas Department of Public Safety •  Monitored by Texas Department of Public Safety /Texas Military Forces/National Guard/US Customs and Border Protection, with cameras maintained by US Customs and Border Protection •  Over 1,400 cameras deployed •  Over 57,000 apprehensions with over 125,000 detections (46% apprehension rate) •  Over 232,000 pounds (51,000 kilos) of contraband seized •  Approximately $1 per day per camera.
  17. Event driven surveillance (EDS) •  Strengths •  Does not require

    dedicated monitoring •  The sensor defines when to pay attention •  Low cost (in this application – COTS) •  Portable (in this application – Fungible) •  Objective data (date/time, location, results) with images •  Weaknesses •  Not real time video (still image in this application/can be video) •  Cell phone connectivity (existing COTS infrastructure) •  Battery power (can be solar) •  Opportunities •  Video analytics •  Moore’s law •  Mesh architecture •  Threats •  Migration of cellular structure to G3 and beyond •  Innovation on the part of smugglers
  18. Above all - images matter I can speak of 240

    lbs. of drugs being intercepted, but being able to show you the drugs as they enter Texas changes everything. Detection and interdiction resources respond to images.
  19. FLOOD WATCH – A PIVOTED DRAWBRIDGE Doing event-driven surveillance in

    harsh environments with limited connectivity and power
  20. Applied to flood monitoring/notification •  Vast area (39,900 square miles)

    •  Limited connectivity •  Limited power •  Need for immediate detection •  Need for accurate qualification •  Sensor designed for harsh environment •  Commercial, off-the-shelf •  Low in cost •  Leveraging the power of images – “What does 1 foot of water mean?” vs. “Holy cow look at that water!” …sound familiar?
  21. DRAWBRIDGE + (AKA “SON OF DRAWBRIDGE”) A cell phone app

    for feeding images and meta-data to Drawbridge with a “match to nearest deployed camera” response-asset allocation-protocol.
  22. Image/data capture •  A registered and vetted user with the

    “Drawbridge +” system takes a picture of what they believe to be smuggling traffic at their location. •  The app captures the image, the date/time, the phone number of the smartphone, the compass heading, and the lat/long of the location. •  The app then saves the image locally, and transmits the image and meta-data of the image to Drawbridge. 2014/12/21 14:04 5128189971 183 deg S Lat 27.431008 Long -98.00681
  23. Matching locations The server matches the location from the meta-data

    in the Drawbridge + image to known existing Drawbridge camera locations.
  24. Matching assets With the location matched to existing Drawbridge cameras,

    the server matches the location to the response/ interdiction assets associated with the existing Drawbridge cameras.