Tag - Bay to breakers

Entries feed - Comments feed

-

SPONSOR, OR INVEST IN, A GREAT NEW TECHNOLOGY

Want To Invest In The Future And Make Money When We Make Money?

ret.jpg

CONTACT OUR TEAM TO FIND OUT ABOUT INVESTING IN, OR SPONSORING, THE FUTURE!

Share

-

INFO: How Scott's Innovation Teams Work

Want to See Scott Operates his Team? This Article Provides a Great Overview:

Innovation and invention.png

THE INNOVATION DREAM TEAM: OPPOSITES SUCCEED

Jeanne M. Liedtka and Randy Salzman 

As an increasingly popular approach to business innovation, the crux of design thinking is that it embraces both creativity and analytical thinking to solve problems; two sides of the design thinking coin, both are essential to the design thinking process.

As such, one key to design thinking is for designers to empathize with those who see the world through what Stanford psychologist Carol Dweck calls a “fixed mindset” — many of whom may be corporate or bureaucratic managers — and vice versa. Having learned at an early age that “life’s a test, try not to look stupid,” the fixed mindseter (whom we call “George”) usually digs deeply into a specialty and masters the intricacies of it, while designer-types, who usually enjoy what Dweck calls a “growth mindset,” see life as a journey of discovery and, therefore, have developed a more diverse repertoire.

A Potential Dream Team

There is a natural tension between these two mindsets, as one usually sticks to the same silo, mastering details and becoming reticent about disruptive change, and the other (whom we call “Geoffrey”) bounces in and out of silos, easily bored with those same intricacies and excited by the weird and the new. Like an exhilarating relationship, the smart Geoffrey and smart George become the “opposites who attract,” instead of the antithetical couples who get bogged down in their differences. Keeping the “creative types” and the “numbers people” on the same wavelength produces great ideas firmly anchored in the real world because Geoffreys have the propensity to embrace innovative ideas and Georges have the wisdom to devise tests for managing — not avoiding — any risks associated with Geoffreys’ imagined futures.

Geoffrey’s Turf vs. George’s Turf

The Geoffrey personality dominates in what we call the front end of design thinking, the What is and What if questions, and George’s natural home turf is in the back end, What wows and What works. If George withholds his natural skepticism until several of Geoffrey’s ideas are napkin pitched (when the organizational case for any new idea begins analysis), he is crucial for not allowing pie-in-the-sky ideas to overcome steely-eyed reality thinking. Too often, upper management can be easily awed by creative types and forget that the Geoffreys of the world, highly invested in their “brilliant” ideas, can become blind to any potential flaws. Identifying promising ideas is Geoffrey’s turf; ensuring that the promise is real is George’s.

Together, this is a formidable team. Opposed, this is no team at all. And design thinking, as practiced in the four-question, 15-step model, provides tools and methods for drawing the best of both personalities — whether that personality is literally two separate individuals or two aspects of the same human. One powerful tool is the methodology itself: When a George feels insecure during divergent “If anything were possible” thinking, he is still reassured he’s following a proven methodology and placated by checking off another box in that methodology. Other times, when the team needs to coalesce around design criteria, or assumption testing, or even very early in the process when teams decide whether design thinking is a solid approach for addressing their challenges, George’s attention to detail provides the foundation for Geoffrey’s creative thought.

Empathy Is Essential

Most design thinkers are Geoffreys and, like all humans, can face difficulty understanding others with different worldviews or mindsets. What seems simplicity itself to that Geoffrey personality might seem ridiculous to a George who may — because of his world view — rarely stick his hand up and chance being perceived stupid. The four-question methodology has Geoffreys all but begging Georges to expose flaws — at the right time and place, which is after What if creativity and before the expenditure of major dollars and resources when an organization pilots any new future.

A successful design thinker can use George and Geoffrey cooperation to truly empathize — different than sympathize or judge — with George. George is not stupid, or evil, or a “bean counter” who needs enlightened compassion, he’s rather essential to success because he helps Geoffrey recognize, and address, assumptions. He digs out the details that trip up even the best of ideas, and he does so after the ideas develop but while there is still time to solve those issues, not after Geoffrey has convinced the boss to turn over the checkbook — putting, of course, everyone’s necks on the line.

Jeanne M. Liedtka and Randy Salzman are authors of the upcoming book Design Thinking for the Greater Good: Innovation in the Social Sector (Columbia Business Press), a study of design-led innovation projects in government and social sectors.

