This document is a resume for James P. Sankey, who has over 15 years of experience as an all-source intelligence analyst in the US Air Force. He has a master's degree in international security studies and has authored papers and provided expertise that have improved military policies, procedures, and software systems. He has extensive experience conducting intelligence analysis and briefings while deployed in the Middle East and South America.
Mission-driven Intelligence Analyst with over eight years of experience and expertise in conducting all-source intelligence analysis, geospatial intelligence, all source, open source intelligence, signals intelligence, human intelligence analysis, and targeting to directly support more than 2,500 military personnel and government employees within the PACOM and CENTCOM AOR. Proven record of applying advanced intelligence analytic skills to identify, assess, interpret, and report potential threats and adversarial vulnerabilities. Ability to work collaboratively with inter-agency Department of Defense personnel in high-pressure situations and under tight deadlines and brief on military-political leadership, national military strategy, strategic doctrine, and regional relations with regards to their impact on force developments. Experienced security manager, supporting security functions with experience in facility security management as well as managing personnel security clearances.
Mission-driven Intelligence Analyst with over eight years of experience and expertise in conducting all-source intelligence analysis, geospatial intelligence, all source, open source intelligence, signals intelligence, human intelligence analysis, and targeting to directly support more than 2,500 military personnel and government employees within the PACOM and CENTCOM AOR. Proven record of applying advanced intelligence analytic skills to identify, assess, interpret, and report potential threats and adversarial vulnerabilities. Ability to work collaboratively with inter-agency Department of Defense personnel in high-pressure situations and under tight deadlines and brief on military-political leadership, national military strategy, strategic doctrine, and regional relations with regards to their impact on force developments. Experienced security manager, supporting security functions with experience in facility security management as well as managing personnel security clearances.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Explore our comprehensive data analysis project presentation on predicting product ad campaign performance. Learn how data-driven insights can optimize your marketing strategies and enhance campaign effectiveness. Perfect for professionals and students looking to understand the power of data analysis in advertising. for more details visit: https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
1. James P. Sankey
6373 Lakeshore Road South, NY 13032
JamesSankey6@Gmail.com
910-496-6696
Summary
I am an individual who anticipates situations and successfully executes any given mission. I
consistently succeed in overcoming challenges, achieving or negotiating mission requirements
with little or no guidance. I am an expert in my job and technical advice / assistance is constantly
sought after by subordinates, peers and seniors alike. I have an inquiring mind which allows me
to easily grasp and apply new concepts, often times uncovering new and innovative techniques in
accomplishing the mission. I clearly and concisely express ideas in both written and verbal
communication. Lastly, I am seldom discouraged given difficult situations or challenging
problems; rather, as a rule, I strive to find the right solution where others might give up.
Accomplishments
Authored Master’s Thesis on Policy Recommendations for Commercially Operated
Unmanned Aerial Vehicles (UAVs); assisting the National Security Council (NSC) in
advising the President of the United States with time-sensitive event.
Identified intelligence gaps and shortfalls in current US and coalition conventional force
TTPs. Worked with multiple agencies and organizations to improve and rewrite standards
of performance when dealing with mission debriefs and Mission Reports (MISREPS)
Authored white papers on special operations forces (SOF) tactics, techniques and
procedures (TTP) which led to significant revision of SOF TTPs. Received Chief of Staff
of the USAF recognition for increasing warfighter capabilities.
Acted as the USAF subject matter expert (SME) providing critical inputs enhancing
several priority DOD software systems dramatically reducing risk to the warfighter.
Security Clearance
ACTIVE - TOP SECRET//SCI
Experience
2003 - Present | All Source Analyst, Various Duty Stations
Researched / analyzed worldwide events; authored/delivered current intelligence,
situation and threat briefings.
Tracked, maintained, and recorded intelligence currency training and mobilization
readiness requirements for all assigned squadron personnel.
Accountable for completion, documentation, inventory maintenance and destruction of
aircrew isolated personnel reports.
Trained personnel on military capabilities and intentions of potentially hostile nations,
providing in-depth country studies.
2. 2010 - 2014 | All Source Analyst, Joint Special Operations Command (JSOC) | Ft Bragg, NC
Senior Intelligence Duty Officer; supporting 2 USSOCOM Joint Special Operations Air
Component Task Forces providing specialized air threat assessments.
