• Welcome to the Online Discussion Groups, Guest.

    Please introduce yourself here. We'd love to hear from you!

    If you are a CompTIA member you can find your regional community here and get posting.

    This notification is dismissable and will disappear once you've made a couple of posts.
  • We will be shutting down for a brief period of time on 9/24 at around 8 AM CST to perform necessary software updates and maintenance; please plan accordingly!

Do You Know Your Critical Data?

With the regulatory legislations in data protection such as GDPR / KVKK, an accepted understanding of how to obtain, process, share and protect data, especially personal data, has started to develop. Data governance capability is one of the most important indicators of the maturity level of this understanding in a company. I will address the process of identifying critical data, which is one of the primary steps of data governance, through a few questions.
With the regulatory legislations in data protection such as GDPR / KVKK, an accepted understanding of how to obtain, process, share and protect data, especially personal data, has started to develop. Data governance capability is one of the most important indicators of the maturity level of this understanding in a company. I will address the process of identifying critical data, which is one of the primary steps of data governance, through a few questions.
How Important is Identification of Critical Data?
Organizations are operating under a downpour of data. And its data processing skills affect the production of the expected value from the enterprise. These skills should be spread in a balanced way in the fields of people, processes, and technology. So, relevant roles must be defined, task assignments must be made, processes with measurable goals must be defined, and data discovery/governance technologies must be included in the system.
Every organization is an entity that creates value for its stakeholders through business processes with different functions. Different units in the organization perform these functions; Such as Human Resources, Accounting, Marketing, Sales, and Information Technology units. These functions allow the organization to serve its purpose and achieve its goals. Units such as Human Resources and Accounting also have databases that contain data to fulfill the functions expected from them.
To be able to make fast and accurate decisions about which data from many different sources will be kept, which ones will be destructed or erased, which ones will be shared with whom, and under what conditions, we need to have some criteria. I believe that the degree of criticality is the most essential criterion to be considered in this regard.
Continue reading: https://gopolat.medium.com/do-you-know-your-critical-data-e6a4f9210be9
  • Like
Reactions: Kathleen Martin

Watch out for the top Big Data and Data Science roles in 2022

Data science and big data support a wide spectrum of job opportunities, explore the top data science roles for 2022
The rise of data science has come to the accompanying explosion in roles in some way that involves data. No wonder it is one of the hot and progressive fields of technological applications in current times. Perhaps the best job market right now converges in the field of data science. Meanwhile, this emerging field is revolutionizing technology and industries alike. As industries across all verticals become more data-driven, it influences the jobs market and the skills that are required. As we discover new data touch points and ways to analyze them, the society we reside in, our daily lives, and the nation’s economy become more reliant on the data. This is also why data science and big data support a wide spectrum of job opportunities.
While data scientist is heralded as the sexiest job of the 21st century, in recent years, job roles like data architect, data analyst, are gaining more traction. Let’s have a quick overview of the most common job roles in data science and big data.
Data Statistician
Average Pay in India: INR 518,935
A Data Statistician collects, analyses, and understands qualitative and quantitative data by using statistical theories and methods.
Skills: Database systems (SQL and NoSQL), Distributed Computing, Data editing and cleaning, Analysis tools (MatLab, R), Statistical software (SAS, SPSS)
Business Analyst
Average Pay in India: INR 700,000
A business analyst is proficient in the skill of linking data insights to actionable business insights and can use storytelling techniques to spread the message across the entire organization. 
Skills: SQL, MS Office, Storytelling, conscious listening, Power BI 
Data Engineer
Average Pay in India: INR 830,088
A Data Engineer focuses on the development, deployment, management, and optimization of data pipelines and infrastructure to transform and transfer data to data scientists for querying.
Skills: Programming languages (Java, Scala), NoSQL databases (MongoDB, Cassandra DB), frameworks (Apache Hadoop)
Data Administrator
Average Pay in India: INR 682,476
Data Admin has to ensure that the database is accessible to every stakeholder in the organizations, is performing legitimately, and that the necessary safety measures are in place to keep the stored data safe and immune to hacking.
Skills: ERP, Data modeling and design, Java, HTML, Database management system (Oracle 11g, Microsoft SQL Server, IBM DB2, Sybase and MySQL), Knowledge about operating systems (Windows, Linux, UNIX), Management Of Information Systems (MIS).
Continue reading: https://www.analyticsinsight.net/watch-out-for-the-top-big-data-and-data-science-roles-in-2022/

Attachments

  • p0007266.m06917.data_science.png
    p0007266.m06917.data_science.png
    443.4 KB · Views: 45

Getting A Seat at The Table: Women in Tech

In the post pandemic world, as the wave of digitization overwhelmed all aspects of human existence, one would think there would be a slew of newer opportunities in the tech sector. But are those opportunities open to all? Can women consolidate their place in the world of technology just like men have in the past few decades? The answer is obviously not very reassuring and the reasons why they have not been able to make huge strides are complex and varied.
Women in the Workforce
To ensure equal participation by women in the tech sector, we need to start by looking at the root causes of disparity. We need to examine what kind of educational degrees are accessible to socially and economically marginalized girls and how women, even those who were gainfully employed, have been impacted by the global pandemic. Many surveys have shown us over the last two years just how precarious jobs for women are. Post the pandemic, these numbers may have shrunk even further. While a mere 7% men lost their jobs following the first lockdown in 2020, 47% women in India had to part ways with their jobs, as per Daniela Bas, director, UNDESA and Department of Economic and Social Affairs, UN. 
With hours of unpaid domestic work and cases of domestic violence on the rise, pandemic hit women harder than men. This led to higher burnouts and exhaustion rates among women as they balanced domestic work with professional work on a daily basis. Organizations still need to put some work into actually retaining the jobs of women through better management techniques. 
Continue reading: https://english.sakshi.com/news/corporate/getting-seat-table-women-tech-152178

Attachments

  • p0007265.m06916.gitanjali_singh_head_of_strategy_and_client_success_visionet_bfsi_1647162617.jpg
    p0007265.m06916.gitanjali_singh_head_of_strategy_and_client_success_visionet_bfsi_1647162617.jpg
    23.9 KB · Views: 45
  • Like
Reactions: Brianna White

What Advice Would Women in Tech Give Their Past Selves?

