Understanding Generative AI, Large Language Models, and Foundation Models: A Comparative Analysis

In the rapidly evolving landscape of artificial intelligence (AI), a handful of model architectures have recently emerged as the forefront of the field: Generative AI models, Large Language Models, and Foundation Models. Each of these models represents a different approach to AI and has unique strengths and applications. Let’s explore them in detail.

Generative AI

Generative AI refers to models that generate new content from existing data. They are able to take in data and generate outputs that closely resemble the input data, whether that be creating an image from a text description, synthesizing a voice, or even generating text that mimics a particular writing style12.

For example, generative AI has been used to transform sketches into photorealistic images, synthesize voices for digital assistants, and even generate new molecules for drug discovery3. A popular type of generative AI is Generative Adversarial Networks (GANs), which consist of two neural networks – a generator and a discriminator – that work together to produce realistic outputs2.

Large Language Models (LLMs)

Large Language Models (LLMs) are a type of AI model that has been trained on a vast amount of text data. They are designed to understand and generate human language and can perform a variety of language tasks, such as translation, question-answering, summarization, and more45.

The true strength of LLMs lies in their ability to understand the nuanced connections between words and phrases and generate coherent, contextually relevant responses. This makes them particularly powerful for tasks like chatbots, content generation, and language translation45.

LLMs, such as GPT-3 from OpenAI, are a great example of this model type and have achieved impressive results in generating human-like text that can even pass the Turing test in certain contexts5.

Foundation Models

Foundation models, a term coined by researchers at Stanford, are models that are trained on broad data from the internet and can be fine-tuned for specific tasks6. These models are called “foundation” because they serve as a base upon which other models or applications can be built.

These models have the potential to revolutionize many domains by providing a strong, versatile base for various applications, from natural language processing to computer vision. They are often pretrained on vast datasets and then fine-tuned to perform specific tasks7.

Just like LLMs, foundation models can generate human-like text, but they can also perform a wider range of tasks, such as image recognition, object detection, and more6.

Comparing and Contrasting

While all three model types – Generative AI, LLMs, and Foundation Models – have the ability to generate outputs based on their input data, they each have unique strengths and applications.

Generative AI focuses on creating new, realistic data based on existing data, making it powerful for creative and design tasks. LLMs, on the other hand, excel at understanding and generating human language, making them great for language-based tasks. Foundation Models are versatile and can be used as a base for many applications, providing a starting point for a wide range of tasks146.

It’s also important to note that these models can often complement each other. For example, a generative AI could be used in conjunction with a foundation model to generate realistic images based on text descriptions.

Understanding these models and their strengths is crucial in leveraging the power of AI in various applications, from natural language processing to creative design, and beyond.


Footnotes

  1. What Are Generative AI, Large Language Models, and Foundation Models? – CSET 2
  2. Generative AI – Nvidia 2
  3. A Dummies’ Introduction to Generative AI – Medium
  4. LLMs: Large Language Models – Boost.ai 2 3
  5. What are Large Language Models? – Machine Learning Mastery 2 3
  6. What Are Foundation Models? – IBM Research Blog 2 3
  7. Foundation Models – Snorkel AI

The Power of Digital Education: North Dakota’s Groundbreaking Initiative in Computer and Cybersecurity Education

In an unprecedented move, North Dakota recently made headlines by passing legislation to provide computer and cybersecurity courses to students from kindergarten to 12th grade. This pioneering step puts a spotlight on a critical issue of our time – digital literacy and security. It serves as a potent reminder that, as our world becomes more digitized, understanding technology and its associated risks becomes non-negotiable, especially for the next generation.

According to the Brookings Institution, the need for comprehensive computer science education around the world cannot be overstated. As computers and internet connectivity become integral components of everyday life, a thorough understanding of these systems is indispensable. While North Dakota’s initiative focuses on K-12 education, this same principle applies to all age groups and stages of life. From children learning to navigate their digital surroundings, to adults seeking to protect their personal and professional data, digital literacy is a universal necessity.

One of the key aspects of this new legislation is its focus on cybersecurity. With cybercrimes becoming increasingly sophisticated, understanding how to protect personal and professional data has never been more critical. As the cybersecurity talent gap continues to widen, initiatives like this become even more crucial in ensuring that the next generation of professionals is equipped to handle future threats.

