Dr. Hood spoke about an initiative that would progress healthcare by improving quality of care, predict and prevent disease, reduce costs, and reduce time spent in the hospital by patients, known as “scientific welfare.”
During his keynote speech at the Future in Review (FiRe) conference in Park City, Utah, Dr. Hood pointed out how the importance of understanding wellness and disease within each patient could help discover the transitions between the two states. Doing so could lead ways to reverse these states and become preventative medicine.
“In 5 to 10 years we will have the ability to reverse Alzheimer’s,” he said.
Dr. Hood emphasized that cloud computing has become a big part of everyday life and is making a significant impact in healthcare. Data clouds are generated to create “actionable abilities” to improve wellness and prevent disease among patients. This lead Dr. Hood to develop the P4 medicine system: Predictive, Prevention, Personalization and Participatory. The focus of this movement is in progressing patient wellness rather than just treating diseases.
“Healthcare is not just about disease but wellness as well,” said Dr. Hood.
According to him, creating personalized wellness programs for patients is the biggest step in progressing healthcare. Using genomic sequencing, clinicians can find methods to prevent disease by altering the patient’s wellness.
“Only 50% of kids born in this calendar year are expected to live to 100,” he said. This is an alarming figure and not improving wellness this statistic will remain the same. Wellness is a lifetime journey and is different for everyone but if done properly following the 4 P’s and using the innovative predictive methods, people will be able to live longer and healthier lives.
Mark Anderson, the founder of Strategic News Service, raised a question in his opening address to Future in Review XV (FiRe XV) conference in Deer Valley, Utah. “Are things as bad as they feel?” he said. In a world with ecommerce gone crazy, acute privacy concerns, and complex security challenges, it was a reasonable question to pose, even to a room full of optimists.
Anderson posited that when it comes to the accelerating pace of change, it’s not about the century, it’s about the scale. He remarked that the term “innovation” is overused to the point of becoming a buzzword. Instead, he began at the level of the concrete: What happens when we move beyond an oil dependent economy? Why are we seeing so many new century-scale changes all at once? In a world in which population has grown from 1.6 billion in 1900 to 7.6 billion today, we need to adopt systems-level thinking.
Anderson said that our plugged-in society bombards us with as much alarming news as we can seek out. However, he believes that compared to a century ago, there is a need for systems-level understanding that transcends mere survival. Anderson said that this means thinking beyond one’s egocentric view.
Anderson also reflected on how the FiRe conference itself has scaled in the past 15 years. He said he believes this is the conference’s pivot moment. FiRe is headed forwards, not backwards. “We’re now enablers as well as creators,” he said. He also encouraged the audience to go beyond listening to “get off your butt and do it”.
Anderson views the evolution of the conference as a way to address challenges, such as urban wildfires and actionable climate change solutions that aren’t being addressed elsewhere.
FiRe XV promises to be exciting, according to Anderson, addressing timely issues such as intellectual property theft and multilateral treaties. He highlighted some of FiRe XV’s standout sessions on the agenda including the Undiagnosed initiative of Katia Moritz. The Earth Energy Monitoring System (E2MS), and new books on Flow Interaction and The Pattern Future are other cutting-edge projects developed and showcased at Future in Review.
So, are things really that bad? Anderson saidwe may have the “luxury” of knowing about every bad turn the world takes the moment it happens, but compared to the challenges of the twentieth century like the two World Wars and the Great Depression, we have it pretty great. World poverty has dropped significantly, and breakthroughs every day in science and technology promise to improve quality of life across the world.
“We have created our own tools,” said Anderson, “we have found with them new truths.” He encouraged the audience to use these discoveries to forge new solutions, in a drive to achieve real and beneficial change.
Anderson inspired the audience by saying, “the future is ours to create.” In answer to his rhetorical question, he spoke directly to the audience.
“There’s never been a better time to be alive,” he said.
In a session titled “The Eye Brain Machine: Computing’s Next Model,” Bryan Jones and Mark Anderson used the retina as a model to understand how a computer chip of the future might process and relay information.
The session began with Jones comparing the retina to a processor of information flow from the outside world to the brain. During development, the eyes form as stocks off of the brain and eventually form into our eyeballs. At the back of the eyeball we find the retina, brain tissue that connects the brain and the eye.
“It becomes a highly specialized device that then feeds into the brain,” Jones said.
A point that came up in the panel was that humans’ mammalian retinas are much simpler than many organisms on earth, including many reptiles and birds. The human retina has roughly 70–100 neuron types and a goldfish has around 250.
The conversation turned to how this retina information compares to computing.
“We started with the raw anatomy and now we’re interested in the network analysis,” said Jones. “The hard part is we have been doing this for 150 years and it is not easy”
This point was illustrated by the fact that there are 9X10¹⁴⁷³ potential nerve connections in the retina. He put that into perspective, saying that there are only 1X10⁸⁰ atoms in the universe by comparison.
Anderson commented how difficult it will be to develop a brain inspired computer chip. Jones mentioned it might be more accurate to say we are developing a neurally informed chip rather than a neurally inspired chip.
