DR. JEFF DANIELS
  • Home
  • About
  • Publications and Speaking
  • Contact
Digital Transformation | Leader | Professor

Brooks Ghost 13

1/16/2021

0 Comments

 
Picture
I have clocked on a few miles on my Brooks Ghost 13 shoes and I absolutely love them.  I upgraded from Brooks 9 series, which previously held the rank of top running shoe in my arsenal.  How could they possibly improve on the 9?   I opted for the Ghost 13 over the 12 since I keep shoes for a long time and I wanted to have the most recent features.  

The 13 is a well-balanced shoe with neutral pronation.  It feels lighter than the the 9 with the "Engineered Air Mesh" upper, it's a breathable fit. The DNA Loft is an improvement as well with a very responsive cushion, not pillow soft, but what you would expect during a run.  I liked many of the colors schemes, and ultimately gave the choice to much more fashion-savvy daughter. 

I settled on color: 053 - Black/Grey/Stormy.  The combo almost looks almost navy blueish, really sharp.  From a sizing perspective, I go with a 10.5 US  in a D-width.  The sizing from Ghost 9 to Ghost 13 was true and accurate.  I made no sizing changes between the series. 

Brooks is simply the best running shoe out there.  Weber's decision to focus Brooks on running shoes and do it well has been impressive.  I will continue to "run happy" with Brooks Ghosts.

0 Comments

What I Learned about Business Model Generation

1/15/2021

0 Comments

 
Picture
On Steve Blank's recommendation, I am reading Business Model Generation by Alexander Osterwalder and Yves Pigneur.

The first thing that strikes me about this book is the visualizations it has.  Definitely not a boring read!  The illustrations and use of space on each page to highlight concepts are impactful.

There are 9 building blocks
  1. Customer Segments
  2. Value Propositions
  3. Channels
  4. Customer Relationships
  5. Revenue Streams
  6. Key Resources
  7. Key Activities
  8. Key Partnerships
  9. Cost Structure

The author's highlight familiar examples such as the transformation of the book publishing industry.  They cover Lego's long tail strategy of customer-designed kits, Google's business model of targeted text advertising over the global web.  

Also included is a freemium strategy coined by Jarid Luckin and popularized by Fred Wilson. and the Open Innovation approach (below).

I found you can download the Business Model Canvas, Value Proposition Canvas, Business Portfolio Map, Team Alignment Map, and many more resources at Strategyzer.com

Picture
0 Comments

Dr. Jeff to join Cyber Quest 2021 as Keynote Speaker

1/15/2021

0 Comments

 
Picture

Jeff Daniels will be the CyberQuest keynote speaker for the second year in a row.  The competition date  for 2021 will be Saturday, February 6th.  This year will be a virtual event. 

Starting in 2018, CyberQuest is a cybersecurity competition for high school students to demonstrate and improve their skills.  The teams are outstanding and highly technical.  We usually meet at the Fort Worth Air Force Plant 4 facility and tour the a/c assembly lines.

