Jeff K.

Jeff K.

San Jose, California, United States
4K followers 500+ connections

About

Jeff solves complex information, technology, risk, and innovation management challenges…

Articles by Jeff

Activity

Join now to see all activity

Experience

  • Ouster Graphic

    Ouster

    San Jose, California, United States

  • -

    San Francisco Bay Area

  • -

    San Jose, California, United States

  • -

    Menlo Park, CA

  • -

    Menlo Park, CA

  • -

  • -

    San Jose, CA

  • -

    Milpitas, CA

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

Education

Licenses & Certifications

Volunteer Experience

  • Computer History Museum Graphic

    Design_CODE_Build "Rock Star" presenter to middle school kids

    Computer History Museum

    - Present 10 years 4 months

    Education

  • Judge and Mentor

    Empathy Hackathon

    - Present 4 years 2 months

    Civil Rights and Social Action

    I serve as a mentor and judge with the Second Chances and Empathy Hackathon, sponsored by the Paper Prisons Initiative (www.paperprisons.org), which seeks to solve not only technical problems of social justice organizations working to help people reenter society successfully but also, through empathy and proximity, break down social silos through direct contact with and increased exposure to the issues facing systems impacted people. Previous solutions range from a tool for helping people…

    I serve as a mentor and judge with the Second Chances and Empathy Hackathon, sponsored by the Paper Prisons Initiative (www.paperprisons.org), which seeks to solve not only technical problems of social justice organizations working to help people reenter society successfully but also, through empathy and proximity, break down social silos through direct contact with and increased exposure to the issues facing systems impacted people. Previous solutions range from a tool for helping people obtain an ID tool after leaving prison to a website redesign of the National Justice Impacted Bar Association to videos about sentencing reform for educating lawmakers; this year, in addition to our reentry focus and focus on racial justice in the criminal justice system, we're also partnering with a humanitarian Afghan refugee project.

  • Cinequest Graphic

    Producer

    Cinequest

    - Present 6 years 10 months

    Arts and Culture

    As a speaker and moderator, my role is to elevate the typical Q&A experience and get artists talking about their passions, lives, and the people/places/moments that inspire them. I create memorable and entertaining experiences for audiences and artists with interesting and thought provoking questions.

    As a producer, my role is to empower Cinequest to continue as a pioneer in innovation (we hosted the first-ever online film festival in 2005-2007), and deliver brilliant, transformative…

    As a speaker and moderator, my role is to elevate the typical Q&A experience and get artists talking about their passions, lives, and the people/places/moments that inspire them. I create memorable and entertaining experiences for audiences and artists with interesting and thought provoking questions.

    As a producer, my role is to empower Cinequest to continue as a pioneer in innovation (we hosted the first-ever online film festival in 2005-2007), and deliver brilliant, transformative experiences for our communities.

    Broadly, Cinequest fuses innovation with the arts to empower great creations and to connect audiences, youth, artists, and innovators with these creations and with each other—forging community, joy, and our future. Set in Silicon Valley, Cinequest’s uniqueness, impact, and legacy result from applying this powerful integration of creativity, technology, and community to inspire and transform lives. Cinequest does this through the Cinequest Film & Creativity Festival, Mavericks Studio, and Picture The Possibilities youth services.

Publications

  • Mobile Medicine Overcoming People, Culture, and Governance

    Productivity Press / Routledge (Taylor & Francis)

    An actionable and practical resource to accelerate mobile computing in medicine.

    No topic in healthcare technology is more urgent yet more elusive to date than mobile computing in medicine. It adheres to no boundaries, stagnates in silos, and demands not just the attention of dedicated professionals, but also teams of teams.

    A rich resource, this book shares hard won lessons and primary research for better understanding, management and execution of key mobile computing initiatives…

    An actionable and practical resource to accelerate mobile computing in medicine.

    No topic in healthcare technology is more urgent yet more elusive to date than mobile computing in medicine. It adheres to no boundaries, stagnates in silos, and demands not just the attention of dedicated professionals, but also teams of teams.

    A rich resource, this book shares hard won lessons and primary research for better understanding, management and execution of key mobile computing initiatives in medicine [that can save patient lives by reducing delays in medical information].

    It provides an action planning reference guide for mobile medicine stakeholders, including health system and insurance decision makers, clinicians, and investors.

    Foundational and groundbreaking in its knowledge set and combination, it also provides a unique and rare perspective, drawing from 27 distinct experts across disciplines from legal to medicine, informatics, organizational psychology, cybersecurity to engineering -- the building blocks needed to catalyze a comprehensive mobile medicine strategy for your health system or investment thesis.

    Considering we lose a family member, colleague, or someone else every nine minutes due to a delay in medical information, according to the Institute for Healthcare Improvement, this book makes significant strides in efficiently conveying foundational knowledge that can contribute to implementing mobile computing safely and cost-effectively while improving clinician and patient experiences in healthcare. These insights will accelerate the reader’s ability to conceptualize the real opportunities via mobile computing in medicine.