Share

-

MANAGEMENT: BAY TO BREAKERS "FOOTSTOCK" MULTI-YEAR MANAGEMENT PROJECT

As Producer Scott delivered an instant temporary city for 200,000+ people, year-after-year...

BTBSTAGE.jpg

Bay To Breakers “Footstock” Production

We created the first 200,000+ person post-race sports-city and ran logistics for that event for the “World’s Largest Sports Event, The Bay To Breakers.” as Producer; contracted for design, development and construction of a 1,200,000 square foot temporary “City”, with all of the functions required to keep people safe and functional, for hundreds of thousands of people.

     http://www.vimeo.com/125390567

 
GALLERY OF PROJECT IMAGES:
 

Share

TELECOM: Peer-To-Peer Mesh Network Technologies

The network technology that self-heals, saves billions and works anywhere on Earth

DEMOCRI-C 8.png

PEER-TO-PEER Network Technologies By Scott

GENERAL DESCRIPTION: A variety of projects which deploy collaborative device connection to support communications in challenged regions and disaster situations. Our teams have built, patented, deployed and delivered some of the first, and leading, peer to peer technology in the world. Some of our team technology has saved many, many lives. PHYSICS: Any device that can see an electromagnetic signal can often also send an electromagnetic signal. Many devices, today, can send and receive many types of electromagnetic signals, on the same device, some concurrently. This approach turns each device (ie: your smartphone or gamebox)  into its own broadcasting, reception and relay station. This technology needs no servers, towers or infrastructure to operate. Signals can range from audio, radio, light, IR, UV, vibration, laser, reflection, GPS interrupts, induction,  and other modifications of the I/O capabilities of the device. USES:  To support communications in challenged regions and disaster situations

demo1.jpg

demo2.jpgdemocri-C.png

DEMOCRI-C 8.png

DEMOCRI-C 2.png

DEMOCRI-C 4.png

http://www.vimeo.com/125658259

http://www.vimeo.com/125390652

http://www.vimeo.com/125390151

http://www.vimeo.com/125390152

http://www.vimeo.com/126023660

Related Past Projects:

Our team developed, engineered, produced, patented and marketed the software suite that has become one of the leading solutions sets in the intelligence, defense and emergency services arenas globally with over $300 Million invested in it’s production and deployment. One of the packages was distributed by Apple Computer with marketing personally accelerated by Steve Jobs in support of the Tsunami disaster. Other versions of the software have been used in refugee zones globally. When an illegal copycat version of our software failed in one region (Putting lives at risk), our authorized version kept on working. Our architecture has been proven to be unstoppable – against all odds. The full version STILL has yet to be hacked, in the field, by any known technology. It is STILL the least network- congestive, lowest-cost infrastructure, most ultra-secure, network solution in the world! A copy of the Movie: BIRTH OF A NATION was placed in the network flow out on the open web, using the technology, with a phrase imprinted across the center of the image. A $250,000.00 reward was offered to anyone who could provide a fully reassembled copy of the film with the imprinted image and certification headers intact. To this day: Nobody has been able to acquire that film sample off of the web, and reassemble it; proving the strength of the technology.
 

EMERGENCY REFUGEE COMMUNICATIONS FOR DISASTERS AND WAR-ZONES:

The CIA's associated group: IN-Q-TEL, invited us to show our technology to them and then delivered it, via their sister organization: New America Foundation, under the names Serval, Commotion, and other identifiers. Federal accounting agencies report that over $200M has been spent, to date, via State Department budgets, to deliver the system globally. Peer-to-peer data relaying is now the #1 software solution for troubled regions and disaster zones. 

Scott’s Original “Internet in a Suitcase” - Multiple U.S. Patents issued as "First-To-Invent"

1830043-1 (2).jpg

When inferior copy-cat versions failed, costing lives, our original version kept on working.

demo2.png

 

Using the technology, only 3 people's cell phones can cover San Francisco from ocean-to-bay, without the need for any servers.

