Texas Association of State Systems for Computing and Communications, The Future is Here: IT Prime Time, Jim Brazell, Venture Ramp, Inc.August 3-5, Houston, Westin Galleria, Final Speech
Career and Technical Education Specialist at Pearson
Texas Association of State Systems for Computing and Communications, The Future is Here: IT Prime Time, Jim Brazell, Venture Ramp, Inc.August 3-5, Houston, Westin Galleria, Final Speech
1.
Texas Association of
State Systems for
Computing and
Communications
The Future is Here: IT Prime Time
Jim Brazell, Venture Ramp, Inc.
August 3-5, Houston, Westin
Galleria
http://www.ventureramp.com
jim@ventureramp.com
@RadicalPlatypus, Twitter
3.
In 1965, 49 years ago, Gordon Moore
of Intel famously proclaimed that
silicon density, the number of
transistors on computer chips, would
double approximately every two
years.
In effect, “Moore’s Law” is the
platform upon which U.S. and global
wealth creation has been built since
the Apollo program.
A new technology wave has emerged
that is changing everything we
know, or think we know about
business and technology in the world
driven by the intersection of
[operational technology and
cyberspace].
Forthcoming, Connected World Magazine, October 2014 Apollo Image Source: NASA
4.
http://www.arraycomm.com/pcct/coopers_law.htm
The number of conversations (voice and data)
conducted over a given area, in all of the
useful radio spectrum has doubled every 2.5
years for the last 110 years since Marconi,
1895.
Martin Cooper’s Law
8.
http://nikeinc.com/news/nike-unveils-revolutionary-nike-experience-for-basketball-and-training-athletes#/inline/8054
VIDEO - http://www.youtube.com/watch?v=SCJNPd-HYiM#t=19
10.
http://www.industrytap.com/robotic-red-blood-cells-to-vastly-expand-human-capabilities/3656
Robotic Red Blood
Cells To Vastly
Expand Human
Capabilities
By: David Russell Schilling | July 20th, 2013
Abbott Laboratories in North
Chicago is currently testing
robotic red blood cells or
respirocytes in rats. According to
a CNN report respirocytes or
mechanical red blood cells will
augment or replace human red
blood cells carrying oxygen to the
body and enhancing mental and
physical performance.
Respirocytes will be built using
“molecular assemblers”, a kind of
molecular printing process, in
nano-factories.
12.
August 4, 2014 -- “Revolution in
computing driven by Del Tesar at UT
Austin shifts focus from Cloud to Cloud
2.0: critical infrastructure and security
as a service.”
13.
“The last economic
technology wave, the post-
industrial era, marked by
the computer, network,
and information
technology revolution has
now crested and a new
economic wave is rising
fueled by intelligent
machines.”
MOORE’S LAW IS TO COMPUTING AS TESAR’S
LAW IS TO CYBER PHYSICAL SYSTEMS.
Forthcoming, Connected World Magazine, October/November 2014 by Jim Brazell and in
the American Society for Mechanical Engineers Journal of Robotics and Mechanisms, The
Next Wave of Technology, forthcoming 2014-2015.
14.
Cyber
Physical
Systems
Cyber
Systems
Technology
Transformation
26.
Cloud 2.0: Cyber Physical Systems
Cyber physical systems are at the heart of
the design, manufacture, installation,
operation, and sustainability of private
corporate, state, and national
infrastructure across the U.S., yet these
systems are highly vulnerable to cyber
exploitation.
The Need for a Transdisciplinary Approach to Security of Cyber Physical
Infrastructure, Springer, Book Chapter, 2013, Brazell
27.
April 15, 2015 – “Similar to the need of the United States’
computing industry to collaborate in the 1980’s to enhance
semiconductor manufacturing efficiency, fulfilled by
Sematech in Austin, the Department of Information
Resources Cybersecurity Council is instrumental in forming
the Texas Cybersecurity Institute. Programs are designed to
leverage the State’s network of State Agencies, Designated
Centers of Academic Excellence in Information Assurance,
and the industrial sector with a special emphasis on energy
CIP.”