This year, the challenges may include:
  •  Web-based attacks
  •  Common vulnerabilities found within websites across the internet
  •  Windows & Linux privilege escalation
  •  Find vulnerabilities to move from a user to an administrator
  •  Packet capture & log analysis
  • A network traffic capture or various application / server logs commonly analyzed by cyber incident responders to retrace an adversary’s steps
  • Steganography
  • The practice of concealing a file, message, image, or video within another file, message, image, or video
  • Reverse engineering
  • The processes of extracting knowledge or design information from anything man-made and reproducing it or reproducing anything based on the extracted information
  • Cryptography
  • The construction and analysis of techniques that prevent eavesdroppers from reading private messages
What Would Be Good to Know
  • Linux & bash (including common CLI tools)
  • Common inter-computer communications
  • Kali & Metasploit
  • Network / Host recon (nmap/ wireshark)
  • Intercepting proxies (Burp Suite)
  • Scripting (python)
Common web application security vulnerabilities
  • OWASP Top 10
  • Configuring a browser to use an intercepting proxy such as Burp Suite (and how to use that proxy)
  • Port scanning tools such as nmap
  • How to use ssh
  • Read / write basic bash & html
  • Common tools in Kali Linux
A Few Handy Tools
  • OllyDbg1.10
  • x64dbg (snapshot_2018-07-15_19-25)
  • Portable App Platform
  • For Windows, these portable apps may be useful
  •  7-ZipPortable
  • DiffImgPortable
  • DiffpdfPortable
  • FileAlyzerPortable
  • FirefoxPortable
  •  FrhedPortable
  • GIMPPortable
  • gVimPortable
  • InkscapePortable
  • JPEGViewPortable
  • KeepNotePortable
  • Notepad++Portable
  • PortableApps.com
  • winMd5SumPortable
Additional Resources
  • Common web vulnerabilities
  • Tools included in Kali Linux like webshells
  • Bash — Search for “intro to bash programming” and read the first few pages of pretty much any result that you find interesting
  • Burp Suite
  • Nmap — Search for common scan syntax –know how to scan common ports, perform a service scan
  • Common Linux commands — Your favorite search engine will answer all your questions
    awk, cut, sed, wc, less, grep
  • Wireshark
    • Search for how to filter on IP address, port, HTTP request method
    • Search for how to follow streams, inspect packet fields
    • Search for how to carve files from Pcap, stream, specific packet
Eligibility Requirements
  • Two teams can represent a school. Schools may register up to 3 teams. Third teams will be waitlisted until registration is opened to them on Monday January 18th. From the waitlist, teams will be accepted on a first come, first served basis or other criteria determined by the planning committee. If a third team is accepted, the school will be notified via email on or after January 18th.
  • 2 – 5 High School students per team allowed
  • One Coach per team. One coach for multiple teams is acceptable.
  • Students on the same team must be from the same school. (Exemption for home schools and case by case requests)
  • A team should be affiliated with and represent the High School under which they are registering.
  • STEM programs are eligible to register a team
    • STEM program is a curriculum based on educating students in four specific disciplines — science, technology, engineering and mathematics — in an interdisciplinary and applied approach. The program of study focuses on the application of the subjects in a challenging and rigorous manner. Courses and pathways cover preparation for post-secondary education and employment.
    • The STEM Program should be a recognized organization/club within the community and high school(s).
    • STEM programs are eligible to register a team with students from different schools if the students’ school cannot form a team.
  • Each team is allowed to bring up to 3 computers per team unless otherwise stated on the site-specific pages
    • Must have a Microsoft RDP client windows: Microsoft Remote Desktop Connection
    • Mac / OS X: Microsoft RDP
    • Linux: rdesktop
    • Must have an ssh client
    • Windows: Putty recommended (there are other options as well, any that support ssh connections will work)
    • Mac / OS X: Terminal (built-in)
    • Linux: Terminal, ensure an ssh client is installed such as openssh-client (typically installed by default)
    • Must have a recently updated (last updated within 1 month prior to the competition day) version of the Mozilla Firefox or Google Chrome browser on each computer
    • Keyboards / mice permitted if desired
    • No printers
    • No VMs
    • Monitors permitted if desired
    • No thumb drives
    • Reference books are permitted
    • Students will be on Lockheed Martin Guest Wifi, therefore internet access for research via the proxies is permitted
    • Tools / software needed to complete the competition will be provided on the systems within the challenge environment

For a complete list of eligibility requirements see the Official Rules



0 Comments

Data Science & Artificial Intelligence Virtual Workshop

1/15/2021

0 Comments

 
Picture
Jeff will be joining a panel to discuss Industry 4.0, Business Impact (ROI), Ethics, Big Data and Data Analytics.

Learn how data science and artificial intelligence (AI) can add value to your business or organization.   

In this free 3-day workshop, you will be able to interact with IBM and SUNY technical leaders in the Data Science and Artificial Intelligence profession. You will hear from SUNY and IBM experts on topics including: Industry 4.0, Business Impact (ROI), Ethics, Big Data and Data Analytics. The workshop will be split between talks and hands-on labs and each day will end with a Q&A panel session. The workshop will culminate with a panel discussion on "How to get started with AI"
  • COST: FREE
  • DATE: Jan. 26-28                                            
  • TIME: 9 a.m. - 12:30 p.m.            
  • LOCATION: Live Virtual on Zoom. A meeting link will be sent to participants.
  • WHO CAN ATTEND: This workshop is intended for industry professionals, academic scholars and students with interest in emerging data science and machine learning/artificial intelligence (AI).
  • CREDENTIALS AND GIVEAWAYS:  
    • Participants who attend all three days will receive a workshop completion certificate for 1.0 Continuing Education Units (1.0 CEU = 10 instructional contact hours). 
    • All participants will receive free e-books, whitepapers and IBM Cloud Services for a 90-day free trial.
    • All participants will be entered into a contest for a free online Data Science or Computer Science course of their choice delivered through Watson Continuing Professional Education.
Register here

0 Comments

Jeff Daniels recognized with NOVA Award for Crisis Response Team

1/15/2021

0 Comments

 
Picture
​Dr. Jeff Daniels was recognized with the prestigious NOVA Award, Lockheed Martin's highest honor presented annually to individuals and teams who have made outstanding contributions to the corporation's mission and business objectives.  

