Machine-to-Machine (M2M) Killer App Hackathon (in St. Charles, IL)

May 24, 2012 author: Comments off

Bring your game: Three sessions, two days, one objective: Create the world’s first killer M2M app!

June 11-13, 2012 during the Connected World Conference at the Pheasant Run Resort in St. Charles, IL

Hackers nationwide are invited to participate in the first ever M2M app Hackathon-with fame and fortune as the reward for your creativity and skills! We provide the energy drinks, snacks, developer kits, and the room to code-all day and all night. The winners will receive not only cash, but a secure place in the history of hacking-guaranteed by a cover story in the nationally distributed Connected World magazine.

Drop your mouse and check out these incentives:
1st place: $3,000 plus be featured on the cover of Connected World magazine and mentioned in the cover story
2nd place: $1,500
3rd place: an iPad
4th place: a cellular signal booster

About the Hackathons:
Join us June 11 from 4:00 p.m. – 8:00 p.m., and grab some free food and drink, as well as your developer kit to get started. You may participate in one or all three Hackathon sessions-either as an individual or as a team. Space is limited so sign up to participate today.

Additional details at http://connectedworldmag.com/conference/index.php?q=hackathon

Video from Resume Workshops Online Now.

May 24, 2012 author: Comments off

Check out the resume workshops ITM sponsored last term.

Creating Employment for Yourself in a Tough Economy: Proactive strategies, tools, and tactics
If you confine your career strategy to jobs that are posted, you’re already behind the curve, together with most other job seekers—because you’re all chasing the same jobs. Learn to get hired before a job is advertised. Learn tools and tactics that will help you to create employment and construct a career—not just keep applying for job after job after job.

We are offering a series of 3 seminars outlining this proactive approach. Our instructor, Gabe Heilig, has been a personnel recruiter, manager of the downtown Washington, DC office of a national resume company, and owner of his own career services firm. In 1993, he won a nationwide RFP to open the only commercial resume service ever granted a lease to do business in the Pentagon. He has coached and written resumes for more than 5,000 professionals—from janitors to admirals, for CIA spies, the Director of White House Cyber Security, and the most recent Secretary of the Army.

Session 1: The Proactive Resume: What it is and how to write one
What makes a resume effective, or ineffective? We will examine this, using resumes attendees have submitted as well as “before and after” examples of resumes the instructor has written for his professional clients. He will provide a partially written, pre-formatted template that you can use to rewrite your resume, and we will review some of these rewritten resumes in Session #3.

Session 2: Creating employment: Niches, nodes, methods, probes, traps, moves, metaphors, paradigms, frames
Learn to think your way to the career you want. Whether the kind of job you want is advertised, or not, there are ways to create this type of employment. That’s what we will explore in this session. We will cover a lot of ground—from looking at the emerging Post-Job, Problem-and-Project Economy, to understanding how to escape the “cubicle horizon,” to learning how to interview effectively.

Session 3: Critiquing Your Rewritten Resume
You will have from February 3-7 to rewrite your resume, using the template given to you in Session 1. You are invited to bring your rewritten resume to Session 3, when we will critique as many as we can in the time we have.
http://ricelake.sat.iit.edu/itm/resumes/20120207_web.mp4

Categories: Job Skills Tags: ,

IIT Commencement

May 14, 2012 author: Comments off

Unfortunately the IIT Blog system won’t let us embed video, but you can view the School of Applied Technology Commencement Ceremony at . You can also see video of IIT’s main Graduation Ceremony at http://www.iit.edu/commencement/.

Great photographs of the ceremony can be viewed and purchased at http://asjphotography.smugmug.com/Events/Illinois-Institute-of/.

