By Steve Goodrich – On March 13, President Trump issued an executive order for a Comprehensive Plan for Reorganizing the Executive Branch. It calls for the OMB director and agency heads to develop plans for improving the efficiency, effectiveness and accountability of agencies, subcomponents and programs within 180 days.
I am not naïve, and yes, I have seen this many times before. But if done right, with a strong foundation and a plan, it could work. It could also be another once-and-done exercise that demonstrates little to no value. Many administrations have conducted similar exercises, most of which faded with the political passing. The Trump executive order runs the risk of having little or negative impact, reducing readiness and demoralizing employees. It also has the potential to do great things for our country.
Here are a few suggestions for how to make it work.
- It must involve Congress.
- It should begin with a national summit that results in a strategic plan.
- Someone must be in charge.
- Reorganization must address vertical and horizontal programs.
- Reform must cross agency boundaries.
- Accept that some investment will be necessary.
- Leverage what you have before you throw anything out.
- Make hard decisions.
- Fix the foundation.
- Create a culture of sharing.
- Grow people.
- Address financial issues
Posted in Broadband, Business, CONGRESS WATCH, How to, Leadership, Net
Tagged Business improvement, Congress Watch, Donald Trump, Government, Organization, Productivity, United States
Basin and Range, Author: John McPhee.
Descartes’ Error, Author: Antonio Damasio.
By Ben Medlock – Things took a wrong turn at the beginning of modern AI, back in the 1950s. Computer scientists decided to try to imitate conscious reasoning by building logical systems based on symbols. The method involves associating real-world entities with digital codes to create virtual models of the environment, which could then be projected back onto the world itself.
In later decades, as computing power grew, researchers switched to using statistics to extract patterns from massive quantities of data. These methods are often referred to as ‘machine learning’. Rather than trying to encode high-level knowledge and logical reasoning, machine learning employs a bottom-up approach in which algorithms discern relationships by repeating tasks, such as classifying the visual objects in images or transcribing recorded speech into text.
But algorithms are a long way from being able to think like us. The biggest distinction lies in our evolved biology, and how that biology processes information. Humans are made up of trillions of eukaryotic cells, which first appeared in the fossil record around 2.5 billion years ago. A human cell is a remarkable piece of networked machinery that has about the same number of components as a modern jumbo jet – all of which arose out of a longstanding, embedded encounter with the natural world.
We only have the world as it is revealed to us, which is rooted in our evolved, embodied needs as an organism. Nature ‘has built the apparatus of rationality not just on top of the apparatus of biological regulation, but also from it and with it’,
In other words, we think with our whole body, not just with the brain. more> https://goo.gl/oBgkRF
Posted in Book review, Economic development, Education, History, Leadership, Nature, Science, Technology
Tagged Algorithm, Brain, Machine learning, Productivity, Symbolic logic, Technology
By Teri Takai – The big problem for many government agencies is that most of them still rely on declarative legacy roles, rubber-stamping certifications and manual processes to manage identities and roles — all of which expose them to continual and multiple access risks. External threat actors compromise identities to evade detection from existing defenses, while insiders work under the radar to access data for exfiltration.
To provide a robust defense and protect the identity-based perimeter, government agencies must consider new thinking and approaches.
The core issue is security leaders are not attacking the evolving security landscape through proactive planning and change management. Instead, they are stuck in a reactive mode.
It is not hard to understand why: the user profile is 24-7, global, instantaneous, and rich in consumer-driven IT. more> https://goo.gl/X59JUA
Posted in Broadband, Communication industry, Economy, Education, Leadership, Media, Net, Regulations, Technology
Tagged Broadband, Business improvement, Congress Watch, Cybersecurity, Government, Identity, Internet, Leadership, United States