Page 2,623«..1020..2,6222,6232,6242,625..2,6302,640..»

Bottom Line: When will ransomware attacks hit the Upper Valley? They already have – Valley News

No longer is it just a matter of time until an Upper Valley institution, business or town gets hit with a ransomware attack. Its already happened. Cybersecurity experts say it will keep happening, and anyone who depends on a computer network to run their business, school or town in other words, everyone should be prepared.

Yes, theyve happened. Can I talk about them? No. But they happen, said Ray Coffin, founder of All-Access Infotech, a Fairlee information technology consultant who builds and manages IT systems for small and medium businesses in the Upper Valley. Its at the forefront of every conversation were having.

Unless youve been living off the grid (and some do in the Upper Valley) and are blissfully unaware, barely a day passes when a business if not an entire industry is held hostage by a ransomware attack. Its a thriving extortion racket: One study estimates that a total of $406 million in ransom money was paid out to perps in 2020, up 337% from 2019.

The M.O. is familiar: A shadowy group many are said to emanate from inside countries like Russia, Iran and North Korea who are hostile to the U.S. seizes control of a targets computer networks and demands money be paid before supplying the key that unlocks the seized network.

Prominent recent ransomware examples include the attack on the Colonial Pipeline, which carries gas to the East Coast and was shut down until the operator paid $4.4 million. Another attack on JBS, which processes 20% of the countrys meat supply, led to a payment of $11 million to bring its plants back online.

When I thought about which businesses in the Upper Valley might be smart about mitigating against the risk of a ransomware attack, Hypertherm was the first to come to mind.

The Hanover-based, employee-owned company is a world-class manufacturer of plasma and waterjet cutting technology.

Hypertherm sells a hefty percentage of its products in the international market and relies upon a global supply chain for materials, thereby raising its risk profile because bad actors could have numerous entry points into its networks.

And, I learned, Hypertherm was an early ransomware victim.

Back in 2010, we were hit three times in less than a year, and it took down production for a half a day, said Robert Kay, IT chief at Hypertherm. We did not pay any ransom and were able to use our backups to restore operations, but it became clear this was a problem we had to address.

The ransomware attack, Kay said, kicked off an action plan that reviewed everything from the companys IT infrastructure to employee interactions with company systems that elevate risk. Kay declined to name specific measures, but one of the actions it has taken is to bring on a security expert with advanced training who has been qualified to join in FBI briefings on cybersecurity threats.

The in-house cyber specialist is also a certified ethical hacker that allows them to be trained in the latest hacking techniques and skills in order to penetrate the companys computer operations to discover vulnerabilities and fix them.

We get attacked often, Kay said. But so far, thanks to the seriousness in which Hypertherm has responded to the threat, we havent been impacted.

The company also carries ransomware insurance, he said.

In a scenario perhaps most relevant for the Upper Valley, the computer system of Leonardtown, a small town in rural Maryland, was shut down after it was exposed to a ransomware attack through the vendor that operated the towns IT system, which in turn relied on software of a targeted company.

Although the town itself was not directly attacked, the incident destroyed the data files the town used to meet its payroll and send out quarterly utility bills to its 3,000 residents.

Lebanon City Manager Shaun Mulholland said that kind of situation is one of the reasons he prioritized switching IT firms and beefing up the citys internal IT department shortly after he took over in Lebanon in 2018.

After an assessment of the citys IT infrastructure found significant weaknesses, they had to totally revamp the whole system, said Mulholland, a former police chief in Allenstown, N.H.

The city spent $750,000 to upgrade IT security, including a new computer system that operates the citys water and sewer plants.

There were a lot of things people could hack into, he said.

And although Mulholland said Lebanon has not been the target of ransomware attack, the city is regularly inundated with so-called phishing attacks that attempt to trick city employees into revealing their passwords in order to hack into email and other accounts.

Now that Lebanons cybersecurity has been improved nobody is 100% secure, Mulholland acknowledged the next step will be to conduct tests with city employees by a cybersecurity firm that will check how on guard city workers are about protecting passwords and information that could result in a bad actor hacking into the citys computer networks, Mulholland said.

Mulholland explained the testing will be to ensure city employees are following protection protocols and to coach them if they make mistakes and not to discipline anyone over errors.

Nobodys going to get into trouble, he said.

Most small, mom-and-pop businesses do not have Lebanons budget to plug holes in their computer systems, but there are still things they can do to minimize the risk of a ransomware attack, according to IT consultant Coffin.

Make sure all your data is backed up on a cloud provider and cloud storage, Coffin said, explaining that if a business finds it is locked out of its data files it can easily pivot to the backup files and will not be compelled to pay the attacker for the key to get the data back. The only data the business would lose is the data since the last backup procedure.

Of course, a business has to pay a cloud storage provider like Amazon or Microsoft and, ranging in cost anywhere from less than a hundred dollars per month to $1,000 per month depending on the amount of the data to be stored, that can be a large expense for a small company, such as a farm stand or handcrafts maker with an online sales platform.

