Category Archives: Computer Science

What the genomes of ancient humans can teach us about modern health | Penn Today – Penn Today

For nearly 40 years, geneticists have looked to ancient DNA to find answers about our modern condition. And, beyond just ancient DNA, research institutionsincluding Penn Medicinehave sought to sequence current human DNA to better understand how genetic variations affect health and disease.

What Iain Mathieson wants to do is compare the past and present to understand how certain genes have evolved, in the process shining new light on some of today and yesterdays diseases.

What were interested in is, Can we say anything about the phenotypes of these ancient individuals? explains Mathieson, an assistant professor of genetics in the Perelman School of Medicine. A lot of people are trying to use present-day genomes to discover genetic variants in people today that are related to specific diseases. [We want to see if] we can take that information and use it to say anything about the ancient people and their diseases. What were doing is combining ancient genomes with information about genetic variants and diseases from present day people to learn about disease in ancient people.

This summer, Mathieson and postdoctoral researcher Samantha Cox are working with two rising second-year students to collate and analyze existing data from scientific literature conducted around the world. Carson Shin, of Herndon, Virginia, who is an anthropology major in the School of Arts & Sciences, conducts anthropological and archaeological literature reviews to find new archaeological and DNA data. Kaeli Kaymak-Loveless, a computer science major in the School of Engineering and Applied Science, then takes that data and tries to analyze it using the statistical computing program R. The students work is funded by the Center for Undergraduate Research and Fellowships.

While Mathieson is ultimately interested in answering big questions, like how the rise of agriculture influenced the genome, hes first looking to see if his method for comparison works. He and his team of CURF interns are collating DNA data, tracking down information on skeletons, and determining height. Theyre examining height in particular, Mathieson says, because theres already a lot known about genetic variants and their relationship to height in present-day people. If they can accurately predict the height of ancient people through genetics, then, the next question becomes, What else can we say?

What wed like is to be able to say things we cant measure in the skeletons, Mathieson says. One of the big technology changes in the last 10,000 years is the development of agriculture; before that, people lived by hunting and gathering, and in the last 6,000 to 8,000 years many transitioned to an agricultural diet. You might wonder if variants of diseases todayobesity, diabetes, or even some autoimmune diseasesmight have a genetic basis in that diet.

Shin began his first year at Penn as a global health major before switching to anthropology, concentrating in archaeology. Heading into the summer, he knew he wanted to work on a project thats hands-on and interdisciplinary; Mathiesons project felt like a perfect fit.

As an anthropology major, its fascinating to me that even though were so separated from our ancestors by time, so little has actually changed about us as humans, Shin muses. Biologically, were pretty much the same. If I met someone from 3,000 years ago, I wouldnt be looking down on them or looking uptheyd be almost the same height as me, eye to eye.

As hes worked, he says, hes realized that he needs more coding experience and plans to take a half-credit course on R in the Wharton School once he meets prerequisitesthe sort of flexibility he says brought him to Penn in the first place. He says he never expected to take a computer science course, coming to Penn, but has relented.

Ive got to know how to code, he says.

Kaymak-Loveless, meanwhile, began as a bioengineering major before switching to computer science. Shes been weighing what to concentrate in but says the internship has allowed her to settle on computational biology, with an aim to take more biostatistics courses.

Most freshmen struggle to find something meaningful to do in their first summer, and I honestly wasnt really expecting to be doing anything meaningful this summer, says Kaymak-Loveless. But I feel like Im applying myself and learningthis has been a great experience.

Mathieson says he usually works with fourth-year students, but has been really impressed with how quickly Kaymak-Loveless and Shin have learned. In the short-term, Mathieson plans to develop the project into a paper.

But once we establish this technique and the ability to do this [successfully], wed like to use this to learn about traits you cant see in skeletons, related to diet and disease, Mathieson says. Thats the end goal.

The rest is here:

What the genomes of ancient humans can teach us about modern health | Penn Today - Penn Today

What Is Cybersecurity? Everything You Need To Know – Forbes

Editorial Note: We earn a commission from partner links on Forbes Advisor. Commissions do not affect our editors' opinions or evaluations.

Are you interested in a fulfilling, well-paying career protecting sensitive data and communications from hackers? Consider pursuing cybersecurity. Tech-savvy thinkers who demonstrate close attention to detail can thrive as cybersecurity professionals.

But what is cybersecurity? This guide covers all the basics, including career paths, common courses and business sectors where these workers are needed.

Cybersecurity involves the protection of information and data on computers, networks and electronic devices. Within the cybersecurity field, professionals anticipate, prevent and respond to attacks.

Nearly every industry takes cybersecurity measures to protect itself from leaks and breaches. Cybersecurity professionals may work with government organizations to safeguard military communications or with businesses to keep malicious actors from accessing financial records. Healthcare companies also use cybersecurity workers to protect their sensitive patient data. Large retailers shield customers credit card data with cybersecurity measures as well.