This week saw 2022’s International Women’s Day — an internationally observed day of recognition for the achievements of women every March 8th, an annual marker of what the U.S. has declared Women’s History Month.
The day is an event with special significance to Code.org, a nonprofit trying to both expand access to computer science (CS) education in schools and increase the participation of young women and other underrepresented groups in tech.
So the group found a unique way to celebrate at the beginning of March. It teamed up with Rewriting the Code, a nonprofit dedicated to supporting women pursuing careers in tech, to ask women in tech and college students a thought-provoking and inspiring question.
What advice would you give to your past self?
Continue reading; https://thenewstack.io/what-advice-would-women-in-tech-give-their-past-selves/

Attachments

  • p0007264.m06915.fe0c3208_iwouldsaycampaign_1024x576.jpg
    p0007264.m06915.fe0c3208_iwouldsaycampaign_1024x576.jpg
    63.5 KB · Views: 34

The Building Blocks of Edge Computing

The IoT has rapidly gained a profile in our everyday lives as its phenomenal growth has enabled the connection of a wide range of devices in our homes and in our working environments. The sophistication of these connected devices is continually increasing, allowing more computing to be done at the edge, instead of in the cloud. Computing at the edge of a network may be a well-established concept, but, for successful operation, edge devices must possess a broad set of capabilities to ensure optimal security, energy efficiency, connectivity, and of course, computing power.
In this article, we take a look at the building blocks which are enabling this new generation of connected devices to support IoT edge computing.
What happens at the edge?
The generic diagram of an embedded IoT device, depicted in Figure 1, illustrates the basic functions performed at the edge. The edge device monitors a range of inputs, via sensors, and alters a set of outputs, via actuators, based upon the status of the inputs. A microcontroller unit (MCU) at the heart of the device converts the data (analog to digital or vice versa) and performs various operations on it, depending on the specifics of the application. The MCU will also be equipped with resources such as memory, connectivity (to enable communication with the cloud and with other sensors), security, and real-time capabilities – such as interrupt scheduling and real-time processing.
Edge-Computing_Figure-1.png

Figure 1: Generic IoT device functionality (Image source: Essentials of Edge Computing by NXP)
The MCU is therefore the engine of the IoT device, and its computing power is dictated by the specifics of the application. Engine control units in a connected automobile, for example, may need to react to an input change in real-time, requiring sophisticated decision-making capability. To achieve near real-time responsiveness, the computing algorithm must be located locally – meaning that the MCU must have the resources to host it. Applications such as remote sensor monitoring in agriculture will generate less data and will usually have more relaxed response time requirements, meaning that decision-making can take place in the cloud, reducing the requirements on the MCU.
The MCU is therefore a critical component of the IoT device and the above description hints at some of the trade-offs facing the designer when choosing the optimum device.
Continue reading: https://www.eetasia.com/the-building-blocks-of-edge-computing/

Attachments

  • p0007263.m06914.download_17.png
    p0007263.m06914.download_17.png
    4.7 KB · Views: 46

How People Actually Make Money From Cryptocurrencies

YOU SAW THE many cryptocurrency-related Super Bowl ads, and maybe you found them weird, or deeply dystopian, or just disturbingly familiar. Nevertheless, perhaps you believe the blockchain has financial rewards left to reap and want to jump in, or you’ve already got some of your money tied up in cryptocurrencies via companies like Coinbase and FTX that were advertising during the big game.
What now? Keeping track of the ups and downs of Bitcoin, Ethereum, and other crypto coins and actively trading on those fluctuations can be a full-time job. Day-trading, basically. And jumping into NFTs, the digital baubles you can mint, buy, or sell, is still daunting for many.
For many crypto traders who are in it for the medium to long haul, there are some other ways to make money on cryptocurrency that’s just sitting in your crypto wallet: staking and yield farming on DeFi networks. “DeFi” is just a catchall term for “decentralized finance”—pretty much all the services and tools built on blockchain for currencies and smart contracts.
At their most basic, staking cryptocurrency and yield farming are pretty much the same thing: They involve investing money into a crypto coin (or more than one at a time) and collecting interest and fees from blockchain transactions.
Continue reading: https://www.wired.com/story/how-to-make-money-from-crypto/

Attachments

  • p0007262.m06913.money_and_crypto.jpg
    p0007262.m06913.money_and_crypto.jpg
    69.4 KB · Views: 36

What Is a Blockchain DAO (and Should You Join One)?

Crypto mania has pushed decentralization into the mainstream, but Bitcoin is only one example of how blockchain can create new structures not controlled by corporations or centralized entities. (Though it’s ubiquitous, plenty of people still don’t even know what blockchain is. If you’re one of them, stop and read an explainer here.)
The latest tech trend is the formation of decentralized autonomous organizations, or DAOs. Artists, charities, and businesses are forming DAOs, but anybody can. Recently the Republic of the Marshall Islands even passed a law giving them the same legal standing as LLCs. There are benefits to starting or joining one, and doing so may be easier than you think.
What is a DAO?
DAOs are organizations not governed by hierarchies, wherein members can vote on their direction and have a direct say in how they’re run. The organizations are accountable to members and shareholders and, in essence, managers and executives are unnecessary. Members do still have jobs that are based on their skills and the organization’s objectives overall. Small, autonomous groups called “guilds” often form within each DAO and tackle specific goals and problems.
Continue reading: https://lifehacker.com/what-is-a-blockchain-dao-and-should-you-join-one-1848636960

Attachments

  • p0007261.m06912.29ac26a03226774e29c203b4fb71c1ee.jpg
    p0007261.m06912.29ac26a03226774e29c203b4fb71c1ee.jpg
    47 KB · Views: 34

What Does The Future Hold For Bitcoin Mining?

From the outside looking in, it seems like a hard life earning a crust on the bitcoin mining breadline. Last year, when China imposed a blanket ban on the practice within its borders, a small army of miners hastily scrambled into action, powering down their machines, closing shop and redeploying their equipment overseas. Within a matter of months, China went from controlling two-thirds of all bitcoin mining worldwide to effectively exiting stage left.
Cryptocurrency miners are nothing if not resilient, but in few other industries would one have to up sticks and move country just to keep the lights on. It isn’t a case of hopping across a land border either. At considerable expense, ousted miners had to ship many tonnes of equipment from mainland China to far-flung territories such as the United States, Russia, Kazakhstan and Canada. If China left a gaping void it has been hurriedly filled, with Kazakhstan in particular cultivating a reputation as a mining hub.
Of course, things move fast in the much-maligned mining world. In recent weeks, Kazakh authorities have talked up significant tax increases for miners, some of whom are “severely damaging” the country’s energy system according to minister of digital development Bagdat Musin. The intrepid miners who made a home in the Central Asian Republic after being banished from China may soon be dusting off their passports, again.
Continue reading: https://www.forbes.com/sites/lawrencewintermeyer/2022/03/13/what-does-the-future-hold-for-bitcoin-mining/?sh=506f4954e9aa

Attachments

  • p0007260.m06911.960x0_86.jpg
    p0007260.m06911.960x0_86.jpg
    194.8 KB · Views: 36
  • Like
Reactions: Brianna White

Blockchain is big in Indonesia, but Tokocrypto wants to make it bigger

Cryptocurrency is on the rise in Indonesia. In 2021, crypto trading in the country racked up a collective US$59.8 billion in transactions, while the number of Indonesians who have crypto assets grew to 7.4 million.
Industry experts have also pointed to the decentralized nature of blockchain as a solution to many of the problems the archipelago faces with its financial system, such as the inability to reach far-flung areas, the lack of access to secure financial services, and the high cost of digital transactions.
However, while much has been said about the potential of blockchain in Indonesia, it has yet to get off the ground, according to Pang Xue Kai, the CEO and co-founder of cryptocurrency exchange Tokocrypto.
“[People] keep claiming that blockchain tech has a lot to benefit Indonesia, but so far, we still haven’t seen a lot of this technology take form,” he says. “There’s a lot of groundwork that still needs to be done.”
In light of the slow development of Indonesia’s blockchain scene, Pang and his team decided to lead by example and spearhead mainstream adoption and use of the technology in the archipelago.
Continue reading: https://www.techinasia.com/blockchain-big-indonesia-tokocrypto-bigger

