Category Archives: Computer Science

NSA Claims It Cant Watch an Important Tape It Recorded in the 1980s – Gizmodo

There are two reels of old tape buried in the National Security Agencys archives that contain a landmark piece of computer science history. Theres a problem though, the NSA doesnt have a device that can play back the tapes.

The tapes are a recording of a lecture from computer science legend Admiral Grace Hopper. Hopper was a U.S. Navy officer and computer pioneer who helped develop FLOW-MATIC, the first programming language that used English keywords instead of numbers. She later helped develop COBOL, a business-oriented computer language that still undergirds many computer systems.

In 1982, she gave a lecture at the NSA headquarters at Fort Meade. The NSA recorded the lecture and stored it away. The insights contained within her 1982 lecture, split into two partsTVC 930A and TVC 930B, with durations of 48 minutes and 15 seconds, and 40 minutes and 39 seconds, respectivelyare not just historical footnotes but are likely to offer valuable perspectives on the evolution of technology and its societal impact, researcher Michael Ravintzky said in an article about Hoppers lecture on MuckRock, a nonprofit that helps people file Freedom of Information Act Requests (FOIAs).

Ravnitzky filed a FOIA for the tapes on October 12, 2021. Three years later the NSA said there were no responsive documents. Ravitzky told the NSA he knew the agency had the files. The NSAs own Television Center Catalog, a document turned loose by a FOIA in 2009, listed the tapes among the contents. He pressed them for an explanation.

The NSAs excuse? It didnt have anything to play the tapes back, couldnt listen to them, and therefore couldnt clear them for release. When the search was conducted, our office reached out to the organization that would have the tape you requested if it still exists. We were informed that although there are some older video tapes that are potentially responsive, they are on a format that NSA no longer has the ability to view or digitize, the NSA FOIA office said in a follow-up. Without being able to view the tapes, NSA has no way to verify their responsiveness. NSA is not required to find or obtain new technology (outdated or current) in order to process a request.

Ravnitzky asked the NSA for pictures of the tapes and they complied. The pictures revealed the tapes were recorded on an AMPEX 1-inch Video Tape Recorder. There were three different standardized types of AMPEX machines, but it wouldnt be impossible to find a device that could play back the tapes. A cursory search on eBay revealed dozens of machines that might fit the bill.

It might not come to that. After MuckRock published an article people stepped forward and offered to help. Michael Morisy, the founder and CEO of MuckRock, told Gizmodo that several groups had reached out with various hardware setups they thought could do the trick.

Been trying to connect folks, he said. But not sure if anything concrete has or will come of it yet.

The NSA is holding on to an important piece of computer history, something historians and the public will be interested to hear. Tape, like everything else, degrades over time. If we want to preserve this lecture and hear the wisdom of Admiral Hopper, now is the time to act.

This challenge transcends the confines of NSAs operational scope, Ravitzky said on MuckRock. It is our shared obligation to safeguard such pivotal elements of our nations history, ensuring they remain within reach of future generations. While the stewardship of these recordings may extend beyond the NSAs typical purview, they are undeniably a part of Americas national heritage.

See the article here:

NSA Claims It Cant Watch an Important Tape It Recorded in the 1980s - Gizmodo

Why diverse voices are key to building equitable AI – Think with Google

Taking CTRL of the problem

I started thinking about ways to address the challenge of creating a more inclusive STEM space over a decade ago. At that time, the challenge was that many people already at the table in a STEM company, wanted us to prove that this was a problem and that these were fields that young women were invested in. They wanted to know that solving this problem was worth the effort.

There was a lot of research and discourse about the lack of women across technical fields. Many of these were talking about formative experiences and I took the opportunity to reflect on my own journey. I recognised the fact that having positive early experiences had led me to where I was.

The good news is the industry has moved beyond denial, but there's still work to do.

Thats why I wanted to create those same experiences for other young people. So, in 2013, I started a non-profit called Stemettes.

Our goal was to empower young women and non-binary folk between the ages of five and 25 to have more equitable access to and make informed decisions about their relationships with STEM and STEAM subjects. By doing this, we hoped to engage the next generation of tech innovators.

To do that, we created spaces that enable connection with role models and peers as well as upskilling. That way our Stemettes can keep pace with the latest technologies whilst building a sense of belonging in technical spaces, which will carry them into whatever their future careers are.

It's not about forcing everyone into STEM careers. Its about ensuring everyone has basic tech literacy, to make informed decisions and participate in these 21st century conversations.

We cant really talk about STEM without covering the impact artificial intelligence will, and has had, on life as we know it. The rise of AI is often presented as a threat to human jobs, including in these fields. Fearful headlines about automation can discourage people from pursuing particular STEM careers thinking that these will be short-lived as AI will take over.

This narrative overlooks the true potential of AI. It is not a replacement for human ingenuity. Instead, it's a powerful tool that can and should augment human capabilities and accelerate scientific progress.

At Stemettes, our approach highlights the importance of early exposure to AI fundamentals. Integrating age-appropriate AI education at all ages can spark curiosity and dispel misconceptions. Inclusive programmes can showcase how AI is already being used to address global challenges, from medicine to legal, climate change to accessibility.

Highlighting the achievements of prominent women in tech fields, including AI research and development, provides relatable role models to inspire young women to follow suit and others to recognise success in all its forms.

