Connect with us

Technology

Let Hackers In: Experts Say Traps Might Be Better Than Walls

Published

on

In this Jan. 20, 2015, Kwon Seok-chul, CEO at computer security firm Cuvepia Inc., presents "Kwon-ga," a real-time monitoring solution that detects hackers during an interview at his office in Seongnam, South Korea. Ever since the Internet blossomed in the 1990s, cybersecurity was built on the idea that computers could be protected by a digital quarantine. Now, as hackers routinely overwhelm such defenses, experts say cybersecurity is beyond due an overhaul. Their message: Neutralize attackers once they’re inside networks rather than fixating on trying to keep them out. In South Korea, where government agencies and businesses have come under repeated attacks from hackers traced by Seoul to North Korea, several security firms have jumped on the growing global trend to develop systems that analyze activity to detect potentially suspicious patterns rather than scanning for known threats. Kwon said it has been tough to convince executives that it’s more effective to catch bad guys after they’ve infiltrated a network instead of trying to keep them out, which he believes is impossible anyway. (AP Photo/Ahn Young-joon)

In this Jan. 20, 2015, Kwon Seok-chul, CEO at computer security firm Cuvepia Inc., presents “Kwon-ga,” a real-time monitoring solution that detects hackers during an interview at his office in Seongnam, South Korea. (AP Photo/Ahn Young-joon)

YOUKYUNG LEE, AP Technology Writer

SEOUL, South Korea (AP) — Ever since the Internet blossomed in the 1990s, cybersecurity was built on the idea that computers could be protected by a digital quarantine. Now, as hackers routinely overwhelm such defenses, experts say cybersecurity is beyond due an overhaul.

Their message: Neutralize attackers once they’re inside networks rather than fixating on trying to keep them out.

First they need to convince a conservative business world to gamble on a different approach. And having sold generations of defensive systems that consistently lagged the capabilities of the most advanced hackers, the industry itself must overcome skepticism it’s flogging another illusion of security.

According to U.S. cybersecurity company FireEye, 229 days is the median length of time attackers lurk inside their victim’s computers before being detected or revealing themselves, underscoring the weakness of conventional tools in identifying sophisticated intruders.

The traditional defenses must “have a description of the bad guys before they can help you find them,” said Dave Merkel, chief technology officer at FireEye Inc. “That’s just old and outmoded. And just doesn’t work anymore,” he said.

“There’s no way to guarantee that you never are the victim of cyberattack.”

Merkel said in the worst case he knows of, attackers hid themselves for years.

Experts aren’t recommending organizations stop deploying perimeter defenses such as antivirus software or firewalls that weed out vanilla threats. But they say a strategy that could be likened to laying traps is needed to counter the sophisticated hacks that can cause huge losses.

The weakness of relying on a firewall is that it’s like building a fence around a housing complex but not hiring a guard to patrol the interior streets, said Ed Amoroso, chief security officer at AT&T.

The hackers who targeted Anthem, the second biggest U.S. health insurer, and accessed personal information of 80 million customers, may have been inside its system for more than a month before being detected, according to the company.

In the famous Sony Pictures hack, the attackers who breached the Hollywood studio’s network went unnoticed until computers were paralyzed and a mountain of data was dumped on the Internet.

The amount of data copied and removed from Sony’s systems should have set off internal alarms long before Sony workers found their PCs taken over by malware, said Mike Potts, CEO of Lancope, a network security company based in Alpharetta, Georgia.

The cybersecurity industry characterizes such long-term intrusions as advanced persistent threats or APT. They are often sponsored by states and target valuable commercial and military information.

In South Korea, where government agencies and businesses have come under repeated attacks from hackers traced by Seoul to North Korea, several security firms have jumped on the growing global trend to develop systems that analyze activity to detect potentially suspicious patterns rather than scanning for known threats.

Kwon Seok-chul, CEO at computer security firm Cuvepia Inc., said it has been tough to convince executives that it’s more effective to catch bad guys after they’ve infiltrated a network instead of trying to keep them out, which he believes is impossible anyway.