Furthermore, cybersecurity is not just about keeping the “bad guys” out. It’s also about understanding our own responsibilities when it comes to handling and protecting data. Companies need to realize that the success of their cybersecurity efforts often hinges on their employees’ digital literacy. By instilling these skills early on, we can better prepare the workforce of the future.

Moreover, teaching computer literacy to children has numerous benefits, beyond just safety. It nurtures problem-solving skills, logical thinking, and creativity. It also equips them with the technical acumen needed in our increasingly digital world.

North Dakota’s new law is a significant step in the right direction. However, it shouldn’t stop there. To truly harness the power of technology, we must advocate for computer and cybersecurity education at all stages of life. It’s time to recognize digital literacy as a basic skill – as important as reading, writing, and arithmetic. This is the path to a safer, more inclusive digital future.

Emerging Threat: Real-Time Deepfakes & Strategies for Mitigation

As the world of information security navigates the rapidly evolving landscape of cyber threats, the advent of real-time deepfakes marks a significant shift. The Los Angeles Times recently reported that these deepfakes have taken a quantum leap in terms of their sophistication, enabling them to mimic facial expressions, speech patterns, and even personal mannerisms in real-time.

Though currently an infrequent threat vector, expert projections cited by IT Brew anticipate a surge in the use of real-time deepfakes by malicious actors within the next couple of years. This emergent threat underscores the need for organizations to devise comprehensive strategies for mitigation and detection.

While the challenge is formidable, there are actionable steps that organizations can undertake to safeguard themselves. Here are a few strategies for consideration:

1. Employee Awareness and Training: An informed workforce is a crucial first line of defense. Regular training sessions should be conducted to educate employees about the existence of real-time deepfakes and how to recognize them.

2. Investment in Detection Technology: A number of startups and research institutions are working on technologies to detect deepfakes. Investing in such technologies can bolster your defenses.

3. Implement Verification Processes: Establish multi-factor authentication and verification processes, especially for remote communications. This will mitigate the risks associated with identity fraud via deepfakes.

4. Legal and Regulatory Compliance: Ensure your organization stays abreast of any legal or regulatory measures related to deepfakes.

While these strategies provide a starting point, there’s much to learn from other resources as well. Gitconnected provides valuable insights into how real-time deepfakes work, and PCMag offers a handy tip for identifying potential deepfakes.

Remember, as we approach this new frontier, vigilance, education, and proactive strategic planning will be our best allies. Prepare your organization now to navigate the imminent waves of real-time deepfake threats. The horizon may be daunting, but with the right tools and knowledge, we can effectively chart a course through these uncertain waters.

Turning the Tables on Cyber Threats: Tabletop Exercises as Cornerstone of Cybersecurity Preparedness

As the reality of our interconnected world sinks in, cyber threats relentlessly and pervasively unsettle organizations across all sectors. The days of reactive strategies are long gone. In this era, proactive and comprehensive preparation is a necessity, not a luxury. Among the various approaches adopted to foster readiness, tabletop exercises are gaining prominence. These exercises, often overlooked but undeniably effective, allow teams to respond to simulated crises, providing valuable insights into system vulnerabilities and response capabilities.

Recent cyber attacks underscore the critical importance of readiness. Case in point, the major oil pipeline ransomware attack in May 2021, that disrupted supply and resulted in widespread panic. Also, the far-reaching SolarWinds attack exposed thousands of organizations to cyber espionage, revealing that no one is immune to digital threats. It’s time to face facts: we live in a high-stakes, high-risk cyber world.

Tabletop exercises are structured activities that simulate critical incidents such as cyber attacks. These scenarios allow participants to explore their roles during a crisis, test responses, and identify potential flaws in their organization’s Disaster Response Protocols (DRP) and Emergency Response Plans (ERP). They are the metaphorical canary in the coal mine of cyber resilience, revealing vulnerabilities before they can be exploited.

Here are some best practices for effective tabletop exercises:

  1. Clear Objectives: Define what you aim to achieve with the exercise. Be it testing a new policy or assessing the response time, a clear objective will guide the process.
  2. Realistic Scenarios: The closer your exercise mirrors potential real-life threats, the more prepared your team will be. Take inspiration from recent attacks and consider threats specific to your industry.
  3. Inclusive Participation: Involve a range of personnel, including those from non-technical backgrounds. Diverse perspectives often reveal overlooked vulnerabilities.
  4. Encourage Open Dialogue: Foster an environment where participants can discuss potential weaknesses without fear of reprisal. Constructive criticism is key to strengthening defenses.
  5. Third-Party Facilitation: Consider involving an unbiased external expert to guide the process. They bring fresh insights, helping to counteract internal bias and complacency.
  6. Regular Reviews: Cyber threats evolve rapidly, and so should your strategies. Regular exercises keep your team sharp and up-to-date.
  7. Post-Exercise Analysis: This is crucial. Document findings, analyze them and update your strategies accordingly. This cycle of continuous improvement is central to building robust defenses.

