Celebrate International Internet Day!

   

      What do you consider to be the greatest invention in modern history? Many will suggest the automobile, airplanes, the telephone, or even sliced bread, but there’s one that we think outshines them all. Yes, we are talking about the internet! The internet has created a powerful online community that has spawned countless cultural changes and has greatly influenced our lives. Through social media and email alone we have the ability to instantly connect with our friends and family, as well as new acquaintances from around the world. It is hard to fathom that this invention is technically a new phenomenon; we’ve only had the modern internet since 1989!

Why do we celebrate internet Day on October 29th? On this date in 1969, the first recorded message transmission was sent over an internet connection between two computers. A student at UCLA named Charley Kline attempted to send log in information to another student at Stanford named Bill Duvall and managed to send the letters “L” and “O” before the connection was lost. At the time these two students were working on the ARPANET (Advanced Research Projects Agency Network) which was being funded by the US Department of Defense and consisted of four terminals set up at UCLA, Stanford, UC Santa Barbara, and the University of Utah. Each terminal operated independently testing various connections and after this first message attempt, it only took an hour to send the entire message to Stanford.

Even though this internet connection was the birth of the World Wide Web, it was still uncommon for anyone outside of universities, government agencies, and a few scientific labs to be using it at this time. This year also marked the establishment of HTML and HTTP by Tim Berners-Lee who was working in Britain at CERN. The World Wide Web was officially launched as a project in August of 1991 and you can see the results of that project today when you pick up your smartphone. The digital age in the late 90s and into the early 2000s was an explosion of internet fever with over 162 million new and public websites being created and hosted online. Silicon Valley in Northern California became the epicenter of internet development and the dotcom boom. Today the internet is a central pillar in global communications and almost every notable public figure has their own profile online that their fans can interact with. How much do you use the internet in your daily life?

It is important to note that Coleman University was established in 1963, long before the internet was born. Computers were not developed for internet use, in fact, they were initially conceptualized for computing large sums (hence the name “computer”) and storing information securely. At the time it would have been unheard of to discuss putting a computer into a private home. Why would a family or single person need one? It may be hard to imagine now, but considering the size of the computers that were being built, it would have been hard to fit one inside of a home in the first place!

We recognize Internet Day as a moment to reflect on the incredible advancements in technology that we have witnessed in the past century and will continue to see in the future. Celebrate today by learning more about the history of the internet, how it has influenced your life, and the telling your friends on social media to celebrate too!

If you are interested in learning more about our degrees in Software Development, Cybersecurity, and Game Design call us at (858) 499-0202 and schedule a tour! There are thousands of jobs for programmers and coders across the nation, and we want to help you get started in your dream career today!

ENVI Makes a Splash at Prestigious Robosub Competition

We often speak of ENVI and their indoor drone testing facility located on the Coleman Campus as a major hub of development for autonomous flying. However there is more “under the hood” at ENVI than that. This year marks the second in a row that the team of volunteers, students, and mentors at ENVI has competed in the 2017 International RoboSub Competition which showcases the best in RoboSub development from across the globe. From July 24th-30th colleges and universities from as far away as China, India, and Russia also competed for the honor of showcasing the best in RoboSub technology.

Every year this competition is hosted at the SSC Pacific TRANSDEC Pool in San Diego, and the pool is supervised by the U.S. Navy Seals who dive to retrieve the subs and move them to their starting positions. The course must be traversed by the RoboSub through various obstacles and challenges within 30 minutes, and contestants have the ability to start over as many times as needed. The big catch is that the time does not start over when a team decides to go back to the starting line. The sub must be retrieved by a Navy Seal diver and brought back to the start in order to try the course again. Luckily teams get to rotate time in the pool before the competition begins in order to make changes and begin to strategize their way through the course. Despite a slightly rough start, over the course of the week long competition against 43 other teams, the team at ENVI was able to qualify in the final round on Saturday and put their name on the leaderboard.

The top three schools this year were Cornell University (USA/First Place), Far Eastern Federal University/Institute for Marine Technology (Russia/Second Place), and the National University of Singapore (Singapore/Third Place). Each of the top teams received a cash prize and international recognition in the world of autonomous underwater vehicles. However prizes were not just awarded to the best contestants. Other teams had the chance to win monetary prizes for “Best Static Entry”, “Best PR”, “Best New Entry”, “Best Presentation”, and “Sportsmanship”.