Kwon said his company’s latest monitoring product keeps a log of all activity, dividing it into authorized users and possible attackers. When certain conditions are met, the program sounds an alarm. A response team, he said, can sit back and watch what hackers copy and respond before damage is done. The security team can cut the hacker’s connection or trick the intruder into stealing empty files.

“Because hackers are in your palm, you can enforce any measures that you want,” said Kwon, member of an advisory board for South Korea’s cyberwarfare command.

In one case, the security team at one of Kwon’s clients “enjoyed” watching for about an hour as a hacker scanned its network and installed tools to unlock passwords and counter antivirus programs.

He said that for skilled hackers, it usually takes about 20 minutes to lay out the initial steps of the attack that allow them to stealthily roam a network. Normally the security team would counterattack within a few minutes after gathering intelligence about the hacker’s tools. But in this case, the hacker was not sophisticated and employed well-known programs mostly made in China.

Eventually, the security team severed the hacker’s connection to the victim’s computer based on the unique ID of the program that Cuvepia’s software showed the hacker was using.

According to FireEye’s Merkel, there is a rise in awareness in the U.S. and growing interest in Asia in modern approaches to information security that include using automated programs to scan for unusual network activity, encryption and segregating sensitive data in special “domains” that require additional credentials to access.

But many companies are in denial about their vulnerability or are reluctant to spend more on cybersecurity, he said.

In the financial industry at least, part of the reason is greater concern with meeting regulatory requirements for security than improving security itself.

When encryption is used, South Korean courts have limited the liability of companies that faced lawsuits from customers over stolen data, said Hwang Weoncheol, a former chief information security officer at a South Korean financial institution. That reinforces the security strategy centered on compliance with regulation, he said.

Protecting high value information often comes with a high price tag.

Installing Cuvepia’s cheapest monitoring product on 1,000 computers for a year costs 450 million won ($410,000). That is many times the cost of installing antivirus software though the cost drops significantly after the first year.

The answer for executives, said Kwon, is to see cybersecurity as an investment not a cost.

___

Youkyung Lee on Twitter: www.twitter.com/YKLeeAP

AP Technology Writer Brandon Bailey in San Francisco contributed.

Copyright 2015 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Activism

Golden State Warriors Program Is Inspiring Next Generation of Female Engineers

Breaking down barriers and biases that deter young girls from pursuing STEAM subjects is essential for creating a level playing field and ensuring equal opportunities for all. By challenging stereotypes and promoting a culture of inclusivity and diversity in STEAM fields, experts believe young girls can be empowered to pursue their interests and aspirations without limitations confidently. Encouraging mentorship, providing access to resources, and celebrating girls’ achievements in STEAM are all crucial steps in creating a supportive environment that fosters success.

Published

on

Front Row: UC Berkeley Steel Bridge Team Back Row: Girls, Inc. Participants. Photo courtesy of the Golden State Warriors.
Front Row: UC Berkeley Steel Bridge Team Back Row: Girls, Inc. Participants. Photo courtesy of the Golden State Warriors.

By Y’Anad Burrell

The Golden State Warriors and e-commerce giant Rakuten are joining forces to inspire the next generation of female engineers through Building STEAM Futures, part of The City Calls campaign.

Organizers say the initiative is founded on the idea that science, technology, engineering, arts, and mathematics (STEAM) are crucial fields for innovation and progress, and empowering young girls to pursue careers in these areas is more important than ever. Studies consistently show that girls are underrepresented in STEAM fields, resulting in a gender disparity that limits potential and hinders diversity.

Breaking down barriers and biases that deter young girls from pursuing STEAM subjects is essential for creating a level playing field and ensuring equal opportunities for all. By challenging stereotypes and promoting a culture of inclusivity and diversity in STEAM fields, experts believe young girls can be empowered to pursue their interests and aspirations without limitations confidently. Encouraging mentorship, providing access to resources, and celebrating girls’ achievements in STEAM are all crucial steps in creating a supportive environment that fosters success.

On Saturday, March 8, International Women’s Day, the Warriors and Rakuten hosted 20 middle school girls from Girls Inc. of Alameda County at Chase Center’s Above the Rim for a hands-on bridge-building experience. The young girls from Girls, Inc. of Alameda County had an opportunity to design, build and test their own bridge prototypes and learn the fundamentals of bridge construction from the Engineering Alliance and the UC Berkeley Steel Bridge Team.