28.
The Future is Here:
IT Prime Time
1. Strategy of Technology
2. IT Workforce Context
3. Human Capital Strategy
29.
Cyber Physical Critical Infrastructure
Emergency services, telecom, energy,
law enforcement, fire departments,
utilities, public works, medical, industrial
facilities, banking and finance,
transportation and tourism, federal and
municipal services, agriculture and food,
and national monuments and icons.
The Need for a Transdisciplinary Approach to Security of Cyber Physical
Infrastructure, Springer, Book Chapter, 2013, Brazell
30.
Source: Harbor
Research, 2003
Cyber Physical Systems
31.
Utilities
A California study indicates that peak-rate usage can be shaved by 20 percent if utilities
used Automated Meter Reading (ARM) for accurate pricing information--each megawatt
of reduction can equate to $400,000 in savings per year (Jackson, p. 1) saving California
utilities and consumers at least $5 billion a year.
http://www.utilitiesproject.com/documents.asp?grID=85&d_ID=2402
More than 25 million AMR units
installed on gas (21 percent),
water (11 percent), and electric
utility (16 percent) meters.
200 million units yet to be
changed out to AMR (Jackson).
32.
SwRI, Patent thin-nickel-strip magneto-strictive sensor (MsS™).
Applicable to airplanes, ships, plants, pipelines and bridges.
US 80 billion square feet of
commercial and
government facilities and
buildings, and more than
100 billion square feet of
dams and bridges
(Sensametrics). One trillion
dollar market (Elgamal).
http://www.swri.org/3pubs/ttoday/fall03/Future.htm
SwRI MsS™
http://www.swri.edu/3pubs/IRD2002/14-9285.htm
Critical Infrastructure Protection (CIP)
Market Worth $105.95 Billion by 2018 according to a new
Report from Markets and Markets.
http://www.marketsandmarkets.com/Market-Reports/critical-infrastructure-protection-cip-market-988.html
33.
Telematics
http://www.itsdocs.fhwa.dot.gov/JPODOCS/REPTS_TE/13599.html
http://www.teradyne-ds.com/telematics/telematics01a.htm
SwRI Transguide
Telematics market to grow at a CAGR of 22.67
percent CAGR percent over the period 2012-
2016 (ResearchandMarkets.com).
TELEMATICS
http://www.researchandmarkets.com/research/tpscpq/global_telematicsGlobal
34.
ttp://www.itsdocs.fhwa.dot.gov/JPODOCS/REPTS_TE/13599.html
ttp://www.roadtraffic-technology.com/contractors/traffic_man/electrosonic/electrosonic1.html
Operations Centers
Air
Land
Sea
Space
Cyber
Since 1998, Transguide has 15 percent reduction of accidents and
has cut emergency response time by 20 percent. (Texas DOT).
.S. ITS to exceed $450 billion by 2015 (Hagler Bailly Services).
35.
August 5, 2014 – “Reminiscent of 911 attacks, fires blaze
in Texas cyber attack. Emergency operations are underway
as two of Texas’ largest oil and gas processing plants were
turned into megaton bombs near city centers Houston and
Corpus Christi. The Cyber Red Guard from Iran has taken
responsibility for the event reportedly stealing data from
Texas Railroad Commission and the energy companies to
trigger the kinetic attack through cyberspace. Property and
casualty claims are expected to skyrocket...”
36.
Apple Insider, Saturday, August
02, 2014, 08:42 pm PT (11:42
pm ET)
Al-Qaeda prefers
Android over
Apple's iOS
By Daniel Eran Dilger
Apple's iOS has taken majority market share in
education, government and the enterprise, but
Google's Android has become the favored mobile
platform among Al-Qaeda operatives.
http://appleinsider.com/articles/14/08/02/al-qaeda-prefers-android-over-apples-ios
41.
Cloud 2.0:
Cyber
Control of
Operational
Technology
SystemsCloud:
Cyber Systems
Technology
Transformation
42.