And, of course, inclusive hands-on learning experiences are crucial for fostering engagement with AI and STEM. Interactive workshops and programmes that allow students to experiment with AI tools, like building robots or programming applications with AI, can make these topics come alive and showcase its creative potential.

The underrepresentation of women and non-binary folk in STEM is a complex challenge, but not insurmountable. By promoting early exposure to the right concepts and role models and fostering a culture of collaboration, we can rewrite the narrative.

We can all be more involved. Support organisations, like Stemettes, looking for role models, donations, and amplification. Its also important to be a lifelong learner. Challenge echo chambers in your workplace and at home by talking to new people about their lived experiences. And read widely. One great resource is The Institute for the Future of Work. It has a lot of tools to think about how to deploy new technologies, including AI, at work in a way that promotes good work and well-being for staff.

And, to the young women and non-binary folk considering STEM careers, I say this: there is an opportunity to be a pioneer who makes a difference, with all the unanswered questions and new innovations to explore. It's a chance to shape the future and make a lasting impact on the world. Let's embrace the potential of this new technology together and unlock a new, better era of scientific discovery.

Read more from the original source:

Why diverse voices are key to building equitable AI - Think with Google

Argonne develops new kind of AI model for weather prediction – Argonne National Laboratory

This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution. There are several actions that could trigger this block including submitting a certain word or phrase, a SQL command or malformed data.

Excerpt from:

Argonne develops new kind of AI model for weather prediction - Argonne National Laboratory

UMD Researchers Develop New and Improved Camera Inspired by the Human Eye | College of Computer … – College of Computer, Mathematical, and Natural…

A diagram depicting the novel camera system (AMI-EV). Image courtesy of the UMIACS Computer Vision Laboratory.

A team led by University of Maryland computer scientists invented a camera mechanism that improves how robots see and react to the world around them. Inspired by how the human eye works, their innovative camera system mimics the tiny involuntary movements used by the eye to maintain clear and stable vision over time. The teams prototyping and testing of the cameracalled the Artificial Microsaccade-Enhanced Event Camera (AMI-EV)was detailed in a paper published in the journal Science Robotics in May 2024.

Event cameras are a relatively new technology better at tracking moving objects than traditional cameras, but todays event cameras struggle to capture sharp, blur-free images when theres a lot of motion involved, said the papers lead author Botao He, a computer science Ph.D. student at UMD. Its a big problem because robots and many other technologiessuch as self-driving carsrely on accurate and timely images to react correctly to a changing environment. So, we asked ourselves: How do humans and animals make sure their vision stays focused on a moving object?

For Hes team, the answer was microsaccades, small and quick eye movements that involuntarily occur when a person tries to focus their view. Through these minute yet continuous movements, the human eye can keep focus on an object and its visual texturessuch as color, depth and shadowingaccurately over time.

We figured that just like how our eyes need those tiny movements to stay focused, a camera could use a similar principle to capture clear and accurate images without motion-caused blurring, He said.

The team successfully replicated microsaccades by inserting a rotating prism inside the AMI-EV to redirect light beams captured by the lens. The continuous rotational movement of the prism simulated the movements naturally occurring within a human eye, allowing the camera to stabilize the textures of a recorded object just as a human would. The team then developed software to compensate for the prisms movement within the AMI-EV to consolidate stable images from the shifting lights.

Study co-author Yiannis Aloimonos, a professor of computer science at UMD, views the teams invention as a big step forward in the realm of robotic vision.

Our eyes take pictures of the world around us and those pictures are sent to our brain, where the images are analyzed. Perception happens through that process and thats how we understand the world, explained Aloimonos, who is also director of the Computer Vision Laboratory at the University of Maryland Institute for Advanced Computer Studies (UMIACS). When youre working with robots, replace the eyes with a camera and the brain with a computer. Better cameras mean better perception and reactions for robots.

The researchers also believe that their innovation could have significant implications beyond robotics and national defense. Scientists working in industries that rely on accurate image capture and shape detection are constantly looking for ways to improve their camerasand AMI-EV could be the key solution to many of the problems they face.

With their unique features, event sensors and AMI-EV are poised to take center stage in the realm of smart wearables, said research scientist Cornelia Fermller, senior author of the paper. They have distinct advantages over classical camerassuch as superior performance in extreme lighting conditions, low latency and low power consumption. These features are ideal for virtual reality applications, for example, where a seamless experience and the rapid computations of head and body movements are necessary.

In early testing, AMI-EV was able to capture and display movement accurately in a variety of contexts, including human pulse detection and rapidly moving shape identification. The researchers also found that AMI-EV could capture motion in tens of thousands of frames per second, outperforming most typically available commercial cameras, which capture 30 to 1000 frames per second on average. This smoother and more realistic depiction of motion could prove to be pivotal in anything from creating more immersive augmented reality experiences and better security monitoring to improving how astronomers capture images in space.

Our novel camera system can solve many specific problems, like helping a self-driving car figure out what on the road is a human and what isnt, Aloimonos said. As a result, it has many applications that much of the general public already interacts with, like autonomous driving systems or even smartphone cameras. We believe that our novel camera system is paving the way for more advanced and capable systems to come.

###

In addition to He, Aloimonos and Fermller, other UMD co-authors include Jingxi Chen (B.S. 20, computer science; M.S. 22, computer science) and Chahat Deep Singh (M.E. 18, robotics; Ph.D. 23, computer science).