Congratulations to the 2012 grads – Connect on Facebook and Twitter

May 14, 2012 author: Comments off

Facebook and Twitter accounts have been created to celebrate the 2012 IIT graduates. If you would like to post pictures or video, send a message, share stories, or celebrate the graduating class, please visit:
Facebook: http://www.facebook.com/IITGrads2012
Twitter: use the hashtag #IITGrads2012

Master’s Degree in Cyber Forensics and Security at IIT

May 14, 2012 author: Comments off

Illinois Institute of Technology Announces Master’s Degree in Cyber Forensics and Security
New Program Combines Technical, Legal, Policy and Compliance
In 2011, the average organizational cost of a data security breach in the U.S. was $5.5 million according to a report from Symantec and the Ponemon Institute. Cyber forensics continues to be used to recover evidence from security breaches. Cyber security and forensics issues have become increasingly complicated with technical, legal, policy, and compliance issues, and with such astronomical costs, there is a critical need in both the government and private sectors for professionals equipped to prevent, counteract and investigate cyber terrorism, cybercrimes and information security breaches.

To address these issues, Illinois Institute of Technology’s School of Applied Technology is offering a Master of Cyber Forensics and Security degree and graduate certificate programs in cyber security management and cyber security technologies, starting in fall of 2012. The program integrates legal courses from IIT Chicago-Kent College of Law curriculum and technical and managerial courses from IIT School of Applied Technology’s information technology and management curriculum. The program provides cyber security and forensics practitioners a thorough grounding in technology, legal issues, policy and compliance, providing an outstanding curriculum for those interested in cyber forensics and security and is a substantive follow-up degree for undergraduates majoring in information technology and management, computer science, computer information systems, or computer engineering.

The mission of the cyber forensics and security programs is to prepare students to assume technical and managerial leadership in information technology and cyber security. With a hands-on, reality-based approach to education, the cyber forensics and security program allows students to apply what they learn in class to solve real-life problems. Additional courses may be taken from the IIT Chicago-Kent College of Law curriculum to give cyber security and forensics practitioners a thorough grounding in legal issues and compliance.

“The program provides an innovative experience where cyber forensics and security students work on cutting-edge, industry-sponsored projects that deal with technical, legal, policy and compliance,” said IIT School of Applied Technology Dean Robert Carlson. “This teaching philosophy prepares students to become innovators, entrepreneurs and leaders of the future.”

Recognized by industry professionals as a premier curriculum, IIT’s Cyber Forensics and Security (ForSec) programs are project-based and students are immersed in solving real problems, using current technologies and industry practices, while being guided by experienced faculty.

“In the IIT ForSec Lab, students use real computer viruses to learn and experience how they work, and also devise methods for protection of computers and mobile devices,” explains Professor Bill Lidinsky, director of security and forensics. “In cyber forensics, students learn how to accurately and legally access and analyze computers and cell phones, searching for evidence such as hidden and deleted files, email sent and received and web pages visited.” Students also do cutting edge research and present findings to their peers and leading professionals in their fields. This approach provides students with relevant experience — publishing and presenting at conferences, in some cases for government organizations such as the FBI.

For additional information regarding the Cyber Forensics and Security programs please visit www.itm.iit.edu/cybersecurity.

To help launch the program, Illinois Institute of Technology is hosted ForenSecure: the IIT Cyber Forensics and Security Conference on April 19 and 20. The conference had speakers from the Federal Bureau of Investigation (FBI) and the Chief Cyber Security Advisor from the Illinois Terrorism Task Force. For additional information about the conference please visit www.cpd.iit.edu/forensecure.

About IIT
Founded in 1890, IIT is a Ph.D.-granting university with more than 7,700 students in engineering, sciences, architecture, psychology, design, humanities, business and law. IIT’s interprofessional, technology-focused curriculum is designed to advance knowledge through research and scholarship, to cultivate invention improving the human condition, and to prepare students from throughout the world for a life of professional achievement, service to society, and individual fulfillment. Visit www.iit.edu.

