Page 2,594«..1020..2,5932,5942,5952,596..2,6002,610..»

Air Force Research Laboratory awards Battelle Major Contract to Conduct Human Performance Research and Engineering for Warfighter Readiness – Business…

COLUMBUS, Ohio--(BUSINESS WIRE)--Battelle has received a five-year, $89.6 million task order contract to conduct human performance research and engineering for the Air Force Research Laboratorys (AFRL) 711th Human Performance Wing.

We are extremely excited to support AFRLs 711th Human Performance Wing mission by providing our research and engineering expertise from across Battelle to combine ideas, resources, and technologies to enhance AFRLs position as a world leader in the study and advancement of human performance, said Matt Zemanek, Division Manager in National Security.

Continuing its long heritage of managing U.S. government laboratory programs, Battelle will support AFRL by administering a Live-Virtual-Constructive (LVC) test bed located within the Warfighter Interactions and Readiness Division. The program utilizes a distributed, virtual environment to conduct research and training to support both Conventional and Special Operations Forces (SOF) as they pivot their train like you fight focus from regional conflicts to Joint All-Domain Operations (JADO) in Great Power Competition (GPC) environments. Because the test bed is an operational capability, Battelle developed an approach to mitigate the impacts of transition on the workforce, AFRL team, and military end-users who rely on the training.

Also on the team that will conduct the work with Battelle is Modern Technology Systems Inc (MTSI).

About Battelle

Every day, the people of Battelle apply science and technology to solving what matters most. At major technology centers and national laboratories around the world, Battelle conducts research and development, designs and manufactures products, and delivers critical services for government and commercial customers. Headquartered in Columbus, Ohio since its founding in 1929, Battelle serves the national security, health and life sciences, and energy and environmental industries. For more information, visit http://www.battelle.org.

Read more:

Air Force Research Laboratory awards Battelle Major Contract to Conduct Human Performance Research and Engineering for Warfighter Readiness - Business...

Read More..

Penn establishes the Center for Precision Engineering for Health with $100 million commitment | Penn Today – Penn Today

The University of Pennsylvania announced today that it has made a $100 million commitment in its School of Engineering and Applied Science to establish the Center for Precision Engineering for Health.

The Center will conduct interdisciplinary, fundamental, and translational research in the synthesis of novel biomolecules and new polymers to develop innovative approaches to design complex three dimensional structures from these new materials to sense, understand, and direct biological function.

Biomaterials represent the stealth technology which will create breakthroughs in improving health care and saving lives, says Penn President Amy Gutmann. Innovation that combines precision engineering and design with a fundamental understanding of cell behavior has the potential to have an extraordinary impact in medicine and on society. Penn is already well established as an international leader in innovative health care and engineering, and this new Center will generate even more progress to benefit people worldwide.

Penn Engineering will hire five new Presidents Penn Compact Distinguished Professors, as well as five additional junior faculty with fully funded faculty positions that are central to the Centers mission. New state-of-the-art labs will provide the infrastructure for the research. The Center will seed grants for early-stage projects to foster advances in interdisciplinary research across engineering and medicine that can then be parlayed into competitive grant proposals.

Engineering solutions to problems within human health is one of the grand challenges of the discipline, says Vijay Kumar, Nemirovsky Family Dean of Penn Engineering. Our faculty are already leading the charge against these challenges, and the Center will take them to new heights.

This investment represents a turning point in Penns ability to bring creative, bio-inspired approaches to engineer novel behaviors at the molecular, cellular, and tissue levels, using biotic and abiotic matter to improve the understanding of the human body and to develop new therapeutics and clinical breakthroughs. It will catalyze integrated approaches to the modeling and computational design of building blocks of peptides, proteins, and polymers; the synthesis, processing, and fabrication of novel materials; and the experimental characterizations that are needed to refine approaches to design, processing, and synthesis.

This exciting new initiative, says Interim Provost Beth Winkelstein, brings together the essential work of Penn Engineering with fields across our campus, especially in the Perelman School of Medicine. It positions Penn for global leadership at the convergence of materials science and biomedical engineering with innovative new techniques of simulation, synthesis, assembly, and experimentation.

Examples of the types of work being done in this field include new nanoparticle technologies to improve storage and distribution of vaccines, such as the COVID-19 mRNA vaccines; the development of protocells, which are synthetic cells that can be engineered to do a variety of tasks, including adhering to surfaces or releasing drugs; and vesicle based liquid biopsy for diagnosing cancer.

Original post:

Penn establishes the Center for Precision Engineering for Health with $100 million commitment | Penn Today - Penn Today

Read More..

First Drive: GTO Engineering Recreates One of the Most Beautiful and Coveted Ferraris Ever Made – Robb Report

If you grew up in the 1980s, then an iconic scene from classic teen movie Ferris Buellers Day Off is probably etched in your memory; the one where a red Ferrari gets airborne while the title theme to Star Wars provides the soundtrack. This cinematic moment stars a Ferrari 250 California Spyder on a full-throttle joyride around Chicago. The Prancing Horse used during filming, however, was actually a fiberglass replica based on a humble MGB. The faux California Spyder Im testing, though, is rather different.

The latest Revival project from GTO Engineering, following its replica 250 GT SWB we drove earlier this year, is an inch-perfect, toolroom copy of the Ferrari original. Even Enzo himself might have struggled to spot the differenceunless he got behind the wheel. It turns out that this reborn 1960s supercar, which uses the identity of a scrapped classic Ferrari for legal purposes, has a few hidden secrets.