But skimping to pay for protection may only lead to bearing a steeper cost later.

It should be looked at like rent, one of those expenses in the budget line, Coffin said.

Contact John Lippman at jlippman@vnews.com.

See the original post here:
Bottom Line: When will ransomware attacks hit the Upper Valley? They already have - Valley News

Read More..

Healthy Komprise doubles revenues and partners AWS in health sector Blocks and Files – Blocks and Files

In corporate wellness news, Komprise has doubled its revenue in the first six months of 2021 and is partnering with AWS to sell cloud-tiering data services into the health sector.

The company sells data management lifecycle technology, which can identify ageing, less-accessed files and move them to lower-cost storage tiers, including Amazons S3 and S3 Glacier cloud vaults. Komprise has an Elastic Data Migration offering, which provides file data migrations to Amazons Elastic File System (EFS) and FSx for Windows File Server, also Azure Files. Users access files from their original locations, and can access their data in AWS, with the option to access it directly versus rehydrating files back to the primary storage.

Komprise says first half 2021 revenues rose 97 per cent year on year and it had 190 per cent new customer growth and 200 per cent average deal size growth. That is healthy.

CEO Kumar Goswami said in a statement: Customers are adopting Komprise because we not only find and move the right data to the cloud, but we tier data without users and applications noticing any change and without locking data in the cloud in a proprietary format.

The company announced it has been awarded a patent that extends the capabilities of its Transparent Move Technology (patented in 2019) to enable asynchronous restoration of files from delayed recall storage such as tape. This patent was a joint application with tape system and secondary storage vendorSpectra Logic.

We think a Komprise and SpectraLogic partnership marketing initiative might hit the streets later this year.

The health sector partnership with AWS builds upon a deal with pharmaceutical giant Pfizer. Komprise says it helped Pfizer stop 20 years of increasing storage costs and leverage its data tiered to AWS for research, without changing how users and applications access their files. A July 22 AWS webinar will discuss Pfizers use of Komprise and AWS cold storage technology.

Komprise was started up in 2014 and has taken in a relatively small $42 million in funding, with the last round taking place in 2019 and raising $24 million. This is small potatoes compared to data protection and management startups like Cohesity ($660M) and Rubrik ($552M+) but on a par with other file lifecycle management startups like StrongBox ($27M).

The three founders are Goswami, President and COO Krishna Subramanian, and CTO Michael Peercy. The threesome set up Kaviza to replace SAN storage in VDI and sold it to Citrix in 2011. Previously they founded Kovair, a software tools company which is alive and prospering.

Komprise has partnerships with HPE, Pure Storage, and works with AWS, Azure and NetApp Cloud Volumes. It clearly has tech that works with other suppliers kit.

We think Komprise could possibly IPO, but its more likely that it will be acquired for its file scanning, indexing, transparent move and analytics technology. It would be a good fit for for any larger IT supplier looking to move into hybrid cloud data management. Dell is aiming to move into the data management market. Just sayin.

See the article here:
Healthy Komprise doubles revenues and partners AWS in health sector Blocks and Files - Blocks and Files

Read More..

Shailesh Haribhakti discusses audit renaissance and the deployment of cyber and digital security measures – Free Press Journal

Boards across the world now recognise that nothing short of an audit renaissance will make them feel satisfied about their oversight on cybersecurity challenges. The feared trillion-dollar number has entered the fear factor gauge as infrastructure breakdowns, halting of operations, ransomware demands and egregious data leakages have grabbed headlines all over the world. Some of the most sensitive organisations in the world have fallen prey, despite massive investment in cybersecurity!

The basic three-part renaissance required can be summarised as follows:

1. Raise global awareness about the subject: Use examples, videos, drawdowns from repositories, sessions by experts and a cutting-edge self-study module available for widespread free usage.

2. Build a culture of safety: Nothing short of global cooperation will work. All incidents, patches, clever attempts to steal, closed down operating assets and restarting strategies must be uploaded to a global repository. Access to the repository must be authorised, universal and uninterrupted. Custodians for this repository should be Central banks of the largest 10 nations on earth, by rotation. All tools, protocols and frameworks that create safety must also be universally shared.

3. Build human and mechanical competence to detect early and counter threats: No lags in continuous monitoring and auditing should be tolerated by the system. Any post facto checks can only be useful as future learnings about attempted attacks. Any breach is too costly to afford and therefore must immediately be uploaded to the repository. As the repository is a true universal asset, it will acquire the status of being protected, curated and shared universally.

Only an establishment with infrastructure of this quality will support unstoppable enhancement in computer power, as quantum computing comes online. Storage and retrieval systems will also have to be constantly kept in a state of accelerated improvement. The battle between the forces of good and the evil will have to be transported to cyberspace. Knowledge and vigilance must trump greed and fear!

