The Future is Here: IT Prime Time

112
Texas Association of State Systems for Computing and Communications The Future is Here: IT Prime Time Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria http://www.ventureramp.com [email protected] @RadicalPlatypus, Twitter

description

Texas Association of State Systems for Computing and Communications , The Future is Here: IT Prime Time , Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria, Final Speech

Transcript of The Future is Here: IT Prime Time

  • 1. Texas Association of State Systems for Computing and Communications The Future is Here: IT Prime Time Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria http://www.ventureramp.com [email protected] @RadicalPlatypus, Twitter

2. Twitter #radicalplatypus @radicalplatypus 3. In 1965, 49 years ago, Gordon Moore of Intel famously proclaimed that silicon density, the number of transistors on computer chips, would double approximately every two years. In effect, Moores Law is the platform upon which U.S. and global wealth creation has been built since the Apollo program. A new technology wave has emerged that is changing everything we know, or think we know about business and technology in the world driven by the intersection of [operational technology and cyberspace]. Forthcoming, Connected World Magazine, October 2014 Apollo Image Source: NASA 4. http://www.arraycomm.com/pcct/coopers_law.htm The number of conversations (voice and data) conducted over a given area, in all of the useful radio spectrum has doubled every 2.5 years for the last 110 years since Marconi, 1895. Martin Coopers Law 5. http://cdn1.tnwcdn.com/wp-content/blogs.dir/1/files/2014/01/79493994-786x305.jpg 6. http://bilder2.n-tv.de/img/incoming/origs12096381/1162732377-w1000- h960/Hand-holding-zoomed-in.jpg Antenna Sensor Controller Capacitor 7. http://media.tested.com/uploads/0/5/5698-augmented_reality_wired_super.jpg 8. http://nikeinc.com/news/nike-unveils-revolutionary-nike-experience-for-basketball-and-training-athletes#/inline/8054 VIDEO - http://www.youtube.com/watch?v=SCJNPd-HYiM#t=19 9. 9 http://research.gigaom.com/report/the-quantified-self-hacking-the-body-for-better-health-and- performance/ 10. http://www.industrytap.com/robotic-red-blood-cells-to-vastly-expand-human-capabilities/3656 Robotic Red Blood Cells To Vastly Expand Human Capabilities By: David Russell Schilling | July 20th, 2013 Abbott Laboratories in North Chicago is currently testing robotic red blood cells or respirocytes in rats. According to a CNN report respirocytes or mechanical red blood cells will augment or replace human red blood cells carrying oxygen to the body and enhancing mental and physical performance. Respirocytes will be built using molecular assemblers, a kind of molecular printing process, in nano-factories. 11. 11 http://news.yahoo.com/human-cyborg-mcdonald-employees-assaulted-wearing-gear-210139320.html 12. August 4, 2014 -- Revolution in computing driven by Del Tesar at UT Austin shifts focus from Cloud to Cloud 2.0: critical infrastructure and security as a service. 13. The last economic technology wave, the post- industrial era, marked by the computer, network, and information technology revolution has now crested and a new economic wave is rising fueled by intelligent machines. MOORES LAW IS TO COMPUTING AS TESARS LAW IS TO CYBER PHYSICAL SYSTEMS. Forthcoming, Connected World Magazine, October/November 2014 by Jim Brazell and in the American Society for Mechanical Engineers Journal of Robotics and Mechanisms, The Next Wave of Technology, forthcoming 2014-2015. 14. Cyber Physical Systems Cyber Systems Technology Transformation 15. http://www.gadgetspage.com/wp- 16. http://img9.joyreactor.com/pics/post/gif-cats-iRobot-vacuum-cleaner-278519.gif 17. http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew RobotBeerfromPicoView 18. http://www.tek-lado.com/wp-content/uploads/Necomimi-on-Sale-600x393.jpg Shippos Neurowear 19. http://neurogadget.com/wp-content/uploads/2012/09/Necomimi-successor-Shippo-brain-controlled-tail-Neurowear-e1348342289528.jpg Shippo brain-controlled tail Neurowear 20. www.tstc.edu 21. (Harbor Research, 2003) 22. (Harbor Research, 2003) 1994 - 2004 23. (Harbor Research, 2003) 24. (Harbor Research, 2003) 2004 - 2014 25. (Harbor Research, 2003) 26. Cloud 2.0: Cyber Physical Systems Cyber physical systems are at the heart of the design, manufacture, installation, operation, and sustainability of private corporate, state, and national infrastructure across the U.S., yet these systems are highly vulnerable to cyber exploitation. The Need for a Transdisciplinary Approach to Security of Cyber Physical Infrastructure, Springer, Book Chapter, 2013, Brazell 27. April 15, 2015 Similar to the need of the United States computing