Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

The Future is Here: IT Prime Time

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 112 Anzeige

The Future is Here: IT Prime Time

Herunterladen, um offline zu lesen

Texas Association of State Systems for Computing and Communications , The Future is Here: IT Prime Time , Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria, Final Speech

Texas Association of State Systems for Computing and Communications , The Future is Here: IT Prime Time , Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria, Final Speech

Anzeige
Anzeige

Weitere Verwandte Inhalte

Diashows für Sie (20)

Ähnlich wie The Future is Here: IT Prime Time (20)

Anzeige

Weitere von Jim "Brodie" Brazell (20)

Aktuellste (20)

Anzeige

The Future is Here: IT Prime Time

  1. 1. Texas Association of State Systems for Computing and Communications The Future is Here: IT Prime Time Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria http://www.ventureramp.com jim@ventureramp.com @RadicalPlatypus, Twitter
  2. 2. Twitter #radicalplatypus @radicalplatypus
  3. 3. In 1965, 49 years ago, Gordon Moore of Intel famously proclaimed that silicon density, the number of transistors on computer chips, would double approximately every two years. In effect, “Moore’s Law” is the platform upon which U.S. and global wealth creation has been built since the Apollo program. A new technology wave has emerged that is changing everything we know, or think we know about business and technology in the world driven by the intersection of [operational technology and cyberspace]. Forthcoming, Connected World Magazine, October 2014 Apollo Image Source: NASA
  4. 4. http://www.arraycomm.com/pcct/coopers_law.htm The number of conversations (voice and data) conducted over a given area, in all of the useful radio spectrum has doubled every 2.5 years for the last 110 years since Marconi, 1895. Martin Cooper’s Law
  5. 5. http://cdn1.tnwcdn.com/wp-content/blogs.dir/1/files/2014/01/79493994-786x305.jpg
  6. 6. http://bilder2.n-tv.de/img/incoming/origs12096381/1162732377-w1000- h960/Hand-holding-zoomed-in.jpg Antenna Sensor Controller Capacitor
  7. 7. http://media.tested.com/uploads/0/5/5698-augmented_reality_wired_super.jpg
  8. 8. http://nikeinc.com/news/nike-unveils-revolutionary-nike-experience-for-basketball-and-training-athletes#/inline/8054 VIDEO - http://www.youtube.com/watch?v=SCJNPd-HYiM#t=19
  9. 9. 9 http://research.gigaom.com/report/the-quantified-self-hacking-the-body-for-better-health-and- performance/
  10. 10. http://www.industrytap.com/robotic-red-blood-cells-to-vastly-expand-human-capabilities/3656 Robotic Red Blood Cells To Vastly Expand Human Capabilities By: David Russell Schilling | July 20th, 2013 Abbott Laboratories in North Chicago is currently testing robotic red blood cells or respirocytes in rats. According to a CNN report respirocytes or mechanical red blood cells will augment or replace human red blood cells carrying oxygen to the body and enhancing mental and physical performance. Respirocytes will be built using “molecular assemblers”, a kind of molecular printing process, in nano-factories.
  11. 11. 11 http://news.yahoo.com/human-cyborg-mcdonald-employees-assaulted-wearing-gear-210139320.html
  12. 12. August 4, 2014 -- “Revolution in computing driven by Del Tesar at UT Austin shifts focus from Cloud to Cloud 2.0: critical infrastructure and security as a service.”
  13. 13. “The last economic technology wave, the post- industrial era, marked by the computer, network, and information technology revolution has now crested and a new economic wave is rising fueled by intelligent machines.” MOORE’S LAW IS TO COMPUTING AS TESAR’S LAW IS TO CYBER PHYSICAL SYSTEMS. Forthcoming, Connected World Magazine, October/November 2014 by Jim Brazell and in the American Society for Mechanical Engineers Journal of Robotics and Mechanisms, The Next Wave of Technology, forthcoming 2014-2015.
  14. 14. Cyber Physical Systems Cyber Systems Technology Transformation
  15. 15. http://www.gadgetspage.com/wp-
  16. 16. http://img9.joyreactor.com/pics/post/gif-cats-iRobot-vacuum-cleaner-278519.gif
  17. 17. http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew RobotBeerfromPicoView