Jones wrapped up the session by talking about the potential for information processing if we can understand better how the retina processes such a large amount of visual information so quickly.
In a series of short opening remarks to day 2 of the Future in Review conference at Park City, Utah, Strategic News Service founder Mark Anderson emphasized the importance of thinking at a high level at a time of rapid change.
“It seems as though at a time of great change, systems level thinking is the right answer,” he said.
In introducing upcoming sessions on visualization, the eye-brain machine, and pictorial supercomputing, Anderson suggested pictures as a way of solving problems. He spoke of the need to refer to our brain’s way to looking at things i.e. through pictures.
He also looked ahead to the upcoming CTO challenge, asking them to engage with a whole new paradigm of computing, calling it the conclusion of a “multi-year effort.”
He ended the 10-minute introduction by segueing into Chris Johnson and Valerio Pascucci’s data visualization panel.
“The brain is our biologically evolved computer systems”, Smarr said during a panel at the Future in Review (FiRe) conference in Park City, Utah. He said that to mimic it, exascale computing is required, which is 1 million teraflops faster than a smartphone.
“Exascale simulates 100% of the complexity of the human brain in real-time”, said Smarr. He elaborated the capabilities of machine learning and to track the neural networks within the brain.
“With the incredible speed of digital computers, a human being cannot keep up with this prodigious flow of data.” said Smarr.
He emphasized that for the human brain to keep up the digital information, it needs to be put through a visualization device such as an oscilloscope for the eye-brain system will be able to interface with the natural world.
The advances in the field have allowed AI to learn voice recognition. The use of Tensor Processing Units (TPU) has become an integral part of this world and provides the capability for machines to learn and recognize the different voices of a family and sync the calendar accordingly to each member.
Bringing in up-close and personal view of the goings on inside Yahoo, ex-CFO Ken Goldman and current President of Hillspire told the audience about the kaleidoscope of reasons for Yahoo’s misfortunes, while being hosted by Ed Butler, Presenter and Senior Broadcast Journalist, BBC.
Drawing on his 40-year long career as a person in the financial field and as a CFO, he praised ex-CEO Marissa Mayer and how she was respected within the company because of her engineering background, unlike the previous 5 CEO’s. However, Goldman also lamented several issues that led to Yahoo’s current condition, like external activism and internal culture.
“The reality is that the culture was really tough,” he said. “It wasn’t conducive to what was going on in the [Silicon] Valley.”
As an example, he said that employees didn’t have smartphones within the company and said that Yahoo had a “non-internet culture.”
Another issue he mentioned was difficulties in hiring, because people wouldn’t want to join the beleaguered company. He said that the mobile engineering group only had 25 people in it. Goldman said that the company tried to “acquihire” employees, which led to a number of good people coming on the company.
However, the acquisitions came with their own set of difficulties. While saying that most acquisitions were successful, he pointed to Tumblr as a notable failure, calling it “challenging.” He drew attention to the nature of the content on Tumblr, which proved difficult to monetize.
Butler bought up the inevitable topic of the Yahoo hack, to which Goldman replied that while lawsuits are inevitable with large companies, he was “cordoned off” as the issue was mainly a cyber security issue. When quizzed on whether the hack affected morale, he disagreed, saying that the lack of morale came more from the uncertain future of the company regarding its business failures.
On the issue of activism, Goldman was critical of certain types of activists. He said that while some activists are constructive, some focus too much on firing the CEO, cutting costs, and selling the company. He said that the activism also harms companies at a business level, pointing out that public companies have two classes of stock because they don’t want to deal with activists. He also mentioned that said activism is the biggest reason fewer companies are going private or are choosing to stay private.
In reflecting on past mistakes, Goldman said that public and investor relations could have been better handled.
“We let the storyline be told by others,” he said.
Panelists discussed the investment trend of increased emphasis on cybersecurity and its importance now and in the near future. Currently, cyber security is a major focus of investment, but 10–15 years ago, there was only a handful of venture capital firms investing in cyber security. Toncheva referenced recent incidents, such as the Equifax hack, and possible governmental hacks perpetrated by North Korea, and their impact on making cyber and information security salient to the public. She emphasized the importance of the issue, stating hacks are “economically devastating, politically devastating, and a matter of national security.”
The issue of hacking and cyber security, extends beyond how it is currently considered, and is continually evolving alongside other technologies. Toncheva described multiple demonstrations relating to the future of security concerns, one involving scientists remotely hacking and controlling a pacemaker, and another in which scientists transmitted a computer virus by inserting genetic code into a cell, and then executing the program as the computer sequenced the DNA.
The conversation then moved to the topic of trust in technology. Gorenberg stated as a society, we are not held back by technological capabilities we are held back by what risks we are willing to take. Adoption and lack of user and institutional trust is the limiting factor, but companies are willing to adopt technological solutions incrementally when they see revenue generation or cost savings. He illustrated this with the example of a company capable of predicting patient kidney failure six months in the future. Hospitals were reluctant to adopt the technology as a diagnostic tool but have implemented it as a triaging aid.