This research is supported by the U.S. National Science Foundation (Award No. 2020624) and National Natural Science Foundation of China (Grant Nos. 62322314 and 62088101). This article does not necessarily reflect the views of these organizations.

The paper, Microsaccade-inspired event camera for robotics, was published in Science Robotics on May 29, 2024.

Read this article:

UMD Researchers Develop New and Improved Camera Inspired by the Human Eye | College of Computer ... - College of Computer, Mathematical, and Natural...

Top 10 Cybersecurity Jobs in 2024: Career and Salary Information – Simplilearn

In today's digital world, cybersecurity has become an essential part of every company's strategy for sustainability, security, and growth. As businesses grow, the demand for cybersecurity talent will only continue to grow in 2023 and beyond.

Cyber security is a growing industry that is still in need of skilled professionals. The global cyber security market is expected to grow from $170 billion in 2017 to $202 billion in 2023.

The demand for cyber security jobs has risen significantly over the past few years. More than 1 million cyber security jobs will be available by 2023, but less than 400,000 cybersecurity professionals will be trained by then. Cyber security is an ever-growing industry. It is projected to grow by 11% in 2023 and by 20% in 2025. This is a fast-paced career with a median salary of $81,000. To meet this growing demand and advance your career in cyber security, consider earning a cyber security certification. This credential can significantly enhance your qualifications and open doors to lucrative opportunities in the field.

In this article, we will be discussing the top cybersecurity jobs of 2023. We will also discuss the career and salary prospects for each of these positions, as well as what education requirements are needed to become qualified in these fields.

Before we dive deep into the various cybersecurity jobs, lets have a glimpse of why the number of cybersecurity jobs is increasing every single day. Did you know that, according to the University of Maryland, hackers attack every 39 seconds, on an average of 2,244 times a day?

When you give this a thought, you will realize how prone any digital network is, to unauthorized access from a third party. This is termed as a cyberattack. When an organization witnesses a cyberattack, they lose data, money, and trust of their customers. To prevent these dangerous cyberattacks, cybersecurity is implemented. Cybersecurity is the practice of protecting networks and computer systems from unauthorized digital access.

With the increase in the generation of digital data, it is anticipated that cyberattacks will quadruple shortly. This proves that growth in the number of cyber security jobs will only increase as organizations will need professionals who can ensure data security. Research shows that there is a limited workforce for cyber security jobs, and the job opportunities are limitless. If you aspire to land a cyber security job, then this article will brief you on the top job roles in this field and how you can go about achieving your dream job.

Cybersecurity stands as a compelling and promising career path in the contemporary digital landscape. With the escalating frequency and sophistication of cyber threats, the demand for skilled professionals in this field is at an all-time high. A career in cybersecurity offers a dynamic and ever-evolving environment, requiring continuous learning and adaptation to stay ahead of malicious actors. As businesses and individuals increasingly rely on digital platforms, the need for experts who can safeguard sensitive information and networks has become paramount. Moreover, the field provides a diverse range of roles, from ethical hacking and penetration testing to risk analysis and security architecture, allowing professionals to specialize based on their interests. With a global shortage of cybersecurity professionals, the career offers competitive salaries and job security. As technology continues to advance, making the digital realm even more interconnected, the relevance and demand for cybersecurity experts are expected to persist, making it a highly favorable and rewarding career choice.

Cybersecurity is a growing industry with a lot of opportunities for growth and development. It is an industry that has the potential to be lucrative, but it also comes with a lot of responsibility.

Cybersecurity professionals are responsible for protecting their company's information and data from attacks by hackers, viruses, or other cyber threats. These professionals typically work in teams with other IT specialists, such as software developers or programmers.

Here are some of the many benefits of this career path:

After completing the Cyber security bootcamp or Post Graduate Program in Cyber Security, 61 year old Philip Jenkins was able to clear the CISSP and CCSP exams in the first attempt itself. Read about his inspiring journey in our Simplilearn Cyber Security Course Review here.

In India, the field of cybersecurity is witnessing unprecedented growth, fueled by the digital transformation of businesses and an escalating wave of cyber threats. The salary dynamics in this field are multifaceted, influenced by factors such as skill sets, industry verticals, geographical locations, demand-supply dynamics, and a commitment to continuous learning.

Cybersecurity salaries in India are heavily influenced by an individual's skill set and expertise. Professionals equipped with in-demand skills such as ethical hacking, penetration testing, and threat analysis often command higher compensation. Advanced certifications like Certified Information Systems Security Professional (CISSP) or Certified Ethical Hacker (CEH) can significantly boost earning potential, reflecting the specialized knowledge and expertise in the rapidly evolving field.

The sector in which a cybersecurity professional operates plays a pivotal role in determining salary levels. Industries dealing with sensitive information, such as finance, healthcare, and government, tend to offer higher salaries to attract top-tier talent. The increased importance of safeguarding critical data in these sectors amplifies the demand for skilled cybersecurity experts, impacting compensation packages.

The geographical location of employment is a key factor influencing cybersecurity salaries. Metropolitan areas with a higher cost of living generally offer more competitive compensation to offset the expenses associated with residing in these locations. As cybersecurity talent clusters in urban hubs, professionals in cities like Bengaluru, Mumbai, and Delhi often enjoy higher earning potential compared to their counterparts in smaller towns.

