Categories
Artificial Intelligence Education Reading

Latest Read: Privacy-Preserving Machine Learning

Privacy-Preserving Machine Learning by J. Morris Chang, Di Zhuang, and G. Dumindu Samaraweera.

Privacy-Preserving Machine Learning by J. Morris Chang, Di Zhuang, and G. Dumindu Samaraweera

Morris holds a BSEE from Tatung University, Taiwan and MS and PhD in computer engineering from North Carolina State University. He teaches at the University of South Florida. Di holds PhD in Computer Engineering from Iowa State University and the University of South Florida. He is a Security / Privacy Engineer at Snap Inc. Dumindu holds a MSc in Enterprise Application Development from Sheffield Hallam University and PhD in Electrical Engineering and Philosophy from University of South Florida. Today he is Assistant Professor of Data Science at Embry-Riddle Aeronautical University.

This was a book that places into perspective the need for ensuring privacy in our fast paced AI marketplace. The authors express the need not only to understand privacy within Machine Learning systems, but understanding methodologies to preserve user’s private data while maintaining performance on LLMs.

They address how personal data well embedded across various sectors increases the risks of data breaches. Just realize how your smartphone is tracked by marketing companies. In fact, they review the Facebook-Cambridge Analytica scandal and call for robust privacy measures in data-driven applications.

Categories
Cyberinfrastructure Education Network Reading

Latest Read: Zero Trust Networks

Zero Trust Networks: Building Secure Systems in Untrusted Networks by Razi Rais.

Zero Trust Networks: Building Secure Systems in Untrusted Networks by Razi Rais

Razi holds a BS In Computer Science from Karachi University and Masters in Computer Science from Shaheed Zulfikar Ali Bhutto Institute of Science and Technology. Today Razi is a Microsoft Senior Product Manager for Microsoft Security + AI.

Zero Trust is yet another confusing and misleading security phrase which confuses almost everyone including IT teams. Yet, it is a very critical network security strategy. Today this is needed more than ever before. This strategy assumes no one or device is trustworthy by default. This requires all users authenticating with their devices before accessing, networks, applications and data.

The core concept is to simply: assume breach. As odd as this will sound at first, continuously monitoring and logging of user and device activity will detect threats. By inspecting network traffic, the verification of each request will be based on an any organization’s access policy. This greatly reduces risk of insider threats, data protection. In addition to the unknowingly misuse of employee’s personal home computers lacking security standards set by their organization. Even in 2024, employee’s home computers still lack anti-virus, malware, or identity theft protection.

Categories
Artificial Intelligence Education Innovation Reading

Latest Read: The DevSecOps Playbook

The DevSecOps Playbook: Deliver Continuous Security at Speed by Sean D. Mack.

The DevSecOps Playbook: Deliver Continuous Security at Speed by Sean D. Mack

Sean holds a BS in Computer and Information Sciences from UC Santa Cruz and MBA from Seattle University. He is CIO and CISO at Wiley, VP of Operations and Applications at Pearson, Director of Global Product Development and Delivery at Experian, and Senior Director of Technical Operations at RealNetworks.

In fact, the term Development, Security, and Operations (DevSecOps) stands for a framework that integrates security into all phases of the software development lifecycle. Today more than ever before DevSecOps must deliver continuous security at the speed of business. DevSecOps can only succeed when the organization supports the triad of people, process, and tech to delver strong cybersecurity infrastructure and practices.

To simplify, DevSecOps emphasizes incorporating security measures from the beginning of the development process, rather than treating them as an afterthought or post deployment requirement. This approach identifies and mitigates potential security risks early on.

Sean outlines why it’s critical to shift security considerations to the front-end of the development cycle, how to do this, and how the evolution of a standard security model since the pandemic has impacted modern cybersecurity.

Categories
Artificial Intelligence Education Innovation Reading

Latest Read: The AI-Savvy Leader

The AI-Savvy Leader: Nine Ways to Take Back Control and Make AI Work by David De Cremer.

The AI-Savvy Leader: Nine Ways to Take Back Control and Make AI Work by David De Cremer

David holds a PhD in Psychology from the University of Southampton, UK. He is Dean of Northeastern University’s School of Business, and the previous chair in management studies at the University of Cambridge UK. He is also a visiting professor at London Business School and China Europe International Business School.

In addition, David is the founder of the Erasmus Behavioral Ethics Centre at the Rotterdam School of Management. He remains an honorary fellow at Cambridge Judge Business School and a fellow at St. Edmunds college, Cambridge University. He is also a research member of The Justice Collaboratory at Yale’s Law School.

David is pulling no punches on his predictions that AI will transform society including organizational leadership. However his focus is on a human-centered approach to AI leadership. His position for leaders: emphasize ethical and strategic integrations of AI into their organizations. If not, AI will get the best of you. There is plenty of recent data to back up his claims.

Categories
Artificial Intelligence Education Innovation Reading

Latest Read: AI at the Edge

AI at the Edge: Solving Real-World Problems with Embedded Machine Learning by Daniel Situnayake and Jenny Plunkett.

AI at the Edge: Solving Real-World Problems with Embedded Machine Learning by Daniel Situnayake and Jenny Plunkett

Jenny holds BS in Electrical Engineering in from the University of Texas at Austin. She is a senior developer relations engineer at Edge Impulse. Daniel is Director of ML at Edge Impulse and holds a BSc Computer Networks and Security from Birmingham City University. He is the former Developer Advocate at Google for TensorFlow Lite.

This book is a guide to exploring how machine learning is being implemented on both edge devices and embedded systems. A bit of caution however, both authors are at Edge Impluse and their company product is referenced.

While not surprising, it can be viewed as a marketing product rather than addressing market leading solutions. The target audience is engineering professionals, including product managers and technology leaders.

We continue to deploy Internet of Things (IoT) devices. Many readers will think thermostats like Google Nest and X. However this focus is on industrial, automation, healthcare, agriculture, and autonomous vehicle devices which brings a lot of real-time data and machine learning driven decision-making at the remote device location. It is a very fast paced environment.