  18. 18. http://www.tek-lado.com/wp-content/uploads/Necomimi-on-Sale-600x393.jpg Shippo’s Neurowear
  19. 19. http://neurogadget.com/wp-content/uploads/2012/09/Necomimi-successor-Shippo-brain-controlled-tail-Neurowear-e1348342289528.jpg Shippo brain-controlled tail Neurowear
  20. 20. www.tstc.edu
  21. 21. (Harbor Research, 2003)
  22. 22. (Harbor Research, 2003) 1994 - 2004
  23. 23. (Harbor Research, 2003)
  24. 24. (Harbor Research, 2003) 2004 - 2014
  25. 25. (Harbor Research, 2003)
  26. 26. Cloud 2.0: Cyber Physical Systems Cyber physical systems are at the heart of the design, manufacture, installation, operation, and sustainability of private corporate, state, and national infrastructure across the U.S., yet these systems are highly vulnerable to cyber exploitation. The Need for a Transdisciplinary Approach to Security of Cyber Physical Infrastructure, Springer, Book Chapter, 2013, Brazell
  27. 27. April 15, 2015 – “Similar to the need of the United States’ computing industry to collaborate in the 1980’s to enhance semiconductor manufacturing efficiency, fulfilled by Sematech in Austin, the Department of Information Resources Cybersecurity Council is instrumental in forming the Texas Cybersecurity Institute. Programs are designed to leverage the State’s network of State Agencies, Designated Centers of Academic Excellence in Information Assurance, and the industrial sector with a special emphasis on energy CIP.”
  28. 28. The Future is Here: IT Prime Time 1. Strategy of Technology 2. IT Workforce Context 3. Human Capital Strategy
  29. 29. Cyber Physical Critical Infrastructure Emergency services, telecom, energy, law enforcement, fire departments, utilities, public works, medical, industrial facilities, banking and finance, transportation and tourism, federal and municipal services, agriculture and food, and national monuments and icons. The Need for a Transdisciplinary Approach to Security of Cyber Physical Infrastructure, Springer, Book Chapter, 2013, Brazell
  30. 30. Source: Harbor Research, 2003 Cyber Physical Systems
  31. 31. Utilities A California study indicates that peak-rate usage can be shaved by 20 percent if utilities used Automated Meter Reading (ARM) for accurate pricing information--each megawatt of reduction can equate to $400,000 in savings per year (Jackson, p. 1) saving California utilities and consumers at least $5 billion a year. http://www.utilitiesproject.com/documents.asp?grID=85&d_ID=2402 More than 25 million AMR units installed on gas (21 percent), water (11 percent), and electric utility (16 percent) meters. 200 million units yet to be changed out to AMR (Jackson).
  32. 32. SwRI, Patent thin-nickel-strip magneto-strictive sensor (MsS™). Applicable to airplanes, ships, plants, pipelines and bridges. US 80 billion square feet of commercial and government facilities and buildings, and more than 100 billion square feet of dams and bridges (Sensametrics). One trillion dollar market (Elgamal). http://www.swri.org/3pubs/ttoday/fall03/Future.htm SwRI MsS™ http://www.swri.edu/3pubs/IRD2002/14-9285.htm Critical Infrastructure Protection (CIP) Market Worth $105.95 Billion by 2018 according to a new Report from Markets and Markets. http://www.marketsandmarkets.com/Market-Reports/critical-infrastructure-protection-cip-market-988.html
  33. 33. Telematics http://www.itsdocs.fhwa.dot.gov/JPODOCS/REPTS_TE/13599.html http://www.teradyne-ds.com/telematics/telematics01a.htm SwRI Transguide Telematics market to grow at a CAGR of 22.67 percent CAGR percent over the period 2012- 2016 (ResearchandMarkets.com). TELEMATICS http://www.researchandmarkets.com/research/tpscpq/global_telematicsGlobal
  34. 34. ttp://www.itsdocs.fhwa.dot.gov/JPODOCS/REPTS_TE/13599.html ttp://www.roadtraffic-technology.com/contractors/traffic_man/electrosonic/electrosonic1.html Operations Centers Air Land Sea Space Cyber Since 1998, Transguide has 15 percent reduction of accidents and has cut emergency response time by 20 percent. (Texas DOT). .S. ITS to exceed $450 billion by 2015 (Hagler Bailly Services).