--------------------------

FIRECHAT and other P2P Emergency Communications Systems Are Changing The World:


GET IT ON IOS STORES and at  https://play.google.com/store/apps/details?id=com.opengarden.firechat

The internet-free messaging app that’s sweeping the world

Apps use P2P combination of Bluetooth and WiFi

We already have Whatsapp, Facebook messenger, Snapchat etc, what makes FireChat different?
You can chat “off the grid”, even if there is no internet connection or mobile phone coverage. How is that possible? Instead of relying on a central server, it is based on peer-to-peer “mesh networking” and connects to nearby phones using Bluetooth and WiFi, with connectivity increasing as more people use it in an area. Firechat lets you talk anonymously Where might this be useful? According to FireChat, “on the beach or in the subway, at a big game or a trade show, camping in the wild or at a concert, or even travelling abroad, simply fire up the app with a friend or two and find out who else is there.” Seriously though. In Hong Kong mostly, where pro-democracy protesters are using it to communicate amid fears of network shutdowns. It’s also been used by Iraqis and Taiwanese students during their anti-Beijing Sunflower Movement. Aside from not being reliant on the internet (which some governments restrict), it is more clandestine and less traceable. You can also join group conversations How popular is FireChat? Over 100,000 people downloaded it in 24 hours in Hong Kong over the weekend, with the CEO saying that numbers are “booming” and up to 33,000 people were using the app at the same time.
CNN NEWS:

– Lasers, Video Projectors, Drones, P2P, coded-hashcodes, Mass-mouthing – GEEK VS. GEEK CYBERWAR! – Lasers write messages on buildings and project animations – Pocket video projectors show digital posters and movies on sides of buildings – Protestor’s drones monitor crowd safety – Entire New INTERNET, built by Democracy Protestors, does not use any corporate back-bone infrastructure. – Complex codes on Twitter and in TEXT messages have hidden meanings – Blinking laser dots on buildings use MORSE CODE – Arm Signals and hand signals use visual message relay – Hong Kong protesters in cyberwar

 

By Jeff Yang
PROTEST1.png

 A pro-democracy protester holds on to a barrier as he and others defend a barricade from attacks by rival protest groups in the Mong Kok district of Hong Kong on Saturday, October 4.

PROTEST2.png

 Pro-democracy student protesters pin a man to the ground after an assault during a scuffle with local residents in Mong Kok, Hong Kong on October 4. Friction persisted between pro-democracy protesters and opponents of their weeklong occupation of major Hong Kong streets, and police denied they had any connection to criminal gangs suspected of inciting attacks on largely peaceful demonstrators.

Protest3.png

 Pro-democracy protesters raise their arms in a sign of nonviolence as they protect a barricade from rival protest groups in the Mong Kok district of Hong Kong on October 4.
 
Students in the massive protests in Hong Kong want representative democracy
  • Jeff Yang: These protesters may be the most sophisticated and technologically savvy ever
  • He says Chinese authorities are blocking images and creating apps that trick protesters
  • Yang: Smartphone a great tool for populist empowerment but it can easily be used against us

Editor’s note: Jeff Yang is a columnist for The Wall Street Journal Online and can be heard frequently on radio as a contributor to shows such as PRI’s “The Takeaway” and WNYC’s “The Brian Lehrer Show.” He is the author of “I Am Jackie Chan: My Life in Action” and editor of the graphic novel anthologies “Secret Identities” and “Shattered.” The opinions expressed in this commentary are solely those of the author.

(CNN) — The massive protests in Hong Kong took an ugly turn on Friday when students pressing for representative democracy clashed with opponents, prompting a breakdown of talks aimed at defusing the crisis.

This negativity followed a week of remarkably peaceful civil disobedience in what has been dubbed the “Umbrella Revolution,” after the widely shared image of a man defiantly holding up an umbrella in a haze of police tear gas fired to disperse the tens of thousands of activists crowding the city’s main government and business thoroughfare, the region referred to as Central.

But protesters shrugged off the gas assault as if it had never happened. Behind the barricades, they studied for exams, coordinated the cleanup and recycling of trash generated by the crowd, and jerry-rigged guerrilla charging stations for the voluminous array of devices the demonstrators are using as part of the sophisticated war they’re waging on the virtual front, wielding the digital-age weapons of image feeds, live streaming video and ceaseless social media updates.

 
 
Jeff Yang

The Umbrella Revolution is hardly the first protest to harness the power of technology to coordinate activities and broadcast messages, but it’s almost certainly the most sophisticated.

Andrew Lih, a journalism professor at American University, discussed the infrastructure the activists have adopted in an article for Quartz, a system that incorporates fast wireless broadband, multimedia smartphones, aerial drones and mobile video projectors, cobbled together by pro-democracy geektivists like the ad-hoc hacker coalition Code4HK.