For two years in a row the ENVI team was able to qualify with their robosub and next year should be just as exciting. In the world of robosub development there are many possibilities for improvement and innovation, and we at Coleman are looking forward to seeing what ENVI has in store for their next competition. For more information on the Robonation competition visit their website at http://www.robonation.org/competition/robosub.

Effective Leaders are Constant Learners: Bob Sweigart

Effective leaders are not afraid to learn something new and keep their minds active through professional development and training. It is important for any professional to be willing to learn whenever they can to improve their work culture.

 As a student or graduate of a technology focused University, it is crucial for you to show not only a mastery of your craft, but also that you have the hard skills needed to be a successful employee and peer. When you review a job description, you are going to assume the company wants you to do A, B and C and have X, Y and Z skills. While it is essential to have these hard skills at your disposal, you need to show the ability to learn new skills. Being the best choice for a position is more than what you have achieved on paper; it is also what you are willing to do as a professional to continue to be the best.

The first step in becoming a successful professional is being able to read between the lines to see past what your employer is asking of you, and understand what you can do that isn’t asked for, but could potentially be of value to the company. As an example, during a college internship, a student was tasked to complete a project and realized that there was software that could be used to assist with the effort. The hurdle was that the proposed software required that the student learn a programming language she was not familiar with. Since the student knew the program would greatly improve the chances of completing the project successfully, she took it upon herself to learn the new programming language. It was not just showing the initiative to try a new way of doing things that made this student employee an example.Being excited to learn something new that would not only benefit the employee, but also the company, is an example of what a great employee should be.

Demonstrating you are constantly learning is crucial in the field of technology because as we all know technology is constantly updating and changing itself. In an article published by Inc., the five best practices for learning while on the job include understanding how things work in your office, talking issues out with others who have more experience, and simply throwing yourself entirely into something new that you have yet to encounter (Inc., 2014). The Harvard Business Review writes that leaders are better when they are also learners. In order to be effective as a leader, the avenues of creativity and innovation have to be open and that means bringing in new perspectives and protocols (Harvard Business Review, 2015). Learning does not stop once you exit a classroom; to be a high performing employee and a powerful leader you should look for opportunities to learn in every challenge that comes your way.

Thank you to Bob Sweigart, our Director of Career Services for his contribution to the Coleman blog. For more Career oriented advice, resume building assistance, help signing up for e-Hired, and interview prep, visit the Career Services staff at Coleman University or email careerservices@coleman.edu for more information.

 

 

Faculty Spotlight: Anthony Le (Game Development)

What did your parents say when you told them that your plans were for your future? Were they happy about your decision, or did you change your mind all on your own? One of the benefits of obtaining a degree in technology is that your skills and career path are destined for a long life. Your passions are what shape your future, and that rings true no matter the circumstances. That is the theme for our Faculty Spotlight this month as we sit down with Anthony Le, a senior Game Development and Software Development instructor for Coleman University, who started out with a very different career path in mind.
Enrolling as a medical student at UCSD, Le realized that he was not meant to enter the field of medicine. After a thrilling class in physics, Le found that he was more interested in the mechanical way that the world worked, rather than the biological. From there he began his career in technology through computer programming and artificial intelligence. We asked him about his life in technology and his passion for teaching at Coleman University.

1. What was it like moving to the US?
We moved out to the United States in the 1975 after the Vietnam War when I was nine years old. At the time my father worked for a shipping company in the US and the first place we were brought to was Camp Pendleton. So all of my family came to the US at the same time. We settled in Bayou la Batre, Alabama because that’s where my father’s shipping company was based. It was also the setting for the movie Forest Gump. At the time the southern states were very anti-communist, and my family was deeply Catholic, so they welcomed us with open arms and we had a better time adjusting. We went to Alabama, and I had the BEST time. All of these people, our neighbors, town folks, would come over every day and give us stuff and check in to see if we were okay, so my experience in Alabama was wonderful. However my Dad didn’t like it as much as I did, because he wanted to be back in California with the rest of his family, so he rented a big U-Haul and drove everybody back. That was 1976, and my family has lived here in San Diego ever since. I went to Serra High School in Tierrasanta and graduated at Mt. Carmel in Rancho Penasquitos. I was yearbook photographer there and won several drafting and photography awards from the Del Mar Fair.

