Page 2,041«..1020..2,0402,0412,0422,043..2,0502,060..»

Do IT teams have what it takes? Creating a holistic approach to data management – Solutions Review

This is part of Solutions Reviews Premium Content Series, a collection of contributed columns written by industry experts in maturing software categories. In this submission, GigaSpaces CEO Adi Paz

A recent report by IBM Institute for Business Value revealed that during the first year of the pandemic, 60 percent of organizations accelerated investment in digital transformation, while 55 percent underwent significant changes to their strategy, and 55 percent of CEOs prioritized becoming more agile all of which indicate that the adoption of new technology is reshaping business operations and accelerating digital efforts.

Growth in cloud spending jumped from 17 percent in 2019 to 23 percent in 2021. But that doesnt mean everyone is or should be moving everything to the cloud. In fact, 71 percent of executives said mainframe-based applications are core to their strategy, and the percentage of organizations leveraging mainframes in a hybrid cloud environment will double in the next three years. Companies expect theyll increase the percentage of applications both in the cloud and on the mainframe in the next two years, increasing the portion of mainframe-based applications.

The good news for organizations is that they dont have to choose. They can have on-premises data centers, mainframes, private cloud, public cloud, edge computing, and more all working together.

On the downside, it will require some effort to get there. The rush to digitize meant that each line of business has been optimizing its own processes, so organizations have, on average, at least 10 clouds across different business functions. That fragmented, siloed approach has limited the value of their transformation efforts. As a result, some 74 percent of companies said cloud-related transformations fail to capture the expected business value.

The key to successful cloud and digital transformation is finding a way to marry the various strategies. This means implementing an efficient and comprehensive data management system that quickly and securely makes information available where and when its needed.

Companies that succeed in implementing a more holistic approach to data management tend to follow three principles as part of their transformation.

Digital transformation doesnt have to happen all at once. In fact, it shouldnt. Companies that achieve successful, holistic digital transformation do so with a step-by-step approach that allows them to quickly pivot and adapt to changes as they pursue long-term goals.

Think about your own unique environments and how to integrate them. Where does the data reside? How should you share data? What security controls do you need? What security standards should you hold partners to? Factor in the attributes of your particular industry, workloads, and ecosystem.

Transforming data management is a daunting task that introduces new approaches. Take it one step at a time.

Unfortunately, you cant simply copy another companys successful digital transformation roadmap. You need to tailor a plan to your business, resources, and capabilities. Start by taking stock of your team and resources, and identify any gaps.

Examine your mainframe capabilities, your requirements for both cloud storage and your mainframe, and how the two will interact in your hybrid cloud technology ecosystem. Build a portfolio of applications and workflows that details what resides where.

Understand where you stand from a talent and skills perspective. Do you have the technical resources to make sure your unique configuration actually works, or do you need help from a partner?

Be bold and brave. Try many strategies. Because youre taking an iterative approach, you dont have to worry about investing significant time and resources in a strategy that doesnt work. Youll quickly discover what to keep and what to move away from, while potentially introducing capabilities you wouldnt have otherwise pursued.

Try adopting new APIs, microservices, developing cloud-native applications, and introducing the latest DevOps techniques. You cant know which approaches and which

combinations will work best for your business until you try them. Now is the time to experiment, see what sticks, and determine the best mix for your needs and goals.

The pandemic gave most companies a new sense of urgency for their digital transformation. Now its time to be more strategic and to reassess your approach to data management. By following these principles, you can plan a more holistic future that meets customer demand while maximizing business value.

As GigaSpaces CEO, Adi Paz stands at the forefront of the fastest moving technology industry trend: Advanced analytics and In-Memory Computing. Hes spent the past 11 years driving GigaSpaces vision, strategy and scaling its business. Adi brings two decades of experience in business management, international marketing, strategic sales, channel development and product development. Prior to joining GigaSpaces, Adi served as VP of Marketing & Products and VP of Business Development at RADVISION, specializing in selling and marketing solutions to the developer and enterprise markets. Adi also held senior positions at Starhome, a Comverse company, focusing on the carrier market.

Visit link:
Do IT teams have what it takes? Creating a holistic approach to data management - Solutions Review

Read More..

NordLocker offers continuous data protection as new report finds that 90% of ransomware incidents impact business’ ability to operate – GlobeNewswire

LONDON, June 02, 2022 (GLOBE NEWSWIRE) -- NordLocker, one of the leaders in encrypted cloud storage services, highlights the importance of continuous data protection as a new report finds that 65% of ransomware attacks result in data being encrypted. In 90% of the incidents, a business's ability to operate is impacted.