Given this remarkable show of force by the crowd under the Umbrella, it’s not surprising that Beijing has moved quickly to prevent transmissions from reaching the mainland, blocking Chinese access to Instagram, where images and videos from the demonstrations and police crackdowns are regularly being posted, and banning all posts on popular messaging sites like Weibo and WeChat carrying keywords that refer to the protests.

Activists have fought back by downloading the peer-to-peer “mesh messaging” app FireChat — which allows communication among nearby users even when centralized mobile services are unavailable by linking smartphones directly to one another via Bluetooth and wifi — in the hundreds of thousands, and by creating an elaborate system of numerical hashtags to stand in for forbidden terms.

For example, #689 is the codename for Hong Kong chief executive C.Y. Leung, referring to the number of votes he received in his selection as the region’s highest government representative, a scant majority of the 1,200 members of the the Communist Party-approved nominating committee. #8964 references Beijing’s brutal June 4, 1989, crackdown on student democracy activists in Tiananmen Square, which casts a looming shadow over the Occupy Central demonstrations.

These strategies seem to have prompted the Chinese authorities to resort to new and more insidious tactics. Links — seemingly posted by Code4HK — have begun popping up on social media, inviting users to download a new app that allows for secure coordination of protest activities.

Instead, clicking the link downloads a Trojan horse that gives its developers — presumed by some security experts to be “red hat’ hackers working with support from the Chinese government — open access to the messages, calls, contacts, location and even the bank information and passwords of those naive enough to download it.

That’s a harsh lesson not just for those living under authoritarian regimes, but for us citizens of nominally free and democratic societies as well.

The smartphone is by far the most formidable tool for populist empowerment ever invented, turning individual human beings into mobile broadcast platforms and decentralized mobs into self-organizing bodies. But it’s also jarringly easy for these devices to be used against us.

Here in the United States, revelations of the existence of massive government surveillance programs like the NSA’s PRISM have caused an uproar among digital libertarians. Likewise, criminal smartphone hacking and cloud cracking has led to the release of celebrity nude photos and sex videos, to the humiliation of those who thought them private.

The response from leading smartphone developers like Apple and Google has been to announce new methods of locking and encrypting information to make it harder for individuals, businesses or governments to gain access to our personal information.

But even as they add these fresh layers of security, they continue to extend the reach of these devices into our lives, with services that integrate frictionless financial transactions and home systems management into our smartphones, and wearable accessories that capture and transmit our very heartbeats.

Imagine how much control commercial exploiters, criminals — or overreaching law enforcement — might have if it gained access to all these features. The upshot is that we increasingly have to take matters into our own hands (and handsets), policing our online behavior and resisting the temptation to click on risky links.

It may be worth exploring innovative new tools that offer unblockable or truly secure alternatives to traditional communications, like the free VPN browser extension Hola, which evades global digital boundaries to Web access; open-source projects likeServal and Commotion, which are attempting to develop standards for mesh connectivity that route around the need for commercial mobile phone networks; and apps like RedPhone and Signal, which offer free, worldwide end-to-end encrypted voice conversations.

Most of these are works in progress. But as technology becomes ever more deeply embedded into our lifestyles, keeping our digital identities secure and private is becoming increasingly critical. And as the protests in Hong Kong have shown, the only solution may be to use technology to defend against technology — in other words, to fight fire with FireChat.

Read CNNOpinion’s new Flipboard magazine

Follow us on Twitter @CNNOpinion.

Join us on Facebook.com/CNNOpinion.


EXAMPLES OF TECHNOLOGY:

 

HTTP://p2p-Internet.weebly.com

 

IEEE Communications Magazine Publishes InterDigital Paper on P2P Communications

written by sstocker
 
InterDigital’s M2M team was recently published in the prestigious IEEE Communications Magazine with their article, “CA-P2P: Context-Aware Proximity-Based Peer-to-Peer Wireless Communications.” The work was co-authored by Chonggang Wang, Qing Li, Hongkun Li, Paul Russell, Jr. and Zhuo Chen, all engineers at InterDigital. The authors argue that CA-P2P may be a viable solution to both existing and new proximity-based services, including commercial applications such as advertising as well as emergency/disaster relief, when centralized networks may become unavailable.  Taking various levels of context into account during the P2P connection results in quick, efficient peer discovery and peer association. This will become increasingly important in the emerging fifth generation, with growing numbers of small cell and D2D communications becoming common. The paper delves into the benefits and challenges of CA-P2P and offers performance evaluations of simulations as evidence. Interested in learning even more? Visit our Vault, where you can search keywords such as peer-to-peer, device-to-device, D2D and IoT to find additional resources.

