Categories
Artificial Intelligence Education Innovation Reading

Latest Read: HBR’s 10 Must Reads 2025

HBR’s 10 Must Reads 2025: The Definitive Management Ideas of the Year from Harvard Business Review.

HBR's 10 Must Reads 2025: The Definitive Management Ideas of the Year from Harvard Business Review

In the closing days of 2023 I was reading HBR’s 10 Must Reads for 2024. This was a good indicator of management ideas for the coming new year. A year later, closing 2024 seems perfect to begin 2025 with HBR’s annual refresh.

This book is for both new and experienced leaders seeking insights, inspiration, and advice to propel their organizations forward in the new year.

Perhaps no other topic is the continuing role of AI impacting organizations last year and the coming impact of AI Agents. Perhaps their 2026 Must Reads will expand upon the growth of agents we will engage this year.

Why? The chapter ‘Reskilling in the Age of AI’ acknowledged ChatGPT’s impact was not predicted. As a result computer automation was already set to displace and transform the global workforce. Now LLMs, Agents, and ML will perhaps drive those numbers even higher. The message: Reskilling will be a focal point for organizations to thrive in an AI-driven environment. Yet the advice includes the challenge that organizational ups killing simply will not be enough. Worth the read alone especially for colleges and training centers.

Categories
Education Reading

Latest Read: HBR’s 10 Must Reads on Managing Projects and Initiatives

HBR’s 10 Must Reads on Managing Projects and Initiatives by Harvard Business Review.

HBR's 10 Must Reads on Managing Projects and Initiatives by Harvard Business Review

This book is a valuable read since all of us will be leading projects or initiatives sooner than we realize. So, why not learn how to manage them more effectively. This book is a collection of articles on project management and positioned a a resource for anyone working in project based work roles or even project leadership.

I found this to be a valuable read for my own projects. Yet I also realize “Keep Your AI Projects on Track” by Iavor Bojinov as a most interesting chapter since the number of AI Project Management services must be already on the horizon. Managing projects and initiatives often involve multiple stakeholders, competing internal priorities, and resources.

The book reveals key topics to understanding to ensure successful project execution. They include: Navigating Complexity, Managing Change, Resource Allocation, Maintaining Alignment, Measuring Success, Dealing with Uncertainty, and Fostering Collaboration. All truly key elements to understand and perhaps master along your project lifecycles.

Categories
Artificial Intelligence Education Reading

Latest Read: Generative Artificial Intelligence

Generative Artificial Intelligence: What Everyone Needs to Know by Jerry Kaplan.

Generative Artificial Intelligence: What Everyone Needs to Know by Jerry Kaplan

Jerry holds BA in History and Philosophy of Science from the University of Chicago and PhD in Computer and Information Science (specializing in AI) from the University of Pennsylvania. He is Adjunct Lecturer at Stanford University’s Center for Democracy, Development, and the Rule of Law. Jerry co-founded GO Corporation in 1987.

This is a somewhat comprehensive guide to the very rapidly evolving field of Generative AI (Gen AI). Jerry is basically conveying GenAI may revolutionize society.

At the same time, Jerry is outlining risks and dangers associated with Gen AI including the abuse and misuse by authoritarian governments to spread disinformation and suppress dissent. Yet in the later chapters there seems to be a simplification of the ethical and societal impacts. There are also concerns that with such a respectable career, a more firm approach to AI ethics was missed.

To be fair, the AI market is so fluid today that the major competitors OpenAI, Microsoft, Google among a small handful of others, it appears somewhat challenging to forecast a market that will surly shift before the end of the year.

Categories
Artificial Intelligence Education Reading

Latest Read: Privacy-Preserving Machine Learning

Privacy-Preserving Machine Learning by J. Morris Chang, Di Zhuang, and G. Dumindu Samaraweera.

Privacy-Preserving Machine Learning by J. Morris Chang, Di Zhuang, and G. Dumindu Samaraweera

Morris holds a BSEE from Tatung University, Taiwan and MS and PhD in computer engineering from North Carolina State University. He teaches at the University of South Florida. Di holds PhD in Computer Engineering from Iowa State University and the University of South Florida. He is a Security / Privacy Engineer at Snap Inc. Dumindu holds a MSc in Enterprise Application Development from Sheffield Hallam University and PhD in Electrical Engineering and Philosophy from University of South Florida. Today he is Assistant Professor of Data Science at Embry-Riddle Aeronautical University.

This was a book that places into perspective the need for ensuring privacy in our fast paced AI marketplace. The authors express the need not only to understand privacy within Machine Learning systems, but understanding methodologies to preserve user’s private data while maintaining performance on LLMs.

They address how personal data well embedded across various sectors increases the risks of data breaches. Just realize how your smartphone is tracked by marketing companies. In fact, they review the Facebook-Cambridge Analytica scandal and call for robust privacy measures in data-driven applications.

Categories
Cyberinfrastructure Education Network Reading

Latest Read: Zero Trust Networks

Zero Trust Networks: Building Secure Systems in Untrusted Networks by Razi Rais.

Zero Trust Networks: Building Secure Systems in Untrusted Networks by Razi Rais

Razi holds a BS In Computer Science from Karachi University and Masters in Computer Science from Shaheed Zulfikar Ali Bhutto Institute of Science and Technology. Today Razi is a Microsoft Senior Product Manager for Microsoft Security + AI.

Zero Trust is yet another confusing and misleading security phrase which confuses almost everyone including IT teams. Yet, it is a very critical network security strategy. Today this is needed more than ever before. This strategy assumes no one or device is trustworthy by default. This requires all users authenticating with their devices before accessing, networks, applications and data.

The core concept is to simply: assume breach. As odd as this will sound at first, continuously monitoring and logging of user and device activity will detect threats. By inspecting network traffic, the verification of each request will be based on an any organization’s access policy. This greatly reduces risk of insider threats, data protection. In addition to the unknowingly misuse of employee’s personal home computers lacking security standards set by their organization. Even in 2024, employee’s home computers still lack anti-virus, malware, or identity theft protection.