One of the most valuable business assets is its data, be it client information, contracts, sales figures, marketing plans, or other details that are confidential and/or critical to an organizations operations. Thus, not only competing businesses but also cybercriminals are after this vital information, says Oliver Noble, a cybersecurity expert at NordLocker, an encrypted cloud storage provider. In order to avoid the risk of being cut out of timely access to data, a company needs to ensure it keeps reliable and frequent backups.

What is continuous data protection?

Continuous data protection (CDP) is real-time backup where every change a user makes to data automatically gets backed up. As opposed to traditional systems that back up data periodically, for example, nightly or weekly, CDP records every version a user saves. In case of data loss or corruption, continuous backup allows the user or administrator to restore data at any point in time.

CDP ensures that unexpected events, such as power outages or natural disasters, dont cause gaps in coverage of critical business assets, says Oliver Noble. With CDP, a company can roll back its systems and data almost immediately after experiencing a ransomware attack or data loss due to human error, which remains the main cause of cybersecurity incidents at work.

Best solutions for continuous data protection

Any business that cant afford its data getting lost, stolen, leaked, or destroyed and thus looking for security and peace of mind should consider using continuous data protection. Companies of all sizes, from small family-owned companies to large enterprises, can benefit from CDP by minimizing the impact of various incidents and keeping their business running smoothly.

CDP can be used to protect data stored on-premise or in the cloud.

NordLocker for your CDP needs

If youre looking for a continuous data protection solution that is both affordable and easy to use, NordLocker may be the perfect option. NordLocker is a cloud-based CDP solution that stores backups of changed data in the cloud. Its designed to be simple to set up and operate, making it perfect for businesses of all sizes. With NordLocker, you can quickly restore damaged or lost data, minimizing business interruptions and downtime.

Read more about CDP: NordLocker

ABOUT NORDLOCKER

NordLocker is the worlds first end-to-end encrypted cloud with a file encryption tool. It was created by the cybersecurity experts behind NordVPN one of the most advanced VPN service providers in the market. NordLocker is available on various platforms, supports all file types, offers a fast and intuitive interface, and guarantees secure sync between devices. With NordLocker, files are protected from hacking, surveillance, and data collection. For more information: nordlocker.com.

Contact:

Skirmante Akinyteskirmante@nordsec.com

The rest is here:
NordLocker offers continuous data protection as new report finds that 90% of ransomware incidents impact business' ability to operate - GlobeNewswire

Read More..

Your photos could be gone in a flash if you’re not careful, we have tips on how to protect your pics – WSB Atlanta

ATLANTA We love taking photos and videos on our phones, but are we as good about saving them?

Channel 2s Linda Stouffer has some things to share about protecting those media files!

Technology journalist Chris Rowlands says that he has thousands of photos in his 256GB phone. He tells us that trusting the cloud is not always a guarantee that your memories are being protected.

I think I have like 40,000 but my phones only 256GB. Some of them are backed up to the cloud. Some of them arent, but thats pretty much all I do is trust the cloud, said Rowlands. But there are times when it doesnt happen, whether you have a connectivity issue, photos arent backed up, then you lose your phone, theyre gone.

[DOWNLOAD: Free WSB-TV News app for alerts as news breaks]

Rowlands said phone companies want you to use their cloud storage but storage space can become an issue.

And obviously once you hit that limit, if you have, for example, 30,000 photos on your phone, youre probably going to need to shell out a few dollars a month, basically to expand the storage capacity, said Rowlands.

Rowlands said that if your family has different types of devices, paying for Google Photos storage might be worth it to have everything in one place.

Google Photos has some of the most powerful AI-driven suggestion software and editing tools, said Rowlands. It will scan your library to protect the subjects of photos.

Other options include backing it up on a hard drive, while Amazon also offers unlimited storage for Prime customers.

It sort of seems like an old-school suggestion, but its never a bad idea to have a second kind of physical copy of your photos on a hard drive, said Rowlands.

TRENDING STORIES:

He said jump drives are great but it comes with a small risk.

Jump drives, great idea. The only risk, obviously, is theyre also quite small. So you can lose those almost as easily as the phone, said Rowlands.

Apps are another option. Apps such as Backblaze and Flickr can help you with the backup process or back up a physical copy on a drive.

But if that sounds too complicated and youd rather just stick to the cloud, Rowlands suggests using two-factor authentication to protect yourself from potential hacks.

Its just that peace of mind thing, right? Because the whole thing of backing up is so that you know that your photos are safe, said Rowlands.

