Page 739«..1020..738739740741..750760..»

On-Pin International, On-Pin Analytics: Introduce Verifeye – The First Call

How well do golf course owners and operators really know and understand their customers, and their customers' playing and buying trends? For On-Pin International and On-Pin Analytics, a leader in technology development for the global golf industry, the answer lies with the launch of Verifeye, a patented system of passively tracking individuals as they move about the course.

Utilizing portable Radio-Frequency Identification (RFID) tags, Verifeye provides golf course owners and operators with the unprecedented ability to collect and analyze live pace of play, individual player habits, actual course utilization, and detailed historical data. Verifeye has the ability to integrate efficiently with a facility's point-of-sale and tee sheet to deliver a sophisticated level of data collection that can be essential in helping determine the success of the operation of any type of golf facility.

"Through real-time data that encompasses all aspects of a given operation, Verifeye can enhance both the bottom line at facilities and the experience for golfers who can be rewarded with affinity programs and other ways to encourage them to spend more time using the entire facility," said Ian Glasson, who founded On-Pin Analytics in 1998, as he recognized an opportunity for technology to improve operations at golf facilities.

"We constantly are innovating," he continued, "by inventing technologies to empower golf course operations. The effective use of advanced technology such as Verifeye is critical to the overall business and playing experiences in golf today."

Member and guest RFID tags are provided -- to be kept on golf bags, in wallets, etc.-- to golfers, with RFID reader stations installed around heavily trafficked golf cart path locations on each course. Verifeye data is collected and displayed in real-time on the On-Pin dashboard and uploaded to On-Pin Cloud servers.

Golf course rangers/marshals then effectively use the data to keep play moving and for detailed, visual reports.

Glasson said he is excited from results gleaned through initial product development and testing of Verifeye case studies that have demonstrated:

a 10-12 percent increase in golf facility revenue

At The Woodford Club in Versailles, Kentucky, owner Randy Clay added Verifeye last fall. He was so impressed with the value of the dynamic system at his 18-hole, semi-private facility that he created On-Pin International LLC, in conjunction with Glasson Investments Pty. LTD, and nationally acclaimed PGA Professional Bob Baldassari, who will lead the business development to help make Verifeye's array of technologies available to owners and operators at golf facilities throughout North America.

"Verifeye is an emerging technology system that also can complement other pre-existing technologies that a facility may have invested in," Clay said. "While the technology in Verifeye is highly advanced, the goal for any facility that uses Verifeye is simple -- to more completely understand your golfers and determine ways to get them to play more golf and spend more time and money with you. That can happen with greater retention through the predictive analysis that is unique to Verifeye."

For more information on On-Pin International and the new Verifeye system, call On-Pin International at 859-682-6001, and visit http://www.on-pininternational.com.

Go here to see the original:
On-Pin International, On-Pin Analytics: Introduce Verifeye - The First Call

Read More..

iSCSI vs. NFS: 5 Key Comparisons | Spiceworks – Spiceworks News and Insights

iSCSI is a storage area networking (SAN) protocol. Also known as iSCSI SAN storage, it defines the data transfer process between host and storage systems. Additionally, iSCSI enables small computer system interface (SCSI) data transportation from the iSCSI initiator to the storage target and vice versa, a process that takes place at the block level using TCP/IP networks.

Compared to the more traditional fiber channel (FC) SAN, iSCSI storage is cost-effective and does not require dedicated hardware such as an FC switch and FC host bus adapter (HBA). In fact, iSCSI SAN storage can be deployed on existing network hardware such as routers and fiber switches. iSCSI is also faster and more efficient than FC SAN as it is based on the block transfer standard.

iSCSI has two key components: the iSCSI initiator and the iSCSI target. The iSCSI initiator is a hardware or software component deployed at the server level to transmit requests and receive responses from the iSCSI target. Conversely, the iSCSI target is deployed at the storage level and provides the required storage space.

See More: What Is a Subnet Mask? Definition, Working, and Benefits

NFS is an open-source networking protocol for distributed file sharing. This standard protocol is leveraged for data distribution and relies on TCP/IP for communication. Enterprises can use NFS on virtually any operating system or device.

In a nutshell, NFS enables users to remotely access les on servers without disrupting the user experience the files can be accessed seamlessly as if they are stored locally. Apart from this, NFS provides scalability and security.

First introduced in 1985, NFS was updated several times. The first version was built to link UNIX hosts and remote computers. NFSv2, which served the same purpose as version 1 but had added TCP/IP support, was released in 1989. NFSv3 was released in 1994, featuring enhanced networking support and increased eciency. Finally, the current version of the network le system is NFS Version 4 (NFSv4). This version is documented in RFC 7530 and focuses on security, performance, and data integration.