April 15, 2015 – The purpose of the Texas Cybersecurity Institute is to: (1)
enable cyber physical systems security and cooperative incident
management services for information sharing, collaboration, and
coordination in multi-sector environments; (2) promote public-private
partnerships for policy and programs related to the development of
human and intellectual capital for education, workforce, economic
development systems relevant to cyber physical systems; (3) create
collaborative multi-stakeholder laboratories and research, development,
and commercialization initiatives to promote public welfare and the
security of critical infrastructure systems and processes; and (4) design
necessary approaches to science, technology and public policy that effect
public safety and cybersecurity critical infrastructure as a service.
43.
– Southern Methodist University
– University of Texas, Dallas
– University of Texas San Antonio
– Our Lady of the Lake University
– Texas A&M University San Antonio
– St Philip’s College
– San Antonio College
– Texas A&M University
– Texas A&M University Corpus Christi
– University of Dallas
– University of North Texas
– University of Texas, Austin
– University of Houston
– University of Texas, El Paso
– Rice University
– Richland College (Dallas CCCD)
The goal of the program is to reduce
vulnerability in our national information
infrastructure by promoting higher
education in information assurance (IA),
and producing a growing number of
professionals with IA expertise in various
disciplines. NSA/CSS
Texas’ Nationally Designated Centers of
Academic Excellence in Information Assurance
Source: Chris Cook, Cyber City USA, San Antonio Texas, Cyber Since 1949
44.
December 10, 2017 -- “Cyber is a domain of
warfare, terrorism, and crime, while
simultaneously being the platform and engine for
economic, civil, and democratic development in
the 21st century. Texas now leads the nation at
the intersection of public safety, cybersecurity
and operational technology with all State
Agencies at Cybersecurity Maturity Level 4 or 5
rating.”
45.
• Minimal cyber
awareness
• Minimal cyber info
sharing
• Minimal cyber
assessments and
policy & procedure
evaluations
• Little inclusion of
cyber into Continuity
of Operations Plan
(COOP)
• Leadership aware of
cyber threats, issues and
imperatives for cyber
security and community
cooperative cyber
training
• Informal info sharing/
communication in
community; working
groups established; ad-
hoc analysis, little fusion
or metrics; professional
orgs established or
engaged
• No assessments, but
aware of requirement;
initial evaluation of
policies & procedures
• Aware of need to
integrate cyber security
into COOP
• Leaders promote org
security awareness; formal
community cooperative
training
• Formal local info
sharing/cyber analysis.
initial cyber-physical fusion;
informal external info
sharing/ cyber analysis and
metrics gathering
• Autonomous tabletop
cyber exercises with
assessments of info
sharing, policies &
procedures, and fusion;
routine audit program;
mentor externals on
policies & procedures,
auditing and training
• Include cyber in COOP;
formal cyber incident
response/recovery
• Leaders and orgs promote
awareness; citizens aware
of cyber security issues
• Formal info sharing/
analysis, internal and
external to community;
formal local fusion and
metrics, initial external
efforts
• Autonomous cyber
exercises with assessments
of formal info sharing/local
fusion; exercises involve
live play/metrics
assessments
• Integrate cyber in COOP;
mentor externals on COOP
integration; formal blended
incident response and
recovery
• Awareness a business
imperative
• Fully integrated fusion
/analysis center,
combining all-source
physical and cyber info;
create and disseminate
near real world picture
• Accomplish full-scale
blended exercises and
assess complete fusion
capability; involve/
mentor other
communities/entities
• Continue to integrate
cyber in COOP; mentor
externals on COOP
integration; formal
blended incident
response and recovery
LEVEL 1
Initial
LEVEL 2
Advanced
LEVEL 3
Self-Assessed
LEVEL 4
Integrated
LEVEL 5
Vanguard
Cybersecurity Maturity Level of Texas State Agencies
Source: Greg White, Ph.D., UTSA, CIAS, 2014
46.
January 24, 2018 – “…by focusing on
situational awareness, Texas
Cybersecurity Institute turns data into
actionable knowledge using A.I. 2.0
techniques from new field labeled
‘Artificial Psychology’”.
48.