2. So you stayed in California for college and went to UCSD. Is that were you became interested in technology?
I love UCSD. It is a great school and much bigger than it was when I was there. That feeling of being on a college campus, making friends in the dorms—it was like its own city. I changed my major several times while I was there. My family wanted me to be a doctor and get a good job, so I started out with bio-chemistry and I quickly discovered that I didn’t like it, but I loved my computer science classes. Turns out one of the faculty members at UCSD was a family friend and he was teaching physics, so he got me into that and I became a TA for his program and for the computer lab. Physics simulations were really my first computing job at UCSD. I fell in love with computer programming after that and changed my major to Cognitive Science, which was a nice mix of biology and the physiological makeup of the human body. I learned and dreamt about how those mental processes can one day be emulated with computing. So that was around the time when an Artificial Intelligence major was introduced at UCSD, and I jumped on that program and that was my final change of major. I also have minors in philosophy, psychology, and astronomy (because I love studying the planets).

3. What were you like as a student?
I was a very active student. Besides being a TA in the computer lab, I was a member of the Vietnamese Student Association, and I became president and tried to get our club more involved with other club events on campus. I organized an International Volleyball Player’s club and organized a Hands Across UCSD event for the campus, and it was really tough to get all of the logistics together, but it was a really fun to try to get everyone involved. By that time my sister and my cousin were attending UCSD, so it became a family affair. Overall, UCSD was an amazing experience, and that is where I cultivated my love of learning.

4. Once you graduated with your degree in A. I. where did you go? Did you create robots?
I wanted to work in computing, and my relative had a chain of computer stores, so I started working for them when I graduated from college. I was in charge of writing programs for diagnostic and performance testing and for keeping tabs on all of the inventory and OCR (optical character recognition) programs used to process all the orders. Unfortunately, this chain did not win out over its competition, so my relative moved into a different field—buying and selling prescription medications from Canada to patients in the US. So I wrote all the programs to scrape and accumulate all of the data on prescription medications (this was before Big Data was around) and price match for the lowest prices. Then the government changed the law and we could no longer sell lower-priced prescription medication from abroad. With my 20 plus years of programming experience, I ended up getting into teaching through my wife at the time, who knew the Vice President of Coleman University was looking for programmers who had real experience and wanted to teach. I came to Coleman when the Game Development department was still in the process of creation, so I was involved in writing the courses for Game Development. We had to write six classes and establish a certification program. I wrote Course 2 and Course 5, which were about Engine design and 3D rendering (for networked first-person shooter (FPS) and third-person shooter (TPS)). The algorithms for 3D rendering use the same technology and mathematical calculating processes as Artificial Intelligence and neural network programs. It’s the summation of a lot of values and the manipulation of numbers simultaneously. It is a lot of complex ideas, and that is the challenge of teaching: getting students to relate to the material and understand it, so they will be excited to learn.

5. Did you find that you had a passion for teaching after you began at Coleman?
Turns out, from all of my experience as an eldest sibling and as a TA in college, this is my calling. It fits me, because I can explore what I love to learn, and using what I know about AI and how the brain works thus far, to facilitate and transfer that knowledge to another person, using a many sensory modalities as possible. For me this was a fateful event, and I went with it. That was over 7 years ago. Now, I am focusing on helping our students learn physical computing, like how to program robots, sensors, GUIs, and different hardware devices to enhance their job placement. Our students are so excited to learn and Game Programming is very competitive, so I am working on introducing physical computing using Python and C into Game Development and Software Development. Even though I love games and created my first game using the VIC20 and Commodore 64, I am not a gamer per se, I am more into computing. I want to bring more programming into the Game Development program. When a student is hands on and sees his or her creation, and it’s something that’s tangible, that is the experience we want. Computing is a tool with a specific language and you need to understand the syntax to express how you want to control the technology.

6. What do you look for in a potential student at Coleman University? What advice do you have for a new Coleman student?
What I love ideally, is excitement. When students are excited, they are learning and progress goes up exponentially. My advice is perseverance. You cannot learn everything in one try. It is a process and especially with programming, you have to do it in many different ways and solve many different errors. In solving errors you learn something new. You can read about it and watch it, but until you do it and spend the time fixing it, you will not actually learn. The more you put yourself through this process the better prepared you will be, so use repetition and that will help you excel and gain experience. Education is an investment, so I would advise anyone who is learning a new skill to keep in mind that commitment to an investment. I will always give students a chance to solve things on their own, and then I step in to help by providing strategies and hints. I often discuss the various ways that people solve the same problem, and my motto is if you don’t agree, at least try it once, and if you realize you like it you can incorporate it into your own style. Be open minded.

 

We want to thank Mr. Le for taking the time to sit with us and discuss his passion for teaching and computer science.  If you are interested in pursuing a technology-focused degree and learn from instructors such as Anthony Le, do not hesitate to call us. Classes start every ten weeks and financial aid is available for those who qualify. Call (858) 499-0202 today!