For other tips, check your backup settings to make sure that your photos are saved.

If you delete a photo from your phone by accident, it should still be in the cloud for 30 days.

[SIGN UP: WSB-TV Daily Headlines Newsletter]

IN OTHER NEWS:

Hear from the woman who was kidnapped Friday night in Gwinnett County and managed to escape.

2022 Cox Media Group

More:
Your photos could be gone in a flash if you're not careful, we have tips on how to protect your pics - WSB Atlanta

Read More..

Russias government website hacked with pro-Ukraine message displayed instead – Euronews

A Russian government website appears to have been hacked over the weekend, causing an Internet search for the site to lead to a "Glory to Ukraine" sign in Ukrainian.

Russia's Ministry of Construction, Housing and Utilities website was targeted after many of the countrys state-owned companies and news organisations suffered hacking attempts since the Russian governments invasion of Ukraine on February 24.

Russia's state news agency RIA quoted a ministry representative on Sunday as saying that the site was down but users' personal data were protected. The website was working as normal by Monday.

RIA said that other media had reported that hackers were demanding a ransom to prevent the public disclosure of users' data.

Russias war on Ukraine is being fought not only with bombs but with bytes as cyber warfare plays an increasingly major role in the invasion.

Before the outbreak of the war, Ukraine saw a rise in cyberattacks on several of its banks and government departments. Many of the attacks came in the form of so-called wiper attacks which destroy data on machines or DDoS attacks, which uses multiple, distributed devices to flood systems.

In response, volunteer hackers began defending Ukraine with the so-called "IT Army," which was set up by Ukrainian digital minister Mykhailo Fedorov. The group is accessed by the messaging app Telegram and lists potential state-owned Russian targets.

Governments around the world have also come to Ukraines defence to support its cyber infrastructure. In the wake of this cyber warfare, countries such as the United States and Australia have issued recommendations to companies to strengthen their cyber security.

But Ukraine, like other Baltic states that were formerly occupied by the USSR, has been fighting cyber threats for decades. Their experience shows these countries have the strongest cybersecurity preparedness, with an index higher than Australia's, Canada's, and Europe's average, according to VPN service company Surfshark.

The study showed that Ukraine and Latvia, which both have an index of 75, surpass the European average by 3 per cent.

While Lithuania tops the survey, with an index of 93, almost 28 per cent higher than Europes average. Estonia was in second place with an index of over 90.

Meanwhile, Russias score is 2.5 per cent lower than Europes average and has an index of 71 per cent, according to Sufshark, which also said that Russia had the most data breaches in the first quarter of 2022, with close to 3.6 million internet users affected and a 136 per cent spike in cases after the invasion.

Russias latest hacking attacks were in early May, which kept video-hosting site RuTube offline for three days and altered satellite television menus in Moscow on Victory Day, when Russia celebrated the 77th anniversary of the Soviet Union's victory over Nazi Germany.

See the original post here:
Russias government website hacked with pro-Ukraine message displayed instead - Euronews

Read More..

High seas and high stakes communications: Securing the maritime industry – tripwire.com

Recall the last time that you stood on the shore, enjoying the briny breeze that gently caressed your skin, and the sounds and smells of the sea.You may have noticed in the distance a large sailing vessel.Have you ever considered all the moving parts that contribute to these floating cities? Beyond the logistics of setting out to sea, a ship contains an impressive array of communication devices and capabilities. Whether that ship is in port, or 500 miles from shore, the ship is never without communication.

There are often more than 150,000 ships at sea over a 24-hour period. To add some perspective, this is three times greater than the average number of airplanes that are tracked by the Federal Aviation Administration on any given day. When combined, all the ships at sea form one of the largest mobile communication networks imaginable.As is often the case with a security mindset, this level of complexity creates great challenges.

A ship is capable of ship-to-shore communication at close range through the use of traditional terrestrial radio, or shore stations, and when far out to sea, satellite communication is used. To add to the complexity, there are more than ten satellite companies that provide maritime communication services.The international scope of sea-based communications is governed by both multinational organizations, as well as advisory organizations, such as the International Telecommunications Union (ITU).

It is easy to think that these impenetrable hulls are immune to security problems. After all, they are somewhat akin to a remote island, far removed from our land-locked security concerns. However, there are threats to maritime vessels, both physical, and virtual. In the event that the physical criminals increase their technological competencies, the results to a fleet could be devastating.