NFS is popular for several use cases. For instance, it is deployed in UNIX environments to share les between users and computers with read or write access. Think of a field professional with no fixed endpoint device this person can access the required les from different endpoints using NFS even though the files are not stored in the local system. This is possible because the les are stored on a central network server.

See More: What Is an Intranet? Meaning, Features, and Best Practices

Internet small computer system interface (iSCSI) is a SAN protocol that sets rules for data transfers between host and storage systems. On the other hand, network file system (NFS) is a distributed file system protocol that enables users to access les stored remotely, similar to how local storage is accessed.

iSCSI vs. NFS: Architectural Overview

Sources: TechTargetOpens a new window and BaeldungOpens a new window

Lets dive in and learn more about the key comparisons between iSCSI and NFS.

iSCSI works by transmitting block-level data between an iSCSI initiator (placed on a server) and an iSCSI target (placed on a storage device). Once the packet reaches the iSCSI target, it is disassembled, and the SCSI commands are separated by the protocol. This allows the storage to be visible using any operating system.

Unlike its alternatives (such as fiber channels), iSCSI can work on existing IP infrastructure without dedicated cabling. As a result, it can serve as a low-cost SAN option.

iSCSI can establish communications with arbitrary SCSI device types. This protocol is widely used by system administrators to set up servers for disk volume access on storage arrays. However, performance issues may arise if iSCSI is not deployed on a dedicated network or subnet.

The client-side may issue two types of requests: read requests and write requests. Read requests are issued when the client wants to read the data on the server. Write requests are issued to the server when the client computer needs to write over the existing data. The read and write requests are implemented using the standard read/write operations. The server computer completes the request by leveraging the corresponding protocol. The data is then returned to the client computer.

Data requests from NFS clients are transmitted through the NFS server. The server retrieves the requested data from the storage and transmits it back to the clients.

Shared le locking is a key software feature of NFS. Shared le access can be implemented by properly specifying both le locking and caching parameters. If the user fails to specify these parameters and le data is only retained in a host cache, all NFS storage clients use the same locking and caching parameters for mounted les.

In cases where multiple computers or threads attempt to access one le simultaneously, the shared file access feature may malfunction. The le locking mechanism was developed to improve the efficiency of shared le access functionality. Shared le access can be executed within a single host or among several hosts, with NFS being used for accessing the same le.

The iSCSI initiator is the host-based hardware or software component. Deployed on the server, this component enables data transmission to and from the storage array. The source array is also capable of serving as a data migration initiator among the storage arrays. The storage network can be created using standard Ethernet components for the software initiator. iSCSI initiators manage several parallel communication links to several targets at once.

The iSCSI target is the component deployed on the storage side. It essentially plays the role of a server that hosts storage resources and allows storage access. iSCSI targets are basically the storage resources within an iSCSI server. They generally represent hard disk storage and are usually accessed via Ethernet.

Targets are data providers and include tape libraries and disk arrays. They expose one or more SCSI logical unit numbers (LUNs) to specific iSCSI initiators. However, iSCSI targets are the logical entities within the context of enterprise storage. iSCSI targets manage several parallel communication links to several initiators.

Next comes the iSCSI HBA, similar to a fiber channel. It offloads computing responsibilities from the system processor. iSCSI HBA helps enhance server network and storage performance but can cost more than a standard Ethernet NIC.

Finally, the iSCSI iSOE can be a good alternative for iSCSI HBA, as it provides similar functionality at a lower cost.

NFS operations leverage three main components, which, logically speaking, reside at the three OSI model layers corresponding to the TCP/IP application layer.

The above three key components or subprotocols represent most of the NFS protocol. Apart from them, the protocol includes numerous other functions. Of these, the key ones are highlighted below.

A key advantage of iSCSI is its use of TCP/IP, which allows for long-distance IP routing without external gateway hardware. It also provides a large storage network environment and increased flexibility.

Standard Ethernet

Using Standard Ethernet by iSCSI means that the protocol does not require expensive components to be built and deployed.

Storage array

A large storage array for iSCSI targets can be either open-source software or commercial. Unique iSCSI targets are provided for numerous clients.

Security

Internet security protocol is leveraged to secure IP network traffic by encrypting and authenticating each data packet received.

RPC is available for servers as well as clients. It replaces the transport device interface for enhanced scalability and support.

Multiple port extensions support RPC ports that are easy to use at the client level and compatible with firewalls.

Firewall compatibility is a key advantage of NFS version 4 and uses TCP Port -2049 for service execution. This simplifies protocol usage across firewalls.

Finally, NFS is a kerberized file system interface and features additional Kerberos privacy, such as Krb5p, to support krb5, krb5i, and other existing Kerberos options.

iSCSI is primarily designed for Microsoft Windows.