  35. 35. August 5, 2014 – “Reminiscent of 911 attacks, fires blaze in Texas cyber attack. Emergency operations are underway as two of Texas’ largest oil and gas processing plants were turned into megaton bombs near city centers Houston and Corpus Christi. The Cyber Red Guard from Iran has taken responsibility for the event reportedly stealing data from Texas Railroad Commission and the energy companies to trigger the kinetic attack through cyberspace. Property and casualty claims are expected to skyrocket...”
  36. 36. Apple Insider, Saturday, August 02, 2014, 08:42 pm PT (11:42 pm ET) Al-Qaeda prefers Android over Apple's iOS By Daniel Eran Dilger Apple's iOS has taken majority market share in education, government and the enterprise, but Google's Android has become the favored mobile platform among Al-Qaeda operatives. http://appleinsider.com/articles/14/08/02/al-qaeda-prefers-android-over-apples-ios
  37. 37. /robonaut.jsc.nasa.gov/iss/#issmission Think beyond walking, talking robots.
  38. 38. http://ces.cnet.com/2300-31045_1-10002192-9.html?s=0&o=10002192 Chevy Volt
  39. 39. http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew RobotBeerfromPicoView
  40. 40. http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew Beeriscriticalinfrastructure, right?
  41. 41. Cloud 2.0: Cyber Control of Operational Technology SystemsCloud: Cyber Systems Technology Transformation
  42. 42. April 15, 2015 – The purpose of the Texas Cybersecurity Institute is to: (1) enable cyber physical systems security and cooperative incident management services for information sharing, collaboration, and coordination in multi-sector environments; (2) promote public-private partnerships for policy and programs related to the development of human and intellectual capital for education, workforce, economic development systems relevant to cyber physical systems; (3) create collaborative multi-stakeholder laboratories and research, development, and commercialization initiatives to promote public welfare and the security of critical infrastructure systems and processes; and (4) design necessary approaches to science, technology and public policy that effect public safety and cybersecurity critical infrastructure as a service.
  43. 43. – Southern Methodist University – University of Texas, Dallas – University of Texas San Antonio – Our Lady of the Lake University – Texas A&M University San Antonio – St Philip’s College – San Antonio College – Texas A&M University – Texas A&M University Corpus Christi – University of Dallas – University of North Texas – University of Texas, Austin – University of Houston – University of Texas, El Paso – Rice University – Richland College (Dallas CCCD) The goal of the program is to reduce vulnerability in our national information infrastructure by promoting higher education in information assurance (IA), and producing a growing number of professionals with IA expertise in various disciplines. NSA/CSS Texas’ Nationally Designated Centers of Academic Excellence in Information Assurance Source: Chris Cook, Cyber City USA, San Antonio Texas, Cyber Since 1949
  44. 44. December 10, 2017 -- “Cyber is a domain of warfare, terrorism, and crime, while simultaneously being the platform and engine for economic, civil, and democratic development in the 21st century. Texas now leads the nation at the intersection of public safety, cybersecurity and operational technology with all State Agencies at Cybersecurity Maturity Level 4 or 5 rating.”
  45. 45. • Minimal cyber awareness • Minimal cyber info sharing • Minimal cyber assessments and policy & procedure evaluations • Little inclusion of cyber into Continuity of Operations Plan (COOP) • Leadership aware of cyber threats, issues and imperatives for cyber security and community cooperative cyber training • Informal info sharing/ communication in community; working groups established; ad- hoc analysis, little fusion or metrics; professional orgs established or engaged • No assessments, but aware of requirement; initial evaluation of policies & procedures • Aware of need to integrate cyber security into COOP • Leaders promote org security awareness; formal community cooperative training • Formal local info sharing/cyber analysis. initial cyber-physical fusion; informal external info sharing/ cyber analysis and metrics gathering • Autonomous tabletop cyber exercises with assessments of info sharing, policies & procedures, and fusion; routine audit program; mentor externals on policies & procedures, auditing and training • Include cyber in COOP; formal cyber incident response/recovery • Leaders and orgs promote awareness; citizens aware of cyber security issues • Formal info sharing/ analysis, internal and external to community; formal local fusion and metrics, initial external efforts • Autonomous cyber exercises with assessments of formal info sharing/local fusion; exercises involve live play/metrics assessments • Integrate cyber in COOP; mentor externals on COOP integration; formal blended incident response and recovery • Awareness a business imperative • Fully integrated fusion /analysis center, combining all-source physical and cyber info; create and disseminate near real world picture • Accomplish full-scale blended exercises and assess complete fusion capability; involve/ mentor other communities/entities • Continue to integrate cyber in COOP; mentor externals on COOP integration; formal blended incident response and recovery LEVEL 1 Initial LEVEL 2 Advanced LEVEL 3 Self-Assessed LEVEL 4 Integrated LEVEL 5 Vanguard Cybersecurity Maturity Level of Texas State Agencies Source: Greg White, Ph.D., UTSA, CIAS, 2014
  46. 46. January 24, 2018 – “…by focusing on situational awareness, Texas Cybersecurity Institute turns data into actionable knowledge using A.I. 2.0 techniques from new field labeled ‘Artificial Psychology’”.
  47. 47. http://www.tradingmarkets.com/featured_contributors/how-to-manage-investment-information-overload- 1583594.html
  48. 48. January 24, 2018 – “Texas Cyber- security Institute partners with TSTC in 2014 and now offers near real-time supply and demand management tools for IT and cybersecurity workforce.”
  49. 49. Contact: Michael A. Bettersworth Associate Vice Chancellor, Senior Advisor Texas State Technical College 512-647-8790 https://www.texastribune.org/2014/07/29/tstc-launches-center-employability-outcomes/
  50. 50. January 24, 2018 – “Texas Cyber-security Institute is funded by Texas State Agencies new calculus for IT lifecycle management pioneered by the Comptroller and DIR. The new method of calculating the value of IT assets over the lifecycle of their use increases IT effectiveness by weighing the real value of operational technology and cyber assets over time.”
  51. 51. 1. Practice for Measuring Life-Cycle Costs for Network, Security, and Information Technology 2. Practice for Measuring Benefit-to-Cost and Savings-to-Investment Ratios for Network, Security, and Information Technology 3. Practice for Measuring Internal Rate of Return and Adjusted Rate of Return for Network, Security, and Information Technology 4. Practice for Measuring Net Benefits for Investments in Network, Security, and Information Technology 5. Practice for Measuring Payback for investments in Network, Security, and Information Technology 6. Standard Guide for Selecting Economic Methods for Evaluating Investments in Network, Security, and Information Technology IT life-cycle management is the effective and efficient management of IT assets from the identification of requirements to the disposal of the assets. Texas’ New IT life-Cycle Management Calculus
  52. 52. January 24, 2018 – “Texas Cyber- security Institute works at the intersection of education, workforce, and economic development to enhance the State’ and Nation’s competitiveness.”
  53. 53. George Kozmetsky, IC2.org photo courtesy of the University of Texas
  54. 54. Education Economic Development Industry Workforce Cyber Innovation Laboratories Texas Agency Leadership
  55. 55. The Future is Here: IT Prime Time 1. Strategy of Technology 2. IT Workforce Context 3. Human Capital Strategy
  56. 56. August 4, 2014 -- “TASSCC first group in the nation to lead education reform based on the fundamental notion that cyber is the key transformative force in the STEM workforce across sectors. THECB and TEA to offer Computer Science and Computational Thinking curricula throughout the core for P-20 education using TASSCC programs of study as a model for CTE and academic students.”
  57. 57. STEM JOBS
  58. 58. STEM JOBS Audience Survey What percentage of jobs in the U.S. in 2010 are classified as STEM jobs by the U.S. Department of Commerce?
