Jeff will be joining a panel to discuss Industry 4.0, Business Impact (ROI), Ethics, Big Data and Data Analytics.
Learn how data science and artificial intelligence (AI) can add value to your business or organization.
In this free 3-day workshop, you will be able to interact with IBM and SUNY technical leaders in the Data Science and Artificial Intelligence profession. You will hear from SUNY and IBM experts on topics including: Industry 4.0, Business Impact (ROI), Ethics, Big Data and Data Analytics. The workshop will be split between talks and hands-on labs and each day will end with a Q&A panel session. The workshop will culminate with a panel discussion on "How to get started with AI"
Dr. Jeff Daniels was recognized with the prestigious NOVA Award, Lockheed Martin's highest honor presented annually to individuals and teams who have made outstanding contributions to the corporation's mission and business objectives.
The 26th annual NOVA Award recognizes Jeff and teammates "working tirelessly to deliver technology products and services in record time so that employees could continue working and Lockheed Martin could continue delivering on our customer commitments despite unprecedented change during the global pandemic crisis."
The Lockheed Martin NOVA Awards were created in 1995. The name "NOVA" aptly describes the contributions of the winners as the bright stars of the corporation.
To be considered for a NOVA award, individuals and teams must demonstrate outstanding contributions to the corporation’s mission and business objectives in the four categories of exceptional service, leadership, teamwork and technical excellence.
I've been participating in Steve Blank's course and thought you might enjoy this session with the Honorable Ellen Lord, the Under Secretary of Defense for Acquisition and Sustainment. She is responsible to the Secretary of Defense for acquisition; developmental testing; contract administration; logistics and materiel readiness; installations and environment; operational energy; chemical, biological, and nuclear weapons; the acquisition workforce; and the defense industrial base. It's outstanding and worth listening to.
Some of the readings for this week included How the DOD Acquires Weapons Systems, The Planning, Programming and Budgeting Process, Acquisition Reform in the NDAA, Defense Primer on DOD Contractors, and on the Defense Industrial Base
The House of Commons Science & Technology Committee produced the second report entitled Digital Skills Crisis.
The report found that the "digital divide" is growing:
A 2018 World Economic Forum Future of Jobs Report estimates that that over half of all employees will require significant reskilling by 2022.
The WEF states, "companies that are successful in workforce transformation will be able to harness new and emerging technologies to reach higher levels of efficiency of production and consumption, expand into new markets, and compete on new products for a global consumer base composed increasingly of digital natives.'”
A 2020 study by service provider Salesforce identified similar gaps. The 2020 report entitled, "The Digital Skills Gap is Widening Fast. Here’s How to Bridge It" identifies nearly "133 million new roles generated as a result of the new division of labor between humans, machines and algorithms may emerge globally by 2022."
In January, 2021, I wrote about the Atlas VPN report that found the top critical skills in cybersecurity are:
The workforce must prepare for continuous learning to stay current with digital skills. Below are several examples
A recent study by IBM found that 95% of IT leaders surveyed said they are looking to adopt public, hybrid or private cloud strategies. This is far different that when I wrote the first dissertation on cloud computing in 2011. The literature was bearish on cloud computing with security controls being one of the biggest inhibitors of using cloud platforms.
The State of IT Transformation Study conducted by the Managed Infrastructure Services unit of IBM's Global Technology Services division. Nearly a quarter of CIOs and CTOs (24%) surveyed say their company is just starting its IT modernization journey or has yet to begin modernizing.
The study also found the majority of CIOs and CTOs surveyed identified the following needs:
My next post will be on Digital Transformation Skills.
When I wrote the first doctoral dissertation on cloud computing and cybersecurity, I never imagined demand would continue to increase 10 years later!
Demand for cyber professionals with the following three skills is increasing according to a report from Atlas VPN . The data is based on the report published by Burning Glass Technologies in October of 2020.
The report analyzed a database of more than 1 billion historical job records and calculated 5-year growth projections for cybersecurity skills.
