Page 1,856«..1020..1,8551,8561,8571,858..1,8701,880..»

7 Reasons to Attend MSSP Alert Live This September: Join Us – MSSP Alert

by MSSP Alert Live Aug 23, 2022

When the MSSP Alert Live 2022 conference kicks off (September 19-21, Washington, D.C.), our guest speakers will describe how MSPs and MSSPs can build more successful cyber practices on their own and through strategic partnerships with each other.

Need more agenda information before registering to attend? Glad you asked: Here are seven main-stage discussions, fireside chats and tutorials that are set to unfold at the conference:

Wendy K. Thomas, CEO, Secureworks

Booz Allen VP Wade Alt

1. Managed XDR Services A Reality Check: In this fireside chat, Secureworks CEO Wendy Thomas will describe how the MSSP transformed its business for cloud-based XDR services. Equally important, Thomas will describe the power of saying no to projects and revenue opportunities that can distract you from your business transformation.

2. The Future of Cyber Defense and Response Services: Here, Booz Allen Hamilton Senior VP Wade Alt will describe how one of the worlds top cyber defense and response organizations evolved in 2022 and where the business is heading next in 2023.

AWSs Ryan Orsi

Jon Boyens, NIST

3. Public Cloud Security Strategies for MSPs and MSSPs: Ryan Orsi, the worldwide MSSP partner lead at Amazon Web Services, sits down for a fireside chat to describe how the cloud giant is working with MSSPs and how those partner engagements are evolving.

4. Software Supply Chain Security Best Practices: Jon Boyens from NIST shares the latest guidance tohelp service providers, software companies and organizations enhance their software supply chain security.

Jeff Schmidt, CEO, Avertium

Bill Goldin

John Strand, Black Hills

5. Managed Detection and Response (MDR) Whos Actually Responsible for Response? Jeffrey Schmidt from Avertium and FBI Special Agent Kyriakos Vassilakos describe real cyber incidents and the best practices MSPs need to take to pinpoint who exactly owns each step of the response process.

6. How to Train Every MSP Employees on Security: For MSPs, your weakest cybersecurity link may involve your own employees. Need help? Learn from the best namely, John Strand of Black Hills Information Security and William Goldin of Lloyd Group.

Andrew Morgan, founder, Cyber Nation & CyberCall

Phyllis Lee, Center for Internet Security

Joe Panettieri, MSSP Alert

7. How Can MSPs Defend Against the Top Five Cyberattacks: Attend this session, and youll learn how your MSP can build a security stack around the CIS Critical Security Controls to keep both your company & your clients secure. Our guest experts leading the discussion: Phyllis Lee from the Center for Internet Security and Andrew Morgan, founder of The CyberCall and Right of Boom.

8. Bonus Top 250 MSSPs 2022 Research Findings: MSSP Alert Editorial Director Joe Panettieri describes the key business performance, technology and cyber trends from this years just-completed research report.

See the rest here:
7 Reasons to Attend MSSP Alert Live This September: Join Us - MSSP Alert

Read More..

Singapore sees uptick in cyber threats in 2Q of 2022 – SecurityBrief Asia

A total of 1,817,635 web threats against Internet users were detected and blocked in Singapore between April to June 2022, according to data obtained through the Kaspersky Security Network, marking a 17.6% increase compared to the first three months of this year.

KSN data is collected from Kaspersky customers here who have installed the companys cybersecurity software on their computers and voluntarily shared information with the firm. In 2Q 2022, 23.1% of users in Singapore were attacked by web-borne threats. This places Singapore in 86th place globally in terms of dangers associated with surfing the internet, with the Republic moving up 23 places from 109th in 1Q 2022.

Web-borne threats, or online threats, are a category of cybersecurity risks that may cause an undesirable event or action via the internet, which usually expose people and computer systems to harm. A broad scope of dangers fit into this category, including well-known threats such as phishing and computer viruses.

While large scale phishing attacks have been averted in Singapore this year, the Police have recently warned of an increase in phishing scams where cybercriminals impersonate banking staff and target victims through phone calls or SMS messages.

Cyber threats occur daily and cybercriminals are getting more sophisticated in their methods, although authorities in Singapore have been proactive in deterring and detecting threats as seen in the formation of the Digital and Intelligence Service that was recently announced," says Yeo Siang Tiong, general manager for Southeast Asia at Kaspersky.

"But countering cyber threats requires a whole-of-society approach so we need to continue to educate individuals and businesses on the importance of good cyber-hygiene habits to reduce the risk of being a victim of a cyber-attack."

In Singapore, the most common methods used by cybercriminals to penetrate systems include exploiting vulnerabilities in browsers and their plugins (drive-by download), and social engineering.