GTO Engineerings replica of the Ferrari 250 GT SWB California Spyder.Photo by Barry Hayden, courtesy of GTO Engineering.

As its name suggests, the Ferrari 250 California Spyder was designed for the US market, specifically the Golden State. Just 105 were made between 1958 and 1962, the first 50 with a 102-inch wheelbase (LWB), followed by 55 with a shorter 94-inch wheelbase (SWB). Today, both versions count among the rarest and most expensive Ferraris of all, as attested to by the fact that James Coburns California Spyder sold for $10 million in 2008, and few are ever seen outside of museums or private collections.

I wont attempt to get all four wheels off the ground today, yet I do plan to drive as il Commendatore intended. After all, the Revival may cost $1 million plus taxes, but its still a bargain compared to the real thing. Sadly, Im about 5,400 miles from California and the weather here is decidedly more British. Yes, its raining. Did I mention the car has no roof?

A birds-eye perspective of the toolroom copy.Photo: Courtesy of GTO Engineering.

Even through a mist of morning drizzle, the California Spyder replica looks jaw-droppingly gorgeous. The original was styled by Pininfarina, its hand-rolled aluminum body combining timeless Italian elegance with head-turning Hollywood glamour. A Ferrari with tail fins really shouldnt work, yet somehow it does. Other 250-series models, such as the Testa Rossa, LM and GTO, are more exciting, but theyre not as achingly beautiful.

Frankly, few cars sound this exquisite either. The naturally aspirated, triple-carb Colombo V-12 is built in-house by GTO Engineering and offered in three states of tune: a stock 3.0-liter Ferrari spec with 280 hp, a 3.5-liter with 320 hp, or a 4.0-liter with 350 hp. With the middling 3.5-liter motor and just 2,315 pounds to shift, this example hits 60 mph in 6 seconds and has a hair-tousling top speed of 150 mphyet it feels faster.

Originally made for the US market, the Ferrari 250 GT Spyder featured a left-hand-drive configuration, replicated here on the recreation.Photo by Barry Hayden, courtesy of GTO Engineering.

After a few steady miles to let the oil warm through and the manual shift to loosen up, I finally get a chance to let rip. The V-12 wakes up at 3,000 rpm, then piles on speed with dizzying intensity. Dont forget, this is an engine that won Le Mans multiple times, and its racing roots are still readily apparent. Hearing its metallic war cry in the open air is a privilege that makes getting wet seem totally worthwhile.

The cars naturally aspirated, triple-carb Colombo V-12 is built in-house by GTO Engineering.Photo by Barry Hayden, courtesy of GTO Engineering.

On hedge-lined lanes strewn with deep puddles, Im initially reluctant to push too hard. However, despite a live rear axle, skinny Michelin tires and complete lack of driver aids, this car has a chassis that quickly breeds confidence. The Revivals reinforced sills are much stiffer than those of the 1960s Ferrari, which adds accuracy to the slow-paced steering and sharpens its neutral yet eminently throttle-adjustablecornering attitude. Its straightforward, old-fashioned fun.

As for the lack of a roof, GTO Engineering founder Mark Lyon says the company can create one, but he thinks the Spyder looks better without it. Also, he reckons most cars will find homes in hotter climes, including California, where clinging, rain-soaked jeans are rather less likely. At least my Mazda has heated seats for the long drive home.

While Ferraris original model has reached eight figures at auction, the GTO Engineering replica costs $1 million.Photo by Barry Hayden, courtesy of GTO Engineering.

Some Ferrari purists dislike the idea of replicas, no matter how faithful to the original. But when the genuine article is too valuable to drive, these cars recreate an experience that is otherwise out of reach. Whether youre blasting along country lanes in southern England, cruising Stateside on Pacific Coast Highway or simply watching it drive by, the Revival offers an experience to savor. Its a car to seize the day and live in the moment. I think Ferris Bueller would approve.

Learn more aboutRobb Reports 2022 Car of the Year at the event taking place in Napa Valleyhereand in Boca Ratonhere.

Originally posted here:

First Drive: GTO Engineering Recreates One of the Most Beautiful and Coveted Ferraris Ever Made - Robb Report

Read More..

A Day in the Life of Mechanical Engineer Alia – All Together – Society of Women Engineers

Alia is an R&D Product Development Engineer at TE Connectivity. Learn more about her work in the medical device industry and how you can #BeThatEngineer!

I was homeschooled my whole life until college. Junior and senior year of high school, I did the Post-Secondary Education Option (PSEO) full-time where I completed over 60 college credits. I then attended the University of St. Thomas in St. Paul, MN where I obtained my Bachelor of Science degree in Mechanical Engineering and my minor in Chinese. I graduated in 2020.

I chose the engineering route because growing up, I loved math, puzzles, and activities that involved critical thinking. I have many uncles and cousins who are engineers, so I grew up hearing about their work and how much they enjoyed being an engineer. I chose Mechanical Engineering because I wanted to go into a broad discipline. I wasnt 100% sure what kind of industry I wanted to work in, and mechanical engineering gave me the flexibility to look into multiple different industries.

In the end, I chose the medical device route.