This STEAM experience for the girls followed the first session in January, where they took a behind-the-scenes tour of the Golden Gate Bridge, learning about its design and construction from industry experts. The City Calls campaign, tipped off with the unveiling the Warriors’ new bridge-themed City Edition jerseys and court design earlier this year.

Continue Reading

Activism

Self-eSTEM Empowers BIPOC Women, Girls in Science, Math

In January 2025, Self-eSTEM will launch digital and generative AI programming, which provides digital literacy and AI literacy training through an entrepreneurial project-based activity. This programming will be a hybrid (i.e. in-person and online).  Additionally, thanks to a grant from Comcast, in spring 2025, the organization will have a co-ed series for middle and high school students.

Published

on

Adamaka Ajaelo. Courtesy photo.
Adamaka Ajaelo. Courtesy photo.

By Y’Anad Burrell
Special to The Post

In a world where technology plays an increasingly central role in all aspects of life, the importance of Science, Technology, Engineering, and Math (STEM) education cannot be overstated. Recognizing the significance of STEM for the future, focusing on young women and girls is a critical step in achieving gender equality and empowering the next generation.

Self-eSTEM, an Oakland-based non-profit organization, was founded by Adamaka Ajaelo, an Oakland native who had a successful corporate career with several Bay Area technology and non-tech companies. Ajaelo boldly decided to step away from these companies to give 100% of her time and talent to the non-profit organization she started in 2014 in the belief that she can change the game in innovation and future STEM leaders.

Over the course of a decade, Ajaelo has provided futurist tech programming to more than 2,000 BIPOC women and girls. The organization has an Early STEM Immersion Program for ages 7-17, Emerging Leaders Workshops for ages 18-25 and volunteer network opportunities for ages 25 and up.

In January 2025, Self-eSTEM will launch digital and generative AI programming, which provides digital literacy and AI literacy training through an entrepreneurial project-based activity. This programming will be a hybrid (i.e. in-person and online).  Additionally, thanks to a grant from Comcast, in spring 2025, the organization will have a co-ed series for middle and high school students.

While the organization’s programs center on innovation and technology, participants also gain other valuable skills critical for self-development as they prepare for a workforce future. “Self-eSTEM encourages young women to expand on teamwork, communication, creativity, and problem-solving skills. The organization allows young women to enter STEM careers and pathways,” said Trinity Taylor, a seventh-year innovator.

“Our journey over the last decade is a testament to the power of community and opportunity, and I couldn’t be more excited for what the future holds as we continue to break barriers and spark dreams,” said Ajaelo.

“By encouraging girls to explore STEM fields from a young age, we foster their intellectual growth and equip them with the tools needed to thrive in a competitive global economy,” Ajaelo says.

Empowering young girls through STEM education is also a key driver of innovation and progress. When young women and girls are encouraged to pursue careers in STEM, they bring unique perspectives and problem-solving approaches to the table, leading to more diverse and inclusive solutions. This diversity is crucial for driving creativity and pushing boundaries in scientific and technological advancements.

Self-eSTEM has fundraising opportunities year-round, but year-end giving is one of the most critical times to support the program. Visit www.selfestem.org to donate to the organization, as your generosity and support will propel programming support for today’s innovators.

You will also find more details about Self-eSTEM’s programs on their website and social channels @selfestemorg

Continue Reading

Antonio‌ ‌Ray‌ ‌Harvey‌

Feds: California Will Be Home to New National Semiconductor Technology Center

California was chosen by the U.S. Department of Commerce (Commerce) and Natcast, the operator of the National Semiconductor Technology Center (NSTC) to be home to the headquarters for the National Semiconductor Technology Center – as part of the Biden-Harris Admin’s CHIPS and Science Act. The CHIPS for America Design and Collaboration Facility (DCF) will be one of three CHIPS for America research and design (R&D) facilities and will also operate as the headquarters for the NTSC and Natcast.