Exploiting vulnerabilities in browsers and their plugins (drive-by download).

Infection in this type of attack takes place when visiting an infected website, without any intervention from the user and without their knowledge. This method is used in the majority of attacks. Among them, file-less malware is most dangerous: its malicious code uses registry or WMI subscriptions for persistence, leaving no single object for static analysis on the disk.

To fight such stealthy threats, Kaspersky products apply Behavior Detection component that benefits from ML-based models and behavior heuristics to detect malicious activity even if the code is unknown. Another key technology, developed by Kaspersky, is Exploit Prevention which reveals and blocks in real time the malware's attempts to benefit from software vulnerabilities.

Social engineering

These attacks require user participation: a user has to download a malicious file to her computer. This happens when cybercriminals make the victim believe she is downloading a legitimate program.

Protection against such attacks requires a security solution capable of detecting threats as they are being downloaded from the Internet. Since many threat actors nowadays obfuscate malicious code to bypass static analysis and emulation, true protection requires more advanced technologies such as proactive ML-based methods and behavior analysis.

The global cyber threat landscape continues to evolve in 2022, and some of the major trends seen in the first half of the year include cybercriminals exploiting the rise in remote work to penetrate corporate networks, rising supply chain attacks and more companies becoming prime targets amid an accelerated shift to the cloud.

For companies observing remote or hybrid work arrangements, Kaspersky experts offer the following tips to help employers and businesses continue to stay on top of any potential IT security issues and remain productive:

For users, here are the top online security tips for to ensure each of us can play our part in cyber-vigilance:

More:
Singapore sees uptick in cyber threats in 2Q of 2022 - SecurityBrief Asia

Read More..

Here’s Why ATOM Gained 13% Amid Wider Crypto Slump – The Motley Fool

Image source: Getty Images

The crypto that talks to other cryptos is gaining ground.

Cosmos (ATOM) was one of the few top cryptos in the green this morning, up almost 13% in 24 hours. Its price has increased over 2% in the past week and almost 15% in the past 30 days. In contrast, according to CoinMarketCap, market leaders Bitcoin (BTC) and Ethereum (ETH) have fallen by almost 10% and 13%, respectively, in the past seven days.

There's no obvious single reason for Cosmos's strong performance in recent days. However, there are a number of contributing factors that have given ATOM some momentum.

Global investment manager, VanEck, published an optimistic analysis of Cosmos and its potential in the coming years. It praised Cosmos's secure cross-chain bridging capabilities, which is a key issue in the crypto industry. Many blockchains operate as individual silos and have difficulty communicating with other networks. Cosmos is one of the interoperability cryptos that addresses this issue.

VanEck predicts that over 5,000 blockchains will be built on its network before 2030 because of Cosmos's "superior technology." The report says, "The Cosmos Hub's ATOM token is in a premier position to capture a substantial share of the public blockchain market's value, and we expect its price will perform according to this expectation."

The VanEck report drew particular attention to something called "internet security." It essentially allows blockchains built in the Cosmos ecosystem to use the Cosmos Hub to secure themselves. A new blockchain can use the existing ATOM-backed blockchain to validate itself, rather than rely on its own -- less developed -- token and chain. According to the Cosmos roadmap, the first step toward launching internet security is due soon.

Finally, there's speculation on social media that some of the projects from the now-defunct Terra (LUNA) ecosystem will move to Cosmos. Several smart contract cryptos are competing to attract Terra applications. Terra was built using Cosmos technology, adding weight to rumors that some decentralized finance developers will move activities there. However, other blockchains, such as Polygon (MATIC) have launched specific funds to entice former LUNA apps.

Our top crypto play isn't a token - Heres why

Weve found one company thats positioned itself perfectly as a long-term picks-and-shovels solution for the broader crypto market Bitcoin, Dogecoin, and all the others. In fact, you've probably used this company's technology in the past few days, even if you've never had an account or even heard of the company before. That's how prevalent it's become.

Sign up today for Stock Advisor and get access to our exclusive report where you can get the full scoop on this company and its upside as a long-term investment. Learn more and get started today with a special new member discount.

It is a difficult time for the cryptocurrency industry, and there are still clouds on the horizon. An uncertain wider economic climate and strong likelihood of stricter regulation mean prices could continue to struggle in the short term. This is still a relatively new and unregulated industry and there's a lot we don't know about how it will develop.

As an investor, the key question is whether you think Cosmos can perform well in the long term. Interoperability -- the ability for cryptos to talk to one another -- is crucial for cryptocurrencies and the VanEck report is positive. Nonetheless, its analysts do raise some concerns about Cosmos's tokenomics and disputes between key developers. Do your own research, and try to consider how Cosmos compares to similar projects such as Polkadot (DOT) and Avalanche (AVAX).