The demand for cybersecurity professionals in India outpaces the available talent pool, leading to a competitive job market. This supply-demand imbalance puts upward pressure on salaries as organizations vie for qualified individuals. As cybersecurity threats continue to evolve, the need for skilled professionals is expected to grow, further contributing to competitive compensation packages.

The dynamic nature of cybersecurity necessitates continuous learning and skill development. Professionals who actively engage in upgrading their skills through ongoing training programs, workshops, and relevant certifications enhance their market value. Employers recognize the importance of staying current in this rapidly changing field and often reward individuals who invest in their professional development with higher salaries.

Now that you have learned about the growth in the number of cyber security jobs and the opportunities the field of cyber security holds, lets take a look at the different job roles available in this field.

There are several cyber security jobs available; the nature of these jobs varies mostly. These jobs can be categorized based on the following parameters:

By analyzing the above parameters, you can choose the correct cyber security job that suits your area of expertise.

Lets now take a close look at the typical cyber security career path and average cybersecurity salary of a few of the top-paying job roles from the long list of cyber security jobs.

While the demand for cybersecurity professionals in India continues to surge, it's essential to explore how salaries vary across different cities, reflecting the diverse economic landscapes and technological ecosystems. According to recent Payscale data, the compensation for cybersecurity experts is notably influenced by geographical locations, making it crucial for professionals to consider regional disparities when evaluating job opportunities.

Unsurprisingly, Bengaluru, known as the Silicon Valley of India, stands out as a hub for cybersecurity talent. The city's thriving tech industry, coupled with a robust startup culture, contributes to higher demand for cybersecurity expertise. As a result, cybersecurity professionals in Bengaluru often enjoy competitive salaries, reflecting the city's status as a technology and innovation epicenter. On average, a cybersecurity expert earns 3.0 Lakhs to 11.5 Lakhs per annum in Bengaluru.

As the financial capital of India, Mumbai plays a critical role in the country's economic landscape. The finance and banking sectors, which are highly reliant on robust cybersecurity measures, drive the demand for skilled professionals. Cybersecurity experts in Mumbai benefit from the city's economic significance, with salaries reflecting the critical role they play in securing financial infrastructure. On average, a cybersecurity expert earns 2.6 Lakhs to 15.0 Lakhs per annum in Mumbai.

The National Capital Region, encompassing Delhi and its surrounding areas, is another hotspot for cybersecurity professionals. The concentration of government institutions, multinational corporations, and a rapidly growing IT sector contributes to a steady demand for cybersecurity expertise. Professionals in Delhi-NCR often command competitive salaries, given the diverse range of industries and organizations operating in the region. On average, cybersecurity experts in Delhi-NCR earn around 2.5 Lakhs to 10.0 Lakhs annually.

Pune, an emerging IT and manufacturing hub, has witnessed a significant rise in demand for cybersecurity professionals. The city's growing tech landscape, combined with a burgeoning startup ecosystem, contributes to the need for robust cybersecurity measures. As a result, cybersecurity salaries in Pune have seen a notable uptick, reflecting the city's increasing importance in the tech domain. Averagely, a cybersecurity expert in Pune earns 3.0 Lakhs to 13.4 annually.

Hyderabad, with its expanding IT and business process outsourcing (BPO) sectors, is increasingly becoming a notable player in the cybersecurity domain. The city's proactive efforts in fostering a cybersecurity ecosystem contribute to rising demand for skilled professionals. As a result, cybersecurity experts in Hyderabad are witnessing competitive salary packages, reflecting the city's growing significance in the IT and cybersecurity landscape. Averagely, a cybersecurity expert in Hyderabad earns 3.1 Lakhs to 10.0 Lakhs on an yearly basis.

In today's digital age, the demand for skilled cybersecurity professionals has skyrocketed, making it a lucrative and dynamic field for career growth. As cyber threats continue to evolve, so do the opportunities for professionals in the cybersecurity domain. This article explores the avenues for career progression in the ever-expanding realm of cybersecurity.

To embark on a successful cybersecurity career, one must establish a strong foundation of skills. This includes a deep understanding of networking, programming languages, and operating systems. Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) can provide the necessary credentials to kickstart a cybersecurity journey.

Cybersecurity is a diverse field with various specializations, including penetration testing, incident response, and threat intelligence. Identifying and specializing in a particular area enhances expertise and opens doors to advanced career opportunities. Continuous learning and staying updated on the latest threats and technologies are crucial for success in any specialization.

Building a robust professional network is essential for career growth in cybersecurity. Engaging with industry professionals, participating in conferences, and joining online communities can provide valuable insights, mentorship, and potential job opportunities. Networking not only expands one's knowledge base but also fosters relationships that can be instrumental in career advancement.

The cybersecurity landscape is constantly evolving, with new threats emerging regularly. Professionals must commit to continuous learning to stay ahead of cyber adversaries. Pursuing advanced certifications, attending workshops, and engaging in hands-on training are essential for keeping skills sharp and relevant.

As professionals gain experience, they may aspire to move into leadership or management roles. Effective communication, strategic thinking, and a holistic understanding of cybersecurity challenges are crucial for success in these positions. Pursuing advanced degrees or certifications in cybersecurity management can further enhance the skills needed to excel in leadership roles.

