SlidePub
Home
Categories
Login
Register
Home
General
Megatrends Global Safety and Security overview
Megatrends Global Safety and Security overview
tochetan
9 views
12 slides
Aug 06, 2024
Slide
1
of 12
Previous
Next
1
2
3
4
5
6
7
8
9
10
11
12
About This Presentation
Mega trends and how they aged
Size:
276.48 KB
Language:
en
Added:
Aug 06, 2024
Slides:
12 pages
Slide Content
Slide 1
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
Global Safety & Security Global Safety & Security
Solutions (GS3)Solutions (GS3)
03/21/02
MegatrendMegatrend
OverviewOverview
Slide 2
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 2
What’s A Megatrend?What’s A Megatrend?
•A direction or sequence of events with momentum and
durability that is slow to establish but, when adopted by the
Market, stay with us for a longtime (7 or more years)
•It requires multiple key drivers (demographics, natural
resources and environment, science and technology,
national and international governance, future conflict,
global economy and globalization).
•It requires at least one sustainable source of financing
(budget surplus, grant, general appropriation)
•It must support many Users who are moving in the same
direction; the more repeatable, the more attractive.
Slide 3
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 3
Sociological DriversSociological Drivers
•Expectation of traveling anywhere, at anytime safely.
•Expectation that the ‘Government’ will protect the Public and
their property wherever they go.
•Increasing dependence on electronic communications,
information services and e-commerce.
•Belief that local Police and Fire protection is equipped for
any and all emergencies
•Global spread of terrorist violence directed at the Civilians
not the Military.
•Growing Public concern about theft of identity and finances
through use of electronic communications, information
services and e-commerce.
•Growing Public concern about the loss of privacy and
convenience vs. personal safety.
Slide 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 4
Political/Legislative DriversPolitical/Legislative Drivers
•Federal declares War on Terrorism and deploys troops
•Federal & State Offices of Homeland Security put in place
•Federal begins to provide access control and security patrols
at Hi-Vi Public venues and airports
•Federal acknowledges fragility of U.S. borders to passage by
International terrorists, drug dealers and illegal immigration.
•Federal acknowledges terrorist attacks forced 1st Responders
into the role of ‘Front-line Homeland Military’ without adequate
support.
•Federal acknowledges need for improved Info-sharing and
communications interoperability between agencies
•Federal acknowledges national dependence on electronic
communications and Information networks and the lack of
adequate security and disaster recovery plans for them.
Slide 5
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 5
Technology DriversTechnology Drivers
•Explosive Global growth of:
–Wireless Voice/Messaging as a replacement for Wireline
phone and Wireless paging services
–Access to the Internet for information dissemination, e-mail,
e-commerce, entertainment, ID theft and espionage
–‘Always On, Always Connected’, Internet Protocol (IP) based
wired/wireless data networks
–The number of destructive computer hackers and IP-network
attack and disable technologies
•Increasing emphasis on solutions using ‘Open’, Globally
accepted, ‘Standards-based’ technologies
•Introduction of Countrywide/Statewide, 1
st
Responder,
shared, wireless voice/data systems with an IP-network
infrastructure
Slide 6
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 6
Economic DriversEconomic Drivers
•Proposed 2003 Federal budget for Homeland Security
–$48B more to Pentagon to fight War on Terrorism
–$5.9B to combat Bioterrorism
–$52B for Information Technology including:
•$26B DOD Information Technology
•$4.2B Cyber Security
–$722M Interagency Information sharing and protection including:
»$380M INS Entry-Exit System
»$125M FBI Infrastructure Protection Center
»$80M 1
st
Responder Priority Cellular Coverage
»$30M Cyber Warning Intelligence Network
»$5M GovNet Protected Federal Intranet
•$23M State Dept. modernization of Passport System
•$31M DOJ Integrated Fingerprint ID System
Source: Washington Post, 02/05/02
Slide 7
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 7
MegatrendsMegatrends
•Continuing worldwide growth of the Internet
•Demand for a safe and secure Homeland
•Exponential increase in use of electronic communications
•Growth of electronic government and e-commerce
•Growing need to identify one’s self to obtain services
•Growing concern for loss of personal privacy and
identification theft
•Increasing emphasis on Standards, licensing and
harmonization
Slide 8
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 8
Potential Matching TechnologiesPotential Matching Technologies
•Shared 1
st
Responder wireless communications systems
–Integrated voice and data
–Inherent inter-agency interoperability and info-sharing
–Encryption services
–Built-in Infrastructure Security
•Biometric ID, Authentication and Access Control:
–Physiological: Eye, Iris and Retinal, Facial, Hand, Fingerprint
–Behavioral: Voice, Signature, Keystroke dynamics
•Intelligent Physical and Biological Sensors/MEMS
–Threat detection
–Threat assessment
•Wireless Tracking and Locating
–Where are you? Family Members, Tourists, Public Safety Units or even
Potential Terrorists?