  59. 59. STEM JOBS 60% or more
  60. 60. STEM JOBS 59%- 25%
  61. 61. STEM JOBS 25%- 6%
  62. 62. STEM JOBS Less than 6%
  63. 63. 5.5% STEM JOBS 5.5% of U.S. Workforce, 7.6MM STEM Jobs in 2010 David Langdon, George McKittrick, David Beede, Beethika Khan, and Mark Doms, “STEM: Good Jobs Now and for the Future.” US Department of Commerce, Economics and Statistics Administration last accessed online October 28, 2012 http://www.esa.doc.gov/sites/default/files/reports/documents/stemfinalyjuly14_1.pdf
  64. 64. ½ of STEM Jobs are Network and Information Tech David Langdon, George McKittrick, David Beede, Beethika Khan, and Mark Doms, “STEM: Good Jobs Now and for the Future.” US Department of Commerce, Economics and Statistics Administration last accessed online October 28, 2012 http://www.esa.doc.gov/sites/default/files/reports/documents/stemfinalyjuly14_1.pdf 5.5% STEM JOBS
  65. 65. Is there a labor market shortage of STEM workers?
  66. 66. The STEM Crisis Is a Myth By Robert N. Charette Posted 30 Aug 2013 http://spectrum.ieee.org/at-work/education/the-stem-crisis-is-a-myth STEM attrition goes 10 yrs into the workforce, as 46% of #workers with a Bachelor’s degree in STEM have left the field. —Georgetown University Center on Education and the Workforce
  67. 67. http://www.brookings.edu/research/reports/2013/06/10-stem-economy-rothwell
  68. 68. According to the Bureau of Labor Statistics, NIT is projected to account for between 52% and 58% of all STEM occupations between 2008-2018 with projected NIT employment resulting in 762,700 jobs, growing more than twice as fast as the average for all occupations in the economy.[15] In “The Need for a Transdisciplinary Approach to Security of Cyber Physical Infrastructure”, Springer, Book Chapter, 2013, Brazell
  69. 69. The truth behind the curtain
  70. 70. ANTHONY P. CARNEVALE NICOLE SMITH MICHELLE MELTON, “Science, Technology, Engineering & Mathematics”, Georgetown University, Center on Education and the Workforce, October 20, 2012 last accessed October 28, 2012 at http://cew.georgetown.edu/stem/. Forecast of STEM Occupational Growth Georgetown University, Center for Education and the Workforce Job Shortages: We face a chronic shortage in STEM competencies as the demand for STEM talents grows outside traditional STEM jobs.
  71. 71. The Hidden STEM Economy, Brookings Institute, 6.10.2013 http://www.brookings.edu/research/reports/2013/06/10-stem-economy-rothwell
  72. 72. Special emphasis should be placed on the intersection of network and information technology (NIT) with the arts, cyber security, games and simulations, health, energy, transportation, environmental science, physical science and health science. http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf
  73. 73. November 14, 2014 -- “TASSCC teams with UT System and Texas State Technical College to offer Cyber-STEM Rigorous Programs of Study for all high school, community and technical college, and university students in the State.”
  74. 74. U.S. percentage of CTE students in 2004, 17-38%, in 2004, qualifying 3 levels of CTE participation. National Assessment of CTE, Interim Report, 2013, https://www2.ed.gov/rschstat/eval/sectech/nacte/caree r-technical-education/interim-report.pdf Learning for Jobs, OECD, 2010, http://www.adheperkins.com/resources/Learning%20for%20Jobs.pdf
  75. 75. “Those who complete both a strong academic curriculum and a vocational program of study (dual concentrators) may have better outcomes than those who pursue one or the other” Source: Silverberg, Warner, Fong, & Goodwin, 2004; Plank, 2001; Stone & Aliaga, 2003)” (National Alliance for Secondary Education and Transition, 2005, Career Preparatory Experiences, ¶ 3).
  76. 76. http://www.dentonrc.com/sharedcontent/utilities/clickedimage/index.html
  77. 77. Health Arts CTE Academics Student Leadership Character Citizenship Classical Contemporary Education
  78. 78. March 15, 2015 -- “San Antonio all female cybersecuity team from Southside ISD wins Cyber Patriot national competition illustrating the strength of the city’s approach to diversifying the IT pipeline.”
  79. 79. The Public The most unique combination of Cyber related elements outside the National Capital Region