A Chief Information Security Officer (CISO) is a senior-level officer who ensures the complete safety of information in an organization. CISOs are responsible for developing and maintaining information security and risk management programs, and they are also required to interact with stakeholders and they brief them about the information security concerns. Usually, one becomes a CISO after having good experience in a few other cybersecurity job roles.

To become a CISO, it is preferred that you hold a computer science degree and an MBA, owing to the seniority of this job role. To reach the position of a CISO, the potential candidate must have a robust skillset. Given below are a few of the most important ones:

Most of the cybersecurity jobs require you to hold the relevant cybersecurity certifications. Your cybersecurity career grows with the number of certifications you have. To become a CISO, the preferred certifications are - Certified Information Security Manager (CISM) and Certified Information Systems Security Professional (CISSP).

According to PayScale, the average annual cybersecurity salary of a CISO in the United States is $166,329, and in India, it is 2,300,785.

Moving on, we will explore the next key position in the world of cybersecurity.

A Security Architect is responsible for designing robust security structures that are used to prevent malware attacks. They perform vulnerability tests and also provide technical assistance to the other security team members.

To become a security architect, it is preferred that you hold a degree in computer science or information technology. A couple of essential skills are:

To become a security architect, the certifications which will benefit your career are CompTIA Security+ and CISSP (Certified Information Systems Security Professional).

According to PayScale, the average annual cybersecurity salary in this job role in the United States is $125,630, and in India, it is 2,151,258.

That was all about the security architect position, lets now take a look at the next job role in our list.

Cybersecurity Engineers work on planning security measures to prevent the organization from a cyberattack. They are responsible for protecting the organizations networks and data. They design cybersecurity platforms and also collaborate with the other teams to maintain overall security.

To become a cybersecurity engineer, the first step is to have a degree in information technology or computer science. Before starting on the role of a cybersecurity engineer, you should have at least two years of work experience in the relevant field. In addition to these, lets look at the other skills a cybersecurity engineer must have:

A cybersecurity engineer can hold either a Certified Ethical Hacker certification or a CompTIA Security+ certification. Depending on the experience level, one can take up advanced certifications as well.

According to PayScale, the average annual cybersecurity salary of a cybersecurity engineer in the United States is $97,607 and is 683,339 in India.

Now, lets move to the next role in the list of cybersecurity jobs.

A malware analyst identifies and examines cyber threats such as viruses, worms, bots, and trojans to understand their nature. They develop malware protection tools, and finally, they document the methods to avoid malware threats.

To become a malware analyst, just like the other cybersecurity jobs, the first step is to have a degree in information technology or computer science. Its good to have at least two years of work experience in the relevant field before becoming a malware analyst. Few other skills a malware analyst should possess are:

Holding a GIAC Reverse Engineering Malware (GREM) certification is a plus for point for this position.

According to PayScale, the average annual cybersecurity salary of malware analysts in the United States is $92,880. According to Glassdoor, it is 5L in India.

Fig: Malware Analyst average annual salary in the US

That was all about the malware analyst role, moving on to our next designation.

A penetration tester, also commonly known as an ethical hacker, is a network security consultant who exploits a systems vulnerabilities just like a hacker would. They design new penetration tools, and they also document the test results.

To become a penetration tester, you need to have 1- 4 years of experience in information security. Given below are some other essential skills:

To bag this role, certifications like Certified Ethical Hacker (CEH), Certified Expert Penetration Tester (CEPT), and Offensive Security Certified Professional (OSCP) will be required.

According to PayScale, the average annual cybersecurity salary of a penetration tester in the United States is $125,630, and in India, it is 2,151,258.

Now that you have understood what a penetration tester does, lets take a look at the next job role in our list of cybersecurity jobs.

Computer Forensics Analysts work on cyberattack cases to gather digital evidence and to retrieve data. They work on recovering deleted, manipulated, or stolen data.

A computer forensics analyst must hold a bachelors degree and some work experience in the related field. In addition to that, they must have the following skills:

Computer forensics analysts can hold certifications like Certified Forensic Computer Examiner (CFCE) and Certified Computer Examiner (CCE)

According to PayScale, the average annual cybersecurity salary of a computer forensics analyst in the United States is $75,120 and is 700,000 in India.

Now that we had a look at the different cybersecurity jobs lets understand how Simplilearn can help you bag one of these top jobs.

The application security engineer is the one who creates, implements, and maintains the security of a company's applications. They are responsible for designing and implementing policies that will protect against both internal and external threats.

A typical day for an application security engineer starts with reviewing the previous days findings and fixing any bugs or vulnerabilities found. After this, they will collaborate with other engineers to plan the next days work.

The salary for an application security engineer can vary depending on what company they work for and how much experience they have. The average salary ranges from $78,000 to $116,000, but it can go up to $150,000 if you are a senior-level engineer or have more than ten years of experience.

Because of the increased reliance on the cloud, cloud security specialists are in high demand and will remain so in the future. The role of a cloud security specialist is to protect data, systems, and networks from cyber-attacks. They do this by analyzing threats and vulnerabilities, implementing safeguards, monitoring networks for intrusions, and overseeing compliance with regulations.

