Graduate, undergraduate, and women’s scholarships are offered by the Center for Cyber Safety and Education of the International Information System Security Certification Consortium (ISC)². They will begin accepting applications on February 28, 2017 for graduate and undergraduate scholarships of up to $5,000, and are currently accepting applications for women’s scholarships of $8,000 or more. One undergraduate student may also be selected for the Harold F. Tipton Memorial Scholarship; the most recent award recipient for this scholarship is Kyle Dean Murbach from Wheaton, IL. Please see the (ISC)² scholarship page at https://www.isc2cares.org/Scholarships/ for full details.
ITM is happy to be in Boston! In the photo at right, Master of Cyber Forensics and Security alumnus Anthony Ramirez receives the Best Paper Award for the 2016 ACM Research in Information Technology (RIIT) conference in Boston. Anthony and Alfedo Fernandez earned this award for their paper MP3 Stegonography: Analyzing and Detecting TCSteg. This is the third time in five years that Illinois Tech Information Technology and Management researchers have received this award. The School of Applied Technology and the ITM Department are Silver Sponsors for the RIIT conference and the concurrent ACM Special Interest Group in Information Technology Education (SIGITE) conference. ITM Associate Chair Ray Trygstad serves on the SIGITE Executive Committee.
The Women in CyberSecurity (WiCyS) 2017 conference will be held in Tucson, AZ on March 31st-April 1st. Scholarships are available for both faculty and students to attend the conference (details at https://www.csc.tntech.edu/wicys/register/); in the past these scholarships, funded by NSF, have covered airfare and lodging. Student and faculty scholarship applications are now open through November 21st. Notifications will go out December 5th. Conference registration costs are nominal–$30 for students, $150 for faculty.
The Call for Participation for Presentations, Workshops, Birds-of-a-Feather (BOF) Sessions, Lightning Talks, Panels, and Posters is open, and submissions will be accepted until November 6 (details at https://www.csc.tntech.edu/wicys/participate/)
All ITM women enrolled in Cyber Forensics and Security, and all third- and fourth-year undergraduate women, are strongly encouraged to participate—lightning talks and posters are easy and can be drawn from work already done—and to apply for these scholarships.
Free books are always nice. There are a fair number of textbooks released regularly under the Creative Commons or GNU Free Documentation Licenses, and not surprisingly many of them are on IT subjects…oh, and on discrete mathematics. (We hear ITM students may need a little boost there.) These books may be a good supplement to a course or may just help you learn something new on your own. Read more…
IBM has made a large variety of educational resources available for free in the areas of big data, touching both data management and data analytics. This includes both pre-defined learning tracks and individual courses. Most courses take 3 to 8 hours to complete and can be entirely done using either open source tools or the resources on the IBM Bluemix cloud, available though our Software! portal at http://www.itm.iit.edu/software/webstore.html. These courses are a great supplement for students in the MIS or Data Management curriculum who want to build their knowledge and abilities in analytics and big data management using tools like Spark, Hadoop, Seahorse, Jupyter, R, Rstudio, System T, Watson, and Scala. To access the courses, go to https://bigdatauniversity.com/.
The Computing Accreditation Commission (CAC) of ABET recently completed its assessment of the Bachelor of Information Technology and Management Program within the School of Applied Technology at Illinois Tech and has accredited the program. ITM is the first ABET-accredited Information Technology program in Illinois. Full details of the accreditation and the meaning for ITM undergrads is at http://appliedtech.iit.edu/news/2016/sep/08/information-technology-and-management-program-itm-illinois-tech-earns-abet. Our accreditation dates from October 2014. Thus, everyone who has received the Bachelor of Information Technology and Management (BITM) degree since December 2014 is now a graduate of an ABET-accredited program.
Since Dell’s purchase of EMC, there is a considerable increase in opportunities for our students at Dell and Dell EMC. Dell’s University Relations (UR) program broadens opportunities for internships and new hires, with an ultimate goal of hiring 25 percent of all external hires from university campuses by the end of year 2020. See all the details for both internship opportunities and new hires at https://jobs.dell.com/students.
ITM Student Handbooks for Fall 2016 have been posted and are available for students.
ITM Undergraduate Student Handbook: http://www.itm.iit.edu/data/ITMUndergraduateStudentHandbookFall2016.pdf
ITM Graduate Student Handbook: http://www.itm.iit.edu/data/ITMGraduateStudentHandbookFall2016.pdf
Linked below are the Department of Information Technology and Management’s requirements for computers for students entering our degrees in Fall of 2016. Please let contact Professor Trygstad if you have any questions or problems.
A major concern in our industry over the last few years has been the declining number of women in the computing fields. IT is not like other industries where there is a “glass ceiling”, a level above which women cannot rise: there are numerous examples of women CIOs in Chicago alone, including the former CIO of Boeing Corporation Kim Hammonds, now Global Chief Operating Officer of Deutsche Bank AG. And of course there’s Yahoo CEO Marissa Mayer, and Megan Smith, CTO of the United States. But we understand that it is difficult being female in a male-majority industry. Our department is strongly committed to doing everything we can to reduce this gender imbalance and to ensure that every student in our program is successful. Because this is a serious concern, I wanted to take an opportunity to share some resources to support women in IT. And guys: you should at least read the articles so you can begin to understand why this is an issue. Read more…