Attachments

  • p0007259.m06910.tokocrypto.jpg
    p0007259.m06910.tokocrypto.jpg
    39.7 KB · Views: 41
  • Like
Reactions: Brianna White

Artificial Intelligence Is Not a Strategy. It Is a Customer Experience Accelerator

If you read the news covering artificial intelligence (AI) developments on any given day, you may feel pangs of fear and dread. From the recent UN report on AI's potential to harm human rights to the use of AI in spyware to hack into journalists' phones, it can seem as though the developers and creators of AI applications have lost control of its powerful potential.
But these reports lose sight of the more effective and well-governed developments that are supporting and optimizing real work and the interchanges happening every day between humans and AI. When AI is approached comprehensively for how it can optimize an entire system-- including the humans within that system-- it has a higher chance of delivering meaningful impact.
The Global AI Agenda, an MIT report from March 2020, found that customer care was one of the top use cases for AI. 60 percent of executive respondents believe AI will play a role in 11 percent to 30 percent of their processes-- a considerable but not necessarily dominant influence on how most businesses operate. The overall acceleration of digital adoption has likely changed these metrics post-pandemic and the need to implement digital and AI solutions is now imperative to be competitive.
Bots are a good place to start.
One of the fastest areas of adoption for AI in the enterprise is chatbot applications. It's often a good place for companies to get started with AI and see quick results. By 2024, Insider Intelligence predicts that consumer retail spend via chatbots worldwide will reach $142 billion-- up from just $2.8 billion in 2019.
Continue reading: https://www.inc.com/brett-weigl/artificial-intelligence-is-not-a-strategy-it-is-a-customer-experience-accelerator.html

Attachments

  • p0007258.m06909.gettyimages_983207568_497051_bhtzgr.jpg
    p0007258.m06909.gettyimages_983207568_497051_bhtzgr.jpg
    98.9 KB · Views: 34
  • Like
Reactions: Brianna White

Five Trends In AI And Analytics That Could Put Your Business Ahead

Business trends are evolving. The Covid-19 pandemic shed light on the importance of data and generating meaningful outcomes from it. Companies need to do more to stay on top of changing buyer behavior, talent retention and supply chain dynamics, all of which have led business leaders to revisit their data analytics strategies and kickstart their digital transformation journeys.
Companies are making analytics and artificial intelligence (AI) critical components of their businesses. They harness the power of data to transform their businesses and succeed in these unprecedented times. Industry leaders need to anticipate the newest trends and study market risks and other factors that play into the success of their companies. Let’s review some current topics driving AI and analytics adoption.
1. Analytics And AI At The Strategy Table
Industry leaders across the board rely on analytics to drive their most strategic use cases. Analytics can generate productivity, fuel innovation and create a sustainable competitive edge. Analytics and AI now occupy a significant seat at the strategy table for organizations. Analytics can fuel loyalty and retention, end-to-end visibility of the supply chain, predictive maintenance, fraud detection, cybersecurity and sustainability. To be successful in these endeavors, corporations need to:
• Align their enterprise, analytics and data strategies.
• Design a well-governed, agile and collaborative operating model.
• Create strong partnerships with academics, experts and technology vendors.
2. Growing Investment In Data Management
One foundation of strategic decision making is high-quality data. With the sheer amount of data many organizations possess, most make it a priority to optimally leverage it. Data management has long been a crucial part of most successful companies' strategies, but many companies don’t maximize their potential.
The results of research studies show that about 68% of data isn’t analyzed within most organizations and up to 82% of enterprises are inhibited by data silos. One way to get the necessary analytics is to process data resources with AI. 
Continue reading: https://www.forbes.com/sites/forbestechcouncil/2022/03/10/five-trends-in-ai-and-analytics-that-could-put-your-business-ahead/?sh=5f4d4bd54705

Attachments

  • p0007256.m06907.960x0_8.jpg
    p0007256.m06907.960x0_8.jpg
    54.7 KB · Views: 37
  • Like
Reactions: Kathleen Martin

Blockchain-Integrated Internet of Nano Things Can’t Be Stopped

An article by Ferry Emveep. Emveep is a company delivering custom software solutions and dedicated developer teams for startups and businesses.
The Internet of Nano Things is one of the most talked-about topics in today’s tech world. However, there are many challenges facing IoNT. The author speculates that several challenges can be solved with Blockchain-based on author sources.
This article will discuss the differences between the Internet of Nano Things (IoNT) and the Internet of Things (IoT) and how Blockchain addresses the challenges of IoNT.
What is the Internet of Nano Things (IoNT)?
The Internet of Nano Things, or IoNT, has roots in IoT and nanotechnology, according to StatNano, which defines it as “an interconnected system of very small devices that transfer data over a network.”
It’s important to note that the next computing revolution will be entirely outside the traditional desktop environment. Between 2021 and 2027, it is expected to grow at a compound annual growth rate of 18.2% globally.
What are the differences between IoNT and IoT?
The internet of nano-things is similar to the Internet of Things. The devices connected within it are miniaturized and small enough to be classified as nanoscale, which ranges from .1 to 100 nanometers (a nanometer is one-billionth of a meter). According to Nano.gov, a sheet of paper is 100,000 nanometers thick, one inch contains 25.4 million nanometers, and DNA has a diameter of 2.5 nanometers.
Most current technologies, such as environmental sensors in cars and homes, or accelerometers and gyroscopes in smartphones that help people use navigation or location services, are examples of tiny devices that can be miniaturized to fit within small volumes. Almost all modern automation is based on nanoscale devices that can communicate to provide more intelligent technical options. These technological integrations will drive innovation in every industry imaginable, from automotive to healthcare and in everyday household goods.
The Internet of Nano-Things is a network of nano-sized objects. Electronics are not only advanced in terms of design and manufacturing, but they are also highly well-packaged to prevent unwanted interference. Because of the electromagnetic methods used to allow these devices to communicate wirelessly, interference is complicated to manage.
Nanotechnologies incorporated into an Internet of Things system are highly specific to the application. An intelligent factory, for example, will use IoNT devices to track temperature, humidity, gaseous fumes, water quality, and possibly carbon emissions from systems’ exhaust. Connected vehicles equipped with similar miniaturized sensors, for example, could predict proximity, environmental conditions, and location data to help ensure the safety and accuracy of vehicle-assistance systems.
On the other hand, it is an innovative city application of interconnected nanodevices. The integrated technologies could be responsible for monitoring toxic gas or particulate concentrations, with devices planted at various locations throughout the city to monitor pollution levels to maintain the health and safety of the residents.
Why Have IoNT?
The internet of nano things makes it possible to connect multiple nanodevices over a network. This, when combined with other related technologies such as big data, cloud computing, and machine learning, can open up a world of possibilities.
Continue reading:https://iotbusinessnews.com/2022/03/10/79043-blockchain-integrated-internet-of-nano-things-cant-be-stopped/ 