After my freshman year of college, I was an FDA Testing Analyst Intern at Augustine Surgical Inc. I coordinated the testing of a new medical device and made sure that it complied with federal regulations. After my sophomore year, I was a Research & Development (R&D) Intern at AVEKA Inc. Here, I gathered data for projects that involved hammer milling, jet milling, and spray drying. In addition, I analyzed the impact of particle sizes on products being made and gained experience in writing technical reports. I started my third internship as an Engineering Intern at Nordson Medical at the beginning of my second semester of junior year and continued until the end of my senior year. I got to work on designing fixtures to protect medical products and testing whether the product met certain specifications. All three of these internships made me realize how much I loved working in the medical device industry, knowing that Im helping people and possibly even saving their lives.

Outside of my classes and internships, during all four years of college, I swam for the womens swim team and helped streamline the swim teams recruiting and overnight system as their Overnight Coordinator. In addition, I was a member of the Society of Women Engineers.

After I graduated, I worked as a Process Development Engineer at Boston Scientific. One of my favorite projects was when we were developing a device that removed clots from the body. This project was in its earlier stages, which allowed a ton of collaboration with team members, brainstorming, and testing. This project allowed me to be very hands-on, which is something that I love.

I am currently an R&D Product Development Engineer at TE Connectivity where I work with catheters for the heart. My job involves updating processes for the manufacturing line. I also develop fixtures and tooling to improve usability, to decrease the amount of scrap or waste, and to ensure continuous improvement of the products I work on. I love the collaborative atmosphere in the office. Working as a team is critical in engineering; if you cant work well with others, your project and your work wont be too successful.

To high school girls interested in engineering, dont be afraid to try something new and always ask questions. Engineering can be daunting, but its also so rewarding. If youre unsure if engineering is for you, try taking an introductory engineering class, sign up for a STEM or engineering camp, or reach out to an engineer and see what their day-to-day life is like. In high school, I attended two engineering camps (one at the University of Minnesota and one at Notre Dame). These camps confirmed that engineering was a degree I wanted to pursue, and they also helped me narrow down what engineering discipline I wanted to go into.

Kristine Loh

Kristine Loh is a PhD student in Chemical Engineering at the University of Minnesota - Twin Cities and the Day in the Life reporter for the high school SWENext newsletter. She graduated from Drexel University in 2020 with her bachelors in Chemical Engineering and her masters in Materials Science and Engineering.

View original post here:

A Day in the Life of Mechanical Engineer Alia - All Together - Society of Women Engineers

Read More..

Nearly All of Evolution Is Best Explained by Engineering – Discovery Institute

In recent articles, I have summarized lectures at CELS (Conference on Engineering in Living Systems) that described an engineering model for adaptation and explained how adaptation derives from organisms internal capacities (here,link).Now I will summarize another CELS lecture that expanded upon these themes by outlining a second complementary engineering model for adaptation.

Standard evolutionary theory assumes that genetic variation expands throughDNA mutating or otherwise altering randomly. Concurrently, natural selection and other processes transform species over time gradually throughnumerous, successive, slight modifications. The results are unpredictable, and in different subpopulations they can vary greatly.

In stark contrast, the presented engineering-based model assumes that organisms adapt to the environment using the same engineering principles seen in human tracking systems (here,here). More specifically, they continuously monitor the environment and track pre-specified environmental conditions. When the right conditions occur, internal mechanisms induce pre-determined responses such as targeted genetic changes, physiological adjustments, and/or anatomical alterations. These adaptive processes are directed by irreducibly complex systems that consistently include three components:

The resulting changes are targeted, rapid, and often reversible. They are also predictable and repeatable. And their magnitude can range from minor alterations to dramatic transformations, but changes are bounded and predefined.

Over the past few decades, every facet of the engineering model has been increasingly affirmed by everyone from mainstream biologists to third-wave evolutionists to leading creationists (here,here,here,here). The strongest supportive evidence comes from studies of what have been termed natural genetic engineering (NGE) and phenotypic plasticity.

NGE refers to genetic alterations that are not random. Instead, they result from cells employing highly complex machinery to direct targeted DNA modifications. Leading researcher James Shapiro describes the processes in a2016 review article:

Combinatorial coding, plus the biochemical abilities cells possess to rearrange DNA molecules, constitute a powerful toolbox for adaptive genome rewriting. That is, cells possess ReadWrite Genomes they alter by numerous biochemical processes capable of rapidly restructuring cellular DNA molecules. Rather than viewing genome evolution as a series of accidental modifications, we can now study it as a complex biological process of active self-modification.

He further elaborates on the editing systems in a2017 review article:

Like all classes of cellular biochemistry, NGE DNA transport and restructuring functions are subject to control by regulatory circuits and respond to changing conditionsNGE activities typically affect multiple characters of the variant cell and organism. Consequently, major phenotypic transformations can occur in a single evolutionary episode and are not restricted to a gradual accumulation of numerous, successive, slight modifications.

One could contest Shapiros claims about what NGE accomplished in the past, but his general description clearly matches the engineering models central features. The regulatory circuits that respond to environmental conditions correspond to sensors integrated with logic mechanisms. And the transport and restructuring functions correspond to specified output responses. In addition, the DNA modifications are targeted, rapid, and bounded as the engineering model expects.