 

Coleman is Ranked #1 in San Diego!

Recently our University was pleased to find that we had been ranked number one in San Diego for Cybersecurity degrees by Universities.com. If you did not already know, Coleman has had the longest running Cybersecurity (formerly Network Security) degree program in San Diego. Since 1963 when we first began our journey as The Automation Institute, our organization has been at the center of technology development and we have graduated many distinguished alumni over our 54 years in Southern California. From Data Processing to Cybersecurity we have come a long way by following the trends and seeing the potential in every student that walks through our door.  Our alumni have gone on to work for SPAWAR, Cisco, Kyocera, and many other incredible companies that are the leaders in technology development. With our lifetime Career Services access and small class sizes our students have been able to create lucrative careers in exciting fields. More importantly, they have brought integrity to the Coleman name and we are proud to continue to provide a top Cybersecurity education for San Diego. Our mission statement is “To deliver relevant education that prepares individuals for technology focused careers, while providing an environment where they may develop to their full potential” and we will remain dedicated to that mission long into our future. This is exciting news for our university and we are so happy to share it with our followers and alumni!!

Coleman and Ssubi give back to San Diego

Our President, Norbert Kubilus, stands next to the donated computers from Sharp Healthcare that Coleman will be helping to refurbish. Ssubi is located behind the Graduate Studies building. 

Coleman University’s mission statement is “To deliver relevant education that prepares individuals for technology-focused careers, while providing an environment where they may develop to their full potential”. That mission statement is not just focused on our learning environments. Our emphasis on developing to a full potential also applies to the various opportunities that Coleman is bringing to our students that take place outside of the classroom and within our community. Since 2016 we have provided a portion of a warehouse for the non-profit Ssubi to operate out of, as well as encouraged our students to work with them to collect and ship donations around the world. This organization has taken on the enormous task of processing gently used medical equipment from local hospitals and clinics and distributing to areas in Africa that have no access to basic and essential medical materials. The founder, Laura Luxemburg, has worked tirelessly throughout Southern California to encourage the leaders in the Healthcare industry to be more conscious of their potential impact through conservation and to donate their equipment to communities who need it. It is her goal to bring jobs to our city in an environment that promotes conservation. Through efforts in connection with Sharp Healthcare and the San Diego Veterans Association, Laura has been successful in reaching the first part of her overall goal for Ssubi: the potential millions of tons of medical waste that can be reused are being saved from landfills. Sustainability is important for helping to make San Diego a Green city and Coleman University wants to be a part of that movement.

In conjunction with their effort called Greening for Good, Ssubi is also offering gently used computer equipment to low income families in San Diego. Our University has provided Ssubi with a center on our campus to clean, store, and refurbish 50 computers that were donated by Sharp Healthcare. Using the Cybersecurity Club room which serves as a lab on our campus, student volunteers are installing new software and returning the equipment to their factory settings. Once each computer has been cleaned, they will be donated to local shelters and families who may not have access to computer equipment. Computer and internet literacy are vital skills that will help every child become more successful in their academic careers. Coleman is dedicated to promoting this literacy effort and we are doing our part by donating equipment to help maintain an equal educational playing field for young learners and their parents. We hope to continue to work closely with Ssubi again in the future, and we look forward to seeing all of the delighted faces of the families who will be receiving these donations.

For more information on the on-going efforts of Ssubi please visit their website: http://www.ssubi.org/ or check out their Facebook page: https://www.facebook.com/ssubiishope/

 

Ransomware Global Strike: The “WannaCry” Attack

 

 

In the height of the westward expansion into California, the “Wild West” became not only a place, but a term that described an entire cultural phenomenon. What made the west so wild were the apparent lawless territories that saw hostile takeovers, train and carriage robberies, kidnapping, and ransoming. Over time the west was settled and developed into new states with their own laws and regulations. The wild part of the west was no longer a threat, at least in the physical world. Today we have a new and almost lawless place, however this territory only exists online. Though there are plenty of companies and programs that work 24/7 to ensure safety online, there are still opportunities for malicious attacks to be carried out. The robberies and takeovers that plagued the westward expansion have now become digital.