Attachments

  • p0007255.m06906.nano.png
    p0007255.m06906.nano.png
    568.6 KB · Views: 37

Back to Basics: 3 Challenges We Still Need to Overcome In IoT

There’s no doubt that the IoT is now officially reaching scale. Analyst firm Statista says that by 2025, more than 75 billion connected devices will be in use globally.  
Innovators have experienced a few successes (or false starts) and are thinking about the broader challenges in building an IoT ecosystem. They want to learn about how to manage connections throughout the project’s lifecycle, how to offload processing from devices to the cloud, how to work with provisioning and credentials, and much more.  
These growing pains have been persistent. Many companies are just starting their IoT initiatives and may not have previous experience. Concerns like security, cloud integration and SIM lifecycle management may remain on the back burner – until something goes wrong.  
Security Is Key 
When people build an IoT system, security tends to be given lower priority for solution and device developers – the process was often seen as “someone else’s problem.” IoT systems might fail to get periodic security updates, making them vulnerable to hackers and other malware attacks. Without a secure foundation and frequent updates, data is at risk. With breaches at an all-time high, IoT innovators recognize the need to have a layer of security to put the devices on.  
One use case that shows how IoT security is being implemented is an intelligent irrigation management solution that provides services to various grower types. The company needed a cloud-based architecture to simplify the transition from their legacy on-premises systems to AWS by providing a secure, bi-directional cellular link between their edge devices and their AWS virtual private connection (VPC).   
Companies are beginning to invest in solutions that route data that hackers cannot access. Keeping IoT devices off the public internet by using private networks built from the ground up can help secure deployments, reducing or in some cases eliminating many of the attack vectors that have negatively impacted previous IoT projects. Customers have two choices when taking this path: 
  • Route traffic directly to their back end of choice (cloud or on-premises) without using the public internet
  • Create a private IoT LAN to route data from device to cloud and back
Continue reading: https://www.toolbox.com/tech/iot/guest-article/challenges-we-still-need-to-overcome-in-iot/

Attachments

  • p0007254.m06905.shutterstock_1888096297.jpg
    p0007254.m06905.shutterstock_1888096297.jpg
    20.1 KB · Views: 39

Five Tips For Starting Or Transitioning To A Career In IoT

The demand for skilled technical professionals has never been higher. Right across the technology employment spectrum, disruptive startups are creating brand-new solutions, and global enterprises are rapidly digitalizing and innovating to stay current. That requires technical talent, and with 70% of tech companies facing skills shortages, it is an exciting time for both new STEM graduates and established technical professionals to consider their career options.
The Internet of Things space is a particularly hot sector when it comes to building a new career path. The size and pace of the global IoT market continue to swell: The cost of IoT devices is tumbling, enabling new use cases on a massive scale that previously were not possible. Technology consultant Gartner predicts that the IT services for the IoT market will become a $58 billion opportunity by 2025, up 34% CAGR from 2020. Though undoubtedly impressive and vast, such numbers are easy to believe considering the untapped potential that IoT communication still holds.
So how can tech specialists get their start in this booming sector? Well, as a tech leader at EMnify, I know there is plenty of demand for talented STEM workers in the IoT space. My own company has multiple hiring managers in both the technology and go-to-market functions actively seeking talent to match our growth ambitions.
But despite the tech labor shortage, we of course do not simply hire every applicant. Whether you are a senior engineer working in another sector but interested in a change or a recent STEM graduate who is keen to start their career in IoT, there are certain attributes and mindsets that will set you up for success. Here are five ways you can make your application stand out — and prepare to start or transition into a career in IoT:
1. Be Willing To Upskill
While a university degree is still a mandatory requirement for many companies, a growing number of employers now acknowledge that self-taught candidates, or candidates with equivalent professional experience, can be just as effective. This shift is also bringing a new expectation that all employees show a willingness and interest in upskilling through relevant certifications, short-term programs, online courses and other professional development routes. Even if you have a STEM degree, make sure you can also demonstrate a clear commitment to continuous learning and self-improvement.
2. Be Forward-Looking
Technology is constantly in a state of flux: The IoT as it is known today used to be seen as the next big thing, but by now it is a well-established technology landscape that is already integral to the operations of a significant percentage of modern businesses. The question is, and should always be, what is next? Be curious and have an opinion about what the future holds for IoT communication — and be ready to back it up if your interviewer asks.
Continue reading: https://www.forbes.com/sites/forbestechcouncil/2022/03/10/five-tips-for-starting-or-transitioning-to-a-career-in-iot/?sh=49f0b8bc55cc

Attachments

  • p0007253.m06904.career_in_iot.png
    p0007253.m06904.career_in_iot.png
    211.4 KB · Views: 38
  • Like
Reactions: Kathleen Martin

Your Guide to Remote IoT Device Management

IoT is a network of various connected systems, devices, and sensors. Gateways, machines, and computers are aligned together to transfer information over the wireless network without human interference. IoT links people with things remotely, as well as things to things at the same time. The number of connected systems can be in the billions. Tracking and managing your IoT devices is essential to ensure the growth and security of your business. This is where remote IoT device management comes in.
What is IoT Device Management?
Internet of Things device management is a list of processes that include equipping, validation, configuration, monitoring, and analysis of the connected devices in an IoT environment with the objective to give and support the spectrum of their functional abilities. This is why an effective and secure IoT device management solution is highly recommended to connect multiple smart assets.
Challenges of Managing IoT Devices Remotely
In the era of the Internet of Things, the systems have the ability to utilize analytics and business intelligence faster and better than a human being. The reactions are recorded, and adjustments are made without any human involvement or acknowledgment.
Businesses today depend more on IoT devices to make better divisions, for cost reduction, and to improve efficiency among the businesses. Although the IoT networks are rapidly becoming a part of the business operations, there are still many challenges in managing the networks. From connectivity to scalability and security, let’s look at some of the challenges facing remote IoT device management.
Security
One of the biggest challenges facing IoT device management is cybersecurity, as it concerns technological information. Cybersecurity doesn’t just focus on vulnerability or weakness of data connection but on everything linked to the hardware.
Let’s take an IoT sensor smart manufacturing unit, for example. In the equipped units, a manager or maintenance associate can utilize a mobile device to check the status of the device, read data, or send commands. Now, what if an attacker tries to attack and seize the information through the machine using the weak security measures of the system? There is a possibility that the technician would shut down all the systems and linked machines, which would overheat or overload the system. It would also give access to the data of the organization.
Continue reading: https://www.iotforall.com/complete-guide-remote-iot-device-management

Attachments

  • p0007252.m06903.acompleteguideaboutremoteiotdevicemanagement_2_1024x768.jpg
    p0007252.m06903.acompleteguideaboutremoteiotdevicemanagement_2_1024x768.jpg
    142.8 KB · Views: 38
  • Like
Reactions: Kathleen Martin