January 24, 2018 – “Texas Cyber-
security Institute partners with TSTC in
2014 and now offers near real-time
supply and demand management tools
for IT and cybersecurity workforce.”
49.
Contact: Michael A. Bettersworth
Associate Vice Chancellor, Senior Advisor
Texas State Technical College
512-647-8790
https://www.texastribune.org/2014/07/29/tstc-launches-center-employability-outcomes/
50.
January 24, 2018 – “Texas Cyber-security
Institute is funded by Texas State Agencies new
calculus for IT lifecycle management pioneered
by the Comptroller and DIR. The new method of
calculating the value of IT assets over the
lifecycle of their use increases IT effectiveness
by weighing the real value of operational
technology and cyber assets over time.”
51.
1. Practice for Measuring Life-Cycle Costs for Network, Security, and
Information Technology
2. Practice for Measuring Benefit-to-Cost and Savings-to-Investment
Ratios for Network, Security, and Information Technology
3. Practice for Measuring Internal Rate of Return and Adjusted Rate of
Return for Network, Security, and Information Technology
4. Practice for Measuring Net Benefits for Investments in Network,
Security, and Information Technology
5. Practice for Measuring Payback for investments in Network, Security,
and Information Technology
6. Standard Guide for Selecting Economic Methods for Evaluating
Investments in Network, Security, and Information Technology
IT life-cycle management is the effective and efficient management of IT
assets from the identification of requirements to the disposal of the
assets.
Texas’ New IT life-Cycle Management Calculus
52.
January 24, 2018 – “Texas Cyber-
security Institute works at the
intersection of education, workforce,
and economic development to enhance
the State’ and Nation’s
competitiveness.”
53.
George Kozmetsky, IC2.org
photo courtesy of the University of Texas
54.
Education
Economic
Development
Industry
Workforce
Cyber Innovation
Laboratories
Texas Agency
Leadership
55.
The Future is Here:
IT Prime Time
1. Strategy of Technology
2. IT Workforce Context
3. Human Capital Strategy
56.
August 4, 2014 -- “TASSCC first group in the nation
to lead education reform based on the
fundamental notion that cyber is the key
transformative force in the STEM workforce across
sectors. THECB and TEA to offer Computer Science
and Computational Thinking curricula throughout
the core for P-20 education using TASSCC
programs of study as a model for CTE and
academic students.”
63.
5.5% STEM JOBS
5.5% of U.S. Workforce,
7.6MM STEM Jobs in 2010
David Langdon, George McKittrick, David Beede, Beethika Khan, and Mark Doms, “STEM: Good Jobs Now and for the
Future.” US Department of Commerce, Economics and Statistics Administration last accessed online October 28, 2012
http://www.esa.doc.gov/sites/default/files/reports/documents/stemfinalyjuly14_1.pdf
64.
½ of STEM Jobs are
Network and
Information Tech
David Langdon, George McKittrick, David Beede, Beethika Khan, and Mark Doms, “STEM: Good Jobs Now and for the
Future.” US Department of Commerce, Economics and Statistics Administration last accessed online October 28, 2012
http://www.esa.doc.gov/sites/default/files/reports/documents/stemfinalyjuly14_1.pdf
5.5% STEM JOBS
65.
Is there a labor market
shortage of STEM workers?
66.
The STEM Crisis Is a Myth
By Robert N. Charette
Posted 30 Aug 2013
http://spectrum.ieee.org/at-work/education/the-stem-crisis-is-a-myth
STEM attrition
goes 10 yrs into
the workforce, as
46% of #workers
with a Bachelor’s
degree in STEM
have left the field.
—Georgetown
University Center
on Education and
the Workforce
68.
According to the Bureau of Labor Statistics,
NIT is projected to account for between
52% and 58% of all STEM occupations
between 2008-2018 with projected NIT
employment resulting in 762,700 jobs,
growing more than twice as fast as the
average for all occupations in the
economy.[15]
In “The Need for a Transdisciplinary Approach to Security of Cyber Physical
Infrastructure”, Springer, Book Chapter, 2013, Brazell
70.