industry to collaborate in the 1980s to enhance semiconductor manufacturing efficiency, fulfilled by Sematech in Austin, the Department of Information Resources Cybersecurity Council is instrumental in forming the Texas Cybersecurity Institute. Programs are designed to leverage the States network of State Agencies, Designated Centers of Academic Excellence in Information Assurance, and the industrial sector with a special emphasis on energy CIP. 28. The Future is Here: IT Prime Time 1. Strategy of Technology 2. IT Workforce Context 3. Human Capital Strategy 29. Cyber Physical Critical Infrastructure Emergency services, telecom, energy, law enforcement, fire departments, utilities, public works, medical, industrial facilities, banking and finance, transportation and tourism, federal and municipal services, agriculture and food, and national monuments and icons. The Need for a Transdisciplinary Approach to Security of Cyber Physical Infrastructure, Springer, Book Chapter, 2013, Brazell 30. Source: Harbor Research, 2003 Cyber Physical Systems 31. Utilities A California study indicates that peak-rate usage can be shaved by 20 percent if utilities used Automated Meter Reading (ARM) for accurate pricing information--each megawatt of reduction can equate to $400,000 in savings per year (Jackson, p. 1) saving California utilities and consumers at least $5 billion a year. http://www.utilitiesproject.com/documents.asp?grID=85&d_ID=2402 More than 25 million AMR units installed on gas (21 percent), water (11 percent), and electric utility (16 percent) meters. 200 million units yet to be changed out to AMR (Jackson). 32. SwRI, Patent thin-nickel-strip magneto-strictive sensor (MsS). Applicable to airplanes, ships, plants, pipelines and bridges. US 80 billion square feet of commercial and government facilities and buildings, and more than 100 billion square feet of dams and bridges (Sensametrics). One trillion dollar market (Elgamal). http://www.swri.org/3pubs/ttoday/fall03/Future.htm SwRI MsS http://www.swri.edu/3pubs/IRD2002/14-9285.htm Critical Infrastructure Protection (CIP) Market Worth $105.95 Billion by 2018 according to a new Report from Markets and Markets. http://www.marketsandmarkets.com/Market-Reports/critical-infrastructure-protection-cip-market-988.html 33. Telematics http://www.itsdocs.fhwa.dot.gov/JPODOCS/REPTS_TE/13599.html http://www.teradyne-ds.com/telematics/telematics01a.htm SwRI Transguide Telematics market to grow at a CAGR of 22.67 percent CAGR percent over the period 2012- 2016 (ResearchandMarkets.com). TELEMATICS http://www.researchandmarkets.com/research/tpscpq/global_telematicsGlobal 34. ttp://www.itsdocs.fhwa.dot.gov/JPODOCS/REPTS_TE/13599.html ttp://www.roadtraffic-technology.com/contractors/traffic_man/electrosonic/electrosonic1.html Operations Centers Air Land Sea Space Cyber Since 1998, Transguide has 15 percent reduction of accidents and has cut emergency response time by 20 percent. (Texas DOT). .S. ITS to exceed $450 billion by 2015 (Hagler Bailly Services). 35. August 5, 2014 Reminiscent of 911 attacks, fires blaze in Texas cyber attack. Emergency operations are underway as two of Texas largest oil and gas processing plants were turned into megaton bombs near city centers Houston and Corpus Christi. The Cyber Red Guard from Iran has taken responsibility for the event reportedly stealing data from Texas Railroad Commission and the energy companies to trigger the kinetic attack through cyberspace. Property and casualty claims are expected to skyrocket... 36. Apple Insider, Saturday, August 02, 2014, 08:42 pm PT (11:42 pm ET) Al-Qaeda prefers Android over Apple's iOS By Daniel Eran Dilger Apple's iOS has taken majority market share in education, government and the enterprise, but Google's Android has become the favored mobile platform among Al-Qaeda operatives. http://appleinsider.com/articles/14/08/02/al-qaeda-prefers-android-over-apples-ios 37. /robonaut.jsc.nasa.gov/iss/#issmission Think beyond walking, talking robots. 38. http://ces.cnet.com/2300-31045_1-10002192-9.html?s=0&o=10002192 Chevy Volt 39. http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew RobotBeerfromPicoView 40. http://www.p9.com.tw/Upload/FTBImages/news_102/12/PicoBrew Beeriscriticalinfrastructure, right? 41. Cloud 2.0: Cyber Control of Operational Technology SystemsCloud: Cyber Systems Technology Transformation 42. April 15, 2015 The purpose of the Texas Cybersecurity Institute is to: (1) enable cyber physical systems security and cooperative incident management services for information sharing, collaboration, and coordination in multi-sector environments; (2) promote public-private partnerships for policy and programs related to the development of human and intellectual capital for education, workforce, economic development systems relevant to cyber physical systems; (3) create collaborative multi-stakeholder laboratories and research, development, and commercialization initiatives to promote public welfare and the security of critical infrastructure systems and processes; and (4) design necessary approaches to science, technology and public policy that effect public safety and cybersecurity critical infrastructure as a service. 