Before you invest in any crypto, make sure you're on top of your other financial goals. An emergency fund with three to six months of living expenses is much more likely to help you through a potential recession than a risky crypto investment. Only invest money you can afford to lose and make sure crypto makes up a small percentage of your overall investment portfolio. If you do decide to buy, check out our top crypto apps and exchanges for places to buy Cosmos and other digital currencies.

Excerpt from:
Here's Why ATOM Gained 13% Amid Wider Crypto Slump - The Motley Fool

Read More..

I Teach Computer Science and I Need to Apologise Less About Having So Much Maths – Analytics India Magazine

If you consider the evolution of the computer science (CS) field, or the way it has been taught in colleges and universities, theoretical mathematics seems to be the de facto subject that most students learn in order to make any kind of advancement in the field.

Every year I teach CS theory, I find that I need to apologise less and less about having so much maths content, said professor Boaz Barak, in a twitter post, explaining that CS practice is getting more and more mathy.

Further, he asked if students wanted to learn to read theoretical texts or directly get into coding, and the application aspect of mathematics.

Citing a diffusion paper written by Stanford University researchers, Barak said: This undergrad intro theory, and I teach neither, but the course does teach them not to be afraid of maths.

In other words, Barak pointed out at the research paper being theoretically maths heavy. He said that being able to digest new maths is becoming more practically relevant in computer science with time.

Harvard professor Yannai A. Gonczarowski believes otherwise. He said that framing non-mathy as swapping icons in HTML is detrimental in two waysfirstly, it presents things such as human-computer interaction (HCI) and large-scale software engineering/design as trivial, and secondly, it teaches students to think some fields are superior to others.

Further, he said that it is also incredibly easy to make the polar opposite comparison, albeit unfair: very abstract out there maths versus potentially providing countless, differently-abled users access they never have before. If you must compare, do so within a field. Cross-field comparisons are mostly a bad idea, added Gonczarowski.

I am not framing non mathy fields as swapping icons in HTML, said Barak, clarifying that he is framing swapping icons in HTML as swapping icons in HTML. He believes that HCI is about so much more than that. What I am saying to students is that the ability to not fear maths will open many options to them, emphasised Barak.

Associate professor at NYU, Julian Togelius said that you can indeed be successful in CS, including in machine learning, while knowing next to nothing of this maths. Just look at me, I barely passed those required theory courses, still made it here, he added.

However, Barak disagrees. He explained that you can be successful in computer science with little knowledge of maths, and can also be successful without knowing how to programme. He however suggested that it is better to know things than not to know. Which is why, even though our theory students grumble about the programming requirements. I support it, he added.

With the advent of software tools, say training neural networks, the technical barriers to entry have been lowered. To this, Barak partially agreed, and said: barriers to training NNs are lowered, but training NNs becomes more practically relevant. Citing deep learning, he said that the time between paper and product is shrinking, which makes the ability to read paper more important.

Furthering the discussion, Oskar Ojala elaborated on the practical application of maths in solving real life problems while giving an example of the success of Facebook. Disagreeing with Oskar, Alex Eisenmann said that CS without maths could give you Facebook but CS with maths has the potential to provide frameworks like AI, ML, quantum computing, and blockchain.

This stands true for some data scientists who write complex algorithms from scratch but there are others who use the pre-existing libraries in frameworks like Python that already have models that are ready to be deployed.

Discrete mathematics fields like graph theory are useful for compilers and operating systems, probability theory is used in AI, ML, and set theory is used in databases and engineering but the tools already present in the library can do the job for most CS engineers.

Read more:

I Teach Computer Science and I Need to Apologise Less About Having So Much Maths - Analytics India Magazine

Read More..

The computing research community should think about its social responsibility – USC Viterbi | School of Engineering – USC Viterbi School of…

Chris Ramming

Chris Ramming, Senior Director for Research and Innovation at VMWare, will be a speaker at theSymposium on the Future of Computing Researchheld by USCs Information Sciences Institute on September 12-13, 2022.

What topics should we be researching to reflect the changing role of computers in our society?

The last few years have shown how impactful computer science research can be on society, but the related innovations may result in dangers, risks and ethical considerations. I think the community is beginning to realize that those issues may need more attention. There may be ways to incorporate some of these broader considerations into our research agendas.

One of the issues that Im particularly interested in right now is privacy. Data is available on the internet in forms that cant be controlled by the people who originated it. Im personally interested in technologies that give us not just the ability to keep secrets which is the way I think about security but also give people control over who sees those secrets which is how I think about privacy engineering.

How do you think we should stimulate research in these areas?