Cybersecurity intrusions have become a major problem, and cybersecurity professionals are needed to step up the defense. Demand reflects this. For example, the Bureau of Labor Statistics projects employment for information security analysts to grow by 33% from 2020 to 2030, far outpacing the 8% projected growth for all U.S. occupations.

As humans have become more reliant on technology, the prevalence and severity of cybercrimes have grown. For example, ransomware is a type of cyberattack that locks an individuals or organizations information until certain demands are met, including extorted payments. These attacks have affected financial, healthcare and education organizations, causing significant delays and leaks of information.

Cybersecurity remains important for anticipating, reacting and assessing cyberattacks. Professionals in this field study breaches and malicious actors to safeguard our most sensitive information and communications.

Cybersecurity professionals can work in many different sectors to protect sensitive data from bad actors. After gaining industry experience, they can pursue management-level roles to oversee departments and craft organizational security efforts.

The following section explores common cybersecurity careers.

Average Annual Salary: Around $171,000

Required Education: Bachelors degree in computer and information technology, masters degree often preferred

Job Description: CISOs prepare for, manage and assess cyberthreats. These senior, executive-level professionals oversee and implement organizations cybersecurity and information security efforts. CISOs, which may also carry the title of chief security officer, typically collaborate with other executives to reduce damages related to breaches and ensure that security programs meet organizational goals.

Larger employers may require CISOs to hold seven to 10 years of experience in information security and/or cybersecurity. Many hiring managers seek candidates with masters degrees, but more professional experience can often stand in for formal education.

Though certification is not required for the role, CISOs can pursue relevant credentials like certified information systems security professional (CISSP) and certified chief information security officer to increase their earning power and career opportunities.

Median Annual Salary: $102,600

Required Education: High school diploma and experience, bachelors degree in computer science preferred

Job Description: Information security analysts assist organizations by scanning computer systems and networks for potential breaches. They use data encryption software and firewalls to safeguard data and communications. These professionals set companies security standards and apply security best practices while remaining current on changes and trends in the field.

Information security analysts primarily work in computer systems design and other related professions, along with the finance and insurance sectors. They often work alongside computer systems analysts and network administrators, requiring strong collaboration skills.

Most employers look to hire applicants with certifications in the field, like CISSP. These professionals can also pursue certified information systems auditor (CISA), certified ethical hacker (CEH) and CISSP credentials.

Average Annual Salary: Around $130,000

Required Education: Bachelors degree in computer science or related field, MBA in information systems cyber threats

Job Description: Security architects plan and construct safe networks for businesses and organizations. These systems may include traditional local area and wide area networks, along with modern technologies like cloud computing. Their work also includes researching emerging networking technologies and presenting their findings to stakeholders to suggest upgrades and improvements.

These professionals use network penetration tests, or ethical hacks, to perform intrusions in good faith to test the effectiveness of safeguards in place. Security architects, like other cybersecurity workers, also assess cyberattacks and breaches to study damages and plan for data recovery efforts.

While security architects do not need certification, they can pursue credentials like systems security certified practitioner, certified cloud security professional and CISSP to demonstrate their knowledge of and commitment to the field.

Average Annual Salary: Around $97,000

Required Education: Bachelors degree in cybersecurity or related field and experience

Job Description: Security engineers craft and oversee networks for organizations to protect sensitive information and data. They may perform vulnerability tests to find areas for improvement and implement network upgrades to protect against breaches.

These engineers set organizational best practices, training coworkers on security measures and ensuring timely updates for network-connected devices. They also investigate cyberattacks to identify the intruder and avoid future breaches. After an intrusion, a security engineer may collect information on the attack and implement efforts to mitigate data loss and future attacks.

Like other professionals in information security and cybersecurity, security engineers can boost their earning potential and competitiveness in the job market by earning certifications. Typical credentials include CISA, CEH and CISSP.

A bachelors degree in cybersecurity typically takes four years to complete, though some schools offer accelerated pathways with shorter degree timelines. Most employers require candidates to have bachelors degrees, making this a common starting place for aspiring cybersecurity professionals.

Typical coursework for a bachelors degree in cybersecurity covers computer forensics, information technology and security ethics, network security design and computer science. Some programs tailor concentrations to career aspirations, allowing enrollees to focus on aspects of the field such as business, management and digital forensics.

Cybersecurity professionals and individuals looking to increase their knowledge of the field can pursue masters degrees, which generally take two years to earn. These programs allow learners to focus on specific elements of cybersecurity, like cybercrime or management, while developing their leadership skills to pursue more advanced roles.

Courses for cybersecurity masters programs build on bachelors curricula through classes in information security strategy and policy, cryptography and cloud architecture security. Many masters degrees in cybersecurity offer management-focused courses as well.