The Top 3 skills are:
The entire Top 10 list of skills is below
I believe there is a place for business, valuation, agility for cybersecurity professionals. Perhaps this is included in the risk management section with a focus on actuarial, cost-benefit analysis, risk-reward, and cost implications of cybersecurity solutions.
What do you think?
Long range planning starts with incremental steps.
One of the beautiful things about Confucius' approach is the simplicity.
He asks us what our time horizon is. Once, we define this (1, 10,100 years), it becomes apparent what steps we take action on. Near-term focus, annual crop such as rice; mid-range, larger trees perhaps pecan, and finally long-term an entirely different "crop."
Education is one of the keys to longevity. Active mind, problem solving, continuous learning. We must teach ourselves, our colleagues, our children. A long time horizon helps us think and act strategically.
Thanks to Betsy Siwula Brandt
@BetsySiwula for reminding us to
Please keep teaching your children during #COVID pandemic.
This is your legacy! #sundayvibes #SundayThoughts #SundayMotivation
From Open-AI blog: DALL-E is a 12-billion parameter version of GPT-3 trained to generate images from text descriptions, using a dataset of text–image pairs. We’ve found that it has a diverse set of capabilities, including creating anthropomorphized versions of animals and objects, combining unrelated concepts in plausible ways, rendering text, and applying transformations to existing images.
Some of the images created from text are incredible:
You can request to join the waitlist here
I have waited a few weeks and have not heard back.
I proposed to research cybersecurity and AI through general exploration. The concept would be to apply behavioral analysis and technique to identify trends, anomalies before they become disruptive. I'm sure there are many more ideas. What are yours?
Identifying a model or strategy to apply to produce maximum positive results is imperative. Consider our research is centered on emerging and existing technologies integrating the best processes. To optimize outcomes, the authors recommend a strategic framework in which to operate within. Below are two models many industrial and systems engineers will be familiar with, the PDCA and CRISP-DM. The third component is a focus on governance of data, configuration management, certification of data structures, and processes around presenting the integrity of the data science practice.
The Plan, Do, Check, Act (PDCA) model is a suitable framework in which to manage solutions for business process, optimization, and platforms. Originating with Dr. William Edwards Deming in the 1950’s, the PDCA model gives us a continuous feedback loop. The “planning” phase centers on problem definition and identifying the data sources required, and affected processes. In the “do” phase, we build and deploy the solution. This may be a limited pilot, minimal viable product, prototype, or phased deployment with limited production impact. In the “check” phase, we assess the expectations, early results and have the opportunity to adjust. Many call this the “study” phase where we apply new techniques, alter the approach. Finally, the “act” phase completes the deployment and sets the new baseline. All four phases of the PDCA model have a continuous feedback loop to improve outcomes.
The CRISP-DM, which stands for Cross-Industry Standard Process for Data Mining, is an industry-proven way to guide data mining efforts. It combines business understanding, data understanding, data preparation, modeling, evaluation and deployment. The CRISP-DM model can be tailored and fit for use. Its strengths include a focus on business comprehension and how respective data sets align to business processes. It also identifies potential data specific problems such as missing data, error types, measurement errors, coding dependencies and inconsistencies, as well as metadata mismatches.
Governance of the data, data structures, models, and runs will be required for preserving integrity of the solution over the life cycle of the system. One key characteristic of the governance model should be a “data lineage” feature to track the source data across languages, file systems, databases, platforms. While the discipline of data governance is new to many organizations, it is particularly well-suited for industrial and systems engineers to define the process, lean it out, and provide measurable insights.
Mr. Crump is my vice president and he shared a generous announcement on the Dallas 500 list. It has been absolutely fantastic working for Mr. Crump.
He is a visionary that has a talent for developing high potential leaders. He allows me to innovate, apply new techniques, and investigate emerging technologies applicable to the Aerospace & Defense, Industrial Manufacturing, and Technology Services industries.
His team has developed revolutionary services in robotic process automation, distributed ledger technology (blockchain), artificial intelligence, enterprise resource planning, human resources, cloud computing, and manufacturing systems. I am thankful to be part of his team and play a part in re-engineering our business, the A&D industry, and have a global impact.