Hard to Reach Places: Smart Drones Making Infrastructure Inspection Safer

UAS are proving to be a powerful tool for ensuring the success and safety of all sorts of infrastructure. Drones can be operated at a fraction of the cost of traditional inspection crews, and, when equipped with the latest technologies, they can deliver the highest quality in imaging and positioning data. In 2021, Commercial UAV News held the "Hard to Reach Places" webinar to provide an overview of the opportunities, barriers, and successful use cases with a key focus on the latest technologies and project results. To discuss this, CUAV invited Jeremy Sofonia from Emesent, Rese Cleaver from DroneUp, Marc Flamm from Skydio, and Conor Ferguson from WISPr Systems.
Emesent's Hovermap is a lightweight (around 400 pounds) mobile lidar mapping payload that uses Velodyne's VLP 16 Puck LIDAR sensor. It utilizes SLAM algorithms to operate in GPS denied environments and some advanced autonomy algorithms for collision avoidance and other autonomy features. During the webinar, Sofonia focused on safety, efficiency, cost-effectiveness, and new insights for drones in asset management. One of the things that Hovermap excels at is in versatility and deployment options since it mounts on a drone, but it also mounts on Boston Dynamics' SPOT, a backpack, a protective cage, or even on a vehicle. With a single purchase, users can access many different applications for infrastructure inspections, such as mining, rail and road, plenty of indoor locations, search and rescue, and urban environments.
To demonstrate how Hovermap works within hard-to-reach places, which in many cases are GPS denied environments when it comes to drone operations, Sofonia showcased some of Emesent's operations. These included scans of a one-kilometer underground mine, a pump house at a hydroelectric station, an indoor stockpile at night, and the above and below ground data collected in a single scan of a substation in Stuttgart, Germany.
"One of the ways that we do this is through our fully autonomous BVLOS advanced systems," Sofonia said. "We collect a real-time point cloud that's fed back to the operator, as long as we can maintain the communication over the drone, allowing us to navigate these GPS denied environments easily, especially with our tap-to-fly kind of approach on the tablet with live map streaming. We also have safety features, like a smart return to home feature when the battery gets low, or if there's too much dust, and collision avoidance to detect and avoid even the smallest obstacles."
According to Sofonia, one of the highlights of Emesent's technology is its processing times, where a 20-minute scan corresponds to a 20-minute point cloud post-processing. Also, its capabilities of merging the data into a single unified cloud are "ahead of the class as far as their ease of use and capabilities."
Cleaver talked about the drone market landscape and how drones will bring considerable value to the infrastructure industry. She believes drones will make the most difference in three critical points: cost, location, and workforce. In terms of cost, Cleaver stated drones are way cheaper than keeping up a whole team of people out somewhere. They also capture high-resolution data within a shorter period than traditional means, easily reach high and tight places that are unsafe, and improve early detection of issues, leading to reduced maintenance costs. Then we have location, where drones eliminate the site-to-site travel time and provide quick and easy access to remote structures, improving the monitoring regularity and optimizing asset performance. For example, DroneUp is seeing an average of eight inspections a day using drones instead of three. Finally, with site-to-site travel eliminated, infrastructure teams can perform meaningful work.
Continue reading: https://www.commercialuavnews.com/infrastructure/hard-to-reach-places-smart-drones-making-infrastructure-inspection-safer

Attachments

  • p0007251.m06902.9919041567f3206cb9dcba45ed8260a8.jpeg
    p0007251.m06902.9919041567f3206cb9dcba45ed8260a8.jpeg
    544.8 KB · Views: 49
  • Like
Reactions: Kathleen Martin

Global Regulation of Drones

Background
Widespread use of drones is now in place around mining, remote exploration works and repair, maritime work, geological survey, agricultural land management, urban transport and delivery, aerial photography, media, and more. Recreational take up continues to fuel market growth of drones globally, and their increasing use in areas like law enforcement, search and rescue and emergency relief is evolving very rapidly. The range of applications continues to grow at an astonishing pace and clear evidence of this continuing trend is apparent from significant increases in patent filings, foreshadowing new ideas and further evolution.
The exponential growth in the use and deployment of drones globally and of the technology underpinning their scope and operation dictates that the regulatory framework and associated security and commercial arrangements such as insurance will continue to evolve.
Historically, drone regulation has been focused primarily upon safety considerations but increasing attention will need to be paid to privacy and data protection laws. Globally, there are varying levels of maturity in such legislation ranging from comprehensive, principles-based data protection regimes, such as Europe's General Data Protection Regulation (GDPR), to the patchwork of sectoral and state laws in other jurisdictions.
The development of a consistent regulatory and operational framework for drones must also consider design and product liability issues which in turn are closely connected to the development of drone-specific airworthiness standards, including mandated 'fail-safe' functions.
International regulation
Global action to develop a harmonized approach and international coordination in relation to drones are more than worthy objectives — they are essential given the need to accommodate and integrate the international use of drones. The achievement of these objectives is no easy task as the regulation of ever-increasing drone-related operations and activities is proving to be a challenge for national aviation safety authorities around the world, not just domestically but also in a coordinated global sense.  It is a challenge that must be embraced and managed.
It is generally accepted that one of the key challenges facing regulators globally in fully realizing the potential of drones is their successful integration into the non-segregated airspace without reducing existing capacity and while maintaining safety levels currently imposed and minimizing potential dangers to other aircraft, passengers, and other persons and property on the ground.
Organisations such as the International Civil Aviation Organisation (ICAO) and the European Union Aviation Safety Agency (EASA) have vital roles to play in this regard and more broadly. The ICAO Model UAS Regulations Parts 101, 102 and 149, supported by Advisory Circulars, and its publication of Standard and Recommended Practices (SARPs) are potentially of very significant benefit to member states in reducing time and costs associated with the regulation of drones. These Regulations are based upon a review of existing regulations in Member States in a bid to share best practices that can be implemented by countries seeking to improve, or introduce, UAS regulation.
EASA is another transnational organisation attempting to bring some much-needed clarity to unmanned airspace. Established in 2002 with the aim of ensuring safety and environmental protection within the European Union, its goals in relation to UAS include managing the safe introduction of UAS into the airspace (European Plan for Aviation Safety (EPAS) 2020-2024 14.1) as well as the admirable goal of simplifying the regulatory sphere by adopting a single regulatory and certification process among Member States. Such a clear transnational policy will be of assistance in aiding the development of both safety and technology as well as simplifying the process for operators across the EU. There is little doubt that embracing an internationally coordinated implementation strategy will enable the potential benefits of this emerging technology to be more quickly realised while at the same time ensuring society is protected from its harmful risks – at least from a safety perspective.
National regulation
At a national level, especially within federal jurisdictions, the interplay between national, state and local (council, local authority or municipal) laws can make for a complex interaction. For the sake of consistency and certainty, aviation law is generally within the sole remit of the national government (see, for example, the judgment of the High Court of Australia in Airlines of New South Wales Pty Ltd v New South Wales [No 2] (1965) 113 CLR 54) and there are strong arguments that, in relation to commercial aviation using recognised aerodromes, it is (for the most part) clear cut where the boundaries of national and local legislation are drawn. In the United States, for example, the Supremacy Clause of the US Constitution (U.S. CONST. art. VI., cl. 2. 118)  provides that federal laws are supreme and therefore preempt (override) conflicting state and local regulations. Where the federal government has made clear its intention to be the sole regulator of an area, preemption is relatively straightforward. Difficulties arise where the federal government has not expressly preempted an area particularly where there is crossover with areas traditionally left to the states. Similarly, in Australia, the scope of Commonwealth “aviation” powers do not extend to commercial aspects of aviation, nor, from the recent decision of the High Court in Work Health Authority v Outback Ballooning Pty Ltd (2019) HCA 2 does the body of Commonwealth civil aviation laws exclude the application of state and territory occupational health and safety laws.
Continue reading: https://www.clydeco.com/en/insights/2022/03/global-regulation-of-drones

Attachments

  • p0007250.m06901.introbannerdesktopvarient.jpg
    p0007250.m06901.introbannerdesktopvarient.jpg
    145.6 KB · Views: 34
  • Like
Reactions: Kathleen Martin