I invited three organisations whose boards I chair, to share their policies and practices. Am here, sharing these practices which have evolved over years of effort to serve as examples how all can learn and improve by sharing:

Lessons from Blue Star Limited

Cybersecurity risk management is a process of swift detection of emerging risks, assessing their potential impact, and determining how to respond in an agile manner if those risks materialise. A cybersecurity management strategy is kept refreshed at all times, as experience builds.

Effective cybersecurity risk management happens on a continuous basis, both at cultural and operational levels.

Blue Star has enhanced its cyber risk management framework through the following initiatives:

Establishing Culture

While developing a cybersecurity risk management programme, the first thing to initiate is embedding it in the companys culture. The average cost of a cyberattack is approximately $1 million, and 37 per cent of organisations attacked have had their reputation tarnished as a result of the attack. This is why a cybersecurity-focused culture must be established at all levels in the organisation, to prevent loss.

An important aspect is guarding against vulnerable human behaviour. This is done by adequate training and awareness to recognise phishing emails and other social engineering attacks.

Security Operations Centre (SOC)

Blue Star implemented Security Operations Centre services that house an information security team responsible for monitoring and analysing the security posture on an ongoing basis. The SOC team works closely with the organisation incident response team, to ensure that security issues are addressed quickly upon discovery.

Benefits of SOC to Blue Star:

1. Monitoring of security-related incidents round the clock and correlating them with global emerging threats.

2. Proactively hunting for targeted attacks, advance threats, and campaigns.

3. Developed the ability to ward off a ransomware attack

4. Reduction in the incident investigation and remediation time.

Vulnerability Assessment and Penetration Testing (VAPT)

Periodic comprehensive VAPT testing is a strictly disciplined activity. This includes Application Security review, Wi-Fi Penetration testing, Infrastructure Penetration Test, Endpoint Security Review and Secure Configuration Review for Servers & Networks.

Secured Websites

Deployed SSL certificates for web portals; security standard compliance extended to software partners.

Information Security Policy

A set of policies and procedures has been formulated to ensure users understand and comply with a set of guidelines on handling of information stored within Blue Stars network and systems.

Information Rights management tool

Data residing in unsecure locations is accessible to individuals who must not have access to it. This is a common use case within any organisation, where unintended user groups gain access to data. Such a situation may cause data leakage to parties which do not have the organisations best interests in mind.

Blue Star has deployed Seclore software, to protect sensitive information flow. This helps to protect sensitive data that is shared between internal users and user groups m. Pre-defined permission policies to documents stored in file repositories and file server folders are in place. When a document is added to the repository or the folder, permissions for print, copy, forward are attached to the document. Only certain groups of users are allowed access to sensitive documents.

Protection during Internet Access

Data on employees laptops are protected at all times. Even when employees are outside the Blue Star network i.e. when they are accessing the Internet over less secure and vulnerable public Wi-Fi connections or from home. An intelligent guard is installed carefully to protect against malicious websites, viruses, worms and Trojans. This is especially important when almost all of our organisation is working remotely.

Also, there might be incidents when some of us inadvertently access links that may be malicious. This is where the Zscaler Cloud Proxy tool kicks in to guard employees machines while accessing the Internet. The tool also offers a dashboard that provides important MIS on overall security and usage.

Backup and restoration

Blue Star has enhanced its data protection by introducing an enterprise class back-up and restoration tool to retrieve data during any cyber or other disruptions.

Insurance Policy

Cyber Insurance Policy has been obtained, to protect the company from loss incurred from corruption of its data from unauthorised software, computer code or third-party data, wrongful appropriation of network access code, disclosure of third-party data by the companys employees etc.

Cybersecurity insight from L&T Financial Holdings Ltd

The potential data loss from a hack per company could run into millions per year. One failure to defend against a hack can spell disaster. Most of the attempts get repulsed at the external firewall-level itself.

Key aspects of defence (It is more or less like Army defence of land):

1. Be aware of possible avenues of breach. Examples are third party APIs, vendor access to systems etc. These are more vulnerable.

2. Invest proactively to strengthen the posture of defense.

3. Create awareness among all employees on Cybersecuritys importance and reduce chances to accidentally or intentionally leak information outside. Access control and development codes are held in code repository instead of individual machines.

4. Have multi-layered architecture to ensure that the attacker, if successful, does not get deep within.

5. Everyone has a role to play in defence and it is not only the cybersecurity teams job. While that team leads the effort, others have to complement.

6. Regular sharing of practices among companies. This builds overall environment against attackers and they get less encouragement.

System malfunction is curtailed. Despite security checks which may increase the per transaction time taken are weeded out continuously as new techniques become available.

Access controls might deny usage option to genuine users sometimes. Potential mitigants that we apply are as under:

1. Sanity testing of production systems before making it live.

2. Performance testing post implementation of information security controls with simulated traffic in pre production environment.