Up until a few years ago, the idea of high-sea pirates was something most people thought existed in age-old tales of rum-soaked hooligans. However, when a recent American President ordered the execution of a pirate, we all recognized that this is a problem that exists even today. Maritime pirates remain a threat, and if the pirates join the cybercrime industry, they could use technology to disrupt both normal communications, as well as distress signals from a targeted ship.

Another threat to the maritime industry is drug trafficking. Disruptions in communication can enable the illegal drug trade, and can also interrupt the delicate balance of the supply chain. As was recently demonstrated, a kink in the supply chain can wreak global havoc.

Maritime-based attacks are not new.At least two of the worlds largest shipping organizations have suffered a ransomware attack.These attacks, as well as other cybercrimes, were initiated using phishing scams. While the attacks have been used for compromising on-shore operations, it is not unreasonable to assume that a ships on-board network could also be affected, leaving a ship in a dangerous state.However, there is currently no hard evidence that the electronic crippling of a ship has ever occurred.What has happened in some parts of the world is that Global Positioning Systems (GPS) have been tampered with, affecting navigation, as well as communications.

Fortunately, proposed improvements in maritime communications protocols, as well as similar technologies to better track ships, are being developed to offer more unified views of locations, and messages.Along with that, regulatory agencies are also working to improve communications by strictly defining maritime communication radio frequencies.

The complexity of modern maritime operations makes it vulnerable not only to phishing-based account compromise, but more significantly, unnoticed configuration modifications.Tripwire is uniquely positioned to help secure maritime operations by providing the foundational controls needed to secure communications.

Tripwire helps ensure that all of the IT and OT systems are configured securely. This is done by tracking the configuration baseline of a system, measuring it against a hardening standard, and providing remediation advice to ensure that the system is configured securely. An example of a hardening standard is the Center for Internet Security benchmarks. This process is known as Security Configuration Management. It is commonly practiced on traditional IT networks and is also a good best practice for maritime devices.

Ransomware attacks make changes to critical system files in order to lock the administrators out of those systems. Tripwire monitors for changes in real time and can help differentiate between a good and bad change, or an authorized or unauthorized change. When an unauthorized or malicious change is detected, an alert and an incident workflow can be triggered so that the appropriate actions can be taken to reduce the exposure of the cyber incident.

Finally, attackers are always trying to leverage a vulnerability in the system to gain unauthorized access. Tripwires solutions can monitor both IT and OT devices for vulnerabilities, prioritize which vulnerabilities would have the greatest impact to the critical devices on the network, and provide remediation advice to ensure minimal risk exposure to the maritime devices. With these controls in place, Tripwire can help reduce the attack surface.

Read the original:
High seas and high stakes communications: Securing the maritime industry - tripwire.com

Read More..

Too Fast and Too Frivolous – Cyber Attacks Speed Ahead By 15x, While Companies Stall In Addressing Vulnerabilities According to SecurityScorecard…

Despite a 15-fold increase in cyber-attacks, only 60% of organizations have improved their security posture.

The findings are explained in SecurityScorecard's report, The Fast and Frivolous: Pacing Remediation of Web-Facing Vulnerabilities.

Only 10% of Vulnerabilities are remediated each month

To measure the speed and progress of remediation, SecurityScorecard's research examined how quickly issues were addressed and how long they persisted across assets. The research showed the financial sector to be among the slowest remediation rates (median to fix 50% = 426 days), while utilities ranked among the fastest (median = 270 days). Somewhat surprisingly, despite a 15-fold increase in exploitation activity for vulnerabilities with published exploit code, there was little evidence that organizations in this sector fixed exploited flaws faster. Regardless of how many total vulnerabilities existed across their domain(s), organizations typically fixed about 10% of weaknesses each month.

"Vulnerabilities likely exist with vendors and service providers, which necessitates the need for continuous visibility into the entire ecosystem," said Wade Baker, partner and co-founder at the Cyentia Institute. "With greater visibility, organizations can prioritize risks and remediation based on data. This is key to effectively addressing cyber vulnerabilities."

Where the vulnerabilities exist

The research shows the "Information" sector (62.6%) and "Public" sector (61.6%) had the highest prevalence of open vulnerabilities. The "Financial" sector (48.6%) exhibited the lowest proportion of open vulnerabilities; however, there is less than a 10% difference between this and other sectors in terms of industries with the most open vulnerabilities. The analysis revealed that it typically takes organizations 12 months to remediate half of the vulnerabilities in their internet-facing infrastructure. When firms have fewer than 10 open vulnerabilities, it can take about a month to close just half of them, but when the list grows into the hundreds, it takes up to a year to reach the halfway point.