5 Career Tips from Women Leaders in Machine Learning

Understanding how important representation, role models, and mentoring had been to my own career journey, I started a network to support other Amazon employees looking to pursue a career in machine learning (ML) and artificial intelligence (AI).
Open to anyone working at Amazon, the global Women in ML/AI group hosts regular networking events and organizes panel discussions with industry experts on career development.
To discuss learnings from our professional journey, I sat down with fellow board members, including senior documentation manager Michelle Luna, senior software development manager Anna Khabibullina and general manager and product lead Shubha Pant. Here are some of the advice we found invaluable when launching and building a career in the field.
1. Put Yourself out There and Make Connections
Luna, Khabibullina, Pant and I are all proof that there are many paths into ML and AI — from the traditional and linear, to the more unconventional.
I started out in the technology and media communications sector in Germany, where one of my first roles was in market research. This is where I realized that I wanted to understand the fundamentals of data science and ML. I have a business background, but I just kept building my network with people in the field and pursuing data science roles and internships.
fa314f2a-michelle-luna-1-150x150.jpg

Luna
Luna: “I had no real machine learning experience before I joined AWS. I had worked in language translation software 25 years ago, so I was sort of pulling at a thread from a past career, but this experience seemed to get me in the door. I have some DevOps experience too, and this applies to my role now in ML, which I hadn’t even realized.
0c4117d0-shubha-pant-e1646681836805-150x150.jpg

Pant
I would say don’t be afraid of putting yourself out there, no matter what your career path in technology has been. One big thing our members want is a place to network with other women who already work in ML. I can’t emphasize enough the importance of reaching out and building those connections.”
Continue reading: https://thenewstack.io/5-career-tips-from-women-leaders-in-machine-learning/

Attachments

  • p0007249.m06900.07ffc5dc_adomas_aleno_ysleov8m_8_unsplash_1024x683.jpg
    p0007249.m06900.07ffc5dc_adomas_aleno_ysleov8m_8_unsplash_1024x683.jpg
    68.6 KB · Views: 38
  • Like
Reactions: Kathleen Martin

Encouraging women in tech is essential to protect society against AI bias

Encouraging women in AI has never been more urgent. A study by the World Economic Forum noted a gender disparity of 78 percent male versus 22 percent female in AI and data science. This disparity isn’t just a challenge within the workforce. It reflects a highly nuanced issue that goes beyond any single workplace and if not addressed will have highly negative implications for society.
We have seen a lot of work to encourage girls and women to become interested in STEM and address gaps in digital skills at an earlier age than in the past. Yet now, there appears to be less effort to support women as they transition from higher education into a sustainable career in tech. This is a challenge for the industry. But the real problem is that as AI becomes ubiquitous in daily life, without a technology workforce that accurately reflects the structure of society, AI-based decisions are constrained by the limited societal and cultural biases of their designers. The impact of such homogeneity in AI decisions and bias has already been seen in examples such as the automation of credit card and mortgage applications, to resume screening and other areas. 
The industry challenge is not due to a lack of skills. Research from the Turing Institute suggests women are trailing behind men with industry-relevant skills such as computer science, data preparation and exploration, general-purpose computing, databases, big data, machine learning, statistics, and mathematics. Yet much of this is not due to formal skills, but rather confidence by women in stating these abilities during recruitment and in the workplace. In the tech world where technical skills are needed, soft skills are sometimes dismissed but in order to move forward, there needs to be a greater focus on leadership and mentorship to build confidence and encourage a more diverse workforce. We say that stereotypes must be combatted from a young age yet a gap remains. For example, within the tech sector, women generally have higher levels of formal education than their male counterparts yet academic citations are fewer suggesting there is a lack of confidence in sharing academic knowledge. The Turing Institute finds that only 20 percent of UK data and AI researchers on Google Scholar are women. Of the 45 researchers with more than 10,000 citations, only five were women. 
When I say that women need to have mentors and role models, I write from firsthand experience. It was only after winning a mathematics modeling competition in university that I considered a related career. This inspired me to write a blog on machine learning algorithms. The easy-to-understand method employed helped the blog garner over 5 million views, and eventually led to a career in programming. When I became a programmer and found myself working as the only woman in a room of men typically 10-15 years older, I struggled to relate and realized the need for a community of like-minded people.  
Continue reading: https://bdtechtalks.com/2022/03/08/encouraging-women-in-tech-is-essential-to-protect-society-against-ai-bias/

Attachments

  • p0007248.m06899.techtalks_logo_retina.jpg
    p0007248.m06899.techtalks_logo_retina.jpg
    17.7 KB · Views: 37
  • Like
Reactions: Kathleen Martin

Microsoft: There's a critical shortage of women in cybersecurity, and we need to do something about it

Encouraging more women to pursue cybersecurity careers is "mission-critical" to filling some of the 2.5 million open jobs worldwide and tackling a global shortage of tech skills, Microsoft has said.
Vasu Jakkal, Microsoft's corporate vice president of security, compliance, identity and management, said women and people "with more diverse perspectives" were desperately needed in the cybersecurity industry to help address the evolving threat landscape and take pressure off of overburdened IT teams.
By bridging the gender gap in cybersecurity, where a lack of female representation is fuelling unequal pay and a lack of support for women, organizations can swiftly bridge organizational skill gaps as well as diversify operational thinking, which brings its own benefits in innovation and profitability, Jakkal said.
In 2021, women represented just 25% of the global cybersecurity workforce. A survey commissioned by Microsoft Security found that, while 83% of respondents believed there was an opportunity for women in cybersecurity, only 44% of female respondents felt sufficiently represented in the industry. Likewise, 54% of women said there was gender bias in the industry that results in unequal pay and support, compared to 45% of men.
Self-limiting beliefs also need to be addressed in encouraging more women to pursue cybersecurity careers and "break through biases that limit women's career options," said Jakkal.
Microsoft's survey indicated that men are more likely than women (21% vs 10%) to feel qualified to apply for a cybersecurity job, whereas more women than men (27% vs 21%) believe men are seen as a better fit for technology fields. "That breaks my heart," said Jakkal.
"I've always felt that cybersecurity is a calling but as our survey shows, the journey isn't always easy. I've often been the only woman or person of color at the table. And, while I've tackled every challenge thrown at me, I sometimes doubted myself and struggled with imposter syndrome. Most of us do – women especially. The important thing is that over time, we find our voice and learn to speak up."
Continue reading: https://www.zdnet.com/article/microsoft-theres-a-critical-shortage-of-women-in-cybersecurity-and-we-need-to-do-something-about-it/

Attachments

  • p0007247.m06898.zdnet_logo_1.jpg
    p0007247.m06898.zdnet_logo_1.jpg
    12.4 KB · Views: 40