A critical aspect is: How exactly does information security get staffed? For most of the evolved functions, a separate layer which conducts audit is deployed i.e. internal audit and statutory auditors. Information security must avoid inherent conflict of interest, as providing security and audit are separated.

Information security is a new function but slowly Internal audit function is being beefed up through reskilling Statutory auditors also have to pick up the slack as they get into ESG and technology driven continuous audits.

Insights from NSDL e-Governance Infrastructure Limited

There are six pillars around which IT security has been thought through. They are :

IT Infrastructure security

Application security

Endpoint security

Third-party risk assessment

Business resilience and

Security governance.

1. IT Infrastructure security - covers aspects like server patching, network security, firewalls, access etc. for both cloud and on-premises infrastructure. This is a monthly activity to update all patches and secure all bases.

2. Application security - covers all APIs, mobile applications and all existing workflow applications. All changes have to be first cleared through information security and the testing of production environment is also done.

3. Endpoint security - since we are BYOD company, basically this operates under zero-trust policy. Tools are deployed to ensure the checkpoint between device and our network layer. Also, monitoring of end device is in place.

4. Third-party risk - we have a large ecosystem of third parties comprising of fintechs, bureaus, call centres, vendors and other technology partners. We try to have controls over them through either direct control using audits, or we give them pointers for self-certification. Self-certification is used in case of large companies only.

5. Business resilience - basically, around ensuring applicability of DR or ensuring that applications are in high-availability mode to ensure business continuity in case something goes wrong.

6. Security governance - last but not the least, regular review on our status. Monthly security posture review by CDO and CRO. In addition, this also gets reviewed at Board committees of RMC and IT strategy.

Some of the important cyber and digital security measures deployed are:

1) Global Standards and frameworks that are most widely and successfully used. A yearly update is mandatory.

2) Multilevel, defenceindepth security architecture deployment. Data traffic is subjected to at least 4-5 levels of scrutiny / checks (using different methods) before it reaches the main system.

3) Daily automated scanning of application systems and infrastructure is done to early detect any new known vulnerabilities. Findings are reviewed / verified and an action plan defined to fix these vulnerabilities. Counter-measures such as Web Application System (Machine learning based) are deployed for preventing the exploitation of vulnerabilities that need time to fix (due to upgradation of version or application dependency).

4) Security posture (attack surface assessment) and benchmarking against the peers in the industry is carried out using automated platform-based services. A real-time dashboard helps regular monitoring and planning of action to maintain / enhance the posture.

5) Zero trust approach Role-based access is followed. Internal users also dont get to access the system directly. Firewall rules determine who will be allowed access. Privileged users dont have access to credentials. Intermediate system logs using securely stored credentials and each action is logged/ anonymised.

6) Industry standard key strengths and algorithms are adopted. This applies to all three phases, data in motion, data at rest and data in use.

7) Unstructured data is monitored based on the policy defined by the respective data owners. Data leak prevention systems block the data, disallowing its transfer through any channel (removable storage, web based storage, print or email).

8) Emails contain critical information, as these are the most preferred channels of communication. Therefore, email on mobile is provided only through separate secured container within users' mobile devices. This provides features such as disallowing copying data attachments outside the container, taking screenshots etc. If email is forwarded, DLP rules would apply.

9) Data traffic of all the above technologies / devices is monitored 24 X 7 with help of state-of-the-art tools and fine-tuned processes and skilled resources. Correlating events, detecting anomalies and triggering a ticket to resolver group is an automated process.

10) Well-thought-out cybersecurity / information security policy and process are deployed to ensure uniformity of action to meet the organisation security objectives. Continuous review and finetuning is undertaken to ensure robustness. Review is done up to the board level for critical cybersecurity policy.

11) Continuous security awareness training is provided to all the employees of all levels. Awareness sessions are conducted for top management and board members.

12) All these controls are audited on continuous bases by internal auditors / independent experts as well as the certification auditors and reported to the audit committee of the board.

Cybersecurity is receiving adequate attention at the highest levels and awareness is getting widespread. The battle is on. Winners will be the diligent and vigilant.

The writer is a corporate leader based in Mumbai. He is a chartered and cost accountant and writes regularly on the Indian economy and public policy

Read the original:
Shailesh Haribhakti discusses audit renaissance and the deployment of cyber and digital security measures - Free Press Journal

Read More..

Use these metrics to get the most out of your engineering team – VentureBeat

All the sessions from Transform 2021 are available on-demand now. Watch now.

This post was written by Rob Zuber, CTO of CircleCI

Ive been leading software teams for more than 20 years and one thing Ive learned about metrics is that leaders tend to put too much emphasis on engineering metrics alone, without considering the bigger picture.

After speaking to a range of engineering industry leaders, and poring over millions of jobs processed from software teams worldwide, we found that the most insightful and relevant metrics fall into three categories:

Engineering velocity metrics measure the speed and efficiency of software delivery pipelines its the metric category that managers typically pay the most attention to. While Ill explain why its not the only important category to track, velocity metrics are critical in helping teams identify slowdowns and find ways to optimize their overall performance.