This protocol facilitates block-level sharing, allowing connected devices to access and utilize storage resources at the block level, similar to a local hard drive.

In an iSCSI setup, the responsibility of managing the file system lies with the guest operating system. This means that the guest OS handles tasks related to the file system, such as organizing and managing files and directories.

With iSCSI, each volume on the block level can be accessed by a single client, ensuring dedicated access and control over the storage resources.

In iSCSI, the file system is implemented at the client level. This enables both data and metadata to be read and managed within the client file system.

Implementing iSCSI can be slightly challenging as it requires configuring hosts, storage options, virtual local area networks (VLAN), and other related settings to ensure proper functionality and integration with the system.

NFS can be used for Microsoft Windows, Linux, and UNIX operating systems, making it a versatile choice for cross-platform environments.

It facilitates file-based sharing, enabling clients to access and share individual files or directories rather than accessing storage at the block level.

In an NFS setup, the responsibility of managing the file system (such as organizing and managing files and directories on behalf of the clients) rests with the NFS server.

NFS allows files to be shared among multiple servers, providing a means for collaborative access and data sharing across server environments.

In NFS, the file system is implemented at the server level. This means the server maintains the file system, and clients access files within that shared file system.

NFS is a protocol known for its efficiency and streamlined design. It is considered a user-friendly choice as it is a shared protocol, making it easier for clients or users to implement and utilize it.

iSCSI is cost-effective in implementation, providing an economical network at the block level. The need for additional network devices is reduced as the protocol need not always use HBAs, distinct cabling, or specific storage devices.

iSCSI is also flexible as it runs on an internet protocol that does not limit the distance between the initiator and the target. This protocol fully leverages the interoperability advantages of Ethernet and TCP/IP. Plus, existing servers can be used several times for configuring iSCSI implementation.

iSCSI is known for swift data transfer even for larger volumes, as the protocol is normally configured for 10 gigabits per second Ethernet (GbE) infrastructure.

iSCSI is easy to deploy and manage, with the users who maintain it not requiring in-depth technical knowledge. The protocol is, therefore, conducive for development and disaster recovery too.

Finally, iSCSI features enhanced network security through identity authentication, physical and logical network isolation, confidentiality, and integrity.

NFS is secure as it uses strong authentication for protection against unauthorized access.

Users can share large les without breaking them down into smaller parts, and enterprises can collaborate across teams via NFS, thus enhancing productivity.

High scalability via data integration is a key benefit of NFS. The protocol can integrate local data with data from remote locations. Enterprises can, therefore, optimize their data centers and minimize costs by consolidating storage.

NFS provides speedy access to data by minimizing latency across wide area networks (WANs).

Like iSCSI, NFS is also suitable for disaster recovery and is used by organizations during disaster recovery planning. In case of a disaster, personnel can leverage NFS to create a virtualized remote copy of sensitive data.

Finally, NFS is secure and suitable for thwarting unauthorized access to data. It is also conducive for auditing and monitoring network activity remotely.

See More: What Is Network Topology? Definition, Types With Diagrams, and Selection Best Practices for 2022

In the realm of network storage, iSCSI and NFS are two well-known protocols.

iSCSI shines in block-based workloads, providing optimal performance for storage area networks (SANs), virtualization, and database applications, particularly in Windows and VMware environments. On the other hand, NFS excels in file-based workloads, offering high throughput and low latency, making it ideal for file-sharing and backup applications, particularly in Linux and UNIX environments.

While iSCSI boasts its own security features, NFS relies on the security mechanisms of the underlying network and file system. NFS scales easily by adding more servers and file systems, whereas iSCSI scales by adding more targets and logical unit numbers (LUNs). However, both protocols may encounter challenges when managing many connections, configurations, or devices.

NFS and iSCSI continue to evolve to meet the storage requirements of the modern world. They are integrating with cloud-based storage services, embracing software-defined storage solutions, and providing persistent storage for containerized applications, enhancing portability, performance, and scalability.

Despite their strengths, NFS and iSCSI face challenges in the network storage landscape. Compatibility issues, complex architectures, and competing protocols like SMB, CIFS, FCoE, NVMe-oF, and S3 can introduce interoperability problems, configuration errors, performance degradation, operational overhead, and security vulnerabilities.

Understanding the nuances of these two protocols and carefully assessing storage requirements will help users make an informed decision to ensure efficient and reliable network storage implementation.

Did this article help you understand the workings of iSCSI and NFS? Share your feedback on FacebookOpens a new window , XOpens a new window , or LinkedInOpens a new window !

Image Source: Shutterstock

See the original post here:
iSCSI vs. NFS: 5 Key Comparisons | Spiceworks - Spiceworks News and Insights

Read More..