A typical scam that you will see online is the email phishing that we talked about in a previous blog. These scams can be easy to avoid as long as the recipient is not engaging with the email or providing any personal information. Unfortunately that does not always protect online users from being attacked for their information. Ransomware has become a bigger threat that is hard to trace and causes an incredible amount of damage. Essentially it is software that takes all of a victim’s personal files and information and holds it for a ransom that must be paid. Recently a large ransomware attack has become global news, with at least 150 countries experiencing the same attack. The most affected victims were the small businesses, universities, and hospitals that were unable to protect themselves and had to either pay the ransom or risk losing all of their data (CNN Money). Reports from China, Germany, Japan, Russia, the US, and Spain confirmed that there had been attacks from the same ransomware and that they had taken the necessary precautions to try and stop its spreading.

Through a patch in the Microsoft Windows software, the ransomware “WannaCrypt” was able to target specific users and take over their systems. Ransomware works as a lock box for your data, keeping you from accessing any of your files or personal information unless you agree to the terms and conditions set up by the creator. Victims were told to use Bitcoin to pay for the return of their files (Microsoft). Many of the Windows users who were targeted were not using an updated, or a licensed version of this software making them even more vulnerable to patches that could not be fixed in the Microsoft updates. In the wake of this viral attack, Microsoft released a statement outlining the efforts they were making to avoid these attacks in the future. However, they also called on the public to become more aware of their own responsibility in updating their computers and backing up their information with an external drive and cloud software. Proactive actions are the key to being safe online. This idea of being proactive is also what stopped the ransomware attack from continuing to spread. A young cybersecurity student in the UK decided to look more closely at the software behind the attack and discovered a kill switch. The malware was using “a very long nonsensical domain name that the malware makes a request to – just as if it was looking up any website – and if the request comes back and shows that the domain is live, the kill switch takes effect and the malware stops spreading” (The Guardian). Once the student located the domain name, all he had to do was buy it. The domain cost $10.69 and was immediately registering thousands of connections every second; once it was purchased the malware was stopped in its tracks. Additionally once this domain was bought he was able to determine the IP addresses attached to the malware and reported them to the authorities. Though this was a great victory, in the world of Cybersecurity it is just a temporary fix. There are just as many entities creating malware as there are cybersecurity experts trying to stop them. What makes this malware attack so dangerous is that it can be replicated and reused at any time.

Backing up files, or storing information in the Cloud, and regularly updating your software are the best measures you can take to protect yourself from ransomware. As we mentioned in a previous blog on email phishing, it is imperative that you avoid any email from a company or bank that is asking for your personal information via email.

If you are interested in becoming a cybersecurity expert yourself, consider a degree from Coleman University. Perhaps it could be you that stops the next big cyber-attack in its tracks! Call (858) 499-0202 for information on our technology focused programs.

 

Phishing Isn’t a Sport

Six tips from Coleman University on how to keep your email safe from phishing scams.

Cybersecurity is a hot button topic lately. With the rumors of Russian infiltration into the United States Presidential election, and the exposure of private emails and photos onto sites such as WikiLeaks, the privacy that we covet online is becoming increasingly endangered. With the recent phishing scam going through Google Docs, it is imperative to remember the necessary steps to take online in order to ensure that you are not a target of a scam. First, let’s review what online scamming/phishing looks like, and the ways to spot one.

The most likely scam that you will encounter is a phishing email that can be sent to your accounts. Phishing is defined by the Merriam-Webster Dictionary as “a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly.” An email may look legitimate with logos and graphics, but that does not mean that it should be taken at face value. For example, banks have taken a stance against phishing by only allowing account actions to be completed through their own websites or at a physical bank location. Your private bank will never ask you for passwords, social security numbers, account numbers, routing numbers, or any other private information via email (Telegraph.co.uk). Be on the lookout for emails that inform you of account changes or updates; if you did not authorize changes, immediately report this issue. The best course of action to protect yourself if you feel that you have been targeted by a scam is to document as much as you can with photos, emails, and phone calls. If an email comes into your inbox that seems suspicious call the company that supposedly sent it and ask about the email. Taking the initiative to validate the email before responding is one of the best ways to protect yourself from online threats. So what happened in regards to the Google Docs scam that went viral last week?

Gmail users were sent a notification from a known contact to click on a shared Google Doc. In order to access the document, the users had to authorize a transfer of contact information to the sender. Since the sender was perceived to be a friend or family member, there was little hesitation to allow this authorization. Routing the doc through an unauthorized Google Docs app prompted the Gmail user to allow the application to take control of their email information as a “management” tool (BGR.com). As a result, any personal information attached to contacts was downloaded and stored. Google reported shortly after this spamming went viral that over one million accounts were potentially compromised and the unauthorized application was shut down, as well as the email accounts that were the source of the scam. Information from email accounts linked to sites such as iTunes, Amazon, Twitter, and Facebook were the most vulnerable to this scam. Any users who had encountered this phishing email were asked to change their emails and passwords immediately. An interesting thing to note is that a majority of these emails were addressed to “hhhhhhhhhhhhhhhh@mailinator.com” (Forbes.com).