Some of the most common velocity metrics include:

Moses Mendoza, former Head of Engineering at data processing and review platform Zapproved, uses throughput to understand the pace of his teams work.

Throughput helps us identify and understand speed but the throughput of a system is also bound by its primary constraint, Mendoza said. Throughput will show you what the slowest issue is in a chain of events, but it wont show you how to fix it to speed up your work.

Graeme Harvey, an engineering manager on my team, emphasizes that its important for all engineers to customize throughput measurement to their individual team.

Because our team practices pair-programming, measuring throughput isnt something that can be tied to an individuals productivity, Harvey said.

When it comes to throughput, his engineers optimize for the team rather than the individual. Pair-programming and helping each other might feel like its impeding the progress of an individual but in actuality, it refocuses energy on whats most important for the team and ultimately the business.

While throughput is a valuable metric that helps you track output, there is no one-size-fits-all way to measure it. Measuring throughput accurately requires you to evaluate the structure of your team and how you work.

According to Alex Bilmes, former VP of Growth at software configuration tool Puppet, there are two ways to measure change lead time. One way to measure change lead time is to look at how long it takes to get an idea out and for the idea to go full cycle. The other way is to look at deployment lead time, which measures how long it takes to get to production after a developer has pushed the change to production.

Full change lead time will point out issues in communication and understanding, as well as the depth of your backlog. Deployment lead time is more likely to show the quality of your pipelines and tooling.

Sprint velocity measures the amount of work a team can tackle during a single sprint and can be used for planning and measuring team performance.

Tom Forlini, CTO at video conferencing platform Livestorm, dives even deeper when measuring velocity, focusing on three smaller metrics:

Livestorm engineers work on two-week sprints and have 50 story points per sprint, Forlini said. We track the number of issues done vs. planned because it gives us a good indication of the sprint planning quality between Product and Tech.

Then, his team looks at the percentage of issues by type. When a sprint contains only new feature issues, we know from the start that it might be quite a challenging sprint to tackle, Forlini added. Ideally, you should balance the type of issues by sprint as much as possible.

Morale metrics are probably the most overlooked metric category in engineering. They tell you how engineers feel about the quality of their work and their job happiness, which is a major retention factor. Keeping retention high means keeping morale high.

Some common morale metrics include:

At Zapproved, Mendoza tracked morale in order to monitor employee retention. We measured morale at work using surveys, having conversations, and asking managers to dive deeper in one-on-one meetings to find out how employees felt.

If responses to a survey are overwhelmingly positive, youll want to know what is working and how to replicate that positive work environment. Similarly, if responses are negative, its helpful to find out directly from your team why they feel that way and what you can do to fix the problem.

Mendoza at Zapproved measured confidence by reviewing every sprint in conjunction with that teams manager and their scrum master. As we measured code quality confidence over two or three sprints, if we saw code quality tanking, it meant something was wrong with how the teams planned their individual investment with the work, says Mendoza.

The engineering managers that I lead also measure work by confidence.

Focusing on confidence over coverage as a metric requires that the emphasis isnt on code coverage, Harvey added. Its critical to break the reliance on having 80% or 90% code coverage and then shipping it only to find out the code is broken. Test coverage is a partial proxy for code confidence. If you know 95% of your code is fully tested, versus 20%, then youre going to feel pretty confident that if your tests pass, your code is legitimate.

Harveys team focuses on delivering small iterations quickly. This provides the confidence that the team is building something of quality, nothing is broken, and theyve made the right choices in building tools for the dashboard.

Everything an engineer does should propel the company forward. Thats why its also essential to track business metrics.

Some common business metrics include:

Tracking business metrics is how your team accommodates for user growth effectively. According to Yixin Zhu, formerly of Uber, while its essential to look at engineering execution metrics, its also important to be dialed into the businesss goals and to measure the company growth.

As Uber grew exponentially, tracking business metrics was incredibly important in order for Zhus engineering team to succeed. When youre talking about doubling every six months, you have to be tracking that to know what you need to build, what degradations to expect, how many data centers you need, how many boxes, etc., Zhu said.

In short, engineers have to keep an eye on real-time business metrics to project and plan accurately. You have to be proactive, Zhu added.

Here are some tips to help you get the most value out of your engineering efforts:

Rob Zuber (@z00b) is the CTO of CircleCI. He leads a team of 250+ engineers who are distributed around the globe. He is a three-time founder and five-time CTO, currently living in Oakland, CA with his family.

Go here to see the original:

Use these metrics to get the most out of your engineering team - VentureBeat

Read More..

Why we need engineers who study ethics as much as maths – The Conversation AU

The recent apartment building collapse in Miami, Florida, is a tragic reminder of the huge impacts engineering can have on our lives. Disasters such as this force engineers to reflect on their practice and perhaps fundamentally change their approach. Specifically, we should give much greater weight to ethics when training engineers.