Partnerships matter a lot. And partnerships between industry, academia and government can be very effective. People can do a lot more together than they can by themselves.

One of the things that people can do when theyre tackling an important area like this, is to just put down a position paper outlining the range of issues that need to be addressed. Which agencies or which communities need to address them? What might a nation-scale research agenda look like to comprehensively tackle one of these societal issues?

Should researchers without traditional computer science backgrounds, such as those with social science degrees, get involved in computer science research? What is the best way for them to get involved?

As technologists, we may not have the tools to understand human needs, desires, societal issues. Bringing in social scientists, ethnography researchers and user-experience researchers earlier, during the problem formulation and design stage of a research program, could be very valuable.

One approach could be to create advisory boards or ethics boards. You cant expect people to work on these problems full-time, and that may not even be necessary. There may be ways of having part-time roles, opening up opportunities to forge collaborations early in the life of a large program.

We also see a lot of places where computer science research can be beneficial in other disciplines such as biology, physics and energy. Collaboration across those kinds of fields can potentially be very valuable as we bring, for example, state of the art AI techniques to new problems in fusion energy. Thats a form of collaboration that is becoming increasingly commonplace, because computer science is so fundamental to many different industries today.

In the past, youve talked about how to foster a positive relationship between corporate and faculty researchers.How can we encourage this kind of research?

The key is to find people who are interested in tackling the same big goal and who value each others insights and experience, and believe that by working together, they can accomplish more. The best thing we can do is create opportunities to connect like-minded researchers.

What is the best way for companies and universities to plan an innovative portfolio of research?

At VMWare, we try to grow our company and enrich our portfolio of products and services in a number of different ways. There are times when we acquire companies, which is referred to as inorganic innovation. There are times when we build our own internal technology, which is organic innovation. We deliberately try to do both.

Academia, increasingly, is finding multiple ways to do research translation. In some cases, people are creating their own faculty-led startups. In other cases, they are letting companies take their inventions to the next level and innovate with them.

We have choices on the corporate side about how to balance organic and inorganic innovation. Researchers at universities have choices about how they would like to see their inventions, commercialized or brought into the real world. Understanding each others point of view is a critical first step in building a successful collaboration. All of those approaches work and make for a productive relationship. But its important to figure out early on which path youre planning to go down.

What is one outdated practice that you see a lot in your field that you believe is limiting innovation and that researchers should move past?

I often hear of people get hung up on intellectual property negotiations before they begin a university-industry collaboration. I think being too concerned about fully triaging intellectual property issues at the beginning of a relationship can slow down the launch of that relationship in ways that may not be necessary. Im encouraged that some leading research groups are proactively adopting a public dedication approach based on permissive open source licenses and patent avoidance. Ive also been encouraged to learn that the public dedication philosophy doesnt seem to be in conflict with the requirements of faculty and student startups there are even a few instances of unicorns (startups with billion dollar valuations) coming out of academic centers with a public dedication philosophy. Perhaps this relatively relaxed approach is possible because our industry competes more on implementation than on intellectual property.

Who is someone in your field that is doing exciting, forward-thinking research?

One example is Scott Shenkers [Professor of Computer Science at UC Berkeley] Extensible Internet Project. Im a sucker for reinventing the internet projects. The Extensible Internet idea turns some conventional wisdoms upside down and recognizes certain practical realities about the nature of internetworking. Its doing it in a way that may address the roadblocks of putting a reinvented internet into practice. Im particularly excited about that kind of thing, where we know that there are some improvements to be made and were doing it in a way thats a little unconventional, so that it might become something that can be introduced in the real world.

A second example is another UC Berkeley effort around sky computing. In computer science we always look at things through the lens of what the next level of abstraction can be, and what it will look like. The sky computing effort is interesting, because it explicitly recognizes a phenomenon that we call multi-cloud. It focuses around the idea of service brokers and abstraction layers that sit above the cloudwhich is why its called sky computing.

What will computer science research look like in ten to twenty years?

I think what were going to see is a continuation of the current trend where computing becomes increasingly embedded in many different domains: medicine, biology, physics, astronomy. It has the potential to add tremendous capability and maybe even accelerate the development of new advances in certain fields. But, of course, accelerating research and doing it at a greater scale also has the increased potential for unintended consequences.

Who should regulate those potential consequences?

You may have heard about a ceremony Canadian engineers undertake at the beginning of their careers that involves an iron ring. The ring provides a reminder of a bridge collapse that was the result of some calculations that werent done correctly. The ring is worn in a way that rubs against papers when people are doing calculations, to remind them that they need to do those calculations carefully and consider the social consequences of their work.