NGE has been identified in all domains of life from the simplest to the most complex. Yeast cells respond to nutrient starvation by increasing themutation rates at specific locationsreferred to as mutational hot spots. And the remarkable diversity in dog breeds is not the result of completely random mutations, but it also results from mutational hot spots that allow for increases in targeted genetic variation that can drive rapid adaptation. BiophysicistsJohn Fondon and Harold Garner noted:

The high frequency and incremental effects of repeat length mutations provide molecular explanations forswift, yet topologically conservative morphological evolutionWe hypothesize that gene-associated tandem repeats function as facilitators of evolution, providing abundant, robust variation and thus enabling extremely rapid evolution of new forms.

Equally striking, plant genomes contain DNA segments known as transposable elements (TEs) that can move to new locations, allowing them to alter the activity of local genes. Specific environmental stimuli can initiate relocation to target locations (here,here), and stimuli can activate the TEs, resulting in adaptive benefits. For instance, TEs modify gene regulation in maize to confer drought tolerance, alter flowering time, and enable plants to grow in toxic aluminum soils (here,here).

Phenotypic plasticity refers to an organisms ability to transform its anatomy and physiology in response to environmental stimuli. The changes do not result from genetic alterations but from internal adaptive mechanisms. Developmental biologist Ralf Sommer enumerated these mechanisms essential components in a2020 review article:

plasticity requires developmental reprogramming in the form of developmental switches that can incorporate environmental information. However, the associated molecular mechanisms are complicated, involving complex loci, such as eud-1, that function as switches and GRNs. While still early, it is likely that switch genes point to a general principle of plasticity because other examples of plasticity also involve complex switch mechanisms.

The incorporation of environmental information tacitly implies the presence of sensors and signal transmission pathways. The switch incorporating the sensory output equates to a logic-based analyzer, and the gene regulatory network (GRN) activity corresponds to the output response. In summary, the core components perfectly match those of the engineering model for adaptation.

Phenotypic plasticity has been observed in numerous species in diverse taxa.Gulls of the familyLaridaetrack the sodium level in their blood with sensors in heart vessels. When the level reaches a threshold, gulls generate a specialized gland that extracts excess sodium from the blood and excretes it through the beak. If the gull migrates to a freshwater environment, the gland disappears.

Cichlid fish demonstrate phenotypic plasticity for multiple traits.Muschicket al.in a 2011 studyraised Midas cichlids on food with different hardnesses. The different diet groups developed significantly different pharyngeal jawbones, and the differences resembled qualitatively the differences in jawbones found in specialized species.Hreret al.in a 2019 study exposed Midas cichlids to light of different frequencies. In response to a change in frequency, the cichlids switched the expression of cone opsin genes crucial for color vision in only a few days. Other such mechanisms likely exist, based on the observation that cichlids rapidly converge to thesame basic forms repeatedly.

As a final example, fish residing in cave environments display distinctive traits such as reduced eyes and pigmentation. The standard evolutionary story is that these traits gradually developed through natural selection. But experiments over the past decade on the effects of exposing fish to cave-like conditions are changing the narrative.

Rohneret al.in a 2013 studyraisedA. mexicanusembryos in water with low conductivity mimicking cave conditions. The embryos developed into adults with significantly smaller eyes.Corral and Aguirre in a 2019 studyraisedA. mexicanusin different temperatures and different levels of water turbulence. The variant conditions resulted in adult fish differing in vertebral number and body shape. For instance, fish raised in more turbulent water displayed more streamlined bodies and extended dorsal and anal fin bases that improved their mobility in that environmental condition. AndBilandijaet al.in a 2020study raised the same species in darkness, and the fish developed many cave-related traits such as resistance to starvation and altered metabolism and hormone levels. Future research will likely uncover even more examples where cave-specific adaptations result not from random mutations but from internal mechanisms.

The engineering model not only best fits the latest experimental and observational data, but it can help guide future research. Whenever a species rapidly and predictably adapts to a specific environmental condition (here,here,here), investigators can expect that changes are directed by sensors, logic-based analyzers, and output response mechanisms. They can then focus research on identifying and understanding these components.

Traditional evolutionary processes do play a part in biological adaptation, but mounting evidence demonstrates that their role is relatively minor in the drama of life (here,here). Instead, engineered adaptive mechanisms that direct targeted modifications perform on center stage.

Read more from the original source:

Nearly All of Evolution Is Best Explained by Engineering - Discovery Institute

Read More..

Triveni Engineering bets big on ethanol blending, to invest Rs 350 crore to increase distillation capacity – Economic Times

Sugar and engineering major & Industries plans to invest Rs 350 crore to double its alcohol manufacturing capacity over the next nine months, as the company seeks to gain from the governments push for ethanol blending in petrol.

With the investment, the company will set up two new distilleries and increase the capacity at its existing two distilleries, eventually raising its alcohol manufacturing capacity from 320 kilolitres per day (klpd) to 660 klpd.

The target of 660 klpd is expected to be achieved by the first quarter of the next financial year, according to Tarun Sawhney, managing director of Triveni Engineering & Industries.

The actual return on capital employed for this new capex is going to be very, very high because the enhanced revenue for such a small amount of capital is quite large, Sawhney told ET.

The governments ethanol blending programme involves mixing ethanol with petrol to reduce pollution and the import of crude oil. This will also create an additional revenue stream for farmers and the sugar industry, as cane syrup is primarily used to produce ethanol.

In June this year, the Centre had advanced the target of achieving E20, or blending 20% ethanol in petrol, by five years to 2025. At present, the national average for ethanol blending is 8-9%.

Over 90% of Trivenis revenue comes from its sugar and alcohol business. It has grown at a compounded annual growth rate (CAGR) of 13% over the past four years.

Sawhney attributes this to increased production of sugar--from 600,000 tonnes to almost a million tonnes a year over this period. This was done by increasing the capacity across its seven sugar mills in Uttar Pradesh and by helping farmers who supply to its mills to increase their yield.

Over the last five years, I can certainly say this about our farmers--their take home income has grown by 3x. And it is because of the increase in yield, because sugarcane is paid for by weight, Sawhney said.

However, Sawhney said that over the coming years, the growth in revenue will be aided more by its engineering businesses, which include manufacturing power transmission systems and water purification plants.

The engineering businesses are going to be growing at a faster pace compared to sugar. And the reason is simple. Our increases in production are going to be limited, he said.

Sanjay Manyal of ICICI Securities wrote in August that Triveni was one of the most efficient sugar companies in India, having the third-largest sugarcane crushing capacity.

TEL would be a beneficiary of higher global sugar prices, given it is holding large sugar inventories and is capable of exporting white sugar (fetches better realisations). With the negligible impact of lower sugarcane yields, recovery rates, higher export potentials (and) sustainable distillery operations, we believe the company would witness stronger operating profit growth, Manyal wrote.

On Tuesday, shares of Triveni Engineering & Industries closed 1.77% higher on the BSE at Rs 174.9.

Read more:

Triveni Engineering bets big on ethanol blending, to invest Rs 350 crore to increase distillation capacity - Economic Times

Read More..

Howard University Returns to In-Person Instruction Amid Cyberattack – The Hilltop Online

Howard University faced a ransomware cybersecurity attack in the first week of September. Since the attack, the University has returned to some normalcy, proceeding with in-person and hybrid classes on Sept. 14.

The University sent out an email disclosing steps to reset email passwords, so students, faculty, and staff can reaccess their accounts and connect to the internet. However, Howard did confirm that the internet is still weak in certain areas.

Luckily, Enterprise Technology Services, the provider of IT services for Howard, was able to prevent any personal information from being accessed by the hackers, and have continued to place protective measures to ensure an invasion doesnt happen again.

The motive for the attack still remains unknown. However, with an increased use of technology, cyber security attacks have been a prominent issue since the start of the pandemic.

According to Varonis, a cyber security company, 88% of organizations worldwide experienced spear phishing attempts in 2019. Spear phishing is a scheme in which scammers pretend to be trusted senders in order to get confidential information out of the receivers.

Frank Tramble, Vice President of Howard Communications, disclosed how the University resolved the issue and measures to prevent another attack.

We evoked the Universitys incident response plan. Since that time, we have contained the threat and are restoring operations within the constraints of our hardened security strategy, said Tramble. Our IT team continues to work diligently to harden security within our operations.

Since the investigation is still ongoing, the University plans to share more updates with the community at a later date.

Although the campus internet is restored, there are still some difficulties for professors and students.

I havent been able to get to my old routine. Ive still been having difficulties connecting to the wifi. Ill go in and out throughout class, said freshman biology major Malana Baez.

The WiFi outage disrupted the entire campus, and continues to influence the semester. Dr. Christine McWhorter, an assistant professor, spoke about the lasting effects of the outage.

Theres still connectivity issues. The cyberattack lasted one week, but it put our courses back three weeks, said McWhorter. Weve had to allow time for students to learn what they didnt learn and put that into practice.

Though this has been a trying time for the Howard community, students have still found ways to press forward and finish coursework despite the difficulty. Latanya Khissy Beyniouah, a freshman computer science major, describes how she is able to stay on top of her work.

Ive walked to Whole Foods because I heard through GroupMe that its good [service], and if thats full, Ill try Potbelly or Mcdonalds, said Beyniouah. But, a week and a half ago, I found out about the writing center, and I was going there.

Enterprise Technology Services has been working tirelessly to assure students and faculty can proceed with their everyday routines. Howard University President Wayne A.I. Frederick took a moment to acknowledge the work that the Enterprise Technology Services does in a recent email.

On behalf of our entire campus community, I would like to express my sincerest and most deeply felt gratitude to all the members of our Enterprise Technology Services team and all our IT professionals, said Frederick.

The Howard community is still working to recover from the attack, and is doing their best to continue with normal operation.

See the article here:
Howard University Returns to In-Person Instruction Amid Cyberattack - The Hilltop Online

Read More..

Education Cyber Security Market to Witness Remarkable Growth by Fortinet, Microsoft, Proofpoint, Zscaler Bulk Solids Handling – Bulk Solids Handling

Global Education Cyber Security Market Research Report 2021 is latest research study released by AMA evaluating the market, highlighting opportunities, risk side analysis, and leveraged with strategic and tactical decision-making support. The study provides information on market trends and development, drivers, capacities, technologies, and on the changinginvestment structure of the Global Education Cyber Security Market. Some of the key players profiled in the study are F5 Networks, Inc. (United States),Broadcom, Inc. (United States),Check Point Software Technologies (Israel),Cisco Systems, Inc (United States),Fortinet, Inc. (United States),IBM (United States),Microsoft (United States),Palo Alto Networks Inc. (United States) ,Proofpoint Inc. (United States),Sophos Ltd. (United Kingdom),Zscaler, Inc. (United States)

You can get free access to samples from the report here:https://www.advancemarketanalytics.com/sample-report/30370-global-education-cyber-security-market

Education Cyber Security Market Overview:The Australian education cybersecurity market is expected to grow at a healthy pace during the forecast period, according to the AMA study. The rising demand for precautions from the cybersecurity attacks such as DDoS attacks, data theft, financial gain, Espionage, and the growing demand for tracking of threats such as data leaks are expected to be some of the major factors aiding the growth of the market. However, the market is expected to witness a decline in growth during FY 2020 but it is again expected to rise at a healthy pace after the COVID-19 pandemic is over.

If you are involved in the Education Cyber Security industry or intend to be, then this study will provide you comprehensive outlook. Its vital you keep your market knowledge up to date segmented by Application (Network Security, Cloud Application Security, End-Point Security, Secure Web Gateway, Internet Security, Others), End Users (Private Educational Institutions, Government Educational Institutions), Enterprise Size (SMEs, Large Enterprises), Service (Managed, Professional) and major players. If you want to classify different company according to your targeted objective or geography we can provide customization according to your requirement.

Education Cyber SecurityMarket: Demand Analysis & Opportunity Outlook 2026Education Cyber Security research study is to define market sizes of various segments & countries by past years and to forecast the values by next 5 years. The report is assembled to comprise each qualitative and quantitative elements of the industry facts including: market share, market size (value and volume 2015-2020, and forecast to 2026) which admire each countries concerned in the competitive examination. Further, the study additionally caters the in-depth statistics about the crucial elements which includes drivers & restraining factors that defines future growth outlook of the market.

Important years considered in the study are:Historical year 2015-2020 ; Base year 2020; Forecast period** 2021 to 2026 [** unless otherwise stated]

Enquire for customization in Report @https://www.advancemarketanalytics.com/enquiry-before-buy/30370-global-education-cyber-security-market Whats Trending in Market:

Rising Internet & Cloud-based Platform Penetration Across the Educational Sector in Australia

Challenges:

Lack of Budget or Resources for Cybersecurity in Education Across Different Institutions

Opportunities:

Rising Penetration of Virtual Classrooms Across Australia is Expected to Generate Huge Opportunities for Market Vendors During the Forecast Period

Increasing Number of Cyber Attacks Across the Educational Institutions Across Australia

Market Growth Drivers:

The Rising Demand for Boosting the Cyber Security Capabilities of Australian Universities

Need for Data Leak Tracking Across the Education Sector in Australia

If opting for the Global version of Education Cyber Security Market analysis is provided for major regions as follows: North America (USA, Canada and Mexico) Europe (Germany, France, the United Kingdom, Netherlands, Russia , Italy and Rest of Europe) Asia-Pacific (China, Japan, Australia, New Zealand, South Korea, India and Southeast Asia) South America (Brazil, Argentina, Colombia, rest of countries etc.) Middle East and Africa (Saudi Arabia, United Arab Emirates, Israel, Egypt, Nigeria and South Africa)

Buy this research report @https://www.advancemarketanalytics.com/buy-now?format=1&report=30370

Key Answers Captured in Study areWhich geography would have better demand for product/services?What strategies of big players help them acquire share in regional market?Countries that may see the steep rise in CAGR & year-on-year (Y-O-Y) growth?How feasible is market for long term investment?What opportunity the country would offer for existing and new players in the Education Cyber Security market?Risk side analysis involved with suppliers in specific geography?What influencing factors driving the demand of Education Cyber Security near future?What is the impact analysis of various factors in the Global Education Cyber Security market growth?What are the recent trends in the regional market and how successful they are?

There are 15 Chapters to display the Global Education Cyber Security market.Chapter 1, About Executive Summary to describe Definition, Specifications and Classification of Global Education Cyber Security;Chapter 2, objective of the study.Chapter 3, to display Research methodology and techniques.Chapter 4 and 5, to show the Education Cyber Security Market Analysis, segmentation analysis, characteristics;Chapter 6 and 7, to show Five forces (bargaining Power of buyers/suppliers), Threats to new entrants and market condition;Chapter 8 and 9, to show analysis by regional segmentation[North America, United States, Canada, Mexico, Asia-Pacific, China, India, Japan, South Korea, Australia, Indonesia, Singapore, Rest of Asia-Pacific, Europe, Germany, France, UK, Italy, Spain, Russia, Rest of Europe, Central & South America, Brazil, Argentina, Rest of South America, Middle East & Africa, Saudi Arabia, Turkey & Rest of Middle East & Africa ], comparison, leading countries and opportunities; Regional Marketing Type Analysis, Supply Chain AnalysisChapter 10, to identify major decision framework accumulated through Industry experts and strategic decision makers;Chapter 11 and 12, Global Education Cyber Security Market Trend Analysis, Drivers, Challenges by consumer behavior, Marketing ChannelsChapter 13 and 14, about vendor landscape (classification and Market Ranking)Chapter 15, deals with Global Education Cyber Security Market sales channel, distributors, Research Findings and Conclusion, appendix and data source.

Read Detailed Index of full Research Study at @https://www.advancemarketanalytics.com/reports/30370-global-education-cyber-security-market

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, Europe or Asia or Oceania [Australia and New Zealand].

Media Contact:

Craig Francis (PR & Marketing Manager)AMA Research & Media LLPUnit No. 429, Parsonage Road Edison, NJNew Jersey USA 08837Phone: +1 (206) 317 1218sales@advancemarketanalytics.com

Connect with us athttps://www.linkedin.com/company/advance-market-analyticshttps://www.facebook.com/AMA-Research-Media-LLP-344722399585916https://twitter.com/amareport

See more here:
Education Cyber Security Market to Witness Remarkable Growth by Fortinet, Microsoft, Proofpoint, Zscaler Bulk Solids Handling - Bulk Solids Handling

Read More..

Survive A Cyberattack: 7 Things Business Owners Must Do In 2021 – Forbes

Global cybercrime trends mean annual damages will hit $10.5 trillion by 2025, representing $11.4 million in of damages incurred per minute and $16.4 billion per day. Not only is cybercrime one of the fastest growing markets on the planet, but according to Cybercrime Magazine it also represents the greatest transfer of wealth in human history.

Survive a cyberattack: 7 things business owners must do in 2021

Successful cyber attacks often start by targeting company employees via social engineering, the psychological manipulation of people into performing actions, including divulging confidential information or granting access to critical infrastructure. Social engineering is the primary way cyber criminals gain access to sensitive data, infrastructure and money.

Adam Anderson is co-founder of Hook Security, providing cyber security awareness training, and managing general partner of Ansuz Capital, a cybersecurity venture fund. With his twenty years of experience in the field of cyber security, Anderson has pioneered and created a new field of study inside security, psychological security (PsySec), to combat the epidemic of social engineering.

From an interview with Anderson, here are seven things business owners can do to prevent and survive a cyberattack.

Taking backups of your critical data is, well, critical. It mitigates risk should you be the target of a ransomware attack, reducing the impact by enabling you to reliably retrieve your data. Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. Ransomware is serious business; Garmin was reported to have paid a $10million ransom when its systems were hacked in 2020.

Anderson recommends you use cloud-based tools such as Dropbox, Google Drive and Box, instead of storing files only on your computer. Configure them to back up your important information automatically. Whilst it is true that online companies such as Microsoft, Google and Apple get hacked, they are still many times better at security than you are, he added. With cloud-based programmes, if the worst should happen, you can simply rebuild the computer, or pick up a new one, and log back into your applications, which means you are down for hours, not weeks.

Cybersecurity insurance policies are valuable in two main ways, according to Anderson. Firstly, they help reduce the impact of a cyber attack by reimbursing your losses and providing resources for recovery. Secondly, they explain exactly what they need to see from your security posture to guarantee a pay out on the policy. In just the act of adhering to the insurance requirements, your protection will be higher.

Anderson recommends the policy you take comes with a disaster recovery team, a financial pay out, and clear instructions on what you must do to be compliant, but says there really isnt a significant difference between providers.

Another area of risk comes from security issues within the software your company uses; the ones already installed on its devices. But before you throw away your laptop, understand that most of these vulnerabilities have likely already been discovered and updated in the latest version of the software. This means software updates are key.

Anderson explained that the technology and paths used to breach a machine are dependent on holes in the system that hackers can exploit. The computer industry announces fixes to these holes on what is known as patch Tuesday, where software updates are available to all users. But its not that easy. Cyber criminals know that most people wont update their machines and they immediately deploy new attacks that count on the presence of those security holes. Updates are essential to stay safe. By updating your computer, you defeat the majority of automated attacks that hit users thousands of times each day.

Survive a cyberattack: 7 things business owners must do in 2021

A password is just one factor of authentication, and cracking a username and password can be very simple. Cyber criminals will either trick you into giving them the information or crack it using technology. By having two-factor authentication (2FA) in place, more information is required, and accessing your accounts is much harder. Yes, its a pain but Anderson believes its well worth it.

When 2FA is in place, even if they have your username and password, they cant log in because they dont have your key fob, phone or whatever else they need. Two-factor authentication typically takes the form of a phone app or text message containing a code that you type in during login. Almost all applications have 2FA. Check the help section of their websites and follow the instructions. Note, dont store your 2FA in a 1FA place. Programmes such as LastPass offer to store your 2FA codes safely, but LastPass only requires 1FA to log in. If in doubt, keep them separate.

Don't give yourself permission to accidentally hurt yourself, Anderson implores. Multiple logins can protect you. For every programme you use, create a non-administratoraccount for your computer and conduct your day-to-day access using that account. It makes sense. Keeping your master accounts untouched and accessing them via reduced admin rights means reduced likelihood of you installing harmful software by accident.

If you dont require full daily access to your programmes, why needlessly open yourself up to exploitation? Write a list of your software programmes and create new user accounts to further minimise risk.

Working from new places poses further risk. In a quest to be productive whilst travelling, unsecure WIFI networks are tempting. What can go wrong, right? A lot. Working remotely, from coffee shops and hotel lobbies, brings more risk than logging onto your home network but most of it is unavoidable.

Anderson recommends you use a virtual private network (VPN) to protect your data whilst you access it. VPNs encrypt your internet traffic and disguise your online identity, making hackers more likely to target someone else. Protect yourself further by never using WIFI networks that dont have a password as they are rife for hacking. It wouldnt be difficult for a hacker to log right into your computer and record your keystrokes, camera or microphone, plus all your files. Its just not worth it. Instead of relying on dodgy coffee shop internet, carry a portable router, tether from your phone or stay offline.