One of the first things that you should look for when it comes to identifying phishing emails is the sender’s name, the name that they have addressed the email to, and the language they have used. If there are typos, or if the language is not clear, that should be your first indication that the email in question is not valid. Most often the email address of the sender will look like an official domain, but there could be minor differences such as a period between words, or a domain extension from another country such as “.ru” or “br”, which can be hard to miss. If links are provided in the body of the email, hover your cursor over them and the destination for the link should pop up. If an IP address comes up instead of the domain name, then the link could be fraudulent. Another item to look for is the tone of the message. If you receive an email that has a threat such as closure of an account, that tone is your best indication that the message is fraudulent. A good source of examples for phishing is the Microsoft website, which also lists the information for phishing phone calls and how to report phishing activity.

Taking that extra moment to evaluate an email is your best line of defense in keeping your private information safe. Make sure to update your email passwords and delete unwanted or fraudulent emails as soon as possible. If you are interested in how online security works, and want to learn more about protecting online identities think about the possibility of a career in Cybersecurity. This field is growing fast and will be a lucrative degree option long into the future. Call Coleman today to schedule an appointment and speak with an admissions counselor at (858) 499-0202 Monday through Friday.

 

 

Faculty Spotlight: Thomas Byrne (Cybersecurity Program)

Part of what makes Coleman University so unique to San Diego is the incredible faculty that we have on our campus. Technology and its development are not pastimes for our faculty; their careers and passions are built around it. We sat down with one of our Cybersecurity instructors, Mr. Thomas Byrne, to talk about his passion for technology and teaching. Hopefully we can show you something new and exciting about your instructors!

Mr. Byrne (far right) stands with his First Robotics Team at the Central Valley Regional in March of 2016. This photo was taken after the team had secured a spot in a semi-final for the second time that month!

1.So, Mr. Byrne, what drew you to technology and network security?

I grew up with technology and thinking back here are some of my memories: I was literally amazed at my first RED Led watch in the mid 1970’s as well as PONG, which I had hooked up to my TV. I thought to myself “this is the future, these digital readouts.”  Then one day in 1982 my father, who worked at McDonnell Douglas in Long Beach as a Branch Chief Engineer, brought home a Compupro 8/16. It ran CP/M off of 8-inch floppies. One of my favorite games to play on the computer was “Colossal Cave Adventure,” which was a text based adventure game that made you visualize the world you were exploring. I spent a lot of time exploring that cave and one day I got stuck in the cave and actually phoned the author for a game hint in the help file. That was cool, knowing that I could phone the creator of the game. The hint was “Did you get the axe? Did you throw the axe at the Minotaur?” Ooops! I also read a lot when I was a kid, and I eventually came across tech magazines in the electronics store. I read an article and found out that you could punch a hole on the back of that huge floppy to make it double sided; it was so exciting to learn that I could double my storage!  I learned to program in Assembly, which meant manipulating the CPU stack, and I watched my dad write code to track expenses and even predict when airplanes were flying overhead as they landed in LAX. I also received my HAM radio license back when you had to learn Morse code and was communicating with people in Japan and Germany… so that’s how I sort of got hooked on technology, it was my fun time. As for network security, I like to be secure and wanted to learn how to maintain my systems against threats. I saw all the virus activity and did not want to lose my data, so I researched how to stay safe online and really liked understanding how the hackers think and what motivates them. I also learned how vulnerable this technology is, and I wanted to do something about it.

2.How long have you been teaching at Coleman? What inspired you to become a teacher?

I was hired as an Instructor in August of 2010. Before that I was a corporate trainer for Luxottica. I always was someone who could learn and then explain almost any topic and gain insights on it. I really like helping people understand difficult concepts in cybersecurity. This is a huge positive, as a lot of the material can be difficult until you understand it. I try to make it easy to understand, so that my students can remember the material down the road and make use of that knowledge. I try my best to cut through the noise to the essence of what’s really important to know.

3.Do you have a piece of advice or information that you want all of your students to know before they graduate?