What is the responsible code of social responsibility that computer scientists should be adhering to? Maybe we can develop that ourselves. The computing research community as a whole should be thinking about its own standards for social responsibility. Its not the province of any one party, and does not need to come from government or academia or industry specifically.

I recently attended the Computing Research Associations biennial meeting; it was the first time people have gotten together in four years after the COVID-19 pandemic. There was extensive discussion about how we as a field need to address social responsibility issues. Theres really a great deal of awareness of the need and the opportunity. The conversations are beginning. I think people are taking them seriously. Well see if there is actionable progress.

Do you have any advice for early career researchers?

One of the things that early career researchers should think about is that sometimes it takes 20 years to see an idea through. To see that idea through may be something you can accelerate by moving from academia to industry to government, by being flexible in how your career evolves. I would encourage people not to get too dialed in to one track, but to think about the opportunities that come from taking on a different point of view at different points in ones career.

A second piece of advice that I wish I had been given myself is not to over appreciate the state of the art at the beginning of your career. Sometimes, research results can seem so polished, and the expression of those research results can seem so carefully articulated that its hard to imagine replacing it with something else or improving on it. Its important to recognize that everything is a work in progress. Its also important not to be shy about rethinking things and recognize there are completely novel ways of looking at the problem and taking a different perspective on it. Recognizing that even things that look near perfect can be evolved is an important aspect of creating new inventions and advancing the state of the art.

What do you hope the next generation of researchers are thinking about?

My hope is that the next generation recognizes that their work can be tremendously impactful. I think that people in the field of computer science are in a position to make a meaningful contribution to the evolution of society and the health of the planet. Im hoping that the next generation recognizes that opportunity, and doesnt just pursue new ideas for the sake of new ideas. Instead, they should research ideas that are poised to do something constructive in the world.

Published on August 23rd, 2022

Last updated on August 23rd, 2022

Visit link:

The computing research community should think about its social responsibility - USC Viterbi | School of Engineering - USC Viterbi School of...

Read More..

Symposium on the Future of Computing Research – USC Viterbi | School of Engineering – USC Viterbi School of Engineering

Photo credit: iStock

With this symposium we ask a single, yet sweeping, question: how will, and how must, the field of computing research evolve over the next twenty years?

Forces as disparate as the increasing centrality of computing to modern society, the intellectual and technical maturing of the discipline itself, changing conceptions of the meaning of research success and the role of research in the larger national landscape, and the emergence of rich, multidisciplinary explorations as fundamental tools for progress all drive us to ask how our field will grow and change in response.Taken together, these forces are motivating a dramatic, qualitative shift in viewpoint about the expectations and demands placed on computing research in upcoming years.

With this symposium, we aim to snapshot a moment in time in this transformation, capture and clarify the fundamental forces driving it, and discuss key strategies and approaches available to the computing research community to shape both its own and societys future. Our symposium brings together informed, thought-provoking computing researchers, research policy setters and research sponsors from academia, industry, and government for a series of open discussions, explorations, and roundtables on topics of importance to future computing research, each with the opportunity for symposium participants to join and guide the conversation.

The symposium will be uniquely interactive. Options are available to participate online, or from an in-person pod in of several locations. Before, during, and after the symposium, we provide opportunities for you to shape the discussion, contribute directly to the program, and meet other participants that share your specific interests. At the conclusion of the symposium, we plan to create a sequence of reports and ongoing discussion opportunities addressing different audiences the technical community, research policy professionals, and the general public addressing the symposiums discussions and conclusions.

Keynote Address by Dr. Sethuraman Panchanathan, Director of the US National Science FoundationDr. Panchanathan will discuss the NSFs vision for the future of computing research, emerging efforts to encourage and enable interdisciplinary and multidisciplinary research that drives understanding of the interplay between computing, science, and society, and the mission and objectives of the NSFs new Directorate for Technology, Innovation, and Partnerships, which aims to drive progress by reshaping and expanding the range of research models, collaborations, and partnerships supported by the Foundation.

Fireside Chat with Dr. Eric Horvitz, Chief Scientific Officer of MicrosoftDr. Horvitz will discuss his vision of computing research as a powerful vehicle and path to enhance the quality of peoples lives. Speaking from his perspective as the Microsofts CSO, his prior role as director at Microsoft Research, and his service with key external advisory groups and organizations including the Presidents Council of Advisors on Science and Technology and the National Academies Computer Science and Telecommunications Board, Eric will examine the future of computing research in a conversation shaped by questions from colleagues and symposium participants.

Participant/Speaker Discussion Sessions covering three topics central to the future of computing researchEach of these sessions will feature three framing presentations from research community members with deep expertise in the area of interest, followed by an open discussion among the speakers and symposium participants, guided by a discussant. Symposium participants will have the opportunity to pose questions for the speakers to consider both before and during the session.