These Refurbished Blink Cameras Are up to 66% Off – Lifehacker

Keeping an eye inside and outside your home is a lot more affordable with Woots fall sale on Blink devices. Theyre selling refurbished Blink cameras for up to 66% off, starting at $15 until Oct. 27 at 1 a.m. ET or until supplies last.

Keep in mind that all these cameras are refurbished, so they might come with signs of wear, but they were all serviced and tested. Woot only ships to the 48 contiguous states in the U.S. If you have Amazon Prime, you get free shipping; otherwise, itll be $6 to ship. Woot products come with an assigned manufacturer warranty or Woots 90-day warranty program in case you have a problem with a product.

TheBlink Mini is currently$15 (normally $35). Its a wired, plug-in camera that is not weather-resistant, so its meant for indoor use. It has motion activation alerts, a live-view mode, shoots in 1080p, has two-way audio and night vision, and works with Alexa. This is the first and only generation of the Blink Mini released in 2020. You can read PCMags full review of the Blink Mini here.

If you would rather have a wireless indoor security camera, consider the 3rd generation Blink Indoor camera. Currently, you can get two Blink Indoor cameras for $59.99 (normally $139.99). The Blink Indoor uses two AA lithium batteries that last two years, so you dont have to worry about changing batteries too much. As the name implies, theyre not weather-resistant and are only meant to be used indoors. Like the Blink Mini, you get a 110 field of view, motion activation alerts, a live-view mode; it shoots in 1080p, has two-way audio and night vision, and works with Alexa. The main difference with the Blink Mini is that you can put this camera anywhere in your home without having to worry about where to plug it in.

For those looking for outdoor cameras, the 3rd generation Blink Outdoor camera is your only choice. Currently, you can get two Blink Outdoor cameras for $59.99 (normally $179.99). The only difference between this one and the Blink Indoor camera is that its weather-resistant. This is already one of the best and most affordable outdoor cameras. And right now, you can get two for less than the price of a new one. You can read PCMags full review here.

If you want to store the videos from multiple Blink cameras locally, see them on the Blink App or your computer, youll need a Sync Module. The Sync Module 2 ($35) is a hub that connects Blink cameras to Blinks cloud servers, allowing you to store video locally, manually record, share live video footage (but no live view recording), and control up to 10 Blink devices with the Blink Home Monitor app. Keep in mind that the Blink system is not compatible with Google or Apples smart home system. You will also need a Blink subscription to use all of its features:

You have two options for a Blink subscription plan. The Blink Basic Plan is $30 per year; the Blink Plus Plan runs you $100 a year with more features, the most important of which is having an unlimited number of devices hooked up to your account.

Read the rest here:
These Refurbished Blink Cameras Are up to 66% Off - Lifehacker

Read More..

SAU Engineering Department partners with Southern Aluminum for experiential learning opportunity – SAU

A group of 15 engineering students from Southern Arkansas University began work-study projects on lean manufacturing and production system quality at Southern Aluminum, one of the fastest growing local innovation industries.

This is a significant partnership between SAUs engineering program and Southern Aluminum to provide our students with practical learning experiences, said Dr. Mahbub Ahmed, chair of the Department of Engineering and Physics. SAU engineering students will engage directly in manufacturing, learning from experts and gaining valuable insights. This aligns perfectly with our engineering programs goal of preparing students for the future workforce.

During the fall 2023 semester, students have been working on six projects, which include fiveStandards, Total Productive Maintenance, Product Quality, SMED Quick Changeover, Production Flow, and Production Pull. Some of the projects could be extended.

The studies aim to analyze unknown root causes and non-linear effects, processing time sequences and synchronization, developing best lean practices, preventive maintenance standards, and the implementation of Kanban systems for store and supply in three main operations of the systems, and a proposed improvement plan of solutions.

The students will gain real-world experience while applying their engineering skill sets to enhance Southern Aluminums operations. Immersed in the manufacturing facility and learning how products are crafted from start to finish, students are expected to gain a better understanding of the process flow and to apply tools such as PDCA and DMAIC problem-solving methods, the Kanban approach, and LPMS.

The project grant of $31,200 is an industry investment in our engineering program and our students brilliant minds. We plan to grow the industry relationship with our department, college, and the University to excel in the future workforce, said Dr. Hayder Zghair, assistant professor of Industrial Engineering at SAU and the projects academic supervisor.

We are excited about the collaborative effort between SAU Engineering and Southern Aluminum, this will only increase the job readiness for the participating students all while promoting innovation and growth for Southern Aluminum. Actively engaging industries in students projects is a prime goal for the Engineering and Physics Department; its a win-win situation for all, said Dr. Abdel Bachri, dean of the College of Science and Engineering.

Read this article:

SAU Engineering Department partners with Southern Aluminum for experiential learning opportunity - SAU

Read More..