There is a job for you, as the world certainly needs trained cybersecurity professionals. It will not be handed to you though. One piece of advice I have is to be very flexible in your careers and gravitate to the areas that interest you. Learn everything you can about security and technology; we live in amazing times and the whole world is going through a digital transformation right now. The world needs your help, so study hard and keep up with all the changes in technology and security. The Internet is a great human resource, so use it; learn how to find good sources of information and never stop learning. It’s very important to learn to interact with others in a positive way and become a good communicator. Be a positive person. Technology is hard for many so help them understand it.

4.Where do you go for the most accurate and up-to-date information on what is happening in technology?

I take advantage of my commute time and listen to podcasts. I’ve got my podcast apps, and I can tie into any podcast out there. I listen to Google, Apple, Microsoft, Security Podcasts, etc. It really comes down to about five companies that are at the head of technology development. It is all interesting to watch and hear, like a big game to see who will come out with the next trend.

5.What are some basic tactics that you would recommend to the public, who may not be fully aware of online cyber risks?

First of all, don’t believe in total privacy online. If you’re on the Internet regularly, you are not doing it privately. If you’re using the Internet you’re going to be in some database somewhere. In regard to keeping your own computers and other devices secure, try not to click on links that you don’t recognize, use two-factor authentication whenever possible, have a password manager for your personal emails and other log-ins, keep up with the news, and don’t go to websites that you can’t verify. Most importantly, don’t allow any action on your devices that you do not personally approve. So if an email comes up with a link that you do not know, reverse it, call the company directly and ask if they contacted you. You need to initiate the connection instead of assuming a provided link is good.

6.What are you involved in outside of the classroom that involves technology development?

Well, I am a mentor for First Robotics. My son wanted to start a robotics club at his high school with two friends, after seeing that other schools around the city, such as Hi Tech High had them. They started a robotics team for Mission Hills High School in San Marcos. I met with them and let them know that I wanted to help out, so I met all the parents of the other students and we worked together to start a robotics team. It’s a lot of work! You have to form the team, and it costs about $4000 to compete in these competitions, so that takes a lot of fundraising. You’re given parameters like the weight of the robots, which has to be 120 pounds, and the cost, which has to be less than $4000, and so on. So you need to get sponsors. We got started in the robotics competitions in San Diego four years ago, and our first project was a defensive robot which was required to have the ability for aerial assist. In that first competition we placed 23rd out of 60 teams, which was pretty high for a rookie team, considering that some of the other teams had been doing this for at least ten years. From there we ended up going to St. Louis to compete, because we won Rookie All Star; we were up against teams from across the nation, but there are also about 30 countries that do this every year as well. Right now there are about 6,000 teams globally that are a part of this competition. We were up against the best and that motivated us to come back even better the next time. So in the following years we have been semi-finalists in both the national and international competitions. This year we were semi-final and quarter-finalists. There are a lot of scholarships attached to this, so students can get money from Boeing and other companies who are looking for engineers to sponsor. Our team is so successful because we have so many mentors who specialize in every aspect of building and implementing.

7.What is an up and coming technology or technology trend that you are really excited about?

Well people like to say that my head is in the clouds, because I am so invested in cloud computing! This is the next paradigm shift in major technology. A cloud service run by major corporations like Google and Microsoft provides the advantage of a powerful storage facility, with massive processing power, and servers that can shift their computing power to adapt to any situation. In regards to hacking, people are going to start seeing the value of the cloud, because it offers more security at less expense, and it is consistently updated. The ability to share and store information will connect the world and give everyone access to technology.

 

We want to thank Mr. Byrne for taking the time to tell us about himself and his passion for technology. Keeping students motivated and engaged is a full-time job and there is a lot more beneath the surface here than you might think. Join us again next month for another spotlight on our incredible faculty at Coleman University! If you would like to know more about First Robotics and the team that Mr. Byrne is mentoring follow the links below.

https://www.firstinspires.org/robotics/frc

https://www.facebook.com/team5137/

 

There’s More to the Story Than You Think: Women in Technology

March is Women’s History Month, a time to reflect on the contributions and movements that have come from women throughout history. Think about what you take for granted every day without thinking of where it came from or who invented it; would you immediately think a woman had created it? Take the modern medical syringe, an item that is now in every doctor’s office across the globe. The first patent for the single plunger syringe was given to a woman, Leticia Greer, in New York in the year 1899 (you can see the original patent application here). In 1966 a woman by the name of Stephanie Kwolek invented the first prototype for Kevlar, the material that would become integral in crash helmets, radial tires, and eventually bulletproof vests (learn more about her invention here). We also owe a lot of our modern inventions in computing and coding to women who were passionate about, and dedicated to improving, technology.