Discussion Session 1 Identifying and Emphasizing Emerging Technical Directions will examine the process of how the computing research community chooses its research directions, and how this might change to meet our communitys and societys future.

The session will consider such questions as:

Discussion Session 2 Recruiting Talent and Fostering Research Careers will examine the nature of future computing research careers, new strategies for drawing talented people to computing research, and new concepts and approaches for preparing for a computing research career.

The session will consider such questions as:

Discussion Session 3 New Models for Research and Research Support will examine the rapidly changing landscape of both research strategies and models and research funding and support.

This session will consider such questions as:

Student Roundtable Conversation with students planning to pursue a computing research careerYour chance to probe and understand this groups desires, ambitions, hopes, and concerns about their place in the future computing research landscape. An in-depth conversation with a group that is the future of computing research.

Roundtable participants will be early career researchers new PhD graduates or near-graduates considering a career in computing research. The group will be selected to represent a range of perspectives and experiences, and a discussant will be available to drive and draw out conversation. Symposium participants will have the opportunity to pose questions and suggest discussion topics both before and during the session.

Small Group Discussion TimeAn opportunity to meet informally with other symposium participants that share your interests, concerns, or challenges. Prior to the opening of the symposium, and continuing until the start of this session, the symposiums meeting platform will provide a mechanism for you to express your interests, raise questions, or otherwise indicate topics youd like to discuss, and will help you match with others that share these interests to join a discussion.

Do you want to discuss the Future of Computing Research? USCs Information Sciences Institute has a symposium for that on Sept. 12-13, 2022.Register here for freeto attend online or in person in Los Angeles, Boston, and Arlington.

Published on August 23rd, 2022

Last updated on August 23rd, 2022

Read more:

Symposium on the Future of Computing Research - USC Viterbi | School of Engineering - USC Viterbi School of Engineering

Read More..

Verific’s Rick Carlson Appointed Advisory Board Member for the College of Computing at Illinois Institute of Technology – Design and Reuse

Illinois Tech Alumnus Will Serve as Advocate to Reinforce Colleges Position as Leading Creator of Computation Talent in Chicago and Beyond

ALAMEDA, CALIF. August 24, 2022 Illinois Institute of Technology (Illinois Tech) alumnus Rick Carlson (MATH 70), vice president of sales for Verific Design Automation, a leading provider of SystemVerilog, Verilog, VHDL, and UPF Parser Platforms, has been elected to the College of Computing Board of Advisors.

Carlson graduated from Chicagos comprehensive tech-focused university with a Bachelor of Science in Mathematics and was also a member of the Illinois Tech mens basketball team. Im exceptionally proud to join the College of Computings Board of Advisors, he says. Illinois Tech and the College of Computing provide students of all backgrounds with the best-in-class computational and data science platform to excel in their respective fields.

With more than 40 years of experience in the electronic design automation (EDA) industry, Carlson will help the College of Computing promote its collective power of difference to advance technology and progress for all. He will serve as an advocate to reinforce the colleges position as the leading creator of computational talent, knowledge and innovation for Chicago and beyond.

Carlson is a Lanza techVentures Investment Partner and an adviser to many EDA startups in his role as vice president of sales for Verific. He was one of the co-founders of the ESD Alliance (formerly the EDA Consortium), an industry trade association that is a SEMI Technology Community. While at Highland Software (now Flexera Software), Carlson helped launch FLEXlm, a software license manager intended for corporate environments to provide floating licenses to multiple computer software end users.

About Illinois Institute of Technologys College of Computing

Illinois Tech created the College of Computing in 2020 as part of an effort to drive Chicagos thriving tech ecosystem by educating a future diverse workforce that is rigorously trained in data and computation. Illinois Tech is home to the Midwests only Bachelor of Science in Artificial Intelligence degree, and the numerous cybersecurity and intelligence pathways at Illinois Tech explore not only the deep foundations of fast-growing fields of computer science, but also emphasize societal ethics in developing this technology. The United States Department of Homeland Security and the National Security Agency have designated Illinois Institute of Technology (Illinois Tech) as a National Center of Academic Excellence in Cyber Defense Education. The universitys Center for Cyber Security and Forensics Education (C2SAFE) is at the core of Illinois Techs designation. Additionally, the center is a member of the United States Strategic Command (USSTRATCOM) Academic Alliance and North American Defense and Security Academic Alliance (NADSAA).

About Verific Design Automation

Verific Design Automation is the leading provider of SystemVerilog, Verilog, VHDL and UPF Parser Platforms that enable project groups to develop advanced electronic design automation (EDA) products quickly and cost effective worldwide. With offices in Alameda, Calif., and Kolkata, India, Verific has shipped more than 60,000 copies of its software used worldwide by the EDA and semiconductor industry since it was founded in 1999.