ANTHONY P. CARNEVALE NICOLE SMITH MICHELLE MELTON, “Science,
Technology, Engineering & Mathematics”, Georgetown University, Center on
Education and the Workforce, October 20, 2012 last accessed October 28, 2012
at http://cew.georgetown.edu/stem/.
Forecast of STEM Occupational Growth
Georgetown University, Center for Education and the Workforce
Job Shortages: We face a chronic shortage
in STEM competencies as the demand for
STEM talents grows outside traditional
STEM jobs.
71.
The Hidden STEM Economy,
Brookings Institute, 6.10.2013
http://www.brookings.edu/research/reports/2013/06/10-stem-economy-rothwell
72.
Special emphasis
should be placed on the
intersection of network
and information
technology (NIT) with
the arts, cyber security,
games and simulations,
health, energy,
transportation,
environmental science,
physical science and
health science.
http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf
73.
November 14, 2014 -- “TASSCC teams with UT
System and Texas State Technical College to
offer Cyber-STEM Rigorous Programs of Study
for all high school, community and technical
college, and university students in the State.”
74.
U.S. percentage of CTE
students in 2004, 17-38%, in
2004, qualifying 3 levels of
CTE participation.
National Assessment of CTE, Interim Report, 2013,
https://www2.ed.gov/rschstat/eval/sectech/nacte/caree
r-technical-education/interim-report.pdf
Learning for Jobs, OECD, 2010, http://www.adheperkins.com/resources/Learning%20for%20Jobs.pdf
75.
“Those who complete both a strong
academic curriculum and a
vocational program of study (dual
concentrators) may have better
outcomes than those who pursue
one or the other”
Source: Silverberg, Warner, Fong, & Goodwin, 2004; Plank,
2001; Stone & Aliaga, 2003)” (National Alliance for Secondary
Education and Transition, 2005, Career Preparatory Experiences,
¶ 3).
77.
Health
Arts
CTE
Academics
Student
Leadership
Character
Citizenship
Classical Contemporary
Education
78.
March 15, 2015 -- “San Antonio all female
cybersecuity team from Southside ISD wins
Cyber Patriot national competition
illustrating the strength of the city’s
approach to diversifying the IT pipeline.”
79.
The Public
The most unique
combination of
Cyber related
elements outside
the National Capital
Region
80.
The United States
Air Force Security
Service invents the
field of cyber-
security in 1949 in
the Alamo City.
81.
http://www.thenewnewinternet.com/wp-content/uploads/24th-air-force.jpg
2009 – Activation of 24th Air Force
Home of Air Force Cyber
82.
91
San Antonio’s high-growth employment sectors –
Projected Fastest Growing Occupations in Bexar County
through 2014
Texas Workforce Commission and US Department of Labor
San Antonio Business Journal by James Aldridge, Web Editor
Date: Wednesday, September 26, 2012
83.
San Antonio has placed one team team to national each of the past 4
years including willing 3rd (2011) and 1st (2012).
https://www.uscyberpatriot.org
84.
John Jay
High School (2)
Roosevelt High School
Engineering and Technology Academy (3)
O’Connor
High School
East Central
High School (3)
Medina Valley
High School (3)
5 miles
Smithson Valley
High School (2)
Boerne
High School
Seguin
High School
Holmes
High School (4)
Brandeis
High School MacArthur
High School (2)
New Life Christian
Academy (2)
Alamo City CyberPatriot
1556 total patriot teams in 2014.
85 teams from Alamo City including
12 middle schools.
Expect 100 teams in 2015.