Published

on

iStock
iStock

By Antonio Ray Harvey

California was chosen by the U.S. Department of Commerce (Commerce) and Natcast, the operator of the National Semiconductor Technology Center (NSTC) to be home to the headquarters for the National Semiconductor Technology Center – as part of the Biden-Harris Admin’s CHIPS and Science Act.

The CHIPS for America Design and Collaboration Facility (DCF) will be one of three CHIPS for America research and design (R&D) facilities and will also operate as the headquarters for the NTSC and Natcast.

“We are thrilled that the Department of Commerce and Natcast chose to locate this critically important facility in Sunnyvale, the heart of the Silicon Valley, alongside the world’s largest concentration of semiconductor businesses, talent, intellectual property, and investment activity,” said Dee Dee Myers, Senior Economic Advisor to Gov. Gavin Newsom and Director of the Governor’s Office of Business and Economic Development (GO-Biz). “The Newsom Administration and our partners across the industry know how important it is to shorten the timeframe from R&D to commercialization.”

According to GO-Biz, the DCF is expected to direct over $1 billion in research funding and create more than 200 employees in the next decade. The facility will serve as the center for advanced semiconductor research in chip design, electronic design automation, chip and system architecture, and hardware security. The CHF will be essential to the country’s semiconductor workforce development efforts.

As detailed in the released NSTC Strategic Plan, the DCF will suppress the obstacles to “semiconductor prototyping, experimentation,” and other R&D activities that will enhance the country’s global power and leadership in design, materials, and process innovation while enabling a vigorous domestic industr“Establishing the NSTC headquarters and design hub in California will capitalize on our state’s unparalleled assets to grow a highly skilled workforce and develop next-generation advancements,” stated U.S. Sen. Alex Padilla (D-Calif.). “This CHIPS Act funding will propel emerging technologies and protect America’s global semiconductor leadership, all while bringing good-paying jobs to our state.”

Continue Reading

Subscribe to receive news and updates from the Oakland Post

* indicates required

CHECK OUT THE LATEST ISSUE OF THE OAKLAND POST

ADVERTISEMENT

WORK FROM HOME

Home-based business with potential monthly income of $10K+ per month. A proven training system and website provided to maximize business effectiveness. Perfect job to earn side and primary income. Contact Lynne for more details: Lynne4npusa@gmail.com 800-334-0540

Facebook

Trending

Technology

Let Hackers In: Experts Say Traps Might Be Better Than Walls

Published

on

In this Jan. 20, 2015, Kwon Seok-chul, CEO at computer security firm Cuvepia Inc., presents "Kwon-ga," a real-time monitoring solution that detects hackers during an interview at his office in Seongnam, South Korea. Ever since the Internet blossomed in the 1990s, cybersecurity was built on the idea that computers could be protected by a digital quarantine. Now, as hackers routinely overwhelm such defenses, experts say cybersecurity is beyond due an overhaul. Their message: Neutralize attackers once they’re inside networks rather than fixating on trying to keep them out. In South Korea, where government agencies and businesses have come under repeated attacks from hackers traced by Seoul to North Korea, several security firms have jumped on the growing global trend to develop systems that analyze activity to detect potentially suspicious patterns rather than scanning for known threats. Kwon said it has been tough to convince executives that it’s more effective to catch bad guys after they’ve infiltrated a network instead of trying to keep them out, which he believes is impossible anyway. (AP Photo/Ahn Young-joon)

In this Jan. 20, 2015, Kwon Seok-chul, CEO at computer security firm Cuvepia Inc., presents “Kwon-ga,” a real-time monitoring solution that detects hackers during an interview at his office in Seongnam, South Korea. (AP Photo/Ahn Young-joon)

YOUKYUNG LEE, AP Technology Writer

SEOUL, South Korea (AP) — Ever since the Internet blossomed in the 1990s, cybersecurity was built on the idea that computers could be protected by a digital quarantine. Now, as hackers routinely overwhelm such defenses, experts say cybersecurity is beyond due an overhaul.

Their message: Neutralize attackers once they’re inside networks rather than fixating on trying to keep them out.

First they need to convince a conservative business world to gamble on a different approach. And having sold generations of defensive systems that consistently lagged the capabilities of the most advanced hackers, the industry itself must overcome skepticism it’s flogging another illusion of security.