Originally posted here:

Verific's Rick Carlson Appointed Advisory Board Member for the College of Computing at Illinois Institute of Technology - Design and Reuse

Read More..

Paltry pay, poor working conditions: TN is finding it hard to get teachers for Computer Science Engg courses – EdexLive

The huge demand for Computer Science Engineering and allied courses has led tocolleges increasingseats in these subjects. They, however, claim that finding qualified teachers was hard. Several colleges have started a combination of courses in Computer Science Engineering along with Artificial Intelligence (AI), Machine Learning (ML) and Data Science (DS) to cater to the rising demand, as stated in a report by The New Indian Express.

Moreover, Anna University, the affiliating university of Engineering colleges in Tamil Nadu, has introduced a new curriculum this year, which includes the latest technology-based courses in different subjects such as Deep Learning and ML, which can be taught only by qualified teachers.

Many academicians feel that the quality of education will be compromised if an adequate number of quality teachers are not appointed by the colleges to teach these subjects. According to experts, there are several factors responsible for the scenario such as paltry pay packages and poor working conditions in private Engineering colleges across the State and lucrative jobs in the IT sector.

It's a tough taskGetting a qualified teacher to teach courses like Computer Science Engineering, AI, and ML is a huge problem. Experienced teachers are not ready to work for the salary we are paying, said the principal of a private Engineering college. The same was the case with five other private engineering colleges that TNIE visited.

KM Karthik, coordinator of All India Private Colleges Employees Union (AIPCEU), feared that students would ultimately suffer as no action would be initiated against the colleges for not hiring adequate and quality teachers.

There is, however, no dearth of quality faculty members, but the Engineering colleges are not ready to pay them what they deserve. And neither AICTE nor the State government is bothered about the problems faced by these teachers due to work pressure and poor working conditions. So, why would someone leave their high paying IT job and become a teacher, asked Karthik.

He further pointed out that recently, 225 Engineering colleges were issued show-cause notices after Anna University found lacunae in the number and quality of the faculty members, but within 15 days a majority of the colleges were granted affiliation. If everything is fine on paper, authorities are not worried if there are actually enough teachers for the students, he said.

Career guidance expert Jayaprakash Gandhi feels the motive of introducing these latest courses will be of no use if the colleges fail to hire quality faculty. We cannot make our students employable if we don't teach them AI and ML properly. We need to train our teachers in the latest updates in CSE, AI, and ML courses, said Gandhi.

Measures have been chalked outVice-Chancellor of Anna University R Velraj said he was aware of the problem and had chalked out measures to deal with it. A new curriculum has been introduced and we know it will be difficult for teachers. So, we have decided to organise training programmes for faculty members. We will call industry experts to train our faculty and will also ask affiliated colleges to do so, said Velraj. Compared with the 27,006 Computer Science and Engineering seats in 2021, this year, the number increased to 42,000.

Read the original:

Paltry pay, poor working conditions: TN is finding it hard to get teachers for Computer Science Engg courses - EdexLive

Read More..

Researchers using artificial intelligence to assist with early detection of autism spectrum disorder – EurekAlert

image:Han-Seok Seo view more

Credit: University Relations

Could artificial intelligence be used to assist with the early detection of autism spectrum disorder? Thats a question researchers at the University of Arkansas are trying to answer. But theyre taking an unusual tack.

Han-Seok Seo, an associate professor with a joint appointment in food science and the UA System Division of Agriculture, and Khoa Luu, an assistant professor in computer science and computer engineering, will identify sensory cues from various foods in both neurotypical children and those known to be on the spectrum. Machine learning technology will then be used to analyze biometric data and behavioral responses to those smells and tastes as a way of detecting indicators of autism.

There are a number of behaviors associated with ASD, including difficulties with communication, social interaction or repetitive behaviors. People with ASD are also known to exhibit some abnormal eating behaviors, such as avoidance of some if not many foods, specific mealtime requirements and non-social eating. Food avoidance is particularly concerning, because it can lead to poor nutrition, including vitamin and mineral deficiencies. With that in mind, the duo intend to identify sensory cues from food items that trigger atypical perceptions or behaviors during ingestion. For instance, odors like peppermint, lemons and cloves are known to evoke stronger reactions from those with ASD than those without, possibly triggering increased levels of anger, surprise or disgust.