Determined and prioritized Special Operation Force (SOF) threat to aircraft operations
intelligence requirements for collection, reporting and dissemination criteria.
Provided global intelligence and developed targeting intelligence TTPs for deliberate
/dynamic target execution support to joint SOF conducting national level missions.
Coordinated with National Intelligence entities for strategic, operational, and tactical
special operations intelligence support during US Special Operations Command
(USSOCOM) execution of Secretary of Defense directed time-sensitive taskings.
Deployments
2016 – Al Udeid, Qatar – NCOIC 609 AOC ISRD/ACF Unit Support
2014 – (UNDISCLOSED) – Senior Intelligence Duty Officer (3 trips)
2013 – (UNDISCLOSED) – Senior Intelligence Duty Officer (3 trips)
2009 – Manta, Ecuador – NCOIC intelligence
2008 – Baghdad, Iraq – NOCIC Open Source Intelligence Analyst
2007 – Balad, Iraq – Fighter Squadron Intelligence Support
2006 – Balad, Iraq – All-Source Intelligence Analyst
Education
2014 – National Defense University | Washington, D.C.
Masters of Arts – International Security Studies
2010 – Southwestern University | Winfield, KS
Bachelor of Science – Criminal Justice
2008 – Community College of the Air Force | Online
Associates of Arts – Intelligence Studies and Technology
Certifications
2010 – Dynamics of International Terrorism Course
2010 – USAF/ACC Antiterrorism Force Protection Level II Course
2009 – Advanced Contingency Skills Training
2009 – NSA Basic Hypotheses Testing
Courses
NCO Academy Distance Learning – 2016
Air and Space Operations Center Intelligence, Surveillance, and Reconnaissance Initial
Qualification – 2016
National Geospatial Agency BLACK WOLF Structured Object Management (OBT/ABI) – 2016
Noncommissioned Officer Professional Enhancement – 2016
Air Force Special Operations Command Initial Qualification – 2010
Dynamics of International Terrorism – 2010
USAF/ACC Anti-terrorism Force Protection Level II – 2010
USAF Expeditionary Center Advanced Contingency Skills Training – 2009
NSA/CSS National Cryptologic School Basic Hypotheses Testing – 2009
Multi-National Forces - Iraq Intelligence Pre-Deployment – 2009
3. Skills
Fuse intelligence information from multiple disciplines to identify potential targets.
Highly interpersonal communication skills with an ability to develop relationships with
customers, understand, and easily recognize intelligence requirements.
Collaborate and liaise with staff members to collate and further the piece of information
to develop comprehensive analysis.
Deliver information as briefs, presentations or formal reports.
Produce specialized analytical materials such as order of battle, intelligence preparation
of the environment, association charts, enemy profiles, and linkage analysis.
Expert in Intelligence processes, collection methods, cycles and organizations.
Expert in methods used to analyze, compile, report and disseminate intelligence data.
Ability to determine and/or assess the state of current operations and develop alternative
courses of action for execution.
Awards and Decorations
- Joint Service Commendation Medal (1 OLC)
- Air Force Commendation Medal
- Joint Service Achievement Medal
- Air Force Achievement Medal (1 OLC)
- Afghanistan Campaign Medal (1 SS)
- Afghanistan Campaign Medal (1 OLC)
- Iraq Campaign Medal (3 OLC)
- Global War on Terrorism Expeditionary
Medal
- Global War on Terrorism Service Medal
- Air Force Good Conduct Medal (3 OLC)
Software
- Research
Microsoft Office Suite applications
DIA/NSA Palantir
CRATE (Collection Requirements Analysis
Tool for the Enterprise)
NRO MIST (Multi-Intel Spatial Temporal)
NGA Black Wolf
MIDB (Modernized Integrated Database)
M3 (Multimedia Message Manager)
mIRC / Jabber / Transverse
Mission Report Analysis Tool (MAT)
Mapping/Imaging
FalconView
JMPS (Joint Mission Planning Software)
Improved Many on Many (IMOM)
Analyst Support Architecture (ASA)
Google Earth
Skope Tools
Terra Explorer
Arc Map
Talon Thresher
TacView C2
BCS-F (Battle Control Station-Fixed)