VCU Engineering’s new dean sees a future beyond ‘traditional … – VCU News

By David PulgarVCU College of Engineering

Engineering should not have traditional boundaries, said Eskandarian, D.Sc., who joined Virginia Commonwealth University in August as the Alice T. and William H. Goodwin Jr. Dean for the College of Engineering. Todays engineering problems are complex, and they need solutions from different engineering disciplines. You may need elements from the physical or computing sciences, for example. And if human interaction is a factor, psychology and social sciences are also important.

Creating an environment where faculty and students work across departments is one of Eskandarians main goals. The College of Engineerings Vertically Integrated Projects provide students with an immersive experience, including collaboration outside of engineering, and he wants to grow that practice.

The fundamentals taught within each discipline remain important, but we have to create opportunities for students to learn outside their disciplines and engage with systems that are not part of their specialtys curriculum, Eskandarian said. More companies are expecting students to have knowledge in areas previously not required, so this kind of education is necessary to ensure our VCU engineers are well-prepared.

He learned the importance of cross-disciplinary focus through his own experience in the field of control systems, specifically for automotive passenger safety and collision avoidance.

If you look at a car, its not just a vehicle with a structure, engine and driving mechanisms, said Eskandarian, who joined VCU from Virginia Tech. Its a combination of material science, electromechanical systems, signal processing, sensors, computing and more that creates the final product. A modern automobile is a package of technologies from different engineering fields.

Learning how things work is something Eskandarian enjoys. He grew up surrounded by family members who were interested in factories, building parts and other topics from both the engineering and medical fields. Gadgets fascinated him from an early age, and his aptitude for math and science helped.

With my childhood toys, I did a lot of dismantling and figuring out how parts were connected, he said. Of course I would destroy them in the process, but it was a good learning experience.

After receiving his masters degree, Eskandarian worked as a practicing engineer, but he wanted to go beyond applying existing knowledge to form engineering solutions.

I was interested in the new knowledge we could discover through research, he said. Researchers want to know the unknowns and face the challenges no one has discovered yet. Thats the true nature of research, and its an element of great interest to me and every other engineering researcher.

As the new VCU Engineering dean, Eskandarian brings a wealth of industry, research and educational experience. As a leader, he believes in being an example for others and stresses the importance of one idea over all others: service.

You have to be of service to your community, Eskandarian said. Many books have been written about what being a good leader means, and to me, a good leader serves their community. For a dean specifically, having a vision and making sure the mission of the university is well-understood and pursued by everyone within the organization is also important.

Subscribe to VCU News at newsletter.vcu.edu and receive a selection of stories, videos, photos, news clips and event listings in your inbox.

See more here:

VCU Engineering's new dean sees a future beyond 'traditional ... - VCU News

Read More..

Engineering faculty-researcher awarded grant to decrease computer … – Rochester Institute of Technology

Michael Zuzak, a faculty-researcher at Rochester Institute of Technology, is one of a growing field of engineers looking to improve computer chip security during manufacturing. Current solutions focus on securing specific regions of the chip design. This leaves the larger architecture vulnerable to compromise. Zuzaks work to secure the entire chip could prevent piracy and help protect intellectual property.

To get chips fabricated, you have to send the entire design to the manufacturer. Ultimately what we want to protect is what the company considers high value. We want to allocate security to more sensitive, unique parts of the system. The hope is that we will have the ability to prevent intellectual property theft during the entire semiconductor fabrication, said Zuzak, an assistant professor of computer engineering in RITs Kate Gleason College of Engineering.

Zuzak received a two-year National Science Foundation grant to use the developmental practice of logic obfuscation to enable system-wide security during the manufacturing and testing of integrated circuits, also referred to as computer chips.

Global manufacturing companies mass produce integrated circuits. For fabrication, these companies are given extensive design files that can be counterfeited, pirated, or modified. This threatens high-trust applications such as healthcare and defense. Logic obfuscation was developed to mitigate threats. The proposed project will develop a design space modeling framework to automatically identify obfuscation configurations capable of system-wide security.

Zuzak is an expert in hardware security and methods to design and manufacture secure and reliable electronic systems. Hiding functionality during the production process is a way to ensure that the design cannot be modified or counterfeited.

Weve gotten very good at locking specific parts of the chip. What I am looking at is how we distribute obfuscation optimally throughout the full system to secure it as a whole rather than just specific modules within the chip, said Zuzak, who is developing AI-driven algorithms to perform security assessments of the physical design that are resistant to reverse engineering attacks. Logic obfuscation makes some portion of the design dependent on a withheld value, a number or secret key. Making the design dependent on that key would allow the manufacturer to produce the computer chip, but not have information about its functionality.