43. Southern Methodist University University of Texas, Dallas University of Texas San Antonio Our Lady of the Lake University Texas A&M University San Antonio St Philips College San Antonio College Texas A&M University Texas A&M University Corpus Christi University of Dallas University of North Texas University of Texas, Austin University of Houston University of Texas, El Paso Rice University Richland College (Dallas CCCD) The goal of the program is to reduce vulnerability in our national information infrastructure by promoting higher education in information assurance (IA), and producing a growing number of professionals with IA expertise in various disciplines. NSA/CSS Texas Nationally Designated Centers of Academic Excellence in Information Assurance Source: Chris Cook, Cyber City USA, San Antonio Texas, Cyber Since 1949 44. December 10, 2017 -- Cyber is a domain of warfare, terrorism, and crime, while simultaneously being the platform and engine for economic, civil, and democratic development in the 21st century. Texas now leads the nation at the intersection of public safety, cybersecurity and operational technology with all State Agencies at Cybersecurity Maturity Level 4 or 5 rating. 45. Minimal cyber awareness Minimal cyber info sharing Minimal cyber assessments and policy & procedure evaluations Little inclusion of cyber into Continuity of Operations Plan (COOP) Leadership aware of cyber threats, issues and imperatives for cyber security and community cooperative cyber training Informal info sharing/ communication in community; working groups established; ad- hoc analysis, little fusion or metrics; professional orgs established or engaged No assessments, but aware of requirement; initial evaluation of policies & procedures Aware of need to integrate cyber security into COOP Leaders promote org security awareness; formal community cooperative training Formal local info sharing/cyber analysis. initial cyber-physical fusion; informal external info sharing/ cyber analysis and metrics gathering Autonomous tabletop cyber exercises with assessments of info sharing, policies & procedures, and fusion; routine audit program; mentor externals on policies & procedures, auditing and training Include cyber in COOP; formal cyber incident response/recovery Leaders and orgs promote awareness; citizens aware of cyber security issues Formal info sharing/ analysis, internal and external to community; formal local fusion and metrics, initial external efforts Autonomous cyber exercises with assessments of formal info sharing/local fusion; exercises involve live play/metrics assessments Integrate cyber in COOP; mentor externals on COOP integration; formal blended incident response and recovery Awareness a business imperative Fully integrated fusion /analysis center, combining all-source physical and cyber info; create and disseminate near real world picture Accomplish full-scale blended exercises and assess complete fusion capability; involve/ mentor other communities/entities Continue to integrate cyber in COOP; mentor externals on COOP integration; formal blended incident response and recovery LEVEL 1 Initial LEVEL 2 Advanced LEVEL 3 Self-Assessed LEVEL 4 Integrated LEVEL 5 Vanguard Cybersecurity Maturity Level of Texas State Agencies Source: Greg White, Ph.D., UTSA, CIAS, 2014 46. January 24, 2018 by focusing on situational awareness, Texas Cybersecurity Institute turns data into actionable knowledge using A.I. 2.0 techniques from new field labeled Artificial Psychology. 47. http://www.tradingmarkets.com/featured_contributors/how-to-manage-investment-information-overload- 1583594.html 48. January 24, 2018 Texas Cyber- security Institute partners with TSTC in 2014 and now offers near real-time supply and demand management tools for IT and cybersecurity workforce. 49. Contact: Michael A. Bettersworth Associate Vice Chancellor, Senior Advisor Texas State Technical College 512-647-8790 https://www.texastribune.org/2014/07/29/tstc-launches-center-employability-outcomes/ 50. January 24, 2018 Texas Cyber-security Institute is funded by Texas State Agencies new calculus for IT lifecycle management pioneered by the Comptroller and DIR. The new method of calculating the value of IT assets over the lifecycle of their use increases IT effectiveness by weighing the real value of operational technology and cyber assets over time. 51. 