Engineers work in a vast range of fields that pose ethical concerns. These include artificial intelligence, data privacy, building construction, public health, and activity on shared environments (including Indigenous communities). The decisions engineers make, if not fully thought through, can have unintended consequences including building failures and climate change.

Read more: Why did the Miami apartment building collapse? And are others in danger?

Engineers have ethical obligations (such as Engineers Australias code of ethics) that they must follow. However, as identified at UNSW, the complexity of emerging social concerns creates a need for engineers education to equip them with much deeper ethical skill sets.

Engineering is seen as a trusted and ethical profession. In a 2019 Gallup poll, 66% rated the honesty and ethical standards of engineers as high/very high, on a par with medical doctors (65%).

However, ethics as a body of knowledge is massive. There are nearly as many academic papers on ethics as mathematics, and clearly more than on artificial intelligence.

With such a rich backdrop of knowledge, engineers must embrace ethics in a way that previous generations embraced mathematics. Complex societal problems make much greater demands on engineering thinking than in the past. We need to consider whole and complex systems, not just issues as individual challenges.

Read more: Most buildings were designed for an earlier climate here's what will happen as global warming accelerates

The construction industry provides a topical example of such complexity. Opal Tower in Sydney, Lacrosse building in Melbourne, Grenfell Tower in London and Torch Tower in Dubai became household names for all the wrong reasons.

Importantly, these issues of poor quality and performance dont arise from new technology or know-how. They involve well-established technical domains of engineering: combustible cladding, fire safety, structural adequacy and so on. A fragmented design and delivery process with unclear responsibility and/or accountability has led to poor outcomes.

These issues prompted the Australian Building Ministers Forum to commission the Shergold Weir Report, followed by a task force to implement its recommendations across Australia.

There are real shortcomings in the legal and contractual processes for allocating and commoditising risk in the industry. However, ethics should do the heavy lifting when legal frameworks are lacking. One key question is whether erosion of professional ethics has played a part in this state of affairs. The answer is a likely yes.

Engineers face ethical dilemmas such as:

Should I accept a narrow or inadequately framed design commission within a design and build delivery model when there is no certainty my design will be appropriately integrated with other parts of the project?

How can I accept a commission when my client provides no budget for my oversight of the construction to ensure the technical integrity of my design is maintained when built?

How do I play in a commercially competitive landscape with pressures to produce "leaner designs to save cost without compromising safety and long-term performance of my design?

"Do I hide behind the contractual clauses (or minimum requirements of codes of practice) when I know the overall process is flawed and does not deliver quality and/or value for money for the end user?

Or worse: Do I resort to phoenixing to avoid any accountability?

Read more: Lacrosse fire ruling sends shudders through building industry consultants and governments

The enduring connection of Aboriginal Australians to Country requires engineers to navigate ethical considerations in Indigenous communities. Engineers must reconcile the legal, technical and regulatory requirements of their projects with Indigenous cultural values and needs. They might not be properly equipped to navigate ethical scenarios when they encounter unfamiliar cultural connections, or regulations are insufficient.

Consider, for example, the sacred sites of the McArthur River Mine. Traditional owners have raised concerns that current mining activities do not adequately protect sacred and cultural heritage sites. Evidence given by community leaders provides insight into the intimate and diverse relationship that traditional owners have with the land.

In considering such evidence, engineers must be able to evaluate both physical site risks (such as acidification of mine tailings and contamination of water bodies) and cultural risks (such as failing to identify all locations of cultural value).

How might we tackle such complicated projects? By properly engaging with traditional communities and by having diverse teams with multiple worldviews and experiences, along with strong technical skills. The broad field of ethical knowledge provides the skill sets to attempt to reconcile the diverse considerations.

Read more: Juukan Gorge inquiry puts Rio Tinto on notice, but without drastic reforms, it could happen again

Engineering students ethical development requires a holistic approach. One assessment suggested:

[] that institutions integrate ethics instruction throughout the formal curriculum, support use of varied approaches that foster highquality experiences, and leverage both influences of cocurricular experiences and students desires to engage in positive ethical behaviours.

The curriculum should include:

skills/expertise the underlying intellectual basis for discerning what is ethical and what is not, which is much more than codes of conduct or a prescriptive, formulaic approach

practice practical know-how in terms of ethical solutions that engineers can apply

mindset having an individual and group culture of acting ethically. The engineers problem-solving mindset must be supplemented by constant reflection on the decisions made and their ethical consequences.

Ethics is not an add-on subject. It must permeate all aspects of tertiary education teaching, research and professional behaviour.

While the arguments for acting now are strong, market realities will also drive the process. The upcoming generation will likely displace those who are slow or reluctant to adapt.

For instance, engineering firms are under pressure from their own staff on the issue of climate change. More than 1,900 Australian engineers and nearly 180 engineering organisations have signed a declaration committing them to evaluate all new projects against the need to mitigate climate change.