    Other authors
    See publication
  • California Cybersecurity Workforce Development and Education Strategy (2020-2030): Framework and Recommendations for a California Cybersecurity Career Education Pipeline and Pathway Project (CCCEPPP)

    California Governor’s Office of Emergency Services (Cal OES) | California Cybersecurity Task Force

    Well-prepared cybersecurity professionals are essential given the dynamic change in scope and breadth of threats and vectors in today’s cybersecurity environment. Thus, we seek a framework to design, develop, and implement a California Cybersecurity Career Education Pipeline and Pathway Project (CCCEPPP) to prepare 50,000 statewide entry-level cybersecurity
    professionals from 2020-2030 and reduce current/future state workforce capability skills/gaps. In order to maximize efficiency and…

    Well-prepared cybersecurity professionals are essential given the dynamic change in scope and breadth of threats and vectors in today’s cybersecurity environment. Thus, we seek a framework to design, develop, and implement a California Cybersecurity Career Education Pipeline and Pathway Project (CCCEPPP) to prepare 50,000 statewide entry-level cybersecurity
    professionals from 2020-2030 and reduce current/future state workforce capability skills/gaps. In order to maximize efficiency and availability of workforce development and education/training programs (and meet diverse key stakeholder needs), we seek innovative ways to balance rigorous
    academic and professional needs in cybersecurity programs and achieve enhanced student access to quality, cost-efficient, and available cyber-security programs statewide.

    This report provides 15 recommendations for a blueprint and template to design, develop, and implement the CCCEPPP and additional educational institution toolkits to enhance statewide cybersecurity workforce development and education capabilities.

    The California Cybersecurity Workforce Development and Education Strategy
    facilitates and coordinates a statewide pipeline/pathway at all levels of education (K-12, Associates, Bachelors, Graduate, and Professional Certification/Training).

    Other authors
    See publication
  • Selected Solutions of Law, Business and Technologies Preventing Crimes

    Institute of Justice Publishing House, Warsaw

    Overview of crime-related issues present in the financial, insurance, and energy sectors, and in the field of human resources management. This report focuses on factors in technological development, innovations, and the influence of the operating environments which facilitate criminal behavior. Information is included on various safeguards and cutting edge detection methods by means of behavioral analysis, big data analysis, artificial intelligence, and other machine learning methods.

    Other authors
    See publication
  • The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

    McGraw-Hill

    The Computer Incident Response Planning Handbook is derived from real-world incident response plans that work and have survived audits and repeated execution during data breaches and due diligence. The book provides an overview of attack and breach types, strategies for assessing an organization, types of plans, and case examples. Tips for keeping data contained, reputations defended, and recognizing and handling the magnitude of any given threat are included.

    Other authors
    • N. K. McCarthy
    See publication
  • Eight Ways to Secure VoIP

    Security Technology Executive Magazine (Cygnus Publishing)

    Voice over IP telephony systems can be vulnerable to multiple network-based attacks. Here are eight approaches that enterprises can leverage to mitigate vulnerability and transform VoIP security.

    See publication
  • Creating Organizational Digital Forensic Investigation Capabilities

    Silicon Valley (ISACA) Information Systems Audit and Control Association

    To measure the potential success of any investigation, consider an organization's internal investigative capabilities.

    This 15 minute clip from Jeff's expert panel presentation outlines key points to consider in establishing and enhancing an organization's internal capacity to perform digital forensics, internal investigations, and incident reponse.

    See publication
  • Information Security: A Legal, Business, and Technical Handbook

    ‎American Bar Association

    The handbook will give clear and comprehensive guidance to anyone who wants a basic understanding of information security threats and the legal issues related to them.

    Other authors
    See publication

Patents

  • Multimodal help agent for network administrator

    Issued US 10,050,868

    Network management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network management technology interprets human user interactions, such as gestures, conversational natural language dialog, and combinations of gestures and natural language dialog, as network directives. The technology can implement the network directives to, for example, facilitate analysis of network activity or to respond to…

    Network management technology as disclosed herein generates and dynamically updates an intuitive, interactive visualization of a computer network in live operation. The network management technology interprets human user interactions, such as gestures, conversational natural language dialog, and combinations of gestures and natural language dialog, as network directives. The technology can implement the network directives to, for example, facilitate analysis of network activity or to respond to network security events.

    See patent
  • NATURAL LANGUAGE DIALOG-BASED SECURITY HELP AGENT FOR NETWORK ADMINISTRATOR

    Filed US 20160219048

    Network management technology conducts conversational natural language dialog with a user to facilitate the user's analysis of network activity and the implementation of network security measures and other actions in furtherance of network operations, management, or security.

    Other inventors
  • IMPACT ANALYZER FOR A COMPUTER NETWORK

    Filed US 20160218933

    Network management technology performs an impact analysis of actual or hypothetical network commands, and presents the impact analysis results to facilitate the user's understanding of the predicted consequences of the actual or hypothetical commands on network operations, management, or security.

Recommendations received

More activity by Jeff

View Jeff’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jeff directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Others named Jeff K.

Add new skills with these courses