Already Zuzak and his team have developed mathematical models for computer chips capable of predicting the effectiveness of security solutions with over 95 percent accuracy. These models can be customized for new chip design after sampling less than 1 percent of possible security configurations.

In the coming months, Zuzak will use these models to automatically distribute security resources in computer chips to optimize the protection of any intellectual property within them, he explained.

The work is not without challenges, and Zuzak is trying to build a solution that can secure a computer chip but also recognize that different devices require different system components.

The biggest challenge is that every system is fundamentally different. In my work, I look at this from a mathematical and a design space modeling perspective. It is used a lot in architecture where you design systems; I am looking at it and asking how do you design secure systems? And how do you targert security rather than just architecture.

By architecture, Zuzak means the structural aspects of a computing system and the interconnected components functionality. Designing computer chips is complex and labor intensive. Companies make substantial investments in intellectual property to produce a chip design for specific electronic device systems.

People see this in the news, right? It is covered like crazy now, and when we talk to our industry advisory board, they light up when they hear security. Its an exciting time, said Zuzak.

Read the original:

Engineering faculty-researcher awarded grant to decrease computer ... - Rochester Institute of Technology

Read More..

IDEA Institute awarded NSF grant to promote systemic change in … – The Grainger College of Engineering

From left to right: Rashid Bashir, Ellen Wang Althaus, Ashleigh Wright, Lynford Goddard and Jennifer Cromley

The University of Illinois Urbana-Champaign Institute for Inclusion, Diversity, Equity and Access (IDEA) has been awarded an NSF grant to create the Developing Equity-Minded Engineering Practitioners (DEEP) center in collaboration with Morgan State University (MSU), a historically Black college/university (HBCU) in Baltimore, Maryland. This is the first external grant awarded to the IDEA institute since it was launched in 2019.

The DEEP center will serve as a hub for developing faculty change agents at UIUC and MSU who will foster equitable and inclusive teaching and learning environments for students. The strategy of DEEP will be to focus on fixing the system, rather than fixing the student.

The UIUC team will be led by Dean Rashid Bashir and co-PIs Ellen Wang Althaus, Lynford Goddard, and Ashleigh Wright from the Grainger College of Engineering and Jennifer Cromley from the College of Education. The MSU team will be led by PI Onyema Osuagwu and co-PIs Dean Oscar Barton and Cliston Cole from the Mitchell School of Engineering.

More inclusive environments positively impact the retention and success of students, particularly those from racial and ethnic backgrounds that are historically underrepresented in engineering, says Althaus. The collaboration between UIUC and MSU will serve as a new model for educational collaborations, especially between predominantly white institutions (PWIs) like UIUC and HBCUs, and minority serving institutions (MSIs).

There are increasing expectations for faculty to do DEI work and foster more inclusive environments in their classrooms, not only from the institution level but also from the engineering accreditation board. The Provost Office at the University of Illinois has revised criteria for the promotion and tenure of faculty to include contributions to DEI, taking effect in March 2022 with a 3-year phase in of the policy. In 2023, the Accreditation Board for Engineering and Technology (ABET) began its own 3-year phase in of DEI criteria, including assessing integration of DEI principles in curricula and faculty creation of equitable and inclusive learning environments.

While these changes may seem overwhelming for faculty balancing many responsibilities in the classroom and in their research laboratories, the goal of DEEP is to help make incorporation of these principles doable. Wright says, We want it to be more of a systematic, institutional change, where were not trying to add another thing to our plate. But rather make it something we inherently do because we live in a diverse society and its the right thing to do.

Over the 2-year duration of the NSF grant (with the possibility of a further 3 years upon renewal), the IDEA team plans to create a repository of lesson ideas and examples and to offer workshops where participants will learn about ways to incorporate DEI principles into the classroom. The goal of the repository is to have a place of easily accessible, crowdsourced information that faculty can use in their curricula. We hope to have widespread engagement from our faculty and staff, without their feeling like its going to be a big time drain for those engaging at the highest level. One person cant do everything, but everybody can do something, says Althaus. Further, DEEP aims to develop an on ramp for faculty who may feel anxious or overwhelmed about revamping their courses, to help them grow their knowledge as equity-minded engineering educators and infuse DEI principles to their courses.

The collaboration with MSU is particularly unique because alumni of Grainger are integral parts of this projectMSU PI Onyema Osuagwu is a 2015 electrical and computer engineering (ECE) PhD graduate and was co-advised by UIUC co-PI Goddard, and MSU co-PI Cliston Cole is a 2017 ECE PhD graduate. Leveraging these relationships will be particularly helpful to learn from another institution that has a different culture and a different student body than that of UIUC. It is also valuable to have the perspectives of alumni who have first-hand experiences from UIUC as students and from MSU as faculty. Learning from another institution ways of interacting with students that are different from here at Grainger will add another level of knowledge and information that can be drawn from on how to really engage and have discussions about diverse topics with students.