Cloud security specialists are responsible for ensuring the safety of data stored on a cloud server. They design and implement policies and procedures that protect data from unauthorized access, alteration, or disclosure. The salary for a cloud security specialist varies depending on their experience level. An entry-level salary ranges from $50K-$60K annually, while an experienced worker can expect to make $90K-$110K annually.

A database administrator is a person who manages and monitors the database. They are responsible for designing, creating, and maintaining the database. Database administrators also need to ensure data protection and security of the data in the database. Database Administrators are vital for the smooth functioning of any organization. They are responsible for making sure that the databases are running efficiently and securely. Database administrators need to have a good understanding of databases, IT infrastructure, and programming languages. This role is in high demand and has a high salary.

The average salary of a database administrator ranges from $50,000 to $200,000 depending on their expertise level.

An incident manager is a person who is responsible for managing and resolving incidents. They are called in when an incident arises, and they are the ones who will fix it. The most important aspect of this job is that they need to be able to handle all kinds of situations, which means they need to be able to think on their feet. The salary of an incident manager depends on the company they work for, location and experience. However, an average incident manager salary is around $65,000 per year.

We explored the prominence of various job roles in the field of cyber security in todays times. Now, lets understand how one can land one of these jobs. It is important to remember that cyber security certifications are of paramount importance if you want to become a cyber security professional. If you hold a good cyber security certification, then your opportunities and your visibility increase dramatically. Consider enrolling in a cybersecurity bootcamp online to gain practical skills and hands-on experience that will further enhance your credentials and readiness for the industry.

Employers look for candidates who possess cybersecurity certifications. Depending on your experience and expertise, you can pick up the right certification for yourself. Simplilearn offers a list of cybersecurity certifications like CEH (v10), CISSP, CISA, and CISM, to name a few.

Simplilearn also offers a Post Graduate Program in Cyber Security, which will equip you with the skills you need to become an expert in the cybersecurity domain. This course provides foundational, intermediate, and advanced security skills through industry-leading certification courses, including CompTIA Security+, CEH, CISM, CISSP, and CCSP.

There are no prerequisites to take up this program; however, knowledge of any programming language is a big plus.

Security Solutions Architect. Annual salary range: $156,500-$194,500.

Jobs for computer network architects, and computer systems administrators are in demand.

Singapore has the highest demand for cybersecurity jobs.

Yes, cybersecurity is considered a high-paying field in India. Salaries can vary based on experience, skills, and the specific role, but the demand for skilled cybersecurity professionals has led to competitive compensation packages.

The first step is to build a strong foundation of skills, including networking, programming, and knowledge of operating systems. Obtaining relevant certifications such as CompTIA Security+ or CEH can provide a solid entry point into the cybersecurity field.

Career progression in cybersecurity depends on factors like skills, experience, and continuous learning. With dedication, networking, and staying updated on industry trends, professionals can advance to more senior roles relatively quickly, often within a few years.

Yes, cybersecurity is a viable and rewarding option for freshers. Entry-level positions like security analysts or junior cybersecurity roles provide opportunities to gain hands-on experience and build a foundation for future career growth.

The biggest risks in cybersecurity include the constant evolution of cyber threats, the need for continuous learning to stay ahead, and the potential for high-stakes consequences if security measures fail. Cybersecurity professionals must also manage stress due to the critical nature of their responsibilities.

Cybersecurity salaries in India vary based on factors such as experience, location, and the specific role. Entry-level positions may start around INR 5-8 lakhs per annum, while experienced professionals or those in managerial roles can earn significantly higher, ranging from INR 10 lakhs to well above. Monthly salaries are derived from these annual figures.

See the original post:

Top 10 Cybersecurity Jobs in 2024: Career and Salary Information - Simplilearn

Enhancing human mobility research with open and standardized datasets – Nature.com

Human mobility datasets are produced from raw geolocation data through a series of pre-processing steps, the details of which are often not disclosed to those outside the research team that conducted the analysis, as shown in Fig. 1. Pre-processing steps are conducted (1) to de-noise the data and remove GPS drifts, (2) to correct for any potential biases in the mobility data, (3) to enrich the datas semantic information, and (4) to comply with privacy standards. Location data, often originally collected for marketing and business rather than research purposes, typically contain various biases. These include, but are not limited to, demographic biases (such as age, income and race), geographic biases (such as urban versus rural areas, developed versus developing countries), and behavioral biases, where observations may be more frequent during certain activities, such as checking into points of interest (POIs)11.

We argue for the need for fit-for-purpose and standardized human mobility benchmark datasets for reproducible, fair and inclusive human mobility research. CBG, census block group; POI, point of interest.

Moreover, to enrich the datas semantic information for further analyses, various pre-processing steps are applied to the dataset, including user cutoff and selection, stop detection, privacy enhancement, attribution of points of interest and other contexts, and transport mode estimation. Each of these steps requires the selection of multiple parameters by the data analyst. For example, to detect a stop within a mobility trajectory, data scientists need to define arbitrary hyperparameters such as the minimum number of minutes spent at the stop and the maximum movement distance allowed from the stop centroid. With several hyperparameters needed for each pre-processing step, a slight change in the selection of these parameters could result in a very different processed human mobility dataset.