Seo is an expert in the areas of sensory science, behavioral neuroscience, biometric data and eating behavior. He is organizing and leading this project, including screening and identifying specific sensory cues that can differentiate autistic children from non-autistic children with respect to perception and behavior. Luu isan expert in artificial intelligence with specialties in biometric signal processing, machine learning, deep learning and computer vision. He will develop machine learning algorithms for detecting ASD in children based on unique patterns of perception and behavior in response to specific test-samples.

The duo are in the second year of a three-year, $150,000 grant from the Arkansas Biosciences Institute.

Their ultimate goalis to create an algorithm that exhibits equal or better performance in the early detection of autism in children when compared to traditional diagnostic methods, which require trained healthcare and psychological professionals doing evaluations, longer assessment durations, caregiver-submitted questionnaires and additional medical costs. Ideally, they will be able to validate a lower-cost mechanism to assist with the diagnosis of autism. While their system would not likely be the final word in a diagnosis, it could provide parents with an initial screening tool, ideally eliminating children who are not candidates for ASD while ensuring the most likely candidates pursue a more comprehensive screening process.

Seo said that he became interested in the possibility of using multi-sensory processing to evaluate ASD when two things happened: he began working with a graduate student, Asmita Singh, who had background in working with autistic students, and the birth of his daughter. Like many first-time parents, Seo paid close attention to his newborn baby, anxious that she be healthy. When he noticed she wouldnt make eye contact, he did what most nervous parents do: turned to the internet for an explanation. He learned that avoidance of eye contact was a known characteristic of ASD.

While his child did not end up having ASD, his curiosity was piqued, particularly about the role sensitivities to smell and taste play in ASD. Further conversations with Singh led him to believe fellow anxious parents might benefit from an early detection tool perhaps inexpensively alleviating concerns at the outset. Later conversations with Luu led the pair to believe that if machine learning, developed by his graduate student Xuan-Bac Nguyen, could be used to identify normal reactions to food, it could be taught to recognize atypical responses, as well.

Seo is seeking volunteers 5-14 years old to participate in the study. Both neurotypical children and children already diagnosed with ASD are needed for the study. Participants receive a $150 eGift card for participating and are encouraged to contact Seo athanseok@uark.edu.

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.

See the original post:

Researchers using artificial intelligence to assist with early detection of autism spectrum disorder - EurekAlert

Read More..

Finding the magic that powers the brain usi – EurekAlert

After building a unique supercomputer to model parts of the brain, its creatorProfessor Steve Furber,says were still a long way from fully understanding the complex mysteries of the human mind.

Professor Furber, based at The University of Manchester, is leading one the worlds most ambitious neuromorphic computer projects and his ambitious study could, one day, mean new medicines to repair brain dysfunction are possible.

However, he adds, that those working on brain exploration are not sure if any modelling based on classical scientific principles, no matter how sophisticated, will ever properly recreate human consciousness because a biological magic may be the missing ingredient.

Intriguingly, the process of using next generation AI-tools to give robots greater brain-like functionality is developing at pace.

Professor Furber and his team at The University of Manchester recently achieved early breakthroughs from theSpiNNaker (Spiking Neural Network Architecture), a supercomputer developed for brain modelling.

The SpiNNaker group has created a real-time cortical microcircuit model and other cerebellum models using the giant device based on campus, and is part of the EU-fundedHuman Brain Project. The cortex is responsible for many higher-level brain functions such as memory recall and natural language, as well as acting as host to sensory and motor areas.

Professor Furber says that despite significant breakthroughs already achieved by SpiNNaker built from a million processors more patience is needed. This, in fact, is just the beginning of the journey.

He says: We do not fully understand the function of the basic cortical microcircuit even though we can now model it and those models reproduce biologically verifiable data.

What we now need is theories of what the circuit is doing, and how it does it, that we can use the models to test.

With such theories in place it might then be possible to construct models of brain subsystems and to explore, for example, what structural disturbances may be behind various forms of brain malfunction.

Then perhaps we could see what pharmacological interventions might help to restore normal brain function, he continues.

There is still room for philosophical debate as to whether or not such a Newtonian model [ie classic rules of science based on rational and understandable laws] is sufficient to explain higher brain functions for example, would a sufficiently accurate and detailed model of the cortex itself become conscious?

Or, must some other biological magic be invoked to explain the mysteries of consciousness. We dont know.

In parallel to scientists exploring the labyrinthine mysteries of the human mind, other pioneers at The University of Manchester, such as Professor of AI Sami Kaski, are looking to further develop artificial intelligence for autonomous systems and robots.

Professor Furber reflected on the crossover from his research with this work: Could we use an understanding of the cortical microcircuit to endow robots with greater awareness of their environments and a greater ability to interact with that environment?

I think that is very likely and on a shorter timescale than the higher level mysteries!

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.

Read the original here:

Finding the magic that powers the brain usi - EurekAlert

Read More..