According to U.S. cybersecurity company FireEye, 229 days is the median length of time attackers lurk inside their victim’s computers before being detected or revealing themselves, underscoring the weakness of conventional tools in identifying sophisticated intruders.

The traditional defenses must “have a description of the bad guys before they can help you find them,” said Dave Merkel, chief technology officer at FireEye Inc. “That’s just old and outmoded. And just doesn’t work anymore,” he said.

“There’s no way to guarantee that you never are the victim of cyberattack.”

Merkel said in the worst case he knows of, attackers hid themselves for years.

Experts aren’t recommending organizations stop deploying perimeter defenses such as antivirus software or firewalls that weed out vanilla threats. But they say a strategy that could be likened to laying traps is needed to counter the sophisticated hacks that can cause huge losses.

The weakness of relying on a firewall is that it’s like building a fence around a housing complex but not hiring a guard to patrol the interior streets, said Ed Amoroso, chief security officer at AT&T.

The hackers who targeted Anthem, the second biggest U.S. health insurer, and accessed personal information of 80 million customers, may have been inside its system for more than a month before being detected, according to the company.

In the famous Sony Pictures hack, the attackers who breached the Hollywood studio’s network went unnoticed until computers were paralyzed and a mountain of data was dumped on the Internet.

The amount of data copied and removed from Sony’s systems should have set off internal alarms long before Sony workers found their PCs taken over by malware, said Mike Potts, CEO of Lancope, a network security company based in Alpharetta, Georgia.

The cybersecurity industry characterizes such long-term intrusions as advanced persistent threats or APT. They are often sponsored by states and target valuable commercial and military information.

In South Korea, where government agencies and businesses have come under repeated attacks from hackers traced by Seoul to North Korea, several security firms have jumped on the growing global trend to develop systems that analyze activity to detect potentially suspicious patterns rather than scanning for known threats.

Kwon Seok-chul, CEO at computer security firm Cuvepia Inc., said it has been tough to convince executives that it’s more effective to catch bad guys after they’ve infiltrated a network instead of trying to keep them out, which he believes is impossible anyway.

Kwon said his company’s latest monitoring product keeps a log of all activity, dividing it into authorized users and possible attackers. When certain conditions are met, the program sounds an alarm. A response team, he said, can sit back and watch what hackers copy and respond before damage is done. The security team can cut the hacker’s connection or trick the intruder into stealing empty files.

“Because hackers are in your palm, you can enforce any measures that you want,” said Kwon, member of an advisory board for South Korea’s cyberwarfare command.

In one case, the security team at one of Kwon’s clients “enjoyed” watching for about an hour as a hacker scanned its network and installed tools to unlock passwords and counter antivirus programs.

He said that for skilled hackers, it usually takes about 20 minutes to lay out the initial steps of the attack that allow them to stealthily roam a network. Normally the security team would counterattack within a few minutes after gathering intelligence about the hacker’s tools. But in this case, the hacker was not sophisticated and employed well-known programs mostly made in China.

Eventually, the security team severed the hacker’s connection to the victim’s computer based on the unique ID of the program that Cuvepia’s software showed the hacker was using.

According to FireEye’s Merkel, there is a rise in awareness in the U.S. and growing interest in Asia in modern approaches to information security that include using automated programs to scan for unusual network activity, encryption and segregating sensitive data in special “domains” that require additional credentials to access.

But many companies are in denial about their vulnerability or are reluctant to spend more on cybersecurity, he said.

In the financial industry at least, part of the reason is greater concern with meeting regulatory requirements for security than improving security itself.

When encryption is used, South Korean courts have limited the liability of companies that faced lawsuits from customers over stolen data, said Hwang Weoncheol, a former chief information security officer at a South Korean financial institution. That reinforces the security strategy centered on compliance with regulation, he said.

Protecting high value information often comes with a high price tag.

Installing Cuvepia’s cheapest monitoring product on 1,000 computers for a year costs 450 million won ($410,000). That is many times the cost of installing antivirus software though the cost drops significantly after the first year.

The answer for executives, said Kwon, is to see cybersecurity as an investment not a cost.

