Top Banner
WITH EMERGING TECHNOLOGIES REIMAGINING YOUR BUSINESS
6

REIMAGINING YOUR BUSINESS - The FDPthefdp.org/default/assets/File/Presentations/What...Business Networks Social, Cloud, and Edge Computing Cognitive Computing Business Reimagined Technology

May 25, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: REIMAGINING YOUR BUSINESS - The FDPthefdp.org/default/assets/File/Presentations/What...Business Networks Social, Cloud, and Edge Computing Cognitive Computing Business Reimagined Technology

WITH EMERGING TECHNOLOGIES

REIMAGINING YOUR BUSINESS

Page 2: REIMAGINING YOUR BUSINESS - The FDPthefdp.org/default/assets/File/Presentations/What...Business Networks Social, Cloud, and Edge Computing Cognitive Computing Business Reimagined Technology

Source: Nokia

2

INTELLIGENCE REVOLUTION

Page 3: REIMAGINING YOUR BUSINESS - The FDPthefdp.org/default/assets/File/Presentations/What...Business Networks Social, Cloud, and Edge Computing Cognitive Computing Business Reimagined Technology

2008 2012 2016 2018

Social NetworksBusiness Networks

Social, Cloud, and Edge Computing

Cognitive Computing

BusinessReimagined

Technology Trends / Shifts

IoTCloud Computing

Drones

A/I, ML, AVR, and Chatbots

Autonomous CarsRobotic Process Automation (RPA)

Blockchain (DLT)

Cognitive Automation

3

DISRUPTIVE TECHNOLOGIES RESTRUCTURE BUSINESS MODELS

Page 4: REIMAGINING YOUR BUSINESS - The FDPthefdp.org/default/assets/File/Presentations/What...Business Networks Social, Cloud, and Edge Computing Cognitive Computing Business Reimagined Technology

Digital Currency /

Banking

Healthcare / Public Health /

Safety

Procurement / Supply Chain

Security / Identity

Real Estate / Mortgage

Asset Management

Adoption

Record Title

Bitcoin

DOECybersecurity

GSAAutomate

Procurement / Supply Chain

FEMATrack Emergency /

Aid

DHSProtect Borders

OPMEmployee RepositoryPotential Use

Case

Expressed Interest

Building Blockchain

DARPASecure Messaging

in Combat

NATOLogistics, Finance and Procurement

HHSElectronic Medical

Records

STATEPassports and

Visas

DODCybersecurity

ARMYMedical Logistics

IDB / World BankProcurement

HHSCognitive

Automation of Business

Transactions

Depository Trust & Clearing

CorporationClearing House for

Financial Transactions

TreasuryAsset Management

World BankBond

4

CDCEmergency

Response / Public HealthFDA

Track Outbreak of Disease / Illness

UndisclosedMedicare and

Medicaid

HHSReimagine Grants

BLOCKCHAIN IN ACTION

CDCMedical Records

UndisclosedMortgage

Leasing

Patent

Page 5: REIMAGINING YOUR BUSINESS - The FDPthefdp.org/default/assets/File/Presentations/What...Business Networks Social, Cloud, and Edge Computing Cognitive Computing Business Reimagined Technology

BLOCKCHAIN

Blockchain is an incorruptible, networked database for recording assets and transactions in the value chain and enables the cognitive automation of the value chain:

▪ Enables trust▪ Cuts the cost of verification▪ Reduces cost of networking▪ Optimizes business transactions

Source: Federal Times

Blockchain (DLT)

Blockchain (DLT)

Smart Contracts (SC)

Microservices

Artificial Intelligence (AI)

Blockchain (DLT)

Blockchain (DLT)

Blockchain (DLT)

DASHBOARD

API

API

5

BLOCKCHAIN DATA LAKE

is inherently fault tolerant and scalable

DATA SOURCES /

SYSTEMS

Page 6: REIMAGINING YOUR BUSINESS - The FDPthefdp.org/default/assets/File/Presentations/What...Business Networks Social, Cloud, and Edge Computing Cognitive Computing Business Reimagined Technology

BLOCKCHAIN

Blockchain is an incorruptible, networked database for recording assets and transactions in the value chain and enables the cognitive automation of the value chain:

▪ Enables trust▪ Cuts the cost of verification▪ Reduces cost of networking▪ Optimizes business transactions

Source: Federal Times

6

BLOCKCHAIN DATA LAKE

FOR GRANTS LIFE CYCLE

BLOCK

PLANNING

OPPORTUNITY

APPLICATION

PREVIOUS TXN HASH

HASH OF ALL TXNS

BLOCK

REVIEW

AWARD

CONTRACT

PREVIOUS TXN HASH

HASH OF ALL TXNS

BLOCK

SINGLE AUDIT

PERFORMANCE

FUNDS TRANSFER

PREVIOUS TXN HASH

HASH OF ALL TXNS

BLOCK

RECONCILIATION

CONTRACT MODIFICATION

CLOSEOUT

PREVIOUS TXN HASH

HASH OF ALL TXNS

Transactions are encrypted, properly ordered, and stored in blocks that are linked together using a hash of the transactions in the prior block. Personally Identifiable Information (PII) and documents are stored “off-chain”.