The complexity of human mobility data processing makes it difficult for data users, including researchers and analysts, to keep track of all of the decisions that were made during the pre-processing steps. Moreover, thanks to the proprietary nature of raw and processed human mobility datasets, disclosing the details of the pre-processing methods may not be sufficient to grasp the full characteristics of the human mobility data with which the downstream tasks were conducted. This lack of transparency about the quality of processed human mobility datasets raises critical issues in human mobility research, including the lack of replicability, generalizability, and comparability of method performance. Researchers may claim state-of-the-art prediction results on specific datasets, potentially leading to overfitting and loss of generalizability. To address the lack of transparency on the validity of mobility data, several data companies (such as Unacast, Safegraph, and Cuebiq), as well as scientific papers12 have evaluated and reported the accuracy of human mobility datasets through comparisons with available external data, such as the American Community Survey and visitation patterns to stadiums and factory facilities.

See original here:

Enhancing human mobility research with open and standardized datasets - Nature.com

You can help fix gender inequality in STEM and help your own kids in the process – Kidsburgh

When Pittsburgh students think about their future careers, every one of us will likely need some computer science experience. Computer science isnt just for people working in tech. Jobs in everything from medicine to marketing require computer knowledge, and AI platforms like Chat-GPT are likely to become central to peoples lives.

Pittsburgh high schools are ready for this. Many schools offer computer classes, including the College Boards Advanced Placement (AP) computer science courses.

But theres one big problem: Women and girls are being left behind. Despite an uptick in college computer science courses, only 20% of computer science majors in universities are women.

WHAT LOCAL GIRLS ARE EXPERIENCING

I took AP Computer Science (CS, for short) at my school this past year. Its a college-level class and I loved it. But out of 16 students, Im one of only three girls who sit among 13 boys. Ive never felt discouraged or unsupported by my teacher or the boys in my class. But its intimidating unlike in my other STEM classes, like biology and calculus, where theres an equal split between the genders.

Throughout computer science in schools and the working world, theres a serious lack of female representation. This makes me feel like I shouldnt be interested in CS if other girls arent enrolling in this class, why should I sign up? No one discusses this faulty reasoning and negative self-talk in class, but its a powerful thing.

Consider: When my class learned a bit about the history of computer science, we learned that Charles Babbage, or the Father of Computer Science, was the genius and technological pioneer behind the Analytical Machine. It wasnt until I did my own research that I discovered that the machine was the brainchild of Ada Lovelace, the woman who is widely regarded as the worlds first computer programmer.

Im not alone. Chloe Deng, a junior at Carnegie Mellon University is the Vice President of CMUs Girls Who Code chapter, and is completing a major in information systems and two minors in software engineering and creative writing.

When she took AP Computer Science in her junior year of high school, she says, she was one of two girls in the class.

She remembers how the boys in her class would band together and help each other with homeworks, leaving her and the other girl out of the loop: It doesnt feel great when you stick out and you notice it All those pressures combined, it does get to you.

Deng faced bias even before her junior year. She joined her high schools robotics team just a few years earlier and always felt that she was given the administrative tasks, like grant writing or social media managing, while her male counterparts were given more technical responsibilities, even if they were often younger and less qualified. Deng left the club a year after she joined.

WHAT CAN WE DO?

Despite feeling overlooked in high school, Deng is now at the forefront of CMUs efforts to bridge the gender gap in the CS field. With Girls Who Code, Deng designed an eight- week after school STEM- focused course for middle-school-aged girls. It has three goals: to make learning CS fun, to provide a supportive environment for young girls to explore CS projects, and to show them successful women who have been in their position and who have made amazing contributions to the CS field. Girls leave GWC equipped with the skills to enter higher level CS classes and with confidence that they can take into the classroom.

When girls speak up, and then worry that at school they are too loud, blunt, or aggressive, Deng tells them, No, youre standing up for yourself, youre just advocating for yourself.

Even with the help of organizations like Girls Who Code, gender discrimination still exists within the countrys top universities. CMUs School of Computer Science, which prides itself on its 50-50 gender split, is ranked number one in the nation, outpacing schools like MIT and Stanford. But many universities dont have that gender balance.

Deng acknowledged her schools efforts to make women feel seen and supported, but she still feels the effects of bias. When she works on group projects, she says, all the hidden work - like the planning, reminding people to get stuff done, all the behind the scenes work, conveniently falls on women.

What can Pittsburgh parents do to help?

Along with teaching girls and young women to advocate for themselves, I think its important to teach men to be better allies, Deng says. By talking with boys and men about this, we can help them see how they might be discouraging women and show them how to support women and how to encourage them.

Parents can also empower their daughters to pursue CS in two ways: First, by connecting them with CS clubs, courses, and educational resources like Girls Who Code, and second, by offering words of affirmation.

Your words can really make a difference. When my parents say, Tell me about the matrix project you are working on? or You are trying your best, just keep going, I feel grateful that there are people in my corner, cheering me on.

With the unwavering support of mentors both in and out of the classroom, we can close the gender gap in CS. Women already are pioneers in CS. Now its up to all of us, regardless of gender or experience with CS, to bring more young women to the forefront of change in the field.

See the original post:

You can help fix gender inequality in STEM and help your own kids in the process - Kidsburgh

University of South Dakota Launches Master’s Degree in Artificial Intelligence – mykxlg.com

{KXLG Vermillion, SD} The University of South Dakota (USD) has announced the launch of a new Master of Science in Artificial Intelligence (M.S. in AI) program aimed at preparing students to be leaders in the rapidly evolving field of AI. Approved by the South Dakota Board of Regents during their June meeting, this cutting-edge program will equip graduates with advanced knowledge and practical skills in artificial intelligence, machine learning, and related disciplines.