SecurityScorecard collects and analyzes global threat signals that give organizations instant visibility into the security posture of vendors and business partners as well as the capability to do a self-assessment of their own security posture. The technology continuously monitors 10 groups of risk factors to instantly deliver an easy-to-understand A-F rating. Additionally, SecurityScorecard Ratings with Attack Surface Intelligence provides visibility into IP, network, domain or vendor's attack surface risk data, all in one pane of glass. This actionable, deep threat intelligence helps customers identify all of an organization's connected assets, expose previously unknown threats, conduct investigations at scale and prioritize vendor remediation.

For more information on the SecurityScorecard cybersecurity ratings platform or to request a demo, visit http://www.securityscorecard.com.

About SecurityScorecard

Funded by world-class investors including Evolution Equity Partners, Silver Lake Waterman, Sequoia Capital, GV, Riverwood Capital, and others, SecurityScorecard is the global leader in cybersecurity ratings with more than 12 million companies continuously rated. Founded in 2013 by security and risk experts Dr. Aleksandr Yampolskiy and Sam Kassoumeh, SecurityScorecard's patented rating technology is used by over 30,000 organizations for enterprise risk management, third-party risk management, board reporting, due diligence, cyber insurance underwriting, and regulatory oversight. SecurityScorecard is the first cybersecurity ratings company to offer digital forensics and incident response services, providing a 360-degree approach to security prevention and response for its worldwide customer and partner base. SecurityScorecard continues to make the world a safer place by transforming the way companies understand, improve and communicate cybersecurity risk to their boards, employees and vendors. Every organization has the universal right to their trusted and transparentInstant SecurityScorecardrating. For more information, visitsecurityscorecard.comor connect with us onLinkedIn.

SOURCE Security Scorecard

Follow this link:
Too Fast and Too Frivolous - Cyber Attacks Speed Ahead By 15x, While Companies Stall In Addressing Vulnerabilities According to SecurityScorecard...

Read More..

Undergraduate robotics program starts enrollment this fall | The University Record – The University Record

The College of Engineerings new undergraduate program in robotics will empower students to practice the full spectrum of robotics including underwater, wheeled, legged, flying and medical robots at the 134,000-square-foot Ford Motor Company Robotics Building.

The program is available for fall 2022 enrollment following state approval from the Michigan Association of State Universities on June 2. The U-M Department of Robotics is a first among top 10 engineering schools.

According to the U.S. Bureau of Labor Statistics, the demand for qualified robotics professionals grew by more than 13% in 2018 alone, and up to 80% of U.S. industrial employers are facing difficulties filling vacancies for highly skilled technical professionals, including robotics, computer vision, artificial intelligence and motion control.

The global industrial and service robotics markets are expected to grow by more than 20% year over year, reaching a total market of $310 billion by 2025.

As our society grows, theres an unmet demand for people skilled in robotics, and Michigan Engineering is poised to help fill this void as a leader in this space, said Alec D. Gallimore, the Robert J. Vlasic Dean of Engineering, and the Richard F. and Eleanor A. Towner Professor of Engineering, an Arthur F. Thurnau Professor and professor of aerospace engineering.

The colleges robotics department will produce deeply trained roboticists who put people first, collaborating across disciplines to solve complex issues affecting the state of Michigan, our nation and the world at large.

The new program features an inclusively designed curriculum with more than 30 course offerings, providing exposure to technologies that were inaccessible for most undergraduate students a decade ago. These include 3D printing for rapidly prototyping new robot designs and high-speed laser scanning that enables simultaneous localization and mapping.

As tools have become widely available, they can now be rolled out at the undergraduate level. The curriculum centers on how an embodied intelligence senses, reasons, acts and works with humans covering topics in electronics, mechanisms, computation, mathematical foundations and human-robot interaction.

As companies try to prevent bias from entering their technologies, the need for a talented pool of roboticists who are both highly skilled and equity-centered is vital to help avoid unfair discrimination against citizens, patients, customers and job applicants.

The undergraduate programs focus on interdisciplinary collaboration and social awareness, in addition to excellence in science and technology, will enable students to design people-first solutions to societys challenges.

The University of Michigan has a remarkable ecosystem of academics, enabling our robotics faculty and students to work collaboratively across disciplines with far reaching societal contributions, said Provost Laurie McCauley.

Recently, the department announced Dawn Tilbury, associate vice president for research-convergence science at U-M, will serve as the first chair of the Department of Robotics. She also is the Herrick Professor of Engineering, professor of mechanical engineering and professor of electrical engineering and computer science.