The 26th annual NOVA Award recognizes Jeff and teammates "working tirelessly to deliver technology products and services in record time so that employees could continue working and Lockheed Martin could continue delivering on our customer commitments despite unprecedented change during the global pandemic crisis." 

The Lockheed Martin NOVA Awards were created in 1995. The name "NOVA" aptly describes the contributions of the winners as the bright stars of the corporation.

To be considered for a NOVA award, individuals and teams must demonstrate outstanding contributions to the corporation’s mission and business objectives in the four categories of exceptional service, leadership, teamwork and technical excellence. 

0 Comments

Technology, Innovation, and Modern War – Acquisition & Sustainment w/ Ellen Lord

1/15/2021

0 Comments

 
Picture

I've been participating in Steve Blank's course and thought you might enjoy this session with the Honorable Ellen Lord, the Under Secretary of Defense for Acquisition and Sustainment. She is responsible to the Secretary of Defense for acquisition; developmental testing; contract administration; logistics and materiel readiness; installations and environment; operational energy; chemical, biological, and nuclear weapons; the acquisition workforce; and the defense industrial base.  It's outstanding and worth listening to.

Highlights include:
  • Acquisition at the speed of relevance.
  • Software is central to every DoD mission and system.
  • "We need to acquire and deliver software with much greater speed agility and cybersecurity."
  • The software acquisition pathway is the newest pathway in the adaptive acquisition framework. (see image) is built on commercial principles that enable innovation and rapid delivery in response to conditions of uncertainty
  • We have rapidly changing user needs, disruption technologies, and threats on the battlefield.
  • Agile, DevOps, DevSecOps represent a substantial departure from the usual way of doing business.
  • Cybersecurity is foundational.  Cybersecurity Maturity Model Certification defines levels with contracts.
  • Key identify reputable vendors and supply chain.

Catch up with the class by reading summaries of the previous fifteen classes here.

Some of the readings for this week included How the DOD Acquires Weapons Systems, The Planning, Programming and Budgeting Process, Acquisition Reform in the NDAA, Defense Primer on DOD Contractors, and on the Defense Industrial Base



Picture
0 Comments

The Digital Skills Gap....and What To Do About It

1/15/2021

0 Comments

 
Picture
Picture

The House of Commons Science & Technology Committee produced the second report entitled Digital Skills Crisis. 

The report found that the "digital divide" is growing:
  • 22% of IT equipment in schools is ineffective
  • Just 35% of computer science teachers had a relevant qualification
  • Only 70% of the required number of computer science teachers have been recruited
  • 93% of tech companies find that a digital skills gap affects their commercial operations
  • 90% of jobs require digital skills to some degree
  • Skills gap costs economy around £63bn a year in lost income
The report was created 4 years ago, but many of the tenants still hold.  

A 2018 World Economic Forum Future of Jobs Report estimates that that over half of all employees will require significant reskilling by 2022.
The WEF states, "
companies that are successful in workforce transformation will be able to harness new and emerging technologies to reach higher levels of efficiency of production and consumption, expand into new markets, and compete on new products for a global consumer base composed increasingly of digital natives.'”
​
A 2020 study by service provider Salesforce identified similar gaps.  The 2020 report entitled, "​The Digital Skills Gap is Widening Fast. Here’s How to Bridge It" identifies nearly "133 million new roles generated as a result of the new division of labor between humans, machines and algorithms may emerge globally by 2022."

In January, 2021, I wrote about the Atlas VPN report that found the top critical skills in cybersecurity are: 
  • Application development security is the hottest growing skill and Atlas VPN predicts demand for this experience will rise 164% in five years. 
  • Cloud security experts will increase 115% over the next five years. 
  • Risk management is predicted to increase 60%.