Future engineers must transcend any remaining single-solution mindsets from the past. Theyll need to embrace a much more complex and socially minded ethics. And that begins with their university education.

Continued here:

Why we need engineers who study ethics as much as maths - The Conversation AU

Read More..

In Pursuit of a Career in Healthcare, She Became an Engineer – The Wall Street Journal

Growing up in Guilford, Conn., Gabriella Lanouette watched her mother head off to work each day as a pediatric nurse.

Every day she comes home having helped kids, says Ms. Lanouette, who began planning her own career in healthcare while still a child. Seeing her work in this field was really inspiring to me.

As she got older she realized she didnt want to be a healthcare provider, so she began looking for other ways to get involved in the field. A passion for coding led to an engineering job. After earning a masters degree from Columbia University, Ms. Lanouette landed a job at Orbis International, an international nonprofit focused on preventing and treating blindness and eye diseases in economically developing countries.

Ms. Lanouette is part of a team that develops algorithms for the companys telemedicine platform, Cybersight. Clinicians use the tool to diagnose eye diseases like diabetic retinopathy and glaucoma, uploading images of the back of the eye to the platform, which provides artificial intelligence-enabled analysis.

The Wall Street Journal recently spoke with Ms. Lanouette about how her pursuit of a career in healthcare led her to engineering. Heres her story, edited and condensed.

Go here to see the original:

In Pursuit of a Career in Healthcare, She Became an Engineer - The Wall Street Journal

Read More..

How to Think not What to Think: the UNSW Document Outlining Engineering Ethics – Architecture and Design

A Vision Document published by the University of New South Wales seeks to champion Ethical Civil Infrastructure and Sustainable Environments and outlines that major problems in the building and construction industry have been evoking regulatory responses from various governments in Australia.

Published in the wake of the recent apartment building collapse in Miami, Florida, the document asks if the tragedy would have ever occurred if engineering ethics were upheld at every link in the supply chain. It also points out that legislative responses are commonly introduced when ethical practices have eroded or failed. The Opal Tower and Mascot Towers in Sydney, as well as the Neo200 block and Collins Arch project in Melbourne are further examples of poor engineering ethics.

One of the main aims of the Vision Document is to support a cultural shift within engineering education and the relevant engineering professions emphasising a value on the ethical rather than solely technical consideration.

The authors note that it is important to fully appreciate that professional engineering decisions are not constrained to highly formalised narrow technical tasks. They highlight the fact that modern problems of humanity that call for engineering solutions are increasingly complex and multifaceted involving conflicting demands.

Ethical decision-making goes beyond what is legal, acceptable or common. Something may well be legal but still be unethical depending on a particular viewpoint - for example the interaction of aquifers and agriculture.

An ethical professional decision is not merely based on what is allowed and/or technically valid, but also what is judged to be right and fair. Most critically, the deliberation must be conducted at the onset where it can influence decisions not after the fact to simply provide excuses.

The documents authors believe tertiary education is crucial in fostering an ethical culture throughout an engineers academic training, that can then follow through their progression in the profession.

The document hopes engineers ascertain ethical skills to solve novel problems which may have never been encountered previously. Ideally, teaching them how to think, not what to think in order to avoid disaster.

Image: Reuters

See the original post:

How to Think not What to Think: the UNSW Document Outlining Engineering Ethics - Architecture and Design

Read More..

University of Maryland engineers create new 3-D soft robotic hand – FOX 5 DC

UMD engineers create 3-D soft robotic hand

Ryan Sochol, Assistant Professor at the University of Maryland's Department of Mechanical Engineering, has worked at his soft robotics invention for six years.

COLLEGE PARK, Md. (FOX 5 DC) - Engineers at the University of Maryland are showing off a new kind of robot.

Ryan Sochol, Assistant Professor at the University of Maryland's Department of Mechanical Engineering, has worked at his soft robotics invention for six years.

Download the FOX 5 DC News App for Local Breaking News and Weather

"Soft robotics is a pretty new field,"Sochol said. "It's only been around for about a decade or so."

Sochol and a team of UMD researchers worked to bring a 3-D soft robotic hand to fruition. Their invention has the potential of making biomedical devices much safer in the future.

MORE FROM FOX 5: Smithsonian to end reservation requirement for most museums

"The hope is by making our technology more accessible, that essentially anyone who has access to one of these typesof these kinds of printers, either themselves or through a printing service like we did,will beableto download our files for free and be able to immediately print any one of those designs or they can modify those designs," Sochol said. "And the hope is that by increasing access, that we are able to eventually accelerate advancement in this new area of soft robotics."

Sochol says working on the 3-D soft robotic hand has been one of the greatest accomplishments of his group and his professional life.

Excerpt from:

University of Maryland engineers create new 3-D soft robotic hand - FOX 5 DC

Read More..