Tilbury, who recently led the National Science Foundation Directorate of Engineering, helped lay the foundation for the convergence of disciplines that defines robotics research at the university. She played a leading role in establishing Michigans Robotics Institute and noted the opportunity for faculty and students at the department to push the boundaries of the field.

Robotics has so much potential because it really brings together so many different engineering disciplines biomedical, computer science, electrical, industrial, mechanical, aerospace, and naval architecture and marine engineering, Tilbury said. Michigan roboticists will possess the knowledge and skills to develop robotics that help people across a multitude of arenas whether thats within their workplace, home or community.

The College of Engineering last year announced the creation of its new robotics department, which will be an evolved adaptation of the U-M Robotics Institute. In fall 2020, the institute began piloting courses centered around providing excellent engineering instruction and equal opportunity for students.

The Robotics 101 course quickly exposes students to advanced robotics through the theory and computational applications of linear algebra instead of calculus, since not every undergraduate attended a high school that offered calculus.

This course enrolls students at historically Black colleges and universities, including Morehouse and Spelman, who have a pathway to receive a U-M engineering degree. The Robotics 102 course includes undergraduates at Kentuckys Berea College, serving mostly Appalachian students.

The outreach to historically excluded populations is reflective of the departments commitment to diversity, equity and inclusion and the colleges equity-centered engineering framework.

I know that if we dont have equitable representation in our research labs and classrooms, we wont have equitable representation among our development teams, executive suites and policymakers who are thinking about these life-changing technologies, said Chad Jenkins, associate director of undergraduate programs at the Michigan Robotics Institute and a professor of electrical engineering and computer science.

We just want to do right by the people who are on our campus and across the country so we can help extend the ladder of opportunity.

Originally posted here:

Undergraduate robotics program starts enrollment this fall | The University Record - The University Record

Read More..

Kennesaw State professor awarded NSF grant to explore brain-inspired computer vision – Kennesaw State University

KENNESAW, Ga. (Jun 3, 2022) Kennesaw State University faculty member Yan Fang will examine the human brains capabilities as he and his students research ways to make drones and robots better at tracking fast-moving objects without exhausting their limited battery power.

Fang, an assistant professor in the Southern Polytechnic College of Engineering and Engineering Technology, earned a prestigious grant for early-career researchers from the National Science Foundation (NSF), which will fund his research through 2024.

Yan Fang

The NSF Computer and Information Science and Engineering Research Initiation Initiative (CRII) award is highly competitive and provides resources to help new faculty members launch their research careers in computer science and engineering. Fang came to Kennesaw State in the fall of 2021 after earning a doctorate at the University of Pittsburgh and working as a postdoctoral researcher at Georgia Tech.

I am pleased that Dr. Fangs work has been recognized with this NSF award, Turaj Ashuri, SPCEETs interim assistant dean of research, said. This grant award demonstrates our commitments and efforts to give cutting-edge research opportunities to our students, which is a component of the Universitys strategic growth framework.

Fang will work with a Ph.D. student and a few undergraduate students on this project. They will use the nearly $174,000 in funding to research novel structures of computing systems, design course modules, and initiate K-12 education outreach for local minority high school students.

Dr. Fangs research in neuromorphic processing of visual data mimics how the brain handles information from the eyes, chair of the Department of Electrical and Computer Engineering Benjamin Klein said. This is a very exciting application of artificial intelligence that will help computers interpret what they see. We are delighted that NSF recognizes the importance of this work.

Small, battery-powered computing systems face a challenge handling complex visual data.

We are trying to solve issues with visual tracking, Fang said. On small devices, like cell phones, wearable devices, and drones, the battery power and the computing abilities are limited and not very powerful. If your target is moving quickly, it is also difficult to recognize and track it.

Fang explained the process of visual tracking by comparing a new dynamic vision camera that captures fast-moving objects to a frogs vision, which recognizes flies as food when they are moving but does not associate them with food when they are motionless.

Fang and his students will get inspiration from the human brain, which can quickly compute and process images to address the challenges that next-generation computer systems face.

This research is important because devices like cell phones and drones, are widely used in our daily life, Fang said. Research that improves the computing capability and energy efficiency of these devices will make them more intelligent and powerful.

Visual processing tasks like detection, tracking, and navigation are essential to unmanned aerial vehicles, robots, surveillance, and defense systems.

I feel honored to be a recipient of this award, Fang said. Im excited to begin this research with more resources and undergraduate students who continuously impress me with their knowledge and ideas.