The first documented coding concept for a machine was invented by the Mathematician Ada Lovelace, who had become fascinated with Charles Babbage’s design for a computing machine. The Analytical Engine was conceptualized to perform long and complex mathematical equations in a short amount of time. Using the pattern designs from the Jacquard Loom, Lovelace conceptualized a set of “cards” that would have holes in them that would correspond with numbers and patterns established by the creator. These cards would be read through the holes by the machine and in turn produce a numerical answer. The notes on this card design that Lovelace published in a Scientific Memoirs journal are now considered to be the first plan for a “coding” system for a machine. The Analytical Engine could have been programmable, thus making it customize-able for various types of computing and the punch cards could then also be reused. Initially Ada Lovelace imagined that this engine would be used to create and play music, as well as do complex mathematics. Though the Analytic Engine was never constructed, the notes that Lovelace published set the ground work for the future of programming and computing. For more information on Ada Lovelace and her programming design, click here or visit The Ada Project website.

Another pioneer in computing and programming is Grace Hopper, an Admiral in the United States Navy. Have you ever “de-bugged” your computer? Well that term came from Grace Hopper herself! After removing a moth from the Mark I computer and taping it to her notebook, the term stuck and has been a part of our culture ever since. Hopper was born at the beginning of the 20th century in New York City. After completing her Bachelor’s in Mathematics, she went on the Yale to complete her Master’s and then her Ph.D. She taught for a number of years until she enlisted in the United States Navy Reserve where she was assigned to the Bureau of Ships Computation Project being researched at Harvard University. She was then later named as a Research Fellow. Her work was dedicated to the first large-scale computer named the Mark I, and would go on to help develop the Mark II and Mark III. After working with numerical code in computing, Hopper began work on the first computer compiler and computer programming language referred to as COBOL. It was her idea to start collecting programming commands for a shared library of codes in order to save time and reduce programming errors on projects. The collection of commands using binary code allowed for the computers to begin to understand basic phrases in English and then translate them into binary. She is called “Amazing Grace” for a reason! Learn more about her life and her work here, at the US Navy website.

Mathematicians have been integral in computer and science technologies and even space exploration. During the Space Race in the 1960s, Katherine Johnson paved the way for space flight and helped NASA put Astronauts into orbit, and put them on the Moon. Her story begins in West Virginia where she was born in 1918. From an early age she was gifted with incredible curiosity and determination to succeed. She moved ahead several grades when she was in middle school, and started high school at the age of 13. She graduated from West Virginia State College with honors and began a career teaching mathematics in 1937. By 1939, she was invited to become one of the first African American citizens to attend the Graduate program at the recently opened West Virginia University. Though she left the program early to marry and start a family, she still continued to teach math in local public schools. In 1952 she applied to become a computer for the National Advisory Committee for Aeronautics’ (NACA’s) Langley Laboratory. At the time this computing section was all African American; science was still segregated. After her first two weeks, she was promoted to work on the Maneuver Loads Branch of the Flight Research Division where she analyzed data from flight tests. After the successful launch of Sputnik from Russia, her work became much more in demand.  As NACA (soon to be NASA) began to frantically develop a plan to put men into space, Johnson became an integral part of the team to calculate and analyze data in order to make that happen. Her calculations were used for the Freedom 7 mission in 1961 that put a human into orbit around the Earth, which led to her development of a set of calculations and equations that would make it possible to accurately determine the landing point of a space craft. However, her most famous project was the orbital mission of John Glenn, who demanded that she do the calculations for his orbit despite the mechanical machines that had been put in place to do all of it. He trusted her mind and her calculations with his life, and would not go into space until she had confirmed that the machine’s results were accurate. She did all of the thousands of calculations by hand, using only her desktop mechanical calculating machine, which was at the time the equivalent to a basic calculator. She was also asked to work on the plans for the moon landing and her calculations helped to ensure that the Lunar Lander would synch with the Command and Service Module. After 33 years in Langley, she retired. In 2015, at the age of 97 she was awarded the Presidential Medal of Freedom. You can read more about her on the NASA website.

We owe a lot to the women who have taken their passions and followed them into greatness. These three women are just the tip of the iceberg on a long list of female led technology development throughout history. The next time you turn on your laptop, or use your phone to calculate, think of these women who had to create these technologies that we freely use today. For more on these women, click on the links provided or go to computerscience.org for more information on other women who have made history and the issues that women in technology are still facing.