How engineers fought the CAP theorem in the global war on latency – TechCrunch

CockroachDB EC-1 Part 2: Technical design

CockroachDB was intended to be a global database from the beginning. The founders of Cockroach Labs wanted to ensure that data written in one location would be viewable immediately in another location 10,000 miles away. The use case was simple, but the work needed to make it happen was herculean.

The company is betting the farm that it can solve one of the largest challenges for web-scale applications. The approach its taking is clever, but its a bit complicated, particularly for the non-technical reader. Given its history and engineering talent, the company is in the process of pulling it off and making a big impact on the database market, making it a technology well worth understanding. In short, theres value in digging into the details.

In part 1 of this EC-1, I provided a general overview and a look at the origins of Cockroach Labs. In this installment, Im going to cover the technical details of the technology with an eye to the non-technical reader. Im going to describe the CockroachDB technology through three questions:

Spencer Kimball, CEO and co-founder of Cockroach Labs, describes the situation this way:

Theres lots of other stuff you need to consider when building global applications, particularly around data management. Take, for example, the question and answer website Quora. Lets say you live in Australia. You have an account and you store the particulars of your Quora user identity on a database partition in Australia.

But when you post a question, you actually dont want that data to just be posted in Australia. You want that data to be posted everywhere so that all the answers to all the questions are the same for everybody, anywhere. You dont want to have a situation where you answer a question in Sydney and then you can see it in Hong Kong, but you cant see it in the EU. When thats the case, you end up getting different answers depending where you are. Thats a huge problem.

Reading and writing data over a global geography is challenging for pretty much the same reason that its faster to get a pizza delivered from across the street than from across the city. The essential constraints of time and space apply. Whether its digital data or a pepperoni pizza, the further away you are from the source, the longer stuff takes to get to you.

View post:

How engineers fought the CAP theorem in the global war on latency - TechCrunch

Read More..

In line with NEP, 14 engineering colleges to teach in regional languages – The Indian Express

Fourteen engineering colleges across eight states have secured permission from the All India Council of Technical Education (AICTE) to collectively admit over 1,000 students in undergraduate programmes that will be taught in regional languages from the new academic year.

At least half of them four from Uttar Pradesh, two from Rajasthan and one each from Madhya Pradesh and Uttarakhand will teach in Hindi. The remaining colleges from Andhra Pradesh, Maharashtra, West Bengal and Tamil Nadu will offer the programme in Telugu, Marathi, Bengali and Tamil, respectively.

The technical education regulators approval has been granted for select branches most of them are for computer science, followed by electrical and electronics engineering, civil engineering, mechanical engineering and information technology.

This is the first year that AICTE in line with provisions of the new National Education Policy (NEP) that calls for education in ones mother tongue as far as possible has permitted engineering colleges to offer B.Tech programmes in 11 regional languages (Hindi, Marathi, Tamil, Telugu, Kannada, Gujarati, Malayalam and Bengali, Assamese, Punjabi and Oriya).

Last year in November, the Union Education Ministry had announced that would will push for technical education, especially engineering, in regional languages, starting from the 2021-22 academic year. The Ministry had also indicated that some of the top engineering schools such as the IITs and NITs might be among the first to implement this.

The response of the IITs to this announcement was lukewarm. Most were not in favour of the proposal, arguing that since the demography of students studying in IITs is diverse, offering B.Tech programmes in several regional languages would not be feasible.

Madhya Pradeshs Atal Bihari Vajpayee Hindi Vishwavidyalaya and Tamil Nadu's Anna University have done this in the past. But the initial response to the Vishwavidyalayas programmes was lukewarm since there wasn't enough reading material in Hindi for engineering students. Drawing from that experience, AICTE is now translating material.

However, the AICTE, based on the results of a sample survey, decided to give recognised colleges an option to offer engineering courses in vernacular languages.

Read | Education minister terms NEP guiding philosophy, calls for fast-tracking its implementation

Last week, Prime Minister Narendra Modi gave a fresh push to this NEP proposal in his address to 100 centrally-funded technical institutes. In his address, he emphasised the need to develop an ecosystem of technological education in Indian languages and to translate global journals into regional languages.

Speaking to The Indian Express, AICTE Chairman Anil Sahasrabudhe said the technical education regulator has already finished translating all video lectures on engineering on the Ministrys SWAYAM platform in eight regional languages. Content will soon be translated into Oriya, Assamese and Punjabi, too. SWAYAM hosts online open courses and lectures on engineering, science, humanities, management, language, mathematics, and commerce, among others.

Permission to teach engineering in regional languages has only been given to [National Board of Accreditation] NBA-accredited programmes. The translation of SWAYAM lectures for first-year students is complete and we are now roping in teachers to also translate existing textbooks and also write their own in regional languages, he told this newspaper.

We are aware of the market needs, which is why English will be studied as a language in the regional languages programmes. In all of our translated work we have ensured that the English names of the scientific concepts are retained, he added.

Continued here:

In line with NEP, 14 engineering colleges to teach in regional languages - The Indian Express

Read More..