  80. 80. The United States Air Force Security Service invents the field of cyber- security in 1949 in the Alamo City.
  81. 81. http://www.thenewnewinternet.com/wp-content/uploads/24th-air-force.jpg 2009 – Activation of 24th Air Force Home of Air Force Cyber
  82. 82. 91 San Antonio’s high-growth employment sectors – Projected Fastest Growing Occupations in Bexar County through 2014 Texas Workforce Commission and US Department of Labor San Antonio Business Journal by James Aldridge, Web Editor Date: Wednesday, September 26, 2012
  83. 83. San Antonio has placed one team team to national each of the past 4 years including willing 3rd (2011) and 1st (2012). https://www.uscyberpatriot.org
  84. 84. John Jay High School (2) Roosevelt High School Engineering and Technology Academy (3) O’Connor High School East Central High School (3) Medina Valley High School (3) 5 miles Smithson Valley High School (2) Boerne High School Seguin High School Holmes High School (4) Brandeis High School MacArthur High School (2) New Life Christian Academy (2) Alamo City CyberPatriot 1556 total patriot teams in 2014. 85 teams from Alamo City including 12 middle schools. Expect 100 teams in 2015. Taft High School (2) San Antonio Christian Academy Information Technology Security Academy New Braunfels (3) Stevens High School San Marcos High School Canyon Lake CAP Squadron Randolph High School La Vernia High School (3) Stacey Junior/High School Information Technology Security Academy San Antonio (3) Lackland CAP Squadron Harmony Science Academy (2) Harlandale High School Microsoft Academy Boerne Area Home Schoolers Churchill High School (2) Clark High School McCollum High School Microsoft Academy Scobee Middle School (2) McAuliffe Middle School Lee High School STEM Academy (2) Kennedy High School KIPP University Prep High School Lutheran High School McNair Middle School (3) Southwest High School (7) Krueger Middle School St. Anthony High School Brennan High School Marshall High School Nimitz Middle School (2) Alamo Heights High School (4) Hobby Middle School Canyon Lake High SchoolNew Braunfels High School Church Hill Middle School Young Women’s Leadership Academy Milton Lee T- STEM Academy Sam Houston New Tech Academy School of Science and Technology Texas Military Institute Bracken Christian School Judson High School Madison High School Steele High School Memorial Toltech T-STEM Academy Brooks Academy
  85. 85. Alamo Cybersecurity Pipeline Ph.D. in Security Related Field High School Jr./Sr or Graduate or lower division BS BS Degree seeking advanced Degree High School Graduate with basic security training BS Degree in Security Field MS Degree in Security Field Assoc. Degree in Security Field Assoc. Degree seeking Bachelor’s
  86. 86. St. Phillip’s Computer Science Network Administrator Network Security Administrator Biomedical Equip Technician Computer Maintenance Technician Computer Network Specialization E-Business Computer Support Specialist Web Developer NW Vista Computer Forensics Computer Science Digital Gaming, Simulation and Cinematics for Artists Multimedia Specialists Programming & Visualization Systems Administration New Media Communications Music Technology Palo Alto Computer Information Systems Computer Science Information Systems Systems Advanced Web Program. Network Admin CISCO Network Technology Security Academy Network Administration Network Security Personal Computer Support Administrative Comp. Tech. San Antonio College Computer Science Computer Security Geographic Information Systems Network Administrator Geographic Information Science Network Routing Accounting Technology Computer Programming Computer Help Desk Specialist Cisco Administrator Database Specialist Cisco Routing Associate Degrees and Certifications Cyber City USA San Antonio, Texas Northeast Lakeview Computer Science Mathematics Physics Criminal Justice