Were excited to see what the results are, what the outcomes are, whats the impact that we can have from doing this work and then sharing it with other people. Hopefully that really changes the landscape about how we think about teaching at R1 institutions, how we engage with students from diverse populations, regardless of the type of institution for being PWI or an MSI, because its all important and valuable, says Wright.

On the collaboration, Dean Bashir says, "We are honored to partner with Morgan State University to co-create a joint center to bring about positive change. We are committed to building a more inclusive college at Illinois, as well as a more diverse academic culture more broadly."

Visit link:

IDEA Institute awarded NSF grant to promote systemic change in ... - The Grainger College of Engineering

Read More..

Ellucian’s Internship Program Ranked #1 in Technology and … – Ellucian

RESTON, VA Ellucian, the leading higher education technology solutions provider, today announced that Ellucian's Global Internship Program has once again been recognized as one of the best in Vault's 2024 100 Best Internships list this year placing #2 in the overall rankings. Ellucian was also ranked the #1 internship program in the role-based categories for Tech & Engineering, Information Technology, and Sales, Marketing & Communications. Additionally, Ellucian was ranked #3 in the Racial & Ethnic Diversity.

Ellucian's Internship Program provided opportunities for 100+ global interns this year to grow their skills, gain real-world experience in technical and non-technical roles, and connect with students, team members, and business leaders across the globe to jumpstart their career. Internships feature meaningful projects tied to the intern's field of study, dedicated 1:1 mentors and opportunities to present their work at Ellucian's capstone fair. Many interns also go on to find full-time employment at Ellucian once their internship ends.

"We are proud to see Ellucian's Internship Program ascend to the #2 spot on the Vault 2024 Best Internships list, a significant leap from our #10 ranking last year," said Greg Giangrande, Chief People and Communications Officer, Ellucian. "As a company dedicated solely to serving the higher education industry, we are doubly committed to providing students from all backgrounds equitable access to a fulfilling career through impactful internships. Vault is a trusted source for internship ratings, and this recognition demonstrates the quality and impact of Ellucian's program as we create pathways for students in higher education to enter the workforce."

Since 1996, Vault has provided in-depth intelligence on what it's really like to work within an industry, company, or professionand how to position oneself to launch and build the career of their dreams. Vault is best known for its influential rankings, ratings, and reviews on thousands of top employers and hundreds of internship programs.

Vault's Best Internship rankings are based on scores from surveying over 10,000 interns on their quality of life, compensation and benefits, interview process, career development, full-time employment prospects, and diversity. More than 507 campus partners and 20 million+ career seekers use Vault to search, find, evaluate, and land the best jobs and internships.

Learn more about the internship and early career programs at Ellucian here: https://careers.ellucian.com/early-career.

Continue reading here:

Ellucian's Internship Program Ranked #1 in Technology and ... - Ellucian

Read More..

Javan Engineering is now fully integrated as a CHA company – The Mercury

CHA Consulting Inc. (CHA) has announced it has fully integrated and rebranded Montgomery County-based Javan Engineering into the company. CHA, an engineering, design, consulting, and program/construction management firm, acquired Javan Engineering in April this year, and the integration process began.

Now known as Javan Engineering, a CHA Co., the firm has 200 employees at offices in Upper Dublin and Upper Gwynedd townships in Montgomery County including engineers, project managers, specialized process engineering talent, and asset management technical professionals.

With the reshoring of domestic manufacturing and continued growth in pharma and life sciences facilities, the integration of our talented Javan colleagues has strengthened our advanced manufacturing and asset management teams and will continue to benefit our combined clients, Jim Stephenson, CEO of CHA, said in a statement. This rebrand further strengthens our presence in advanced manufacturing, allowing us to offer exceptional services and diverse resources with a united team comprised of some of the most skilled and knowledgeable technical professionals.

Javan has expertise in project and program management; process & MEP engineering; asset management; and predictive maintenance and reliability, and has an extensive portfolio of project work addressing complex, specialized manufacturing challenges. Its full integration supports CHAs strategy for growth in thelife sciences/pharmaceuticals and specialty chemicals markets, according to a press release.

Since joining CHA in April, weve created a collaborative team by building on each others strengths and working together to provide expanded service offering to the clients of both firms, Tim Javan, former president of Javan Engineering, said in a statement. Our clients and staff recognize there are great synergies on the horizon and have already appreciated the expertise and value the combined entity can bring to each project.

With its headquarters in Albany, N.Y., CHA Consulting has more than 1,700 employees in 50 offices in the U.S. and Canada. In addition to the Upper Gwynedd and Upper Dublin locations, the company also has a location in Spring Township, Berks County.