1. Practice for Measuring Life-Cycle Costs for Network, Security, and Information Technology 2. Practice for Measuring Benefit-to-Cost and Savings-to-Investment Ratios for Network, Security, and Information Technology 3. Practice for Measuring Internal Rate of Return and Adjusted Rate of Return for Network, Security, and Information Technology 4. Practice for Measuring Net Benefits for Investments in Network, Security, and Information Technology 5. Practice for Measuring Payback for investments in Network, Security, and Information Technology 6. Standard Guide for Selecting Economic Methods for Evaluating Investments in Network, Security, and Information Technology IT life-cycle management is the effective and efficient management of IT assets from the identification of requirements to the disposal of the assets. Texas New IT life-Cycle Management Calculus 52. January 24, 2018 Texas Cyber- security Institute works at the intersection of education, workforce, and economic development to enhance the State and Nations competitiveness. 53. George Kozmetsky, IC2.org photo courtesy of the University of Texas 54. Education Economic Development Industry Workforce Cyber Innovation Laboratories Texas Agency Leadership 55. The Future is Here: IT Prime Time 1. Strategy of Technology 2. IT Workforce Context 3. Human Capital Strategy 56. August 4, 2014 -- TASSCC first group in the nation to lead education reform based on the fundamental notion that cyber is the key transformative force in the STEM workforce across sectors. THECB and TEA to offer Computer Science and Computational Thinking curricula throughout the core for P-20 education using TASSCC programs of study as a model for CTE and academic students. 57. STEM JOBS 58. STEM JOBS Audience Survey What percentage of jobs in the U.S. in 2010 are classified as STEM jobs by the U.S. Department of Commerce? 59. STEM JOBS 60% or more 60. STEM JOBS 59%- 25% 61. STEM JOBS 25%- 6% 62. STEM JOBS Less than 6% 63. 5.5% STEM JOBS 5.5% of U.S. Workforce, 7.6MM STEM Jobs in 2010 David Langdon, George McKittrick, David Beede, Beethika Khan, and Mark Doms, STEM: Good Jobs Now and for the Future. US Department of Commerce, Economics and Statistics Administration last accessed online October 28, 2012 http://www.esa.doc.gov/sites/default/files/reports/documents/stemfinalyjuly14_1.pdf 64. of STEM Jobs are Network and Information Tech David Langdon, George McKittrick, David Beede, Beethika Khan, and Mark Doms, STEM: Good Jobs Now and for the Future. US Department of Commerce, Economics and Statistics Administration last accessed online October 28, 2012 http://www.esa.doc.gov/sites/default/files/reports/documents/stemfinalyjuly14_1.pdf 5.5% STEM JOBS 65. Is there a labor market shortage of STEM workers? 66. The STEM Crisis Is a Myth By Robert N. Charette Posted 30 Aug 2013 http://spectrum.ieee.org/at-work/education/the-stem-crisis-is-a-myth STEM attrition goes 10 yrs into the workforce, as 46% of #workers with a Bachelors degree in STEM have left the field. Georgetown University Center on Education and the Workforce 67. http://www.brookings.edu/research/reports/2013/06/10-stem-economy-rothwell 68. According to the Bureau of Labor Statistics, NIT is projected to account for between 52% and 58% of all STEM occupations between 2008-2018 with projected NIT employment resulting in 762,700 jobs, growing more than twice as fast as the average for all occupations in the economy.[15] In The Need for a Transdisciplinary Approach to Security of Cyber Physical Infrastructure, Springer, Book Chapter, 2013, Brazell 69. The truth behind the curtain 70. ANTHONY P. CARNEVALE NICOLE SMITH MICHELLE MELTON, Science, Technology, Engineering & Mathematics, Georgetown University, Center on Education and the Workforce, October 20, 2012 last accessed October 28, 2012 at http://cew.georgetown.edu/stem/. Forecast of STEM Occupational Growth Georgetown University, Center for Education and the Workforce Job Shortages: We face a chronic shortage in STEM competencies as the demand for STEM talents grows outside traditional STEM jobs. 71. The Hidden STEM Economy, Brookings Institute, 6.10.2013 http://www.brookings.edu/research/reports/2013/06/10-stem-economy-rothwell 72. Special emphasis should be placed on the intersection of network and information technology (NIT) with the arts, cyber security, games and simulations, health, energy, transportation, environmental science, physical science and health science. http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf 73. November 14, 2014 -- TASSCC teams with UT System and Texas State Technical College to offer Cyber-STEM Rigorous Programs of Study for all high school, community and technical college, and university students in the State. 