Exploring the 4 Types of Blockchain Technology

Blockchain technology offers decentralisation, enhanced security, faster settlements, and immutability.
The technology became popular through bitcoin.
The four main types of blockchain networks are private blockchain, public blockchain, hybrid blockchain, and consortium blockchain.
Private Blockchain
What is a Private Blockchain?
A private blockchain is a permissioned blockchain and partial decentralised system where only a single organisation has access and authority over the network.
In other words, anyone who wants to join it must ask for permission from the governing body of the blockchain, and the public people cannot access it.
A private blockchain entails invitation and only the individuals taking part in a transaction can know about it. Anyone who is managing a private blockchain network can change or edit any transactions according to their needs.
Private blockchains enable various levels that determine which users can write, read and audit the blockchain. In private blockhain platforms, users get rules that other platforms do not get. Therefore, all the nodes have to abide by some regulations to make sure that a company flows properly.
However, a private blockchain consumes much energy and power and is more vulnerable to risks, hacks, and data breaches or manipulation. It is easy for bad actors to imperil the whole network.
In private blockchain platforms, the entries can be changed by the owner and organisations utilise the distributed ledger technology, however, they do not publicise their data. Private blockchain entails each user to have a substantiated identity since that characterises the type of access they have. These are renowned enterprise solutions that enable administering the resources and actions that everyone conducts. They allow faster transactions and are more energy-efficient to maintain.
In addition, as enterprises entail privacy, private blockchain use cases seems an ideal fit in this case. Without real privacy, their competition can enter the platforms and disclose priceless information to the press. This can influence the brand value immensely in the long run.
Private Blockchain Features
  • Full Privacy
  • High efficiency
  • Stability
  • Low fee
Public Blockchain
What is a Public Blockchain?
A public blockchain is a blockchain network with no restrictions which means that anyone can join it whenever they want. Anyone can see the ledger and get involved in the consensus process.
Continue reading: https://medium.datadriveninvestor.com/exploring-the-4-types-of-blockchain-technology-eafb1e2d5394

Attachments

  • p0007246.m06897.1_cymce11_vcwpzknk8mymbq.jpeg
    p0007246.m06897.1_cymce11_vcwpzknk8mymbq.jpeg
    169.5 KB · Views: 35
  • Like
Reactions: Kathleen Martin

How the shift to edge computing is impacting enterprises

It comes down to simple physics and cost: In cloud computing, high availability and sub-second response times are nearly impossible, or at least unfeasibly expensive.
This drawback has given rise to edge computing, which moves computing resources to the physical location of data creation, or the so-called “edge” of the internet. The touted results are real-time speeds and dramatically increased availability, flexibility, resiliency and consistency of the data.
According to Dave McCarthy, research vice president for cloud and edge infrastructure services at IDC, there has been a shift in mindset from “…anything and everything should go to the cloud, to ‘Let’s use the cloud for what it’s good for, and use other things when they make more sense.’”
Edge computing has increasingly become a priority for a growing number of organizations. According to IDC, worldwide enterprise and service provider spending on edge hardware, software and serves is expected to hit $176 billion in 2022, representing a 14.8% increase over 2021. That spend is anticipated to approach $274 billion by 2025, according to the firm. Similarly, the LF Edge arm of the Linux Foundation expects edge spending to jump to $800 billion by 2028. 
This has equaled exponential growth in the number of providers. Industry giants and specialized companies alike have been expanding into the space; established providers of edge computing platforms and services include Cloudflare, Macrometa, Platform9 and Litmus Edge. Amazon Web Services (AWS) offers its Lambda@Edge technology, while IBM has Watson Anywhere, and nearly all other IT vendors, from Google, to Dell, to Hewlett-Packard Enterprise (HPE) have announced plans to provide some sort of multiple edge computing platform.
Couchbase, a distributed NoSQL cloud database, has also expanded its support of edge computing with the launch of Couchbase Mobile 3. The new platform allows developers to build fully native applications in the cloud, at the edge and on mobile and IoT devices using their chosen languages, frameworks and platforms, according to Wayne Carter, Couchbase’s vice president of engineering. 
Better, faster, stronger — the demand for data and apps
The 11-year-old, Santa Clara-based public company has established itself with its two versions of an open-source, NoSQL, multimodel, document-oriented database software
As Carter noted, modern apps need to be faster, more resilient, agile, and accessible, and have the capability to be run from anywhere. Since apps run on multiple different systems, developers need to be able to configure hundreds of locations and devices quickly and easily. 
“Customers increasingly require mobile and edge capabilities to meet modern application demands, and data must always be available, so apps perform at unmatched speed,” Carter said.
The goal with the Couchbase platform, and with edge in general, is to move data closer to where it is being used, even when it is in motion, to ensure that apps always have access to it.
Continue reading: https://venturebeat.com/2022/03/10/how-the-shift-to-edge-computing-is-impacting-enterprises/

Attachments

  • p0007245.m06896.edge.png
    p0007245.m06896.edge.png
    337.3 KB · Views: 40
  • Like
Reactions: Kathleen Martin

Women in Tech: “Find a way to quiet the self-doubts early”

research study by The National Center for Women & Information Technology showed that “gender diversity has specific benefits in technology settings,” which could explain why tech companies have started to invest in initiatives that aim to boost the number of female applicants, recruit them in a more effective way, retain them for longer, and give them the opportunity to advance. But is it enough?
Four years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Chelsea Hohmann, Engineering Manager at Stoplight.
Today’s Woman in Tech: Chelsea Hohmann, Engineering Manager at Stoplight
Chelsea-Headshot.jpeg
Chelsea Hohmann has been a part of the Stoplight family for three and a half years, serving as our engineering team lead and manager based in Austin, Texas. Before joining Stoplight, Chelsea was a full-stack engineer at Applause and National Instruments. Chelsea is a graduate of the University of Texas at Austin with a bachelor’s in business administration, management information systems, and supply chain management.
When did you become interested in technology? What first got you interested in tech?
My dad was a high school teacher at the Liberal Arts and Science Academy magnet school in Austin. He taught physics, robotics, and a class he invented called SciTech where students had to create a mechanical device that could successfully complete an engineering challenge. So, I was exposed to technology from an early age. I remember building and playing with Lego Mindstorms with my dad, and programming it to do the tango when I was really young.
Fast forward to college where I chose to major in MIS in the McCombs School of Business at UT Austin. The MIS major was more geared towards skills needed to be a Business Analyst so partway through I realized that it wasn’t as technical as I would’ve liked. The Database and Web Application Development classes really solidified my interest in more of the technical side of the major, so I decided to also get a minor in Computer Science as well.
Let’s talk about your background. How did you end up in your career path? What obstacles did you have to overcome?
After graduating from UT Austin I went to work for an engineering company called National Instruments in their IT department building internal web applications to support their R&D department. After a few years in that role, I realized I wanted to work more on a company’s main product rather than internal IT applications so I joined a testing and digital quality company called Applause working on their Automated Testing SDK and dashboard.
After proving to myself that I could, in fact, be successful in a true Product Engineering role, I joined Stoplight, a leading API design company, and I recently transitioned into an Engineering Manager role. The main obstacles I’ve had to overcome are all self-inflicted. I have major imposter syndrome (which a lot of women often struggle with in STEM as well), and I have always struggled to accept that I am qualified for the position I want and/or have. I always felt like since I didn’t have a Computer Science degree, I was constantly playing catch up on my technical abilities. The first jump from working on internal IT applications to actual product development was the scariest, and every change in career since then has gotten easier, but there’s still that little voice of doubt that I have to work to keep quiet. It’s important to remind myself, and the next generation of young women in tech that even though that little voice will always be there, you have to push through it and recognize that YOU are the most qualified person for this role.
Continue reading: https://jaxenter.com/women-in-tech-hohmann-176910.html