Masters-level cybersecurity programs often feature thesis or capstone requirements in their final year. Enrollees can demonstrate their skills through these courses by researching and exploring real-world issues in cybersecurity and providing relevant solutions. Capstone projects typically require a presentation at the end of the semester. A thesis includes an oral defense in front of faculty members.

Cybersecurity bootcamps offer shorter, more intensive timelines than traditional degrees. Bootcamp length can vary based on the provider and enrollment type. Part-time bootcamps may stretch on for 25 or more weeks, while full-time programs may only require 12 weeks.

Bootcamps allow enrollees to learn new skills or sharpen their existing abilities on an accelerated timeline. Employers seeking entry-level cybersecurity professionals may hire bootcamp graduates. Candidates with unrelated degrees can also complete bootcamps to demonstrate their skills and commitment to potential employers.

Cybersecurity bootcamps like those provided by Flatiron School, Coding Dojo and the University of Pennsylvania offer career-planning assistance for graduates. Some bootcamps also offer job guarantees or income-share agreements, which allow learners to hold off on making payments until they find relevant employment.

Cybersecurity professionals can earn industry certifications to illustrate their abilities and engagement with the field to hiring managers. The following list is not exhaustive, and cybersecurity professionals should research available credentials relating to their specific professions and aspirations.

CISSP: A CISSP certification, offered by (ISC), indicates that its holder can successfully plan, deliver and oversee effective cybersecurity programs. This credential typically suits experienced professionals rather than entry-level cybersecurity workers.

CISA: This credential indicates mastery of auditing and monitoring companies business and IT systems. Entry-level and mid-career professionals can earn this certification, delivered by ISACA, to improve their IT knowledge and increase their salaries. ISACA reports an average salary of $149,000 for individuals with CISA certification.

CISM: The certified information security manager credential demonstrates high-level knowledge relating to risk assessment, incident management and security governance. Professionals looking to advance into management roles can pursue this certification, which requires continuing professional education credits to renew.

View original post here:

What Is Cybersecurity? Everything You Need To Know - Forbes

Singing, speech production, and the brain | Penn Today – Penn Today

In the Penn Phonetics Lab in early August, rising second-year Nicholas Eiffert places a metal contraption over the head of Maggie Compton, a high school friend of his who has agreed to participate in the study hes helping facilitate.

Weve affectionately named this the cage, he says as he checks the alignment of the ultrasound probe on Comptons chin. Thats your tongue, he says, pointing to a moving image on the facing computer screen. This all looks pretty good, confirms Audrey Keener, another Penn rising second-year working in the lab.

During the next 20 or so minutes, Compton reads then sings a series of words, each one recorded by the computer. The ultrasound captures images of her tongue placement in the mouth, and an electroglottograph (EGG) strapped around her neck measures vocal fold vibrations.

The experiment is part of work led by Penn linguist Jianjing Kuang aimed at understanding how people create vowel sounds when they sing. This summer, through thePenn Undergraduate Research Mentoring(PURM) program offered by theCenter for Undergraduate Research and Fellowships, Keener and Eiffert recruited participants for the study, ran sessions, and compiled recordings of famous singers to analyze the same auditory components they were measuring in person.

Music has a privilege in auditory processing, and singing is a special case of speech production and perception, Kuang says. Speaking uses minimal effort, in terms of articulation and processing. But people have to train to be good singers. In this project, we want to push the limit, to look at what happens when human beings maximize their effort and try to achieve the best acoustic effects.

This summers project expands on a small sample of local singers that third-year linguistics doctoral student May Chan had previously recruited to study vowel articulation in singing.

She and Kuang are still working through that analysis, but they did notice some patterns early on. For sopranos its obvious. When they sing very high notes, the only vowel they can produce is aaaaahhh, Kuang explains. For the lower vocal range, there has to be greater modification. Because vowels vary in what the mouth does to produce them, singers of different vocal ranges must employ different strategies to sing them.

Getting a clearer picture of such tactics would require analyzing the interaction between tongue placement and pitch in more people. Inspired by the enthusiasm of students in a class she taught this past spring called The Phonetics of Singing, Kuang decided to broaden the study and offer two PURM internship spots this summer.

For Keener and Eiffert, the opportunity sat at the intersection of their interests. Keener, a computer science major from Bethel, Connecticut, plays piano and flute; Eiffert, a double major in math and computer science from Bordentown, New Jersey, used to play saxophone and took music theory classes in high school.

Kuang invited the two Penn undergrads to join her lab, then divided the project into two major components, one focused on lab work, another on compiling a corpus of famous singers. The students began their 10-week internship on June 7.

With oversight from Kuang and Chan, Keener and Eiffert spent much of their time running the experiments, which took place in a soundproof room on the third floor of a Walnut Street building. The pandemic had left the equipment mostly dormant for several years, so getting it up and running again required some trial and error.

Setting up the lab to run articulatory experiments felt like a big task, Chan says. Yet the trio was up for the challenge, taking turns as faux participants and testing the equipment with run-throughs of songs and sounds, like Twinkle, Twinkle Little Star and aaahhhh or helllllooooo.

With the set-up squared, they began bringing in participantsminimal singing skills necessarywho would get connected to the computer via a headset that held an ultrasound probe snugly under the chin. A Velcro strap held an EGG loosely around the neck.

Music has a privilege in auditory processing, and singing is a special case of speech production and perception.Penn linguist Jianjing Kuang

Each person would start by speaking a set of words, then move into singing scales, not the do-re-mi kind, but word sets Chan had developed. Starting at the bottom of their vocal range, participants would go through one seriesbot, boot, bat, beat, bet, bought, for examplemove up a note, then repeat until they could go no higher. They completed the exercise five times, with different word sets each time. We took turns having somebody outfit the participant and run recordings, while the other person was at the piano playing the pitches, Keener says.

Eiffert also led a secondary aspect of the work, compiling classical recordings the team could use to study the same vowel articulation in singing. Ive been going through this huge database to find songs that are vocal-only or vocal and piano or guitar, he says. Those can be used to see how vowels change as someones voice pitch changes.

This summer, the Penn Phonetics Lab team ran the in-person experiment with 17 people. To date, the corpus Eiffert is building has some 500 recordings from around 25 singers.

The point of all this research is to get at what happens when someone makes vowel sounds, which are the most discernible part of speech, according to Kuang. When we speak, we have consonants and vowels, she says. Consonants are mostly just noise. The most mechanical or vocalic part of speech is the vowel. We focus on vowels to get a rich acoustic analysis.

Chan sees implications for both linguistics and music research. On the linguistic end, work on singing helps us understand the full potential of the human voice and its relationship with linguistic structure, she says. On the music side, experimental techniques for studying singing will allow for a more systematic way of describing musical genres and techniques across cultures, capturing the unique ways our vocal tracts are used.

Beyond that, more insight into this type of speech production could reveal information about how the human brain functions. Its connected to the theoretical understanding of how the human vocal tract works, Kuang says. The brain and auditory system work together to perceive sound. Better understanding this will allow us to potentially help people with hearing loss, too.

Though the research continues, Keener and Eiffert have now finished their summer work in the lab. It remains to be seen whether theyll rejoin the lab this fallKuang has extended an invitationbut they both express gratitude for the experience. It was great going through the process of figuring out a project, getting it to work smoothly, Eiffert says.

That ease is on display back in the lab in early August. Eiffert reassures Compton, his friend and that days participant, that many people need multiple tries for the scales. He checks that shes comfortable. Keener looks on from the piano, offering input and gently pinging each key. At sessions end, theyve generated more data to add to the larger set, moving one step closer to unlocking the connection between singing, speech production, and the brain.

May Pik Yu Chan is a third-year doctoral student in the Linguistics Departmentin the School of Arts & Sciences.

Nicholas Eiffert is a rising second-year from Bordentown, New Jersey, double majoring in math and computer science in the School of Arts & Sciences.

Audrey Keener is a rising second-year from Bethel, Connecticut, majoring in computer science in the School of Engineering and Applied Science.

Jianjing Kuang is an associate professor in theLinguistics Departmentin the School of Arts & Sciences. She co-directs thePenn Phonetics Laboratory, and is faculty of MindCORE and the Center for East Asian Studies.

See original here:

Singing, speech production, and the brain | Penn Today - Penn Today

Science Cafs Return In Person This Fall | Clarkson University – Clarkson University News

After two years of virtual events, Clarkson University Science Cafes will return in person this fall on Tuesday, September 20 in Canton, and Wednesday, September 21 in Potsdam with Dinosaurs, Asteroids and Climate Change.

The dinosaur-killing asteroid hit the surface of the Earth about 66 million years ago and resulted in a cascade of natural disasters, including widespread wildfires, tsunami, an impact winter and a hypothesized period of sustained global warming. Using stable isotopic signatures preserved in microscopic fish fossils, we were able to test the global warming hypothesis and provide the first empirical evidence of warming following the asteroid impact. Join Associate Professor Page Quinton (Earth and Environmental Sciences, SUNY Potsdam) to learn about how geologists study past climates and how this information can be used to understand the causes and consequences of modern climate change.

Next up, is The Green Rush: The Business of Cannabis in Canton on Tuesday, October 4, and Wednesday, October 5 in Potsdam.

One would think that there would be nothing left to discuss regarding a plant first cultivated 12,000 years ago in Central Asia. Despite being consumed in practically every culture, cannabis has a long and harrowed history with health-related issues, abuse and racial injustice, and now it offers us a new business model ... CannaBusiness. Navigating the laws (federal and state), sociopolitical conversations and twists and turns of moving from the black to the grey market, the cannabis industry is predicted to generate $1.25 billion in tax revenues over the next six years in the state of New York alone. Join Associate Professor Christa Haifley (Business Administration, SUNY Potsdam) for an engaging evening of discussion on this budding new industry.

On Tuesday, October 18 and Wednesday, October 19, is Protecting Drones From Themselves and Others.

Autonomous drones and rovers perform critical tasks for government agencies and emergency services that range from fighting forest fires to exploring distant planets. Computer hacks and software bugs can disrupt vehicle operation by causing crashes or hindering successful completion of missions (e.g., a sample is not collected or a camera is misaligned). How can an autonomous vehicle fend for itself when such malfunctions occur? Join Assistant Professor Kevin Angstadt (Computer Science, St. Lawrence) as he discusses drone technology and explores automatic techniques to help them recover from hacks and malfunctions.

Sustainability and Policy: An Economists Perspective is the topic on Tuesday, Nov. 1 and Wednesday, Nov. 2.

Led by the urge for private economic gains (the invisible hand), human activities have been a central cause of local and global environmental changes. Environmental policies are the visible hand that directs human activities in a way that minimizes social economic losses while promoting the equitable distribution of these losses. Join Assistant Professor Qingran Li (Economics and Financial Studies, Clarkson) as she talks about an economists perspective of sustainability and how economic research can inform the design of environmental policy.

The final Science Cafe of the season, Cutting-Edge Investigations, will be held on Tuesday, Nov. 15 and Wednesday, Nov. 16.

In 1930, a legal precedent was set for the use of toolmarks in U.S. courts, declaring that the edge on one blade differs as greatly from the edge of another as the lines on one human hand differ from the lines on another (Washington, 1930). But how unique are these features when interpreted from toolmark evidence in bone? Saws are one of the most common tools encountered in forensic anthropological investigations, particularly in cases involving dismemberment. Investigators must understand how saws create marks, determine what these marks relay about a blades characteristics and then assess how accurate these features are in identifying a saw or group of saws.

Join Assistant Professor Alicia Grosso (Physical Therapy, Clarkson) as she reviews how microscopic saw mark analysis helps forensic anthropologists identify potential saw blades in forensic investigations.

Traditionally, Science Cafs have brought together local university and college professors and townspeople in relaxed, informal settings, such as coffeehouses and pubs. The speaker will make a presentation about a topic in their field and, as always, there will be plenty of time for questions and discussion.

The Canton events will be held Tuesdays at 7:15 p.m. in The Rushton Conference Room in the Best Western University Inn at 90 E. Main Street, Canton. The Potsdam events are held on Wednesdays at 7:15 p.m. in the Potsdam Civic Center Community Room at 2 Park St.

Would you like to be added to our email list and receive regular information and reminders? Just email sciencecafe@clarkson.edu and ask us to add you to the list.

The Science Caf is sponsored by Clarkson University School of Arts & Sciences, Potsdam NY.

Read the original here:

Science Cafs Return In Person This Fall | Clarkson University - Clarkson University News

Postdoctoral Research Fellow (A / B), School of Computer Science job with UNIVERSITY OF ADELAIDE | 304560 – Times Higher Education

(Level A/B) $72,829 to $102,952 per annum plus an employer contribution of up to 17% superannuation will apply.

Post-Doctoral Fellow in Multi-Object Tracking and Robotics.

Fixed term position for 1.5 years (possibility of extension to 3 years).

Build your research career within the School of Computer Science and contribute to an innovative project in Multi-Object Tracking and Robotics. Be part of a research team investigating new multi-drone multi-objective trajectory planning for multiple target tracking with drones.

This is an opportunity for a high-achieving postdoctoral researcher to join a world-leading research group in Computer Security and Machine Learning as well as Computer Science department ranked 48th in the world and The University of Adelaide ranked in the top 1% of Universities worldwide. Notably, Adelaide is ranked the third most liveable city in the world and the most liveable city in Australia in 2021.

The University of Adelaide is a member of Australias prestigious Group of Eight research-intensive universities and ranks inside the worlds top 100. In the Australian Governments 2018 Excellence in Research for Australia (ERA) assessment, 100% of University of Adelaide research was rated world-class or above, with work in 41 distinct fields achieving the highest possible rating of well above world-standard. This included Artificial Intelligence and Image Processing, and Electrical and Electronic Engineering.

The project will involve new inter-disciplinary collaborations with researchers from sciences and national collaborations with institutions involved in multi-target tracking as well as the Defence Science and Technology Group (DSTG). This should provide significant benefits, such as new theoretical frameworks with provable performance guarantees for muti-drone tasking involving tracking multiple targets and exploring new application areas to benefit wildlife conservation and society in general.

The discoveries to be made in the project will significantly increase our understanding of planning under uncertainty for multi-target tracking. This project represents a unique opportunity to produce future expertise for the Australian workforce, not only in university research, but in industry.

The successful applicant will develop innovative multi-drone planning for tracking algorithms that can use be used in real-world applications under uncertain, dynamic and noisy measurement environments.

To be successful you will need:

Level A

Level B

Enjoy an outstanding career environment

The University of Adelaide is a uniquely rewarding workplace. The size, breadth and quality of our education and research programsincluding significant industry, government and community collaborationsoffers you vast scope and opportunity for a long and fulfilling career.

It also enables us to attract high-calibre people in all facets of our operations, ensuring you will be surrounded by talented colleagues, many world-leading. And our work's cutting-edge naturenot just in your own area, but across virtually the full spectrum of human endeavourprovides a constant source of inspiration.

Our core values are honesty, respect, fairness, discovery and excellence. And our culture is one that welcomes all and embraces diversity. We are firm believers that our people are our most valuable asset, so we work to grow and diversify the skills of our staff.

In addition, we offer a wide range of attractive staff benefits. These include: salary packaging; flexible work arrangements; high-quality professional development programs and activities; and an on-campus health clinic, gym and other fitness facilities.

Learn more at: adelaide.edu.au/jobs

Your faculty's broader role

The Faculty of Sciences, Engineering and Technology is a multidisciplinary hub of cutting-edge teaching and research. Many of its academic staff are world leaders in their fields and graduates are highly regarded by employers. TheFacultyactively partners with innovative industries to solve problems of global significance.

Learn more at:set.adelaide.edu.au

If you have the talent, we'll give you the opportunity. Together, let's make history.

Click on the link below to view the selection criteria and to apply for the opportunity.

https://careers.adelaide.edu.au/cw/en/job/510395/postdoctoral-research-fellow-ab-school-of-computer-science

Please ensure you submit a cover letter, resume, and upload a document that includes your responses to all of the selection criteria for the position as contained in the position description or selection criteria document.

Applications close 11:55 pm, 11 September 2022.

For further information

For a confidential discussion regarding this position, contact:

Damith RanasingheAssociate Professor, School of Computer ScienceP: +61 (8) 8313 0066E: damith.ranasinghe@adelaide.edu.au

The University of Adelaide is an Equal Employment Opportunity employer. Women and Aboriginal and Torres Strait Islander people who meet the requirements of this position are strongly encouraged to apply.

See the original post here:

Postdoctoral Research Fellow (A / B), School of Computer Science job with UNIVERSITY OF ADELAIDE | 304560 - Times Higher Education

A New Partnership between Bowdoin College and the Roux Institute – Bowdoin College

Additional collaboration between Bowdoins Career Exploration and Development (CXD) and Roux will include opportunities for Bowdoin students to participate in Rouxs Startup Showcases and Start Summits.

Start Summits are fun, fast-paced weekend events that give undergrads an opportunity to experience building a startup team and racing to develop a business, all with the support of experts and colleagues.

Two Bowdoin students, Roxana Valdez '24 and Ramiro Storni '23, have spent the summer engaging in innovative research projects with the aim of increasing the number of Bowdoin students doing summer research at Roux and the number of students employed as interns at one of Rouxs twenty-six corporate partners.

Designed as an engine of innovation, talent building, and economic growth for Portland, Maine, and northern New England, the Roux Institute has been leading companies and nonprofit organizations at the table from day one, creating programs that are preparing the workforce to stay agile and thrive in a competitive landscape powered by artificial intelligence.

The Roux Institute also helps entrepreneurs launch businesses focused on and powered by technology and with its partners is creating an innovation corridor that will stretch from Boston to Portland and beyond.More about the Roux Institute.

Roux and Bowdoin

Bowdoin shares a long history with David Roux, a former trustee of the College, and his wife, Barbara Roux. The couples generous gift initiated the Roux Center for the Environment, which was completed in fall 2018. The Roux Center brings together faculty from across academic disciplines to encourage collaboration and creativity in the teaching and scholarship of the environment and further strengthens Bowdoins position as a leader in this field of study.

David and Barbara Roux also have extensive family ties to the College. David Rouxs father, Donald Roux, is a member of the Class of 1955; his brother, James Roux, was a member of the Class of 1981; his sister, Mary Roux Train, a member of the Class of 1991; and the couples daughter, Margot Roux, graduated in 2014. David Rouxs mother, Constance Connie Rouxthe sister of Maines former governor James B. Longley, a member of the Class of 1948also took classes at the College.

Original post:

A New Partnership between Bowdoin College and the Roux Institute - Bowdoin College

Required computer science Blog The Buckeye Institute – Buckeye Institute

This letter to the editor was published in The Columbus Dispatch.

A recent Dispatch opinion piece (Ohio cannot be Silicon Heartland if students are left behind) is correct a talented workforce is necessary to realize Ohios ambitious goal of becoming the Silicon Heartland.

The first step is to equip Ohio high school students with the computer science skills they need to succeed in an increasingly digitalized world.

Unfortunately, computer science is a skill where Ohio lags its peers in nearly every relevant metric. That is why it is so encouraging to see Gov. Mike DeWine join Americas 49 other governors in signing the Compact To Expand K-12 Computer Science Education.