74. U.S. percentage of CTE students in 2004, 17-38%, in 2004, qualifying 3 levels of CTE participation. National Assessment of CTE, Interim Report, 2013, https://www2.ed.gov/rschstat/eval/sectech/nacte/caree r-technical-education/interim-report.pdf Learning for Jobs, OECD, 2010, http://www.adheperkins.com/resources/Learning%20for%20Jobs.pdf 75. Those who complete both a strong academic curriculum and a vocational program of study (dual concentrators) may have better outcomes than those who pursue one or the other Source: Silverberg, Warner, Fong, & Goodwin, 2004; Plank, 2001; Stone & Aliaga, 2003) (National Alliance for Secondary Education and Transition, 2005, Career Preparatory Experiences, 3). 76. http://www.dentonrc.com/sharedcontent/utilities/clickedimage/index.html 77. Health Arts CTE Academics Student Leadership Character Citizenship Classical Contemporary Education 78. March 15, 2015 -- San Antonio all female cybersecuity team from Southside ISD wins Cyber Patriot national competition illustrating the strength of the citys approach to diversifying the IT pipeline. 79. The Public The most unique combination of Cyber related elements outside the National Capital Region 80. The United States Air Force Security Service invents the field of cyber- security in 1949 in the Alamo City. 81. http://www.thenewnewinternet.com/wp-content/uploads/24th-air-force.jpg 2009 Activation of 24th Air Force Home of Air Force Cyber 82. 91 San Antonios high-growth employment sectors Projected Fastest Growing Occupations in Bexar County through 2014 Texas Workforce Commission and US Department of Labor San Antonio Business Journal by James Aldridge, Web Editor Date: Wednesday, September 26, 2012 83. San Antonio has placed one team team to national each of the past 4 years including willing 3rd (2011) and 1st (2012). https://www.uscyberpatriot.org 84. John Jay High School (2) Roosevelt High School Engineering and Technology Academy (3) OConnor High School East Central High School (3) Medina Valley High School (3) 5 miles Smithson Valley High School (2) Boerne High School Seguin High School Holmes High School (4) Brandeis High School MacArthur High School (2) New Life Christian Academy (2) Alamo City CyberPatriot 1556 total patriot teams in 2014. 85 teams from Alamo City including 12 middle schools. Expect 100 teams in 2015. Taft High School (2) San Antonio Christian Academy Information Technology Security Academy New Braunfels (3) Stevens High School San Marcos High School Canyon Lake CAP Squadron Randolph High School La Vernia High School (3) Stacey Junior/High School Information Technology Security Academy San Antonio (3) Lackland CAP Squadron Harmony Science Academy (2) Harlandale High School Microsoft Academy Boerne Area Home Schoolers Churchill High School (2) Clark High School McCollum High School Microsoft Academy Scobee Middle School (2) McAuliffe Middle School Lee High School STEM Academy (2) Kennedy High School KIPP University Prep High School Lutheran High School McNair Middle School (3) Southwest High School (7) Krueger Middle School St. Anthony High School Brennan High School Marshall High School Nimitz Middle School (2) Alamo Heights High School (4) Hobby Middle School Canyon Lake High SchoolNew Braunfels High School Church Hill Middle School Young Womens Leadership Academy Milton Lee T- STEM Academy Sam Houston New Tech Academy School of Science and Technology Texas Military Institute Bracken Christian School Judson High School Madison High School Steele High School Memorial Toltech T-STEM Academy Brooks Academy 85. Alamo Cybersecurity Pipeline Ph.D. in Security Related Field High School Jr./Sr or Graduate or lower division BS BS Degree seeking advanced Degree High School Graduate with basic security training BS Degree in Security Field MS Degree in Security Field Assoc. Degree in Security Field Assoc. Degree seeking Bachelors 86. St. Phillips Computer Science Network Administrator Network Security Administrator Biomedical Equip Technician Computer Maintenance Technician Computer Network Specialization E-Business Computer Support Specialist Web Developer NW Vista Computer Forensics Computer Science Digital Gaming, Simulation and Cinematics for Artists Multimedia Specialists Programming & Visualization Systems Administration New Media Communications Music Technology Palo Alto Computer Information Systems Computer Science Information Systems Systems Advanced Web Program. Network Admin CISCO Network Technology Security Academy Network Administration Network Security Personal Computer Support Administrative Comp. Tech. San Antonio College Computer Science Computer Security Geographic Information Systems Network Administrator Geographic Information Science Network Routing Accounting Technology Computer Programming Computer Help Desk Specialist Cisco Administrator Database Specialist Cisco Routing Associate Degrees and Certifications Cyber City USA San Antonio, Texas Northeast Lakeview Computer Science Mathematics Physics Criminal Justice 87. University of Texas at San Antonio Texas State University St Marys University Our Lady of the Lake University Wayland Baptist University Trinity University University of the Incarnate Word Texas A&M University, San Antonio Alamo Colleges San Antonio College Palo Alto College St Phillips College Northwest Vista College Northeast Lakeview College Alamo Academies - Information Technology and Security Academy Holmes High School Southwest High School Harlandale High School Microsoft Academy Roosevelt High School Engineering and Technology Academy Lee High School STEM RAM Academy John Jay High School Science and Engineering Academy Sam Houston New Tech Academy Harmony Science Academy Memorial High School Toltech T-STEM Academy Milton B. Lee Academy of Science and Engineering Security Hill 24th AF AF ISR Agency NSA/CSS Texas Rackspace USAA AT&T Valero CoSA/Bexar County IT University Health System Baptist Health System HEB Frost Bank UTSA Others 97 SACUCCA Monster.com IT-ology Bestica Cyber Workforce Placement 88. S.A. higher ed partners offer $9,672 bachelor's degreeBy Jennifer R. Lloyd Wednesday, March 7, 2012 A bachelor's in information technology with information security emphasis. Two years college-level work in high school, a year at Alamo Colleges and finish at A&M San Antonio. Total cost: $9,672. Photo: Ralph Barrera, Austin American-Statesman / SA Governor Perry challenged universities to craft a $10,000 bachelors degree, though not all in higher education were fans of the idea 89. nationalccdc.org 90. Dr. Gregory White accepts Educator of the Year Award from Colloquium for Information System Security Education. White is a computer science associate professor and director of the Center for Infrastructure Assurance and Security (CIAS) at The University of Texas at San Antonio. http://utsa-sciences.tumblr.com/post/7344218754/gregwhiteaward#sthash.BPNGGyvW.dpuf 91. SURVIVAL OF SPECIES GOVERNANCE SECURITY & SAFETY QUALITY OF CIVIL LIFE WEALTH JOBS MARKETS Cyber- STEM What is STEM? Why is STEM important? 92. What is STEM in the context of P-20 Education Practice? STEM is transformation by design. STEM is transformation of social, human, and environmental systems by human design and the unintended consequences of human design choices. STEM is a technological force changing society and social institutions. STEM is changing the structure, flow, and composition of social institutions and personal identity: family, education, work, economy, law, government, etc. From an identity perspective technology and more broadly STEM effects our worldview, our concepts of: self-efficacy, subjectivity, objectivity, privacy, time, space (place), geography, cosmology, individuality, identity, values, beliefs and culture. STEM is a process of collaboration connecting institutional silos (education, government, industry, and civil society) to satisfy community and global needs. STEM is confronting the local challenges in your community and school through the process of inquiry, design, and innovation. STEM is turning a community inward on itself to form learning communities and laboratories designed to effect local and global opportunities and challenges through collaboration and cooperation. STEM is a moral imperative to prepare all students for their future, rather than our past. STEM educational practices, ideally, today open access and opportunity in education through a balanced approach to learning that retains the important fundamentals of classical education while integrating contemporary knowledge, processes, and tools. 93. The Future is Here: IT Prime Time 1. Strategy of Technology 2. IT Workforce Context 3. Human Capital Strategy 94. January 19, 2014 -- Mirroring the White House, Office of Science and Technology Policy, the 84th Texas Legislature has aggregated Texas State Agency funding for education among non-education agencies to pool investment in Cyber-STEM programs. 95. OSTP ARPA Education P-20 Education Transformation 96. Education Economic Development Industry Workforce Cyber Innovation Laboratories Texas Agency Leadership 97. Education Economic Development Industry Workforce Cyber Innovation Laboratories TASSCC 98. Education Economic Development Industry Workforce Cyber Innovation Laboratories You 99. Twitter #radicalplatypus @radicalplatypus 100. Texas Association of State Systems for Computing and Communications The Future is Here: IT Prime Time Jim Brazell, Venture Ramp, Inc. August 3-5, Houston, Westin Galleria http://www.ventureramp.com [email protected] @RadicalPlatypus, Twitter