Slide 9
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 9
Potential Matching Technologies 2Potential Matching Technologies 2
•‘Always connected, Always on’ wired/wireless data
technologies:
–Instant Messaging
–GPRS and High Speed Data (HSD)
–Imaging and Streaming Video
–Wireless LAN and HSD ’Hot spots’
–Secure, electronic commerce
•Information Technology Infrastructure Security
–Network Management
–Data encryption
–Attack Prevention: anti-virus, firewalls, etc.
–Detection: DDOS, intrusion, etc.
–Recovery: disaster recovery, data storage and backup
Slide 10
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 10
Potential Matching Technologies 3Potential Matching Technologies 3
•IT Network Managed Security Services
•Managed Industrial/Home Security Services
Slide 11
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 11
GS3 Prioritized Solution SpacesGS3 Prioritized Solution Spaces
•Fingerprint ID (part of biometric security)
•Command & Control
•Wireless Communications
•Accountability Systems
•Biometric Security
•Decision Support Systems
•Information Security Services (accel. oppor. in Core)
•Location Tracking
•Monitoring and Sensing
•Systems Integration (accel. oppor. Managed Security Sys.)
•WLAN
New Identified Oppor. Accelerated Oppor. In Core
Slide 12
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2001.
08/06/24 Motorola Confidential Proprietary 12
Review GS3 Next StepsReview GS3 Next Steps
•GS3 Compass Business Intelligence repository matching
Solution Spaces at: www.compass.mot.com/go/98911552
–Each Solution Space technology contains folders to hold
background, key competitor and market research information
–I have place around 90 NEW background and market research
documents in Biometrics, Info Security and General Security
•Develop an overview of target Solution Spaces?
–Biometrics overview example follows, do you want more?
•Develop target segment overviews within a Space?
–Need GS3 team member to identify appropriate target(s)
•Develop a profile of key vendors within an identified target
segment?
–How many vendors?
–How deep?
Tags
global safety and security
Categories
General
Download
Download Slideshow
Get the original presentation file
Quick Actions
Embed
Share
Save
Print
Full
Report
Statistics
Views
9
Slides
12
Age
481 days
Related Slideshows
22
Pray For The Peace Of Jerusalem and You Will Prosper
RodolfoMoralesMarcuc
30 views
26
Don_t_Waste_Your_Life_God.....powerpoint
chalobrido8
32 views
31
VILLASUR_FACTORS_TO_CONSIDER_IN_PLATING_SALAD_10-13.pdf
JaiJai148317
30 views
14
Fertility awareness methods for women in the society
Isaiah47
29 views
35
Chapter 5 Arithmetic Functions Computer Organisation and Architecture
RitikSharma297999
26 views
5
syakira bhasa inggris (1) (1).pptx.......
ourcommunity56
28 views
View More in This Category
Embed Slideshow
Dimensions
Width (px)
Height (px)
Start Page
Which slide to start from (1-12)
Options
Auto-play slides
Show controls
Embed Code
Copy Code
Share Slideshow
Share on Social Media
Share on Facebook
Share on Twitter
Share on LinkedIn
Share via Email
Or copy link
Copy
Report Content
Reason for reporting
*
Select a reason...
Inappropriate content
Copyright violation
Spam or misleading
Offensive or hateful
Privacy violation
Other
Slide number
Leave blank if it applies to the entire slideshow
Additional details
*
Help us understand the problem better