A university on the South Coast is preparing for a new engineering program it hopes to have in place within the next two years.Cal State Channel Islands in Camarillo proposed to launch an engineering program last summer. University officials say they’re still awaiting final approval from the CSU Chancellor’s Office, but they expect to get a green light soon.
So, they’ve begun the planning process for a program focused on mechatronics, which is a combination of mechanical and electrical engineering.
“The animation of mechanical devices by software” said Michael Soltys, chair of the Computer Science Department, which mechatronics will be housed under.
He said few engineering programs have an emphasis in this field.“We’re thinking of starting mechatronics with small robotic mobility, like drones, like underwater robots. Robots that move, that walk, that drive,” he said.
The university has begun hiring faculty and designing courses. The goal is to start the engineering program in the fall of 2018 with 24 students.
SQL injection has been around since databases first appeared on the internet. When a web app allows anyone to pass data straight into database queries without that input being rendered safe through sanitization and filtering, that’s a SQLi vulnerability right there. This kind of bug can be exploited to command the database to do things – such as cough up all of its contents – that the web application should prevent from happening.
The Defense Department still uses 8-inch floppy disks and computers from the 1970s to coordinate nuclear forces, according to a report last year from the Government Accountability Office. Many of the Pentagon’s communications systems are so vulnerable to sabotage that the Army and Navy regularly practice fighting without them. Satellites can be shot down by missiles or have their sensors dazzled by lasers. Their ground links can be jammed or hacked.
Dale Hayden, a senior researcher at the Air Force’s Air University, told an audience of aerospace experts earlier this month that proliferation of antisatellite technology has put America’s communications networks at risk. “In a conflict, it will be impossible to defend all of the space assets in totality,” he said. “Losses must be expected.”
It has never been easier for America’s adversaries—principally Russia and China, but also independent nonstate actors—to degrade the U.S. military’s ability to fight and communicate. Senior military officials have expressed grave doubts about the security of the Pentagon’s information systems and America’s ability to protect the wider commercial virtual infrastructure.
A new paper:On normalization of inconsistency indicators in pairwise comparisons, by W.W. Koczkodaj, J.-P. Magnot, J. Mazurek, J.F. Peters, H. Rakhshani, M. Soltys, D. Strzałka, J. Szybowski and A. Tozzi.
Abstract: In this study, we provide mathematical and practice-driven justification for using [0,1] normalization of inconsistency indicators in pairwise comparisons. The need for normalization, as well as problems with the lack of normalization, are presented. A new type of paradox of infinity is described.
Google’s self-driving cars. IBM’s “Dr. Watson.” The Jet Propulsion Laboratory’s Mars 2020 Rover.Behind these huge technological leaps is mechatronics, an interdisciplinary field that mixes a wide array of engineering disciplines—mechanical, electrical, computer and software.
According to the National Association of Colleges and Employers’ (NACE) “Class of 2015 First-Destination Survey,” mechatronics engineering majors were the highest-paid class of 2015 engineering graduates among those who received a bachelor’s degree.
Channel Islands is mentioned at the end of this article:
CSU Channel Islands will be the latest California State University campus to implement a mechatronics engineering program, which is planned to begin in September 2018. It was created in response to the demand for mechatronics engineers in Ventura County.
As a Hispanic-serving institution (HSI) and with a student body that’s more than 50 percent female, the new program will also focus on increasing access to engineering for historically underrepresented students in science, technology, engineering and mathematics (STEM), says Michael Soltys, Ph.D., professor and chair of the computer science program.
Around 11 p.m. one night, you realize there’s a key step your team needs to take on a current project. So, you dash off an email to the team members while you’re thinking about it.
No time like the present, right?
Wrong. As a productivity trainer specializing in attention management, I’ve seen over the past decade how after-hours emails speed up corporate cultures — and that, in turn, chips away at creativity, innovation, and true productivity.
If this is a common behavior for you, you’re missing the opportunity to get some distance from work — distance that’s critical to the fresh perspective you need as the leader. And, when the boss is working, the team feels like they should be working.
This  has been a tumultuous year in technology; we have seen security breaches, iPhone 6, Google Glass, drones and the virtual reality of Oculus Rift. In 2015 we will see that mobile devices will continue to become the prevalent way for people to browse the Internet. Highly visited sites such as google.com provide the mobile experience by sensing that the request for a web page originates from a hand-held device, and more sites are going to follow suit. Already, over half of consumer time spent on the Internet is on mobile devices, and hence the prediction of great growth in the mobile web, and, in particular, in mobile shopping.
But mobile devices are not only becoming the window of choice to the Internet; they are in fact becoming the computing platform of choice. For example, the CIO at Hargrove Inc., a trade-show and event services company in Lanham, Maryland, is investing in mobile technologies that will make it easier to access floor plans and information from the trade-show floor. For this to be practical, the screen size of mobile devices has to increase, and indeed it already has. Take, for instance, the seven-inch MediaPad X1 by Huawei, a giant smartphone. Thus, another prediction is that the line between mobiles and tablets will become more blurred and we will have devices that qualify as both smartphones and tablets.
3-D printing will continue leaving the domain of academics and enthusiasts, and it will become more and more of a standard, bringing the manufacturing of small parts to the household. The next generation of at-home 3-D printers will use lasers, heat or liquid to bind powders into solid materials.
Global IT giants including Amazon and LinkedIn could be doing far more to raise awareness of the need for better password practices among their users.
Analysis by Professor Steve Furnell, Director of the Centre for Security, Communications and Network Research at Plymouth University, looked into the password security controls in place among ten of the world’s most visited websites.
It revealed very few of them give detailed guidance about the importance of providing secure passwords, either when users were creating or updating accounts.
The majority also provided little or no information about the reasons why password protection is important, and while some did make suggestions about best practice, very few went on to enforce their own advice.