___

Youkyung Lee on Twitter: www.twitter.com/YKLeeAP

AP Technology Writer Brandon Bailey in San Francisco contributed.

Copyright 2015 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Activism

Golden State Warriors Program Is Inspiring Next Generation of Female Engineers

Breaking down barriers and biases that deter young girls from pursuing STEAM subjects is essential for creating a level playing field and ensuring equal opportunities for all. By challenging stereotypes and promoting a culture of inclusivity and diversity in STEAM fields, experts believe young girls can be empowered to pursue their interests and aspirations without limitations confidently. Encouraging mentorship, providing access to resources, and celebrating girls’ achievements in STEAM are all crucial steps in creating a supportive environment that fosters success.

Published

on

Front Row: UC Berkeley Steel Bridge Team Back Row: Girls, Inc. Participants. Photo courtesy of the Golden State Warriors.
Front Row: UC Berkeley Steel Bridge Team Back Row: Girls, Inc. Participants. Photo courtesy of the Golden State Warriors.

By Y’Anad Burrell

The Golden State Warriors and e-commerce giant Rakuten are joining forces to inspire the next generation of female engineers through Building STEAM Futures, part of The City Calls campaign.

Organizers say the initiative is founded on the idea that science, technology, engineering, arts, and mathematics (STEAM) are crucial fields for innovation and progress, and empowering young girls to pursue careers in these areas is more important than ever. Studies consistently show that girls are underrepresented in STEAM fields, resulting in a gender disparity that limits potential and hinders diversity.

Breaking down barriers and biases that deter young girls from pursuing STEAM subjects is essential for creating a level playing field and ensuring equal opportunities for all. By challenging stereotypes and promoting a culture of inclusivity and diversity in STEAM fields, experts believe young girls can be empowered to pursue their interests and aspirations without limitations confidently. Encouraging mentorship, providing access to resources, and celebrating girls’ achievements in STEAM are all crucial steps in creating a supportive environment that fosters success.

On Saturday, March 8, International Women’s Day, the Warriors and Rakuten hosted 20 middle school girls from Girls Inc. of Alameda County at Chase Center’s Above the Rim for a hands-on bridge-building experience. The young girls from Girls, Inc. of Alameda County had an opportunity to design, build and test their own bridge prototypes and learn the fundamentals of bridge construction from the Engineering Alliance and the UC Berkeley Steel Bridge Team.

This STEAM experience for the girls followed the first session in January, where they took a behind-the-scenes tour of the Golden Gate Bridge, learning about its design and construction from industry experts. The City Calls campaign, tipped off with the unveiling the Warriors’ new bridge-themed City Edition jerseys and court design earlier this year.

Continue Reading

Activism

Self-eSTEM Empowers BIPOC Women, Girls in Science, Math

In January 2025, Self-eSTEM will launch digital and generative AI programming, which provides digital literacy and AI literacy training through an entrepreneurial project-based activity. This programming will be a hybrid (i.e. in-person and online).  Additionally, thanks to a grant from Comcast, in spring 2025, the organization will have a co-ed series for middle and high school students.

Published

on

Adamaka Ajaelo. Courtesy photo.
Adamaka Ajaelo. Courtesy photo.

By Y’Anad Burrell
Special to The Post

In a world where technology plays an increasingly central role in all aspects of life, the importance of Science, Technology, Engineering, and Math (STEM) education cannot be overstated. Recognizing the significance of STEM for the future, focusing on young women and girls is a critical step in achieving gender equality and empowering the next generation.

Self-eSTEM, an Oakland-based non-profit organization, was founded by Adamaka Ajaelo, an Oakland native who had a successful corporate career with several Bay Area technology and non-tech companies. Ajaelo boldly decided to step away from these companies to give 100% of her time and talent to the non-profit organization she started in 2014 in the belief that she can change the game in innovation and future STEM leaders.

Over the course of a decade, Ajaelo has provided futurist tech programming to more than 2,000 BIPOC women and girls. The organization has an Early STEM Immersion Program for ages 7-17, Emerging Leaders Workshops for ages 18-25 and volunteer network opportunities for ages 25 and up.