Finding Our Summer 2012 Course Offerings

April 25, 2012 author: Comments off

Folks seem to be having trouble getting to the ITM summer course listings through MyIIT. If you go into MyIIT, select Look Up Classes, select Search By Term: Summer 2012, select Information Tech and Mgmt, and click on “Course Search”, it will then show you a list of ALL courses offered by the department, whether they are offered in the current term or not; it is NOT a list of courses offered this summer. If you select “Advanced Search” instead of “Course Search”, than select Information Tech and Mgmt, then click on “Section Search”, then it will show you the full list of courses offered this summer. OR just to make your life easier, just see the following PDF file: Information Technology and Management Summer 20912 Course Offerings

Gamma Nu Eta Meet and Greet at Noon, April 24

April 24, 2012 author: Comments off

Come learn more about our Honor Society, Gamma Nu Eta, at our Spring Meet and Greet in Man-0n-the-Bench Park from noon to 2pm, Tuesday April 24th. FREE PIZZA!

Registering for Fall 2012

April 9, 2012 author: Comments off

Fall and Summer 2012 registration opens today for graduate students and fifth-year seniors!

As of Fall, ITM 4XX and 5XX courses now have have four-letter Subject Codes and can be found listed under IT Development (ITMD), IT Management (ITMM), IT Operations (ITMO), IT Security (ITMS) and IT Theory and Technology (ITMT). The ITM subject code has been retained for 100- through 300-level courses. To view ALL ITM courses in MyIIT, hold your control key down and select all ITM courses by clicking on the choices as shown at the right. By the way, all previously existing courses still carry the same number but now have a new subject code. In addition, one other course offered by the School of Applied Technology is listed under our TECH subject code, indicating it is a course available to ALL graduate students in the School of Applied Technology; the course is TECH 581, Consulting for Technical Professionals, taught by Adjunct Professor Bonnie A. Goins who has many very successful years of practical experience in the field.

If you’ve been looking at the course schedule, there were a few last-minute additions: ITMM 482 Business Innovation, ITMO 542 Wireless Technologies and Applications, ITMS 443/543 Vulnerability Analysis (ethical hacking) and ITMO 547 Telecommunications Over Data Networks: Projects and Advanced Methods.

Significant courses for graduate students that are offered this term that are offered on an infrequent basis include ITMD 563 Intermediate Web Application Development (dot Net framework with C#); ITMM 586 Information Technology Auditing (ISACA CISA content); ITMO 551 Distributed Workstation System Administration (MS Windows Sysadmin); ITMO 557 Storage Technologies (new this term: covers RAID, SANs, NAS, cloud storage, and more); ITMS 555 Mobile Device Forensics (also new this term: forensic investigation of smartphones, tablets and other mobile devices); ITMT 535 Data Center Architecture (a key element of our datacenter curriculum); and TECH 581 Consulting for Technical Professionals (if you ever want to be a consultant, you need this course). Undergraduates…should see their adviser’s Advising Notes at http://trygstad.rice.iit.edu/Fall2012ITMUndergraduateAdvisingNotes.pdf

My Perfect IIT – Please Submit!

April 9, 2012 author: Comments off

Have you ever thought about what you’d like to change about IIT? About how IIT could be improved?

As part of the new accreditation process of the North Central Association’s Higher Learning Commission (HLC), universities are required to undertake a Quality Improvement Initiative. The Quality Improvement Initiative can be anything intended to significantly improve the quality of the university. The IIT Accreditation Advisory Committee has invited all members of the IIT community–students, faculty and staff–to share your ideas about a quality improvement initiative that IIT might undertake. They’ve set up a website to gather your ideas; you can submit an original idea (in 150 words or less), and/or vote on ideas submitted by others. Don’t be afraid to be bold, but please submit only serious ideas. The idea submission and voting process will be active until April 21, so send your ideas now. Submit your idea and vote on others’ now:

Categories: Stuff for Students Tags:

Y U NO….

April 9, 2012 author: Comments off

Oh, be real!

Categories: Uncategorized Tags: