Archive

Archive for May, 2012

Machine-to-Machine (M2M) Killer App Hackathon (in St. Charles, IL)

May 24th, 2012 Comments off

Bring your game: Three sessions, two days, one objective: Create the world’s first killer M2M app!

June 11-13, 2012 during the Connected World Conference at the Pheasant Run Resort in St. Charles, IL

Hackers nationwide are invited to participate in the first ever M2M app Hackathon-with fame and fortune as the reward for your creativity and skills! We provide the energy drinks, snacks, developer kits, and the room to code-all day and all night. The winners will receive not only cash, but a secure place in the history of hacking-guaranteed by a cover story in the nationally distributed Connected World magazine.

Drop your mouse and check out these incentives:
1st place: $3,000 plus be featured on the cover of Connected World magazine and mentioned in the cover story
2nd place: $1,500
3rd place: an iPad
4th place: a cellular signal booster

About the Hackathons:
Join us June 11 from 4:00 p.m. – 8:00 p.m., and grab some free food and drink, as well as your developer kit to get started. You may participate in one or all three Hackathon sessions-either as an individual or as a team. Space is limited so sign up to participate today.

Additional details at http://connectedworldmag.com/conference/index.php?q=hackathon

Video from Resume Workshops Online Now.

May 24th, 2012 Comments off

Check out the resume workshops ITM sponsored last term.

Creating Employment for Yourself in a Tough Economy: Proactive strategies, tools, and tactics
If you confine your career strategy to jobs that are posted, you’re already behind the curve, together with most other job seekers—because you’re all chasing the same jobs. Learn to get hired before a job is advertised. Learn tools and tactics that will help you to create employment and construct a career—not just keep applying for job after job after job.

We are offering a series of 3 seminars outlining this proactive approach. Our instructor, Gabe Heilig, has been a personnel recruiter, manager of the downtown Washington, DC office of a national resume company, and owner of his own career services firm. In 1993, he won a nationwide RFP to open the only commercial resume service ever granted a lease to do business in the Pentagon. He has coached and written resumes for more than 5,000 professionals—from janitors to admirals, for CIA spies, the Director of White House Cyber Security, and the most recent Secretary of the Army.

Session 1: The Proactive Resume: What it is and how to write one
What makes a resume effective, or ineffective? We will examine this, using resumes attendees have submitted as well as “before and after” examples of resumes the instructor has written for his professional clients. He will provide a partially written, pre-formatted template that you can use to rewrite your resume, and we will review some of these rewritten resumes in Session #3.

Session 2: Creating employment: Niches, nodes, methods, probes, traps, moves, metaphors, paradigms, frames
Learn to think your way to the career you want. Whether the kind of job you want is advertised, or not, there are ways to create this type of employment. That’s what we will explore in this session. We will cover a lot of ground—from looking at the emerging Post-Job, Problem-and-Project Economy, to understanding how to escape the “cubicle horizon,” to learning how to interview effectively.

Session 3: Critiquing Your Rewritten Resume
You will have from February 3-7 to rewrite your resume, using the template given to you in Session 1. You are invited to bring your rewritten resume to Session 3, when we will critique as many as we can in the time we have.
 http://ricelake.sat.iit.edu/itm/resumes/20120207_web.mp4

Categories: Job Skills Tags: ,

IIT Commencement

May 14th, 2012 Comments off

Unfortunately the IIT Blog system won’t let us embed video, but you can view the School of Applied Technology Commencement Ceremony at . You can also see video of IIT’s main Graduation Ceremony at http://www.iit.edu/commencement/.

Great photographs of the ceremony can be viewed and purchased at http://asjphotography.smugmug.com/Events/Illinois-Institute-of/.

Congratulations to the 2012 grads – Connect on Facebook and Twitter

May 14th, 2012 Comments off

Facebook and Twitter accounts have been created to celebrate the 2012 IIT graduates. If you would like to post pictures or video, send a message, share stories, or celebrate the graduating class, please visit:
Facebookhttp://www.facebook.com/IITGrads2012
Twitter: use the hashtag #IITGrads2012

Master’s Degree in Cyber Forensics and Security at IIT

May 14th, 2012 Comments off

Illinois Institute of Technology Announces Master’s Degree in Cyber Forensics and Security
New Program Combines Technical, Legal, Policy and Compliance
In 2011, the average organizational cost of a data security breach in the U.S. was $5.5 million according to a report from Symantec and the Ponemon Institute. Cyber forensics continues to be used to recover evidence from security breaches. Cyber security and forensics issues have become increasingly complicated with technical, legal, policy, and compliance issues, and with such astronomical costs, there is a critical need in both the government and private sectors for professionals equipped to prevent, counteract and investigate cyber terrorism, cybercrimes and information security breaches.

To address these issues, Illinois Institute of Technology’s School of Applied Technology is offering a Master of Cyber Forensics and Security degree and graduate certificate programs in cyber security management and cyber security technologies, starting in fall of 2012. The program integrates legal courses from IIT Chicago-Kent College of Law curriculum and technical and managerial courses from IIT School of Applied Technology’s information technology and management curriculum. The program provides cyber security and forensics practitioners a thorough grounding in technology, legal issues, policy and compliance, providing an outstanding curriculum for those interested in cyber forensics and security and is a substantive follow-up degree for undergraduates majoring in information technology and management, computer science, computer information systems, or computer engineering.

The mission of the cyber forensics and security programs is to prepare students to assume technical and managerial leadership in information technology and cyber security. With a hands-on, reality-based approach to education, the cyber forensics and security program allows students to apply what they learn in class to solve real-life problems. Additional courses may be taken from the IIT Chicago-Kent College of Law curriculum to give cyber security and forensics practitioners a thorough grounding in legal issues and compliance.

“The program provides an innovative experience where cyber forensics and security students work on cutting-edge, industry-sponsored projects that deal with technical, legal, policy and compliance,” said IIT School of Applied Technology Dean Robert Carlson. “This teaching philosophy prepares students to become innovators, entrepreneurs and leaders of the future.”

Recognized by industry professionals as a premier curriculum, IIT’s Cyber Forensics and Security (ForSec) programs are project-based and students are immersed in solving real problems, using current technologies and industry practices, while being guided by experienced faculty.

“In the IIT ForSec Lab, students use real computer viruses to learn and experience how they work, and also devise methods for protection of computers and mobile devices,” explains Professor Bill Lidinsky, director of security and forensics. “In cyber forensics, students learn how to accurately and legally access and analyze computers and cell phones, searching for evidence such as hidden and deleted files, email sent and received and web pages visited.” Students also do cutting edge research and present findings to their peers and leading professionals in their fields. This approach provides students with relevant experience — publishing and presenting at conferences, in some cases for government organizations such as the FBI.

For additional information regarding the Cyber Forensics and Security programs please visit www.itm.iit.edu/cybersecurity.

To help launch the program, Illinois Institute of Technology is hosted ForenSecure: the IIT Cyber Forensics and Security Conference on April 19 and 20. The conference had speakers from the Federal Bureau of Investigation (FBI) and the Chief Cyber Security Advisor from the Illinois Terrorism Task Force. For additional information about the conference please visit www.cpd.iit.edu/forensecure.

About IIT
Founded in 1890, IIT is a Ph.D.-granting university with more than 7,700 students in engineering, sciences, architecture, psychology, design, humanities, business and law. IIT’s interprofessional, technology-focused curriculum is designed to advance knowledge through research and scholarship, to cultivate invention improving the human condition, and to prepare students from throughout the world for a life of professional achievement, service to society, and individual fulfillment. Visit www.iit.edu.