In January 2025, Self-eSTEM will launch digital and generative AI programming, which provides digital literacy and AI literacy training through an entrepreneurial project-based activity. This programming will be a hybrid (i.e. in-person and online).  Additionally, thanks to a grant from Comcast, in spring 2025, the organization will have a co-ed series for middle and high school students.

While the organization’s programs center on innovation and technology, participants also gain other valuable skills critical for self-development as they prepare for a workforce future. “Self-eSTEM encourages young women to expand on teamwork, communication, creativity, and problem-solving skills. The organization allows young women to enter STEM careers and pathways,” said Trinity Taylor, a seventh-year innovator.

“Our journey over the last decade is a testament to the power of community and opportunity, and I couldn’t be more excited for what the future holds as we continue to break barriers and spark dreams,” said Ajaelo.

“By encouraging girls to explore STEM fields from a young age, we foster their intellectual growth and equip them with the tools needed to thrive in a competitive global economy,” Ajaelo says.

Empowering young girls through STEM education is also a key driver of innovation and progress. When young women and girls are encouraged to pursue careers in STEM, they bring unique perspectives and problem-solving approaches to the table, leading to more diverse and inclusive solutions. This diversity is crucial for driving creativity and pushing boundaries in scientific and technological advancements.

Self-eSTEM has fundraising opportunities year-round, but year-end giving is one of the most critical times to support the program. Visit www.selfestem.org to donate to the organization, as your generosity and support will propel programming support for today’s innovators.

You will also find more details about Self-eSTEM’s programs on their website and social channels @selfestemorg

Continue Reading

Antonio‌ ‌Ray‌ ‌Harvey‌

Feds: California Will Be Home to New National Semiconductor Technology Center

California was chosen by the U.S. Department of Commerce (Commerce) and Natcast, the operator of the National Semiconductor Technology Center (NSTC) to be home to the headquarters for the National Semiconductor Technology Center – as part of the Biden-Harris Admin’s CHIPS and Science Act. The CHIPS for America Design and Collaboration Facility (DCF) will be one of three CHIPS for America research and design (R&D) facilities and will also operate as the headquarters for the NTSC and Natcast.

Published

on

iStock
iStock

By Antonio Ray Harvey

California was chosen by the U.S. Department of Commerce (Commerce) and Natcast, the operator of the National Semiconductor Technology Center (NSTC) to be home to the headquarters for the National Semiconductor Technology Center – as part of the Biden-Harris Admin’s CHIPS and Science Act.

The CHIPS for America Design and Collaboration Facility (DCF) will be one of three CHIPS for America research and design (R&D) facilities and will also operate as the headquarters for the NTSC and Natcast.

“We are thrilled that the Department of Commerce and Natcast chose to locate this critically important facility in Sunnyvale, the heart of the Silicon Valley, alongside the world’s largest concentration of semiconductor businesses, talent, intellectual property, and investment activity,” said Dee Dee Myers, Senior Economic Advisor to Gov. Gavin Newsom and Director of the Governor’s Office of Business and Economic Development (GO-Biz). “The Newsom Administration and our partners across the industry know how important it is to shorten the timeframe from R&D to commercialization.”

According to GO-Biz, the DCF is expected to direct over $1 billion in research funding and create more than 200 employees in the next decade. The facility will serve as the center for advanced semiconductor research in chip design, electronic design automation, chip and system architecture, and hardware security. The CHF will be essential to the country’s semiconductor workforce development efforts.

As detailed in the released NSTC Strategic Plan, the DCF will suppress the obstacles to “semiconductor prototyping, experimentation,” and other R&D activities that will enhance the country’s global power and leadership in design, materials, and process innovation while enabling a vigorous domestic industr“Establishing the NSTC headquarters and design hub in California will capitalize on our state’s unparalleled assets to grow a highly skilled workforce and develop next-generation advancements,” stated U.S. Sen. Alex Padilla (D-Calif.). “This CHIPS Act funding will propel emerging technologies and protect America’s global semiconductor leadership, all while bringing good-paying jobs to our state.”

Continue Reading

Trending

Copyright ©2021 Post News Group, Inc. All Rights Reserved.