Gadgets and programmes aside, the most important part of all this is training your brain. Think like a hacker to fill the holes they will exploit. Know what they are looking for to ensure its not found. Cybersecurity awareness training programmes are a way to train yourself and your people to spot scams and stay safe. Knowing the difference between a genuine email and a phishing attempt, plus locking down data and software, can save thousands in material, mental and reputational damage.

Whats the value of your data and software? What price do you put on your peace of mind? Taking just a few steps can mean that hackers are deterred, reducing the risk of a successful cyber attack and the impact it has on your organization.

Read more:
Survive A Cyberattack: 7 Things Business Owners Must Do In 2021 - Forbes

Read More..

Singapore Government-funded software creates cyber attack fixes for utilities and more – The Straits Times

SINGAPORE - Water treatment is important to societies globally but glaring leaks in the cyber defences of systems controlling water plants have been in the spotlight in recent months.

In January, a hacker gained access to a water plant in San Francisco and deleted programs linked to water treatment. This came to light only in June.

Another water plant in a Florida town was hacked in February and the intruder tried to poison the drinking water by raising the concentration of a chemical to dangerous levels.

In both cases, workers undid the hackers' actions in time. But the incidents highlighted some perils.

Workers were using a popular software to access the plants' systems from locations other than the facilities, and hackers had taken over their accounts to break in.

One cyber-security firm believes a software it has developed, funded by a Cyber Security Agency of Singapore (CSA) innovation initiative, could help operators of critical infrastructure detect and plug security issues, even without expertise.

Called X.act, the software can simulate new and known cyber attacks and tactics, as well as create a fix that can be used immediately.

The Singapore company that made it, SkillSpar, which also has offices in the United States, Vietnam and Thailand, said its software recreates a virtual copy of the critical system controlling an infrastructure facility.

The infrastructure operator chooses a breach scenario to test, such as a computer compromised by a worker who uses a malware-infected USB drive.

The operator can use X.act to run hacking simulations on the virtual control system with the press of a button to find out what happens next.

This could show how far the malware spreads, and if there are unusual activities, such as the system being accessed at odd hours.

Unlike other products in the market, SkillSpar said X.act automatically generates data that can be used to configure the system quickly as a fix to thwart hackers' techniqueswhen operators are alerted to potential malicious activities.

By curbing the damage arising from potential breaches, systems can be protected even if security flaws have not been patched by equipment vendors.

"Patching in the operational technology world doesn't work," said Mr Phuong Nguyen, SkillSpar's co-founder and offensive security consultant, referring to systems that run critical infrastructure like those in water and power plants.

He said vendor patching happens once every three months as time is needed to test patches and the systems need to be up as much as possible.

Another patch issue is that many legacy control systems work only on old operating systems like Windows 7. The latter is no longer supported with official security patches, making it open to cyber attacks. Overhauling all these systems would be costly, said Mr Nguyen.

With X.act's fix, infrastructure operators can quickly test it on the virtual system against another similar attack by pressing a button.

The operator can then contact vendors to further test the fix before deciding if it can be applied to the real system.

X.act is being used in the oil and gas sector here, and SkillSpar has received inquiries from the United Arab Emirates and Vietnam.

The software was developed after SkillSpar took part in CSA's Cybersecurity Industry Call for Innovation programme in 2018. It would have received funding of up to $500,000 from the agency.

Since the start of the call for innovation in 2018, CSA has awarded funding for 21 projects, eight of which are already in use or undergoing trials. Over $10 million has been committed to the projects so far.

Past cyber-security projects include those for Internet-connected devices, ransomware protection, autonomous vehicles and operational technology security across the energy, maritime, healthcare and government sectors, said CSA.

Mr Joel Langill, managing member of the Industrial Control System Cyber Security Institute based in Wisconsin in the US, said SkillSpar's simulation software is good in theory as it is used on a model of a real system, and could be applied on different systems too, be they simple or complex.

He is a member of CSA's Operational Technology Cybersecurity Expert Panel that is meeting in Singapore this week. Among other things, the panel seeks to identify challenges and gaps in the cyber-security capabilities of the operational technology sector here, and recommends how to address them.

Mr Langill was, however, concerned about how sensitive X.act was at detecting suspicious activities that might fly under the radar because they look like commands executed by a legitimate user.

Another issue: the cost of using the software. He said many public utilities, like in the US, have limited budgets, so they may not be able to spend as much on cyber security, and face challenges hiring talent in this area.

"Working for municipalities probably isn't as high (on the list for people) as working for an integrator or a larger contractor, where their salaries could be significantly more, and job satisfaction could be much higher," he added.

Mr Langill said ramping up cyber-security in the water sector is also difficult in countries like the US, because water and waste water treatment are not regulated centrally and there is lack of enforcement.

"The cyber awareness and maturity of the bulk of (US water) authorities arevery low," he said.

One way to address some of these challengesis to make cyber security a procurement requirement at every point in building a water plant, said Mr Langill.

He added that it is "not expensive" if done right from the get go.

He cited a large South American oil and gas facility he worked on that needed cyber-security features installed after a breach. About 200 control devices at the facility did not have firewall software, as it appeared a financial decision was made earlier against the installations.

"To install what they should have installed in the first place cost about 2.5 times what it would have cost if they'd done it the first time," said Mr Langill.

The rest is here:
Singapore Government-funded software creates cyber attack fixes for utilities and more - The Straits Times

Read More..