Taft
High School (2)
San Antonio Christian
Academy
Information Technology
Security Academy
New Braunfels (3)
Stevens
High School
San Marcos
High School
Canyon Lake
CAP Squadron
Randolph
High School
La Vernia
High School (3)
Stacey
Junior/High School
Information Technology
Security Academy
San Antonio (3)
Lackland
CAP Squadron
Harmony
Science Academy (2)
Harlandale High School
Microsoft Academy
Boerne
Area Home Schoolers
Churchill
High School (2)
Clark
High School
McCollum High School
Microsoft Academy
Scobee
Middle School (2)
McAuliffe
Middle School
Lee High School
STEM Academy (2)
Kennedy
High School
KIPP University Prep
High School
Lutheran
High School
McNair
Middle School (3)
Southwest
High School (7)
Krueger Middle
School
St. Anthony
High School
Brennan
High School
Marshall
High School
Nimitz Middle
School (2)
Alamo Heights
High School (4)
Hobby Middle
School
Canyon Lake
High SchoolNew Braunfels
High School
Church Hill
Middle School
Young
Women’s
Leadership
Academy
Milton Lee T-
STEM
Academy
Sam Houston
New Tech
Academy
School of
Science and
Technology
Texas Military
Institute
Bracken
Christian School
Judson
High School
Madison
High School
Steele
High School
Memorial
Toltech
T-STEM
Academy
Brooks
Academy
85.
Alamo Cybersecurity Pipeline
Ph.D. in Security
Related Field
High School Jr./Sr or
Graduate
or lower division BS
BS Degree seeking
advanced Degree
High School
Graduate
with basic security
training
BS Degree in
Security Field
MS Degree in
Security Field
Assoc. Degree
in Security
Field
Assoc. Degree seeking
Bachelor’s
86.
St. Phillip’s
Computer Science
Network Administrator
Network Security Administrator
Biomedical Equip Technician
Computer Maintenance Technician
Computer Network Specialization
E-Business
Computer Support Specialist
Web Developer
NW Vista
Computer Forensics
Computer Science
Digital Gaming, Simulation
and Cinematics for Artists
Multimedia Specialists
Programming & Visualization
Systems Administration
New Media Communications
Music Technology
Palo Alto
Computer Information Systems
Computer Science
Information Systems
Systems Advanced Web Program.
Network Admin CISCO Network
Technology Security Academy
Network Administration
Network Security
Personal Computer Support
Administrative Comp. Tech.
San Antonio College
Computer Science
Computer Security
Geographic Information Systems
Network Administrator
Geographic Information Science
Network Routing
Accounting Technology
Computer Programming
Computer Help Desk Specialist
Cisco Administrator
Database Specialist
Cisco Routing
Associate Degrees and Certifications
Cyber City USA
San Antonio, Texas
Northeast Lakeview
Computer Science
Mathematics
Physics
Criminal Justice
87.
University of Texas at San Antonio
Texas State University
St Mary’s University
Our Lady of the Lake University
Wayland Baptist University
Trinity University
University of the Incarnate Word
Texas A&M University, San Antonio
Alamo Colleges
San Antonio College
Palo Alto College
St Phillip’s College
Northwest Vista College
Northeast Lakeview College
Alamo Academies
- Information Technology and Security Academy
Holmes High School
Southwest High School
Harlandale High School Microsoft Academy
Roosevelt High School Engineering and Technology Academy
Lee High School STEM RAM Academy
John Jay High School Science and Engineering Academy
Sam Houston New Tech Academy
Harmony Science Academy
Memorial High School Toltech T-STEM Academy
Milton B. Lee Academy of Science and Engineering
Security Hill
24th AF
AF ISR Agency
NSA/CSS Texas
Rackspace
USAA
AT&T
Valero
CoSA/Bexar County IT
University Health System
Baptist Health System
HEB
Frost Bank
UTSA
Others
97
SACUCCA
Monster.com
IT-ology
Bestica
Cyber Workforce Placement
88.
S.A. higher ed
partners offer $9,672
bachelor's degreeBy Jennifer R. Lloyd
Wednesday, March 7, 2012
• A bachelor's in information technology with
information security emphasis.
• Two years college-level work in high school,
a year at Alamo Colleges and finish at A&M
San Antonio.
• Total cost: $9,672.
Photo: Ralph Barrera, Austin American-Statesman / SA
Governor Perry challenged universities to
craft a $10,000 bachelor’s degree, though
not all in higher education were fans of the
idea…
90.