What do we do to prepare?
The workforce must prepare for continuous learning to stay current with digital skills.  Below are several examples 
  • Technology leader Lockheed Martin started CodeQuest and later CyberQuest to promote programming, development, cognitive, and cybersecurity skills.  Both have been wildly successful and have gone international.   I am a plank owner in CodeQuest, helping to plan and desig the first event in Fort Worth, 2012.

  • The University of Maryland Global Campus has been redesigning coursework to align with Department of Defense and industry demand for cloud computing, AI, and cybersecurity.  DISA has partnered with UMGC to tackle the cybersecurity shortage head-on.
    ​
  • Individuals in the workforce have many options to up skill.  One example are the top AI courses I shared in early January.  Below are the courses
    • Artificial Intelligence A-Z: Learn How to Build an AI (Udemy)
    • ColumbiaX’s Artificial Intelligence MicroMasters Program (edX)
    • Google AI Education
    • The Beginner’s Guide to Artificial Intelligence in Unity (Udemy)
    • fast.ai courses – Deep Learning for Coders, Foundations, Data Ethics, Linear Algebra, Natural Language Processing
    • Machine Learning by Stanford University (Coursera)
    • Deep Learning Specialization by Andrew Ng (Coursera)
    • IBM Applied AI Professional Certificate (Coursera)
    • AI for Everyone by Andrew Ng (Coursera)
    • Introduction to TensorFlow for Artificial Intelligence, Machine Learning, and Deep Learning (Coursera)
      ​
As leaders in the workforce, it's our job to develop talent and provide opportunities to learn and grow employees.  With a digital skills crisis upon us, we can help our countries, economies, organizations, and individuals prepare for new services, products, and business models.

Picture
0 Comments

95% of IT leaders pursuing cloud strategies

1/14/2021

0 Comments

 
Picture
A recent study by IBM found that 95% of IT leaders surveyed said they are looking to adopt public, hybrid or private cloud strategies.  This is far different that when I wrote the first dissertation on cloud computing in 2011.  The literature was bearish on cloud computing with security controls being one of the biggest inhibitors of using cloud platforms.

The State of IT Transformation Study conducted by the Managed Infrastructure Services unit of IBM's Global Technology Services division. Nearly a quarter of CIOs and CTOs (24%) surveyed say their company is just starting its IT modernization journey or has yet to begin modernizing.

The study also found the majority of CIOs and CTOs surveyed identified the following needs:
  • increased infrastructure flexibility as driving the digital transformation (67%)
  • competitive advantage (61%)
  • cost savings (58%)
  • increasing globalization (54%)
  • meeting client demands (45%)
What you are doing to prepare the next-generation infrastructure?

My next post will be on Digital Transformation Skills.


0 Comments

App Development Security is the most wanted cybersecurity skill in 2021

1/10/2021

0 Comments

 
Picture
When I wrote the first doctoral dissertation on cloud computing and cybersecurity, I never imagined demand would continue to increase 10 years later!

Demand for cyber professionals with the following three skills is increasing according to a report from Atlas VPN .  The data is based on the report published by Burning Glass Technologies in October of 2020.

The report analyzed a database of more than 1 billion historical job records and calculated 5-year growth projections for cybersecurity skills.

The Top 3 skills are:

  1. Application development security is the hottest growing skill and Atlas VPN predicts demand for this experience will rise 164% in five years. 
  2. Cloud security experts will increase 115% over the next five years. 
  3. Risk management is predicted to increase 60%.

The entire Top 10 list of skills is below
  1. Application development security
  2. Cloud security
  3. Risk management
  4. Threat intelligence
  5. Incident response
  6. Compliance and controls
  7. Data privacy and security
  8. Access management
  9. Security strategy and governance
  10. Health information security

I believe there is a place for business, valuation, agility for cybersecurity professionals.  Perhaps this is included in the risk management section with a focus on actuarial, cost-benefit analysis, risk-reward, and cost implications of cybersecurity solutions.

​What do you think?

-Jeff

0 Comments

What I learned from Confucius on Strategy

1/10/2021

0 Comments

 
Picture
Long range planning starts with incremental steps. 

One of the beautiful things about Confucius' approach is the simplicity. 

He asks us what our time horizon is.  Once, we define this (1, 10,100 years), it becomes apparent what steps we take action on.  Near-term focus, annual crop such as rice; mid-range, larger trees perhaps pecan, and finally long-term an entirely different "crop." 

​Education is one of the keys to longevity.  Active mind, problem solving, continuous learning.  We must teach ourselves, our colleagues, our children.  A long time horizon helps us think and act strategically.  