  87. 87. University of Texas at San Antonio Texas State University St Mary’s University Our Lady of the Lake University Wayland Baptist University Trinity University University of the Incarnate Word Texas A&M University, San Antonio Alamo Colleges San Antonio College Palo Alto College St Phillip’s College Northwest Vista College Northeast Lakeview College Alamo Academies - Information Technology and Security Academy Holmes High School Southwest High School Harlandale High School Microsoft Academy Roosevelt High School Engineering and Technology Academy Lee High School STEM RAM Academy John Jay High School Science and Engineering Academy Sam Houston New Tech Academy Harmony Science Academy Memorial High School Toltech T-STEM Academy Milton B. Lee Academy of Science and Engineering Security Hill 24th AF AF ISR Agency NSA/CSS Texas Rackspace USAA AT&T Valero CoSA/Bexar County IT University Health System Baptist Health System HEB Frost Bank UTSA Others 97 SACUCCA Monster.com IT-ology Bestica Cyber Workforce Placement
  88. 88. S.A. higher ed partners offer $9,672 bachelor's degreeBy Jennifer R. Lloyd Wednesday, March 7, 2012 • A bachelor's in information technology with information security emphasis. • Two years college-level work in high school, a year at Alamo Colleges and finish at A&M San Antonio. • Total cost: $9,672. Photo: Ralph Barrera, Austin American-Statesman / SA Governor Perry challenged universities to craft a $10,000 bachelor’s degree, though not all in higher education were fans of the idea…
  89. 89. nationalccdc.org
  90. 90. Dr. Gregory White accepts Educator of the Year Award from Colloquium for Information System Security Education. White is a computer science associate professor and director of the Center for Infrastructure Assurance and Security (CIAS) at The University of Texas at San Antonio. http://utsa-sciences.tumblr.com/post/7344218754/gregwhiteaward#sthash.BPNGGyvW.dpuf
  91. 91. SURVIVAL OF SPECIES GOVERNANCE SECURITY & SAFETY QUALITY OF CIVIL LIFE WEALTH JOBS MARKETS Cyber- STEM What is STEM? Why is STEM important?
  92. 92. What is STEM in the context of P-20 Education Practice? STEM is transformation by design. STEM is transformation of social, human, and environmental systems by human design and the unintended consequences of human design choices. STEM is a technological force changing society and social institutions. STEM is changing the structure, flow, and composition of social institutions and personal identity: family, education, work, economy, law, government, etc. From an identity perspective technology and more broadly STEM effects our worldview, our concepts of: self-efficacy, subjectivity, objectivity, privacy, time, space (place), geography, cosmology, individuality, identity, values, beliefs and culture. STEM is a process of collaboration connecting institutional silos (education, government, industry, and civil society) to satisfy community and global needs. STEM is confronting the local challenges in your community and school through the process of inquiry, design, and innovation. STEM is turning a community inward on itself to form learning communities and laboratories designed to effect local and global opportunities and challenges through collaboration and cooperation. STEM is a moral imperative to prepare all students for their future, rather than our past. STEM educational practices, ideally, today open access and opportunity in education through a balanced approach to learning that retains the important fundamentals of classical education while integrating contemporary knowledge, processes, and tools.
  93. 93. The Future is Here: IT Prime Time 1. Strategy of Technology 2. IT Workforce Context 3. Human Capital Strategy
  94. 94. January 19, 2014 -- “Mirroring the White House, Office of Science and Technology Policy, the 84th Texas Legislature has aggregated Texas State Agency funding for education among non-education agencies to pool investment in Cyber-STEM programs.”
  95. 95. OSTP ARPA Education P-20 Education Transformation
  96. 96. Education Economic Development Industry Workforce Cyber Innovation Laboratories Texas Agency Leadership
  97. 97. Education Economic Development Industry Workforce Cyber Innovation Laboratories TASSCC
  98. 98. Education Economic Development Industry Workforce Cyber Innovation Laboratories You
  99. 99. Twitter #radicalplatypus @radicalplatypus
  100. 100. Texas Association of State Systems for Computing and Communications The Future is Here: IT Prime Time Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria http://www.ventureramp.com jim@ventureramp.com @RadicalPlatypus, Twitter

×