The M.S. in AI program at USD is designed to blend theoretical foundations with hands-on experience. Students will explore machine learning, computer vision, intelligent systems, robotics, and agent-based systems. Additionally, they will explore knowledge discovery, data mining, and the ethical use of AI. By combining rigorous coursework with practical applications, graduates will be well-prepared for leadership roles in AI research, development, and implementation across diverse industries.

Dr. KC Santosh, Department of Computer Science Chair, emphasized the program's commitment to cutting-edge knowledge. "Our curriculum provides students with the latest advancements in AI," said Dr. Santosh. "But it's not just about technology. We also focus on critical thinking, reasoning, and ethical considerations. As the only public liberal arts institution in the state, we're dedicated to ensuring that AI technology is developed and deployed ethically and responsibly."

The rise of AI-centered technology has led to a surge in job opportunities. Companies and startups worldwide are investing significantly in AI research and development. According to a recent Bloomberg Intelligence report, the AI market is projected to grow from $40 billion in 2022 to a staggering $1.3 trillion within the next decade. The World Economic Forum's Future of Jobs 2023 report predicts a 39% growth rate for AI and machine learning specialists over the next five years.

USD's M.S. in AI program aims to meet this demand and cultivate leaders in the field. Graduates will be equipped to drive innovation and economic growth in South Dakota and beyond. They will be crucial in integrating AI systems across various sectors, including healthcare, finance, agriculture, and manufacturing. President Sheila K. Gestring highlighted the program's impact: "This legacy of preparing leaders who use their liberal arts education to make a difference extends to our AI graduates. They will shape the future of AI, ensuring its responsible and impactful application."

For more information about USD's M.S. in AI program, visit USD's official website.

Read more:

University of South Dakota Launches Master's Degree in Artificial Intelligence - mykxlg.com

The University of AI | College of Natural Sciences – College of Natural Sciences

Today on the show we have Art MarkmanVice Provost for Academic Affairs and a professor of psychology and marketing at the University of Texas at Austin. Hes also co-host of the public radio program and podcast Two Guys on Your Head. And we also have K.P. Prockoan associate professor of instruction in biochemistry who uses AI in the classroom and who also manages a grant program in UT Austins College of Natural Sciences to help faculty integrate AI tools into the classroom.

Dig Deeper

A Technologist Spent Years Building an AI Chatbot Tutor. He Decided It Cant Be Done. Ed Surge (One researcher gave up on expert AI tutors for students, saying the tech is still decades away, and instead is focusing on AI tools to help human teachers do a better job)

Opinion: An education legend has created an AI that will change your mind about AI, Washington Post (AI columnist Josh Tyrangiel says a popular AI-based math tutor is the best model we have for how to develop and implement AI for the public good. Its also the first AI software Im excited for my kids to use.)

Will Chatbots Teach Your Children?, New York Times (An overview of the potential benefits and risks of AI-based tutors, as well telling hype from reality)

Will Artificial Intelligence Help Teachersor Replace Them?, Ed Week (features UT Austins Peter Stone, who argues the calculator didnt replace math teachers, it just required them to change the way they teach; the same will be true with AI tools.)

Opinion: College students are dropping out in droves. Two sisters could fix that., Washington Post (One company is using AI to help universities regularly check in with and support students to boost retention.)

Episode Credits

Our co-hosts are Marc Airhart, science writer and podcaster in the College of Natural Sciences and Casey Boyle, associate professor of rhetoric and director of UTsDigital Writing & Research Lab.

Executive producers are Christine Sinatra and Dan Oppenheimer.

Sound design and audio editing by Robert Scaramuccia. Theme music is by Aiolos Rue. Interviews are recorded at the Liberal Arts ITS recording studio.

Cover image for this episode generated with Midjourney, a generative AI tool.

About AI for the Rest of Us

AI for the Rest of Usis a joint production of The University of Texas at Austins College of Natural Sciences and College of Liberal Arts.This podcast is part of the UniversitysYear of AI initiative. The opinions expressed in this podcast represent the views of the hosts and guests, and not of The University of Texas at Austin.Listen via Apple Podcasts, Spotify, Amazon Podcasts, RSS, or anywhere you get your podcasts. You can also listen on the web at aifortherest.net.Have questions or comments? Contact: mairhart[AT]austin.utexas.edu

View post:

The University of AI | College of Natural Sciences - College of Natural Sciences

ACM Workshop on Research Opportunities in Computer Science 2024 – Amrita Vishwa Vidyapeetham

About

The goal of the ACM ROCS workshop is to raise awareness about the research opportunities available in the growing field of computer science broadly and also specifically in India. The one-day event will feature talks by leading experts across different themes in Computer Science.

Registration Deadline October 15, 2024

Date of WorkshopOctober 19, 2024

VenueAmrita Vishwa Vidyapeetham, Amritapuri Campus

Undergraduate students in their pre-final / final years and postgraduate students from computer science, mathematics and related programs can participate in the workshop.

Contact:srirams@am.amrita.edu

Excerpt from:

ACM Workshop on Research Opportunities in Computer Science 2024 - Amrita Vishwa Vidyapeetham