Share

MANAGEMENT: LOGISTICS DIRECTION FOR LARGE PUBLIC PROGRAMS

We do BIG!

promoorig_707.jpg

Our teams have been engaged to produce and/or manage million square foot+ venues with hundreds of thousands of people. We layout the operation, stage the logistics, source all suppliers and infrastructure, run the operations, keep everyone safe and then disappear these entire "temporary cities" as if they were never there.

Here are a few samples of  past work for the community, organizations and sponsors: 

SFBLUES.jpg

San Francisco Blues Festival Logistics

We ran logistics for the San Francisco Blues Festival working with the Founder: Tom Mazzolini and the Co-Sponsors: The National Park Service.

BLUES.jpg

blues84.jpg

The San Francisco Blues Festival broke the record as the longest continuously operated American music festival in national Park service history.

db_Concert31 (3).jpg

http://www.vimeo.com/125657421

...To the top major events centre in the Bay Area with record-setting crowds and novel presentations, with production and operations by Scott, working for both The National Park Service and Fort Mason Center:

coke1.jpg

greatgettghr.jpg

promoorig_704.jpg

garagesale2.jpg

largest-garagesale.jpg

img149.jpg

   img150.jpg  
pressorig_237.jpg
 

Production Sets and Decorations for Mimi Farina for Bread and Roses -

img400.jpg
1157455_orig.png
 

 

Production Lead for THE GREAT GAMING HOUSE. One hundred theaters in the same building for an interactive walk-through venue about the game of life. Created by the founder or arena theater in America; author Kelly Yeaton.-

img668.jpg
img669.jpg
img670.jpg
 
img670 (2).jpg
img671.jpg
img672.jpg
img673.jpg
img677.jpg
 

 

Producer and designer of the promotional program for the San Francisco Symphony called: AMERICAN CLOUD -

img679 (2).jpg
 
bluloons (3).jpg
americancloud (2).jpg

Scott was the Creative Director for Showplace Square and assisted with tenant relations and produced the annual music spectacular -

promoorig_151.jpg

promoorig_260.jpg

 


For the Opening of Ramada's top hotel, Our crew were tasked with rappelling the building to install the world's largest ribbon and bow -

db_perfmc_art11 (3).jpg

db_parc55b1 (3).jpg

      parc55.jpg

-----------

PUT THE SAN FRANCISCO SYMPHONY OUT ON A PIER? NO PROBLEM:

pressorig_254.jpg

Share

-

INFO: Our Top In-House Skills List

Invention Team.png

OUR TOP SKILLS INCLUDE:

Analysis - Qualitative

Art Direction

Competitor Counter-Measures

Content Producing

Global Process Improvement

Invention

Operations

Product Creation and Development

Program Direction

Public Policy Operations

R&D

Social Media Development

Start-up venture C & D Positions

Strategic Planning

Which Are Supported By Our Experience In, and Aptitude For,:

3D Computer Graphics

Ad Traffic

Brand Management Marketing

Brand Management Sales

Business Analysis

Business Development

Business Solutions

Campaign Optimization

Client Relations

Collateral Management

Communications-Support

Congressional Research

Copy Writing

Corporate Operations

CRM

Customer Service Face-to-Face Support

Customer Service Frontline Support

Diplomacy

Display Advertising

DRM

e-Business

e-Commerce

Engineering Process/Process Control

Engineering Project Management

Engineering R & D

Event Coordination

Executive Management

Executive Planning

Face-to-Face Support

Federal and International Law Enforcement

Graphic Design Specialist

Graphics & Desktop Publishing

Intelligence Operations

IT Business Solutions

IT Corporate Trainer

Legal Patent / Trademark / Intellectual Property

Marketing Communications

Marketing Communications-Management

Marketing Creative Services

Marketing Customer Relationship Marketing

Media Metrics

Media Relations

Model Making

National Internet Marketing

Office Management

Online Advertising

Online Media

Photoshop

Product / Brand Management

Project Management

Project Manager

Prototyping

Public Relations

Quality Assurance QA

Sales Consultative Sales

Sales Enterprise Sales

Sales Field Sales

Senior Management

Sharepoint Organization

Trade Show Coordination

Training & Development

Transparency Programs

UI/UX Research

Venture Capital

Web Development Content Maintenance

Wire Frame

Share