Abbey OBrien BarrowsPhotos by David Caselli

A leader in innovative teaching and learning, Kennesaw State University offers undergraduate, graduate and doctoral degrees to its nearly 43,000 students. With 11 colleges on two metro Atlanta campuses, Kennesaw State is a member of the University System of Georgia. The universitys vibrant campus culture, diverse population, strong global ties and entrepreneurial spirit draw students from throughout the country and the world. Kennesaw State is a Carnegie-designated doctoral research institution (R2), placing it among an elite group of only 6 percent of U.S. colleges and universities with an R1 or R2 status. For more information, visit kennesaw.edu.

Link:

Kennesaw State professor awarded NSF grant to explore brain-inspired computer vision - Kennesaw State University

Read More..

Seattle U students tackle real-world computer and engineering projects for Amazon, F5 and others – GeekWire

A team of Seattle University seniors who tackled a problem for Kenworth Truck Co., from left: Matthew Miramon, Jackson Christian, James Finnestad, faculty advisor Dr. Yen-Lin Han, Kayla Smith, Paula Fijolek and Daniel Lee. (GeekWire Photo / Lisa Stiffler)

Technology moves so fast, it can be difficult to teach computer science and engineering students the very latest in their fields. So Seattle University tries to make sure its grads learn to learn.

On Friday, students presented year-long projects done in partnership with Northwest organizations from corporations including Amazon, Microsoft and F5 Networks to community groups, government departments, and small businesses such as Seattle City Light, a nonprofit called Maris Place for the Arts, and Redmond Dudes Baseball to help solve their computer science and engineering problems.

Now in its 35th year, Seattle Us Project Center assigned roughly 180 seniors and masters degree students to 40 teams to work on the projects.

Students are faced with a technological challenge that they dont know the answer to, said Rachael Brown, director of the Project Center.

Senior Mason Adsero was on one of three teams that partnered with Kenworth Truck Co., a subsidiary of Bellevue, Wash.-based PACCAR. Their project used machine learning to develop a more efficient process for managing the customization of trucks to meet customers needs. They trained their model on Kenworths engineering database and used Tableau software for visualizing the results. They met via Zoom almost weekly with liaisons from Kenworth.

It was a tech stretch for the students.

It was pretty overwhelming at first, said Adsero. We were all in deep water.

But the team members said they were successful in creating a working model that theyll be handing over to Kenworth.

In addition to exploring new tech challenges, the students said that the projects were an opportunity to work in teams; communicate and receive feedback from partner organizations that act as customers; do project management; set schedules and goals; and practice giving presentations.

It gives them an experience that makes them a more well-rounded professional before they even graduate college, Brown said.

Participants included students from Computer Science, Civil and Environmental Engineering, Environmental Science, Mechanical Engineering, and Electrical and Computer Engineering departments.

It gives them an experience that makes them a more well-rounded professional before they even graduate college.

Each team had at least one liaison from the partnering organization or sponsor plus a faculty advisor.

Larger sponsor organizations pay a fee to participate in the program, while smaller businesses or nonprofits engage for free or pay a smaller amount. The sponsors are able to keep software, devices and other intellectual property created by the effort.

Amazon has collaborated with the Seattle U students since 2001.

Participating in Seattle Us Projects Day gives Amazon the opportunity engage with smart, ambitious science and engineering students who will soon be looking for jobs, said Drew Herdener, Amazons vice president of Worldwide Communications, by email.

The company sponsored six teams this year. That included multiple cloud projects, such as one to classify AWS Partner Network data and another that built a tool for developers to manage workflow, as well as creating technology for monitoring its data centers servers.

So does the company actually use the products generated by the students?

Generally speaking and most often, the students projects are proof of concept and do help us determine if a particular program has promise and how it could be executed, Herdener said.

Profiles of all of the projects can be found here. Keep reading for descriptions of three more teams:

Beavers build dams in some inconvenient places for humans, causing flooding of farmlands, homes and roadways. A three-student team studied the impact of devices called pond levelers to regulate the amount of water stored behind a dam, and the ability of salmon to navigate the dams at different water levels.

The team built their own devices for remotely monitoring water levels every 15 minutes and deployed them at four dam sites. While the students successfully collected data, there were still unanswered questions for the project, so Seattle U applied for and received a grant to continue the work over the summer.

Seniors Ruby Raoa and Lailan Uysaid the project was difficult but rewarding.

When you plan for field work, you think its going to go well, Uy said. But whatever can go wrong will. When you get out there, you have to problem solve a lot, she added.