That is a good start, but Ohio lawmakers should go further and require all Ohio public school districts to offer at least one foundational computer science class. Those new classes will require more teachers, and lawmakers must also revisit and update restrictive qualification requirements that limit the number of skilled computer science teachers.

Ohio needs more workers with computer science skills to become the Silicon Heartland and compete economically. Creating that workforce starts in Ohios schools.

Logan Kolas,Economic Policy AnalystThe Buckeye InstituteColumbus

Visit link:

Required computer science Blog The Buckeye Institute - Buckeye Institute

Meet Professor of Learning Design and Technology Florence Martin: ‘I Hope to Provide Students with the Knowledge and Skills They Need for Their…

Florence Martin will join NCStates College of Education in the 2022-23 academic year as a professor of learning, design and technology in the Department of Teacher Education and Learning Sciences.

Martin previously directed and taught in graduate programs at the University of North Carolina at Charlottes Cato College of Education and at University of North Carolina at Wilmingtons Watson College of Education. She earned her doctorate and masters degrees in educational technology from Arizona State University,

In the following Q&A, she discusses why she chose a career in education, how she chose her research focus and what academic work she is most proud of in her career.

This Q&A has been edited for clarity.

Why did you choose a career in education?

After completing my undergraduate degree in engineering, my passion for teaching and technology led me to the field of education, specifically educational technology. I chose a career in educational technology as I believed that, through it, I will be able to support the systematic design of instruction and effective integration of technology for teaching in various settings.

What inspired you to pursue a doctoral degree?

Towards the completion of my masters degree, I realized that to teach and research at the university level, I needed a doctoral degree. This led me to pursue a doctoral degree in educational technology. Through my research and teaching, I am now able to impact several more classrooms and courses.

What are your research interests?

I engage in research to create transformative learning experiences through effective design and integration of digital teaching and learning innovations. In recent years, I have researched the design of online learning environments, cybersecurity and computer science education, and competencies for learning and development professionals to provide equitable learning opportunities

What sparked your interest in those topics?

As an instructor teaching online, I was looking for ways to be effective in my online courses. This led me to research on online teaching and learning topics. The need to keep our students safe in this digital world led me to research on cybersecurity education. Also, the importance of computing in everyday life led me to research on computer science education.

What is one moment or project in your academic career that you are particularly proud of?

I am proud of my work on digital safety. Through this National Science Foundation-funded project, we were able to offer summer camps on digital safety to about 200 elementary school students. With children being exposed to technology at a very young age, I am glad we can educate them through these camps on how to be safe in this digital world.

What is your teaching philosophy?

My teaching philosophy is that well-designed instruction can enhance the learning process and stimulate learners to engage in original thought. Also, teaching technology is a profession that requires a commitment towards knowledge acquisition and an opportunity for a lifelong learning experience.

What do you hope your students learn from you?

I hope to provide students with the knowledge and skills they need for their careers either as instructional designers, learning technologists, technology facilitators, e-learning specialists, distance learning coordinators, researchers, professors etc.

What makes someone an extraordinary educator?

Some of the aspects I believe are essential for someone to be an extraordinary educator include, being a student-centered instructor, addressing the needs of diverse students, being a life-long learner, keeping up with the changing trends of the field, using student and peer evaluations to improve instruction and using data for decision-making. Also, in this digital age, it is important for instructors to be able to teach using the various modalities effectively; face to face, hybrid, synchronous, asynchronous and bichronous online courses.

Visit link:

Meet Professor of Learning Design and Technology Florence Martin: 'I Hope to Provide Students with the Knowledge and Skills They Need for Their...

The dedicated women behind the worlds first general-purpose computer – Yahoo News

The classified ad ran in Philadelphia-area newspapers in the early days of World War II: Looking for Women Math Majors. With men enlisting to fight, the U.S. Armys Ballistic Research Laboratory was hiring women to work at the University of Pennsylvanias Moore School of Electrical Engineering, to do what had been considered mens work. They would calculate, by hand, the ballistics trajectories of the artillery being used in battle.

Kathy Kleimans Proving Ground: The Untold Story of the Six Women Who Programmed the Worlds First Modern Computer is a lively group biography of the women who performed those calculations. From there, they were hired to work on ENIAC, the first general-purpose electronic computer, which was developed to speed up the ballistics calculations.

Kleiman has been interested in the group she calls the ENIAC 6 for decades. As an undergraduate studying computer science, she came across an old photograph of ENIAC (short for electronic numerical integrator and computer), the hulking machine in the Moore schools basement. Two women appeared in the photograph along with four men, but when the author tried to find out who they were, one expert in computer history dismissively told her that they must be models.

Kleiman eventually tracked down and completed oral histories with four of the six women. (The ENIAC 6 are Kay McNulty, Frances Bilas, Betty Snyder, Marlyn Wescoff, Ruth Lichterman, and Jean Jennings.) She founded the ENIAC Programmers Project, which produced a 2014 documentary about them.

ENIAC was created by physicist John Mauchly and electrical engineer J. Presper Eckert. While a missile could reach its target in less than a minute, calculating a missile trajectory by hand took on average 30 hours. Mauchly had long had a vision of an electronic programmable computer, and, with funding from the Army, the war created the opportunity for him to build it, with Eckerts help. Once programmed, ENIAC could calculate a trajectory in 30 seconds.

Story continues

Modern programmers use tools such as programming languages, operating systems, and compilers, Kleiman writes. The women had none of those tools at their disposal and werent even allowed to see the machine itself until late in the process, as they hadnt received security clearance. They set about doing the work by closely studying the engineers blueprints and diagrams.

Kleiman describes their technical accomplishments in clear language easy for the computer layperson to follow. While their programming solutions were innovative and painstaking, the group appeared largely unfazed by the challenge. During wartime, as McNulty later recalled, lots of people were doing out of the ordinary things.

The women had fond memories of this period of their lives, but they described being hazed by some of their male colleagues, targeted with practical jokes and pranks. While completing a training program at the Maryland Army facility Aberdeen Proving Ground, where they were far outnumbered by male soldiers, they were stared at and catcalled. Jennings recalled feeling like a piece of meat surrounded by vultures.

They experienced additional indignities: They were initially given a job rating of subprofessional, not based on the work they were doing but because the Army didnt allow women, regardless of their positions, to be rated professional. And when ENIAC was finally unveiled to journalists and scientists in early 1946, the women were invited to the demonstration not as collaborators, but as hostesses, tasked with greeting the male guests and pouring coffee.

The final indignity lies in the fact that the women were all but forgotten. In 1995, when the author realized that the 50th anniversary of ENIAC was approaching, she called the Moore school to find out if the occasion would be commemorated. She learned that an event was being planned, but when she asked the organizer if the women were being invited, he responded, Who are you talking about?

Kleiman tracked down the surviving programmers and helped get them to the event.

This engaging book is the culmination of her efforts to raise their profile.

Related stories

Read this story at csmonitor.com

Become a part of the Monitor community

Follow this link:

The dedicated women behind the worlds first general-purpose computer - Yahoo News

Lecturer, School of Computer Science job with UNIVERSITY OF AUCKLAND | 304344 – Times Higher Education

Lecturer x3

Te Whiwhinga mahi | The opportunity

The School of Computer Science at the University of Auckland is currently looking for early career academics to join our diverse and internationally renowned School at Lecturer level. If you are passionate about teaching and research, want to build lasting collaborations, and value diversity, we encourage you to apply.

We are seeking dynamic candidates with expertise in Machine Learning, Computer Vision, Artificial Intelligence, or any closely related fields. Industrial experience and/or experience of collaborative research with industrial partners would be a significant advantage.

The School recognises these areas as a priority, and we expect the successful candidates to contribute to the continuously growing success of our programs in Data Science and related fields. Such contributions include world-class research, publishing in world-class journals and conferences, securing research grant funding, high-calibre teaching as well as supervision of capstone projects and dissertations at the Master and PhD level.

The salary range for this role is $86,979 - $103,904 per annum depending on qualifications and experience. This is a full-time permanent role, 40 hours per week.

Qualifications

He krero mu | About you

Our Ideal candidate will have:

Additional Information

Ng huatanga kei a mtou | What we offer

The University of Auckland is New Zealands leading university and maintains significant computational, laboratory and analytic facilities. Auckland itself is frequently rated as one of the worlds most liveable cities.

The University is committed to providing an excellent working environment through:

In addition, we also offer career development programmes, discounted car parking, a generous parental leave allowance, childcare and a number of other discounts on internal and external services.

The University is committed to meeting its obligations under the Treaty of Waitangi and achieving equity outcomes for staff and students in a safe, inclusive and equitable environment. For further information on services for Mori, Pacific, women, LGBTQITakatpui+, people with disabilities, parenting support, flexible work and other equity issues go to http://www.equity.auckland.ac.nz.

For more information please visitStaff Benefits.

Me phea te tuku tono | How to apply

Applications must be submitted online, by the closing date of 6/09/2022 to be considered. Please include your cover letter and your CV highlighting how you can meet the skills and experiences detailed above.

Please reach out to Carmen Carmona Aragon Via carmen.carmona.aragon@auckland.ac.nz for more information. Please note, we are happy to answer your questions but we do not accept applications by email.

Equity

The University is committed to meeting its obligations under the Treaty of Waitangi and achieving equity outcomes for staff and students in a safe, inclusive and equitable environment. For further information on services for Mori, Pacific, women, LGBTQITakatpui+, people with disabilities, parenting support, flexible work and other equity issues go to http://www.equity.auckland.ac.nz

The rest is here:

Lecturer, School of Computer Science job with UNIVERSITY OF AUCKLAND | 304344 - Times Higher Education