In the face of rising threats, such as ransomware attacks, hands-on preparation becomes invaluable. Organizations can greatly benefit from these exercises, emerging better prepared and more resilient.

The recent cyber attacks serve as grim reminders that robust cyber defenses are a necessity. Through effective tabletop exercises, we can pinpoint weaknesses, improve coordination, and elevate our cyber resilience. As the landscape of cyber threats evolves, our defense strategies must adapt in tandem. Tabletop exercises are not just an effective tool, but an essential rehearsal, preparing us for the worst while we continually strive for the best.

For further insights, please check out these resources:

  1. How to Conduct a Tabletop Exercise
  2. Tips on Conducting Effective Tabletop Exercise
  3. 9 Steps to Design a Powerful Tabletop Exercise

Training Engagement: The Key to Robust Cybersecurity & Compliance Education Measures

For many companies, one of the most challenging aspects of implementing a comprehensive cybersecurity strategy isn’t the technology—it’s the people. Engaging staff in cybersecurity measures is a tall order, especially when they perceive these initiatives as bureaucratic requirements rather than essential safeguards. The key to changing this mindset may lie in an unexpected place: entertainment. This is a novel approach gaining traction in the business world as leaders seek creative ways to ensure the effectiveness of their cybersecurity defenses.

The Challenge of Staff Engagement

Employees are often aware that training material and compliance measures are in place primarily to meet regulatory requirements. Such an understanding can lead to disinterest, minimal engagement, and ultimately ineffective cybersecurity postures. However, flipping the script by offering a balanced mix of required training with personally beneficial knowledge can shift perceptions. Remember, a company’s cybersecurity is only as strong as its weakest link, and that link is often a human one.

Making Training Engaging

For training to be impactful, it must be engaging. Traditional, lecture-style presentations may cover the required material, but they do little to encourage active participation or ensure the retention of information. Introducing elements of entertainment into the mix can make training sessions more enjoyable and therefore more engaging. For example, gamifying the learning process can turn what might have been a tedious training session into a competitive and interactive experience.

Examples of Engaging Cybersecurity/Compliance Training

There are several innovative ways companies are improving staff engagement in cybersecurity/compliance training. Some organizations are turning to virtual reality (VR) experiences, turning “threats” into something staff can “see” and “experience.” Others are using escape room scenarios, where teams have to solve cybersecurity/compliance puzzles to “escape.” Not only does this make learning fun, but it also promotes teamwork and problem-solving skills. I don’t know about you, but this type of training seems like it would greatly help in having the content “stick”!

The Benefits of Engagement through Entertainment

Engagement through entertainment isn’t just about making cybersecurity training more fun. It’s about making it more effective. The more staff are engaged with the training, the more likely they are to retain the information and apply it in their day-to-day activities. By transforming cybersecurity training from a dreaded task into an anticipated event, companies can drastically improve their overall security posture.

In conclusion, companies seeking to bolster their cybersecurity defenses should not overlook the value of engaging staff in a meaningful and entertaining manner. While technology will always be a vital component of cybersecurity, the human element can’t be neglected. By leveraging the power of entertainment, companies can turn their staff from potential security risks into valuable first lines of defense.

The Dark Side of AI: Phishers Exploiting Technology to Enhance Attacks

As artificial intelligence (AI) continues to revolutionize various aspects of our lives, there’s an unsettling development emerging in the world of cybercrime. Phishers are reportedly leveraging AI to craft more sophisticated and believable attacks, putting the security of individuals and organizations at risk.

The Double-Edged Sword of AI

AI has undoubtedly made our lives easier, from improving resumes and cover letters to generating engaging content with minimal input. However, as we embrace the convenience and smart solutions AI provides, it’s essential to remember that not everyone will use these tools for good. The powerful capabilities of AI can be weaponized by malicious actors, such as phishers, who seek to exploit vulnerabilities and steal sensitive information.

The Darktrace Report: AI-Assisted Phishing on the Rise

According to a recent report by Darktrace, a leading cybersecurity firm, phishers may already be utilizing AI to enhance their attacks. The report highlights the increasing sophistication of phishing campaigns, with AI-generated content becoming more engaging and believable. This troubling trend poses a significant threat to unsuspecting users and raises concerns about the future of online security.

How AI Augments Phishing Attacks

Phishing attacks have long relied on social engineering techniques to trick users into revealing sensitive information or granting unauthorized access. With AI’s assistance, phishers can create more targeted and personalized emails, making their deception more convincing. By leveraging AI-generated content, attackers can craft emails that mimic the writing style of legitimate sources, making it increasingly difficult for users to differentiate between genuine and malicious emails.

Moreover, AI can expedite the process of identifying potential targets and their personal information, such as interests, job titles, and social connections. This information can be used to create highly customized phishing emails that appeal directly to the target, increasing the chances of a successful attack.

The Growing Threat of Phishing Attacks

The latest phishing statistics reveal that this form of cybercrime continues to be a significant concern. A recent study found that phishing attacks accounted for 22% of all reported security incidents, and 65% of these attacks targeted small- and medium-sized businesses (source: https://aag-it.com/the-latest-phishing-statistics/). The study also discovered that 30% of phishing emails were opened by the targeted user, highlighting the effectiveness of these malicious campaigns.

The Potential Consequences of AI-Enhanced Phishing

As AI-assisted phishing becomes more prevalent, the potential consequences for individuals and organizations grow more severe. The theft of personal information, financial details, and login credentials can lead to devastating outcomes, including identity theft, financial loss, and reputational damage. Furthermore, organizations may face costly data breaches, regulatory fines, and loss of trust from their customers and partners.

Defending Against AI-Driven Phishing Attacks

To counter the rising threat of AI-enhanced phishing, individuals and organizations must adopt a multi-layered approach to security. This includes implementing robust security solutions, such as spam filters, antivirus software, and firewalls, to minimize the chances of phishing emails reaching their targets. Additionally, user awareness and education are critical in recognizing and avoiding phishing attempts. Regular security training and simulated phishing exercises can help users stay vigilant and respond appropriately to potential threats.

On a broader scale, collaboration between the cybersecurity industry, technology developers, and regulators is necessary to develop comprehensive strategies and policies to address the challenges posed by AI-driven cybercrime. By sharing information and resources, stakeholders can work together to identify emerging threats and develop innovative solutions to protect users from AI-assisted phishing attacks.

As AI continues to advance, so too does the potential for its misuse. The Darktrace report serves as a

stark reminder that the benefits of AI also come with significant risks. It is crucial for individuals, businesses, and the cybersecurity industry to remain vigilant and proactive in combating the growing threat of AI-enhanced phishing attacks. By adopting a combination of advanced security measures, user education, and collaborative efforts, we can mitigate the risks posed by this new frontier of cybercrime.

As we move forward into an increasingly digital and AI-driven world, it is essential for everyone to take responsibility for their online security. By staying informed about the latest developments in phishing attacks and cybersecurity, we can all contribute to creating a safer online environment.

Technical Credentials/Certifications: How to Determine Which Ones are Worth the Investment

In today’s competitive job market, technical credentials have become increasingly important for job seekers. These credentials are an indicator of a job seeker’s expertise and skill level in a particular area. However, not all technical credentials are created equal, and as a job seeker, it’s essential to do your homework carefully to ensure that any credentials you obtain deliver the return on investment you hope for.

Technical credentials run the gamut in terms of scope, quality, and usefulness. Some credentials are industry standards, such as Network+, CCNA, SICC, and PMP. These credentials are recognized across the industry and are often required by employers for certain positions. These credentials can provide a significant boost to a job seeker’s resume and can help them stand out in a crowded job market.

On the other hand, some technical credentials may be very niche and lead to little value. These credentials are often referred to as micro-credentials and are typically obtained through short-term courses or training programs. While these credentials can be useful in certain situations, they may not hold much weight in the job market, particularly in highly competitive industries.

So, how do you know which technical credentials to pursue? The key is to do your industry homework. Before jumping into any credential path, research the industry and the specific job you are interested in. Look at job descriptions and requirements for similar positions and see what types of credentials are typically required or preferred. This will give you a better idea of which credentials will be most valuable for your career path. I’d also suggest reaching out to your network, and speaking to people who are in those industries to get their take on the value of the various certifications available.

Additionally, it’s important to consider the reputation of the organization offering the credential. Look for credentials from reputable organizations that are recognized in the industry. Organizations such as CompTIA, Cisco, and Project Management Institute (PMI) are well-respected in their respective fields and offer industry-standard certifications that are recognized by employers.

Another factor to consider is the cost and time investment required for the credential. Some credentials may require extensive training or testing, which can be costly and time-consuming. Make sure to weigh the cost and time investment against the potential return on investment. In some cases, it may be more beneficial to focus on gaining practical experience rather than obtaining additional credentials.

It’s also important to keep in mind that technical credentials are not the only factor that employers consider when hiring. Employers also look for soft skills such as communication, problem-solving, and teamwork. While technical credentials can demonstrate expertise in a particular area, they do not necessarily indicate a candidate’s overall suitability for a position. And even if one company values a credential over the soft skills, another company in the same industry may not. Credentials aren’t a magic bullet for getting hired.

In conclusion, technical credentials can be a valuable asset for job seekers, but not all credentials are created equal. Doing your industry homework is critical before jumping into any credential path. Look for industry-standard credentials from reputable organizations, consider the cost and time investment, and weigh the potential return on investment. And remember, technical credentials are not the only factor that employers consider when hiring, so be sure to also focus on developing your soft skills. And finally – remember, that it is the culmination of your history, skills, knowledge, as well as a given company’s needs, hiring process, (quality of their interviewers/recruiters, etc), and a bit of luck which all ads up to a new job – just keep at it, you’ll get it!

The Power of Prioritization: Navigating Business and Life with Clarity and Focus

As business leaders, we are constantly faced with prioritization challenges – from identifying and acting on key strategic initiatives to manage competing demands on our time and resources. Effective prioritization of the work to be done is critical for success in any business environment, and it requires careful consideration of a range of factors. Some examples include the company’s strategic goals, available resources, and the needs and interests of various stakeholders, to name a few.

However, prioritization isn’t just a concern for business professionals on the job – it’s also an important part of life. As we navigate the difficulties of our personal and professional lives, we are constantly faced with choices about where to focus our time, energy, and resources. And as recent events in the tech sector have showed, these choices can have a significant impact on our careers and our ability to achieve our goals.

In the wake of mass layoffs in the tech sector, many professionals are re-evaluating their priorities and considering ways to strengthen their resumes and improve their job prospects. While education and certifications can certainly be helpful, they are not the only solution. To truly thrive in the current job market, professionals must prioritize a range of skills and attributes, including adaptability, creativity, and resilience.

To start, it’s important to take a step back and assess your current situation. What are your strengths and weaknesses? Where do you need to improve? What opportunities are available to you, and what challenges do you face? By taking a clear-eyed look at your situation, you can identify the most important areas for improvement and prioritize your efforts accordingly. To get started here, I’d suggest using the OODA loop, which is the cycle observe–orient–decide–act concept, developed by military strategist and United States Air Force Colonel John Boyd. Observe where you are in your career, where the industry is, and where you want to be, then orient yourself toward getting to your next career goal. From there you can decide on how best to achieve that goal, and you can put your plan into action. A key part of that plan should carve out your key priorities to hit your goals.

Reaching your goal may involve seeking additional education or training, updating your resume and cover letter, practicing your interview skills, or networking with other professionals in your field. Whatever your goals may be, it’s essential to be proactive and persistent in pursuing them.

Of course, prioritization isn’t just about career advancement – it’s also about achieving balance and fulfillment in our personal lives. As business leaders, we recognize that our personal lives and our professional lives are deeply interconnected, and that neglecting one can have a negative impact on the other. By prioritizing self-care, relationships, and personal growth, we can create a more fulfilling and sustainable life for ourselves and those around us.

To tie things up here; effective prioritization is critical for success in both our personal and professional lives. By taking a strategic, thoughtful approach to identifying and pursuing our most important goals, we can achieve the results we desire and build a life that is both meaningful and fulfilling. So take a step back, assess your priorities, and start taking action today. The journey may be long, but the rewards will be worth it.

Why Getting Hired by a “Top” Company Shouldn’t be Your End Goal

This post is inspired by a post from Akshat Shrivastava I came across the other day. The second point in this post resonated with me so much that I want to explore it a bit more.

When folks are just starting out in their careers, it’s easy to think that getting hired by a “top” company should be your end goal. After all, these companies are known for their prestige, their generous salaries, and their ability to attract and retain top talent. I know when I was hired by BCG early on, or by Google later on, I felt like I hit the lottery! So much so I stayed with Google for over 10 years; but at what cost? I learned during these layoffs that a company isn’t the end goal and it likely shouldn’t be for others either.

While working for a well-known company can be beneficial (so many perks/benefits!) there are many other career goals beyond simply getting a job with a good company. In this post, I’ll explore some of the reasons why getting hired by a “top” company shouldn’t be the end goal of your career, as well as some other career goals you should consider.

Career Goals Beyond Getting Hired by a “Top” Company

  1. Develop a Diverse Skillset: Rather than focusing solely on working for a “top” company, focus on developing a diverse skillset. This will make you a more valuable employee and give you the ability to pivot your career if necessary. Seek out opportunities to learn new skills, take on new projects, and work with people who have different perspectives than your own. This is the “Jack of all trades” approach, and can serve you well in a multitude of situations. The more you know and the more varied experience you have the more “recession” proof you become, and the more avenues are available to you as you decide to continue down the path of corporate work, or decide to open/run your own business.
  2. Pursue Your Passion: I know this one can be controversial depending on your end goal, but one of the greatest career goals you can have is to pursue your passion. If you love what you do, you’ll be motivated to excel and make a difference in your field. Focus on finding work that aligns with your passions and interests, rather than just chasing a paycheck. When I was running the Indoor maps team for Google – I woke up every day excited to go to work, tackle problems, and get stuff done! If you can’t say the same, maybe it’s worth exploring something a bit different?
  3. Make a Difference: Many people find fulfillment in their careers by making a positive impact on the world. Whether it’s working for a non-profit, volunteering your time, or simply choosing to work for a company that aligns with your values, finding ways to make a difference can give your career purpose beyond just earning a living. I’ve found mentoring within and outside of Google has helped me to find a great amount of personal fulfillment – maybe there is room for you to split off a bit of your time to also pursue something in this relam?
  4. Build a Network: Your professional network can be a valuable resource throughout your career. Focus on building relationships with people who can provide mentorship, advice, and opportunities. Attend industry events, participate in online forums, and seek out opportunities to connect with other professionals in your field. And if the word “Network” makes you cringe, then don’t do it! Instead, make connections, and build relationships through helping others. That is the best way to give the gift which keeps on giving, and also serves as “networking” as well.

Career Resiliency: Owning Your Own Career

Regardless of your career goals, it’s important to remember that you are the owner of your own career. You are responsible for your own professional development, and for ensuring that you are getting more than just a paycheck out of your job. Here are a few tips for owning your own career:

  1. Be Proactive: Don’t wait for opportunities to come to you. Seek out ways to develop new skills, take on new challenges, and advance in your career. The only reason I’m a PMP today, is because I sought out and took on problems I had no business doing so more than 15 years ago! If I can do it, so to can you!
  2. Seek Feedback: Ask for feedback from your managers, colleagues, and mentors. Use this feedback to identify areas for improvement and to develop a plan for professional development. BUT, be careful as you do this. Pick that folks you solicit feedback from carefully – aim for 360 feedback, and remember they are just data points, not life long tattoos. If you can take a balanced approach to this, you’ll reap many rewards.
  3. Be Open to Change: This can be the hardest suggestion for many. But you need to be willing to pivot your career if necessary. Be open to exploring new opportunities and taking on new challenges.
  4. Invest in Yourself: Invest in your own professional development. Take courses, attend workshops and conferences, and seek out opportunities to learn new skills. If your company offers to cover your training, take them up on it. If not, think of this expenditure as an investment in yourself, which will pay off way more than 3% over the long-run of your career!

To wrap things up, getting hired by a “top” company shouldn’t be the “end” goal of your career – it’s a “means” goal to get you to where you want to be. There are many other career goals beyond simply getting a job with a good company and I encourage you to think about them, and what is right for you. Focus on developing a diverse skillset, pursuing your passion, making a difference, and building a network. And remember, you are the owner of your own career. Take ownership of your professional development and be proactive in pursuing your career goals.

Blog at WordPress.com.

Up ↑