See original here:

Javan Engineering is now fully integrated as a CHA company - The Mercury

Read More..

Female computer engineering students obtain better grades and prefer more people-oriented specializations: Report – Phys.org

This article has been reviewed according to ScienceX's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:

by Tania Alonso , Universitat Oberta de Catalunya (UOC)

close

In academic year 2021/2022, men formed a clear majority of students studying for a Bachelor's Degree in Computer Engineering in Spain. According to the report "Igualdad en cifras" ("Equality in Figures") published by the Spanish Ministry of Education and Vocational Training, only 14.1% of all students taking that program were women.

This highlights a reality that will come as no surprise to anyone: women are seriously underrepresented in STEM disciplines (science, technology, engineering and mathematics). So what happens once they get into the classroom? Do men and women differ in terms of performance and specializations?

These are some of the questions examined by the researchers from the STEAM University Learning Research Group (EduSTEAM) Juli Minguilln and Maria Jess Marco-Galindo; Elena Planas from the SOM Research Lab group at the Internet Interdisciplinary Institute (IN3) and Josep Maria Marco-Sim. They are all also members of the Faculty of Computer Science, Multimedia and Telecommunications at the Universitat Oberta de Catalunya (UOC).

They have published an open-access paperEn qu se diferencian las graduadas de los graduados en su trayectoria en el Grado en Ingeniera Informtica? El caso de la Universitat Oberta de Catalunya (How do the pathways of male and female Computer Science graduates differ? The case of the Universitat Oberta de Catalunya)which received an award at this year's JENUI conference on teaching computer engineering at university (JENUI 2023).

One of the conclusions of the study is that women starting a Bachelor's Degree in Computer Engineering do so with more prior learning than their male peers, perform slightly better and choose different pathways.

Many studies have analyzed the gender gap in Computer Engineering studies, but not so many have examined the performance of female graduates while at university, as the UOC researchers have done in this paper revealing the situation at the university.

The differences start with the students' profile: women join the program having already either started or completed a university degree, whereas men tend to join from advanced-level training cycles. According to the authors of the study, this affects their choice of pathways.

The authors interpret that already having a degree means that women are better preparedor at least have more academic experiencewhen they start the Computer Engineering program. "Women generally get better grades, particularly in more theoretical pathway (Computational Engineering) and graduate one semester earlier. This latter fact is partly due to having more credit recognition from courses they've already studied," said the authors.

According to the study, the difficulty of courses does not significantly affect female students' choices. However, what does affect them is the number of courses they still need to take (as a result of credit recognition) and the reality of the glass ceiling. In other words, they choose fewer courses aimed at gaining managerial positions and positions of responsibility within organizations, such as Information Systems. This choice is consistent with the difficulties often encountered by women in such positions.

Furthermore, the results of this research by the UOC reveal a clear difference between the chosen pathways of male and female students. Most women take the software engineering route, software, which focuses on creating solutions that can be applied to people's lives. Men tend to be more varied in their choices, although with an overall preference for Information Systems.

According to the researchers, women tend to choose courses relating more to developing applications and user interaction, i.e., from the computer out, whereas men tend to prefer hardware and systems development, i.e., from the computer in.

This study by the UOC debunks two myths: that women don't have the right skills to study Computer Engineering and that they don't enjoy programming. The authors of the study believe that highlighting this is key to promoting equality, diversity and innovation at university.

"Quantifying and identifying barriers, biases and disparities enables us to create a more inclusive environment with equal access opportunities for men and women. Furthermore, addressing gender differences helps establish models to be followed, propose policy changes, achieve global competitiveness and create a society that is fairer and more equitable," they said.

Likewise, the differences in technology programs between men and women relate to values linked to gender roles that, according to Milagros Sinz, research group leader at the IN3's Gender and ICT group (GenTIC), are transmitted to both men and women.

"The gender gap in science and technology programs is a complex phenomenon whose origins are linked to the fact that our society is based on a set of values linked to gender roles and stereotypes that are transmitted to men and women through socialization processes that are different for each group," said Sinz.

"Men are expected to be assertive, competitive and even aggressive, or to want to take an interest in objects. Women, on the other hand, are expected, for example, to properly express their feelings, take an interest in people and enjoy taking care of other members of society," she said.

This study by the UOC reveals the differences observed between men and women, but it does not examine in detail the reasons behind each group's decisions. It therefore leaves the door open to future research that will help clarify the causes of this inequality so that we can tackle and maybe even overcome them.

Provided by Universitat Oberta de Catalunya (UOC)

Go here to see the original:

Female computer engineering students obtain better grades and prefer more people-oriented specializations: Report - Phys.org

Read More..