Attachments

  • p0007244.m06895.ek_wit_2048x848_60901_v1_hohmann_768x318.jpg
    p0007244.m06895.ek_wit_2048x848_60901_v1_hohmann_768x318.jpg
    44 KB · Views: 38
  • Like
Reactions: Kathleen Martin

The 9 Inspirational Women Leaders In AI Shaping The 21st Century

Women's day and Women's History Month are especially meaningful to me as a proud father of a daughter. I want my daughter to understand how wonderful and invaluable she is, not only to me and her mother, but also to everyone else in the world. Second, I want her to be exposed to amazing women who are accomplishing great things on a daily basis. I live, work and breathe AI and Technology. Through my work and research, I have encountered the work of countless amazing women in this sector. This month, I'd like to introduce you to nine incredible women who are making a difference in AI and Technology, as well as what barriers we all still face. During International Women's History Month, it is our pleasure to highlight and honor 9 women who are pushing the boundaries of artificial intelligence and ensuring that technology advancements contribute to the greater good.
The following is the first of ten articles in this series. This piece will center on the nine women I've spoken with over the last few weeks and their suggestions for other female professionals, young women, and girls who want to pursue a career in artificial intelligence, as well as what changes they see that must be addressed for true equality in the AI and technology field. The subsequent nine articles will feature the in-depth conversations we had.
Dr. Yevgeniya (Jane) Pinelis, Chief, AI Assurance at DoD Joint Artificial Intelligence Center
960x0.jpg

Dr. Jane Pinelis is the Chief of AI Assurance at the Department of Defense Joint Artificial ... [+]
 DR. JANE PINELIS
Dr. Jane Pinelis is the Chief of AI Assurance at the Department of Defense Joint Artificial Intelligence Center (JAIC). In this role, she leads a diverse team of testers and analysts in rigorous test and evaluation (T&E) for JAIC capabilities, as well as the development of T&E-specific products and standards that will support testing of AI-enabled systems across the DoD. She also leads the team responsible for instantiating Responsible AI principles into DoD practices.
If we truly believe that gender diversity positively affects outcomes in the tech industry, which I believe to be true, then I think the right thing to do is to focus on fixing the supply chain of women into these roles. We must start from very early education, and encourage little girls and young women to consider jobs in technology and national security as potential career options.
I see people who care about gender diversity, and they try to include women on panels, or they make an effort to hire women into certain jobs. But the issue is that there are not enough qualified candidates to go around. That's where we need to put our attention. We need to make sure that the supply chain is fixed, that we have a diverse set of talented individuals with whom we can collaborate.
I think what is women-specific is the need to have mentors, make connections, and see leaders in that role that look like them. We need to build up girls' confidence that these jobs are attainable, build their capabilities starting from a young age, and encourage them to pursue places where they belong.
What I want for my girls is to have the freedom of choice. Ultimately I want them to be aware of the opportunities available to them and to have the skills and the confidence to take advantage of those opportunities. I want them to be in touch with their talents and passions, to pursue those options that reflect their capabilities and interests. I want them to be able to do so free of societal expectations, be it around careers that may be deemed appropriate or inappropriate or about choices they make in their personal lives. I want them to be treated fairly and respectfully in the workplace and society.
“What I want for my girls is to have the freedom of choice. Ultimately I want them to be aware of the opportunities available to them and to have the skills and the confidence to take advantage of those opportunities. I want them to be in touch with their talents and passions, to pursue those options that reflect their capabilities and interests. I want them to be able to do so free of societal expectations.” Dr. Jane Pinelis
 


Sol Rashidi, Chief Analytics Officer at The Estée Lauder Companies Inc.
960x0.jpg

Sol Rashidi, Chief Analytics Officer at The Estée Lauder Companies Inc.
 SOL RASHIDI
With eight (8) patents issued, 21 filed, and receiving “CAO of the Year 2021” “50 Most Powerful Women in Tech”, “#4 in Top 20 CDOs” award, “2020 & 2021 list of Global Data Power Women", and ”Top 100 Innovators in Data & Analytics”, Sol focuses on creating a community amongst technologist and non-technologists to help businesses push past their capabilities, establish stronger positioning in the marketplace, and make a difference when using the latest advancements in Technology, Data Science, Engineering, Product Development, Data Visualization, Multi-Cloud Infrastructure (AWS/Azure/GCP/DataBricks/Snowflake/Salesforce), and Marketing Analytics.
To quote an old veteran in the space, there’s no other choice but to ‘lean in’. And while we’re making progress, the technology space has more room to evolve.
We have talented women everywhere, women who have worked really hard to perfect their craft, and sometimes they get faulted for prioritizing perfection over progress, sometimes they get reminded to stay in their swim lane, and sometimes their boldness is considered a fault vs virtue. While my experience may not align with all women in tech and their journey, what I have witnessed is, the way we’re able to lean in and lead is because we had that 1 leader, that 1 sponsor, and/or 1 person with influence to create a runway for us. And with that came opportunity, then success and then awareness of the talent.
So my 1st advice to women would be, know who you are and choose if you want to be a thermometer or thermostat? Are your aspirations to read the temperature in the room, or to create the temperature in the room? Because if it's the latter, be prepared for pushback. As this space requires a special backbone and not a wishbone. Change is hard, if it was easy it would have happened by now. So it requires a certain level of confidence and conviction to lead and you need to be prepared.
Continue reading: https://www.forbes.com/sites/markminevich/2022/03/10/the-9-inspirational-women-leaders-in-ai-shaping-the-21st-century/?sh=7b030a492bb0

Attachments

  • p0007243.m06894.960x0_7.jpg
    p0007243.m06894.960x0_7.jpg
    49 KB · Views: 50

Meteorite Hunting With Drones

For the first time, scientists have recovered a fallen meteorite with the help of drones and machine learning. Automation could lead to more meteorites being recovered, especially smaller fragments or pieces that fell in remote or inaccessible places. Collecting more meteorites means more data about where these space rocks come from and what they can tell us about our solar system. Researchers will also be able to spend more time on analyzing meteorites instead of searching for material.
The meteorite was recovered in Western Australia by a team from Curtin University, Perth, led by Seamus Anderson. The Australian Desert Fireball Network had detected a falling meteorite in April 2021 and predicted its likely “strewn field.” The team used two drones to search the area, with a machine learning algorithm searching drone images for candidate objects for a closer look.
Last year, Robert Citron, a postdoctoral scholar at the UC Davis Department of Earth and Planetary Sciences, led a proof-of-concept study of meteorite hunting with drones in Nevada. The team programmed drones to fly a grid search over a strewn field in which they had placed target objects, using machine learning to search images for meteorites.
The Australian study, recovering an actual fallen meteorite, is a huge leap forward, Citron told Physics World.
“As technology becomes cheaper and more readily available, it can be more accessible to other individuals or groups wishing to perform such studies, increasing the overall recovery of meteorites worldwide,” he said.
Continue reading: https://www.ucdavis.edu/blog/meteorite-hunting-drones

Attachments

  • p0007242.m06893.maps13663_fig_0004_m.jpeg
    p0007242.m06893.maps13663_fig_0004_m.jpeg
    146.5 KB · Views: 36
  • Like
Reactions: Kathleen Martin

Filter