Officials with Seattles St. James Cathedral were eager to work with students to develop plans to reduce their energy use and work toward carbon neutrality. The Catholic church participated in the Seattle U program a decade ago to take initial steps towards energy efficiency.

The real impetus for this year was recognizing the climate crisis is ramping up, and how can we as a cathedral better care for our resources and the earth, said Patrick Barredo, St. James director of social outreach and advocacy.

Officials with the 115-year-old cathedral had regular Zoom meetings with the students. The team visited the site on multiple occasions, poured over utility bills, analyzed existing equipment and measured the interior spaces.

The students will provide St. James with a final report, and officials said their first step will be installing a new control system to optimize heating of the facility. Future plans could include switching over to electric heat pumps and kitchen appliances, and perhaps installing solar and electric vehicle charging sites.

The hope, Barredo said, is the cathedral will be a model for other churches.

Daniel Lees six-student team took on the task of developing monitoring hardware, software and a test platform for Kenworth for measuring the efficiency of its electric truck batteries.

The experience provided lots of learning opportunities, Lee said, including project management and scheduling because we all have busy schedules and we needed so many pieces to come together at once.

But that wasnt all. The seniors also learned quickly solving problems that came up because we had a few fires and explosions from the electronics, he said. The team worked through their challenges and created a prototype that could be a model for use with different vehicles.

It was really nice, Lee said, being able to apply everything weve learned throughout our four years into an actual product that would actually make a difference, eventually.

More here:

Seattle U students tackle real-world computer and engineering projects for Amazon, F5 and others - GeekWire

Read More..

Screen reader accessibility improved thanks to a new tool – Cosmos

Data visualisation is an important part of online media, especially since the onset of the COVID-19 pandemic. But theyre often inaccessible to people who use screen readers.

A type of assistive technology, screen readers are software programs that scan the contents of a computer screen and transform it into a different format like synthesised voice or Braille for people with complete or partial blindness, learning disabilities, or motion sensitivity.

Now, scientists from the University of Washington (UW) in the US have designed a JavaScript plugin called VoxLens that allows people to better interact with these visualisations.

VoxLens allows screen reader users to gain a high-level summary of the information described in a graph, listen to said graph translated into sound, or use voice-activated commands to ask specific questions about the data, such as the mean or the minimum value.

The team presented their research last month at the ACM CHI Conference on Human Factors in Computing Systems in New Orleans in the US.

If Im looking at a graph, I can pull out whatever information I am interested in maybe its the overall trend or maybe its the maximum, says lead author Ather Sharif, a doctoral student in the Paul G. Allen School of Computer Science & Engineering at UW.

Right now, screen reader users either get very little or no information about online visualisations, which, in light of the COVID-19 pandemic, can sometimes be a matter of life and death. The goal of our project is to give screen reader users a platform where they can extract as much or as little information as they want.

The difficulty with translating graphs, according to co-senior author Jacob O. Wobbrock, a professor of information at UW, comes from deciphering information with no clear beginning and end.

Get an update of science stories delivered straight to your inbox.

There is a start and an end of a sentence and everything else comes in between, he explains. But as soon as you move things into two dimensional spaces, such as visualisations, theres no clear start and finish.

Its just not structured in the same way, which means theres no obvious entry point or sequencing for screen readers.

The team worked with screen reader users who had partial or complete blindness when designing and testing the tool. During the testing phase, participants learned how to use VoxLens and then completed nine tasks, each of which involved answering questions about a data visualisation.

The researchers found that participants completed the tasks with 122% increased accuracy and 36% decreased interaction time, compared to participants of a previous study who hadnt had access to VoxLens.

We want people to interact with a graph as much as they want, but we also dont want them to spend an hour trying to find what the maximum is, says Sharif. In our study, interaction time refers to how long it takes to extract information, and thats why reducing it is a good thing.

VoxLens can be implanted easily by data visualisation designers with a single line of code. Right now it only works for visualisations created using JavaScript libraries such as D3, chart.js or Google Sheets but the team is working towards expanding to other popular platforms.

This work is part of a much larger agenda for us removing bias in design, adds co-senior author Katharina Reinecke, associate professor in the Paul G. Allen School of Computer Science & Engineering at UW. When we build technology, we tend to think of people who are like us and who have the same abilities as we do.

For example, D3 has really revolutionised access to visualisations online and improved how people can understand information. But there are values ingrained in it and people are left out. Its really important that we start thinking more about how to make technology useful for everybody.

Visit link:

Screen reader accessibility improved thanks to a new tool - Cosmos

Read More..