Dr. Gregory White accepts
Educator of the Year Award
from Colloquium for
Information System Security
Education. White is a computer
science associate professor and
director of the Center for
Infrastructure Assurance and
Security (CIAS) at The
University of Texas at San
Antonio.
http://utsa-sciences.tumblr.com/post/7344218754/gregwhiteaward#sthash.BPNGGyvW.dpuf
91.
SURVIVAL
OF
SPECIES
GOVERNANCE
SECURITY &
SAFETY
QUALITY
OF CIVIL
LIFE
WEALTH
JOBS
MARKETS
Cyber-
STEM
What is STEM? Why is STEM important?
92.
What is STEM in the context of P-20 Education Practice?
STEM is transformation by design. STEM is transformation of social, human, and
environmental systems by human design and the unintended consequences of human design
choices.
STEM is a technological force changing society and social institutions. STEM is changing the
structure, flow, and composition of social institutions and personal identity: family,
education, work, economy, law, government, etc. From an identity perspective technology
and more broadly STEM effects our worldview, our concepts of: self-efficacy, subjectivity,
objectivity, privacy, time, space (place), geography, cosmology, individuality, identity, values,
beliefs and culture.
STEM is a process of collaboration connecting institutional silos (education, government,
industry, and civil society) to satisfy community and global needs. STEM is confronting the
local challenges in your community and school through the process of inquiry, design, and
innovation. STEM is turning a community inward on itself to form learning communities and
laboratories designed to effect local and global opportunities and challenges through
collaboration and cooperation.
STEM is a moral imperative to prepare all students for their future, rather than our past.
STEM educational practices, ideally, today open access and opportunity in education through
a balanced approach to learning that retains the important fundamentals of classical
education while integrating contemporary knowledge, processes, and tools.
93.
The Future is Here:
IT Prime Time
1. Strategy of Technology
2. IT Workforce Context
3. Human Capital Strategy
94.
January 19, 2014 -- “Mirroring the White
House, Office of Science and Technology
Policy, the 84th Texas Legislature has
aggregated Texas State Agency funding for
education among non-education agencies
to pool investment in Cyber-STEM
programs.”
100.
Texas Association of
State Systems for
Computing and
Communications
The Future is Here: IT Prime Time
Jim Brazell, Venture Ramp, Inc.
August 3-5, Houston, Westin
Galleria
http://www.ventureramp.com
jim@ventureramp.com
@RadicalPlatypus, Twitter
Sie haben diese Folie bereits ins Clipboard „“ geclippt.
Clipboard erstellen
Sie haben Ihre erste Folie geclippt!
Durch Clippen können Sie wichtige Folien sammeln, die Sie später noch einmal ansehen möchten. Passen Sie den Namen des Clipboards an, um Ihre Clips zu speichern.
Clipboard erstellen
SlideShare teilen
Sie hassen Werbung?
Holen Sie sich SlideShare ganz ohne Werbung
Genießen Sie den werbefreien Zugang zu Millionen von Präsentationen, Dokumenten, E-Books, Hörbüchern, Zeitschriften und mehr
Sonderangebot für SlideShare-Leser
Nur für Sie: KOSTENLOSE 60-tägige Testversion für die weltgrößte digitale Bibliothek.
Die SlideShare-Familie hat sich gerade vergrößert. Genießen Sie nun Zugriff auf Millionen eBooks, Bücher, Hörbücher, Zeitschriften und mehr von Scribd.
Offenbar haben Sie einen Ad-Blocker installiert. Wenn Sie SlideShare auf die Whitelist für Ihren Werbeblocker setzen, helfen Sie unserer Gemeinschaft von Inhaltserstellern.
Sie hassen Werbung?
Wir haben unsere Datenschutzbestimmungen aktualisiert.
Wir haben unsere Datenschutzbestimmungen aktualisiert, um den neuen globalen Regeln zum Thema Datenschutzbestimmungen gerecht zu werden und dir einen Einblick in die begrenzten Möglichkeiten zu geben, wie wir deine Daten nutzen.
Die Einzelheiten findest du unten. Indem du sie akzeptierst, erklärst du dich mit den aktualisierten Datenschutzbestimmungen einverstanden.