Gorenberg explained institutional trust and adoption occur incrementally. Toncheva elaborated on increased adoption and trust, suggesting younger generations will usher in a sea of change. She stated they will rebel and support the use of new technologies because of their comparatively high comfort and familiarity with them.
Despite consumer slowed technological adoption and increased security risks, panelists were primarily optimistic about the future of investments and technology trends. Predictions forecasted a coming wave of positive technological changes in healthcare, artificial intelligence, automation, DNA storage, synthetic biology, and the health of the planet. Suissa expressed cynicism about some of the implications of forthcoming technology improvements.
“There will be negative and positive externalities,” Suissa said.
He emphasized many questions are sure to arise regarding responsibility, ownership, and where morality ultimately will fall.
“The greatest value of a picture is when it forces us to notice what we never expected to see,” said John W. Tukey is best known as the inventor of the box-and-whisker plot, one of the most widely-used diagrams in statistics. Chris Johnson and Valerio Pascucci of the University of Utah were inspired by this observation of Tukey’s and elaborated on this theme in their panel titled “Visualizing Visualizations: Pictorial Processing in Nature,” moderated by Mark Anderson.
Johnson and Pascucci connected their research into visualization algorithms to the concept of flow, as explored in Anderson’s theory of Flow and Interaction.
For example, a large scale combustion simulation simplified a 10-factor analysis to an easy-to-understand diagram in three dimensions. Using this kind of exploratory data analysis, Johnson claimed scientists “can recognize patterns not captured by data analysis tools.” A new paradigm for visualization led to new scientific discoveries.
Being able to examine the actual features of a real-world process like combustion, comes closer to approximating a scientist’s mental model. At the same time, the team wants to make sure that the visualizations don’t bias their users. The traditional line draw of a Von Kármán vortex going around an island presents information, but in a dull, non-informative manner. Johnson and Pascucci’s animated model doesn’t require a long turnaround time, and is more actionable for oceanographers.
These cutting-edge visualizations can be applied to a wide variety of questions, such as more accurate models of methane molecules, designing a new lithium ion battery with a longer life, and analyzing porous mediums.
Pascucci emphasized the idea of taking Big Data - in this case, terabytes of primary scientific research data — and winnowing out the signal from the surrounding noise. Not only do these visualizations connect scientists to data, these animations are understandable to laypeople.
In a session designed to keep you awake after lunch, Berit Anderson, CEO of Scout.ai, moderated a discussion between Evan Anderson, CEO of INVNT/IPand author of “Theft Nation”, and Richard Marshall, CEO of X-SES and past Director of Global Cyber Security Management Department of Homeland Security, regarding the moves that China is making to become a dominant player in the international cyberspace.
The discussion began with a picture of a map showing the power that China has throughout the world. Marshall talked about the efforts that China is making to modify the environment to gain geopolitical power in the air, land, sea, space, and cyberspace. Marshall mentioned that the biggest push for China is in cyberspace.
Evan Anderson followed up by pointing out that the benefits of technology can also have the opposite effect. He explained the Chinese “Sesame Credit”, a proposed plan in China to connect all individual internet presence to your credit score and “citizen score”. He warned of what could happen if China were allowed to become a world cyber power.
“As China goes out and spreads their influence they are the scariest thing we’ve ever seen politically,” said Evan Anderson.
Berit Anderson questioned further to see what the effects on the internet could potentially be if China accomplished their goals. Marshall answered by offering his opinion that it might be the same we know now in the US, but it would be very different internationally. We may not be able to share democratic views, and other countries with totalitarian tendencies could become more totalitarian.
To conclude the session Marshal reiterated that China badly wants to be an international cyber power.
“We have to do more than just talk about it, we have to be aware of what they are trying to do, and we have to set up certain protection mechanisms,” he said.
In a tense session on cyber security, Robert Roy, CTO of Micro FocusGovernment Solutions HPE ESP, moderated and answered questions providing information regarding a few different terms and viewpoints in the cybersecurity world.
The session began with a history of cyber security. Roy recounted that back when cyber security was first dreamed up, people thought that security meant obscurity. In order to conceal their information, they thought it was best to hide it. People still view security in the same way. He cited Equifax as an example of this.
“Equifax didn’t protect data like they should have,” said Roy. “That information should have been protected.”
The conversation became heated as a question about personal identifiers brought up some opposing views. It was brought up that there are ways to protect that data, while others felt that data was already lost for good. Finally, the group came together in the agreement that information needs to be encrypted constantly. It was stated that if given enough time and money, any system can be compromised.
“The best way to keep a secret is to not have it,” said Roy.
A question was asked about the meaning of the term “full stack security”. Robert gave a great explanation of how there are different levels of security called application, presentation, session, transport, network, data link, and physical. Each of these layers have specific protections. If one layer is compromised, the hacker needs to get through the other levels in order to get to your information.
The final question of the session was: What can I do myself in order to better my security? The answer was to be your own data steward. It was explained that there are many services that exist to help us keep passwords strong, keep data secret, keep email files encrypted, and we ought to use all of them. Roy mentioned we also need to be wary of what we put onto the web and be careful of who we give our information to.