Thanks to Betsy Siwula Brandt
@BetsySiwula for reminding us to
Please keep teaching your children during #COVID pandemic.



This is your legacy! #sundayvibes #SundayThoughts #SundayMotivation

0 Comments
<<Previous
    Picture

    Author

    Director
    @lockheedmartin
    | Professor
    @UMDGlobalCampus
    | 1st Cloud Dissertation | Top 5 #Thinkers360 #blockchain #cloud #iot #AI #AIEthics #digital #cyber #5g

    View my profile on LinkedIn
    Follow @jeffdaniels
    Tweets by jeffdaniels

    RSS Feed

    Archives

    December 2022
    August 2022
    March 2021
    February 2021
    January 2021
    December 2020
    September 2020
    August 2020
    February 2020
    January 2019
    October 2015
    April 2015
    January 2015
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    March 2014
    February 2014
    January 2014
    December 2013
    November 2013
    August 2013
    July 2013
    June 2013
    February 2013
    December 2012
    October 2012
    September 2012
    August 2012
    April 2012
    March 2012
    February 2012
    January 2012
    December 2011
    November 2011
    October 2011
    September 2011

    Categories

    All
    4h
    Acoustic
    Adele
    Adoption
    Aero
    Aerospace
    Airshow
    Alliance
    Architect
    Architecture
    Astronaut
    Augustine
    Bahill
    Book
    Books
    Boxing
    Budget
    Business
    Business Card
    Candidate
    Card
    Career
    Careerdevelopment
    Chan
    Chowder
    Cio
    Cities Names
    Clam
    Cloud
    Cloudcomputing
    Cnci
    College
    Computing
    Conference
    Connectivity
    Crowe
    Csedweek
    Cto
    Cyber
    Cybersecurity
    Deep Dive
    Defense
    Denise
    Dfw
    Digital
    Ebook
    Education
    Email
    Engineering
    Exploration
    Extreme
    F35
    Fall
    Fb
    Fedgov
    Fighter
    Flight
    Flighttest
    Florida
    Food
    Framework
    Frazier
    Get
    Gissing
    Glennis
    Google
    Haunted
    Hbr
    Heterogeneous
    History
    Homogeneous
    Horwath
    House
    Ideacast
    Identity
    Insiderhighered
    Internet
    Interview
    Joe
    Jsf
    Kindle
    Kindlefire
    Klout
    Kolditz
    Leadership
    Learning
    Linkedin
    Lm
    Martin
    Meeting
    Mentor
    Miracles
    Mit
    Mobile
    Monkey
    Mst3k
    Music
    Nasa
    Nascar
    Nelson
    Netflix
    Networking
    Nist
    Norm
    Orlando
    Phd
    Pictures
    Post
    Practice
    Process
    Pumpkin
    Put
    Quote
    Races
    Ragan
    Recipe
    Results
    Robots
    Role
    Rollinginthedeep
    Scary
    Search
    Security
    Servo
    Silence
    Simian
    Smokin
    Smoothie
    Snarky
    Socialnetwork
    Sound Barrier
    Space
    Speakup
    Spending
    Star
    Stem
    Sterman
    Strategy
    Success
    Systems
    Systemsengineering
    Teaching
    Teamtexas
    Techmgmt
    #techmgmt
    Techmgmt#
    #techmgt
    Technology
    Texas
    Tms
    Togaf
    Townhall
    Treat
    Trend
    Trust
    Tx
    Web
    Web2.0
    X1
    Yeager

    RSS Feed

Powered by Create your own unique website with customizable templates.
Photos used under Creative Commons from europeanspaceagency, ▓▒░ TORLEY ░▒▓, Lori_NY, Dean_Groom, dalecruse, Fin Cosplay & Amigurumi, Iain Farrell, erin_everlasting, palindrome6996, Easa Shamih (eEko) | P.h.o.t.o.g.r.a.p.h.y, markhillary, Matt McGee, Marc_Smith, woodleywonderworks, agustilopez, rachel_titiriga, SeaDave, cheri lucas., Caio H. Nunes, grabbingsand, Armchair Aviator, quinn.anya, Jennifer Kumar, billaday, edtechworkshop, chucknado, purpleslog, yugenro, christianeager, dground, GlasgowAmateur, expertinfantry, OiMax
  • Home
  • About
  • Publications and Speaking
  • Contact