This data set is associated with:
Turner, G. W. (2014). Proposal for the establishment of a National Service Learning Academy and complimentary Action Research Program at the University of Cincinnati. University of Cincinnati. https://doi.org/10.7945/2hmt-1h17.
In this proposal for a National Service Learning Academy and complimentary Action Research Program, several curricula configurations are put forth. The first is a full-blown action research major that partially dictates the appropriate courses to take fulfilling the A&S core requirements and the majority of free electives. The second is a minor/certificate in action research. The third is an alternative set of core courses that would replace the credit hours traditionally reserved for the A&S core requirements, enabling any student to tack on the action research experience to their chosen major while still having credit hours available to pursue other minors, certificates, or electives. The fourth is an alternative core that is based more heavily on applied courses and knowledge.
This webinar was a part of the Data and Computation Science Series and one of five webinars focused on the Publishing Lifecycle of Data. It occurred on August 24, 2020, at 2:00 pm EDT.
Sheila Rabun is the ORCID US Community Specialist at LYRASIS, providing dedicated support for institutions adopting ORCID (including University of Cincinnati). Sheila has a background in academic libraries, with a focus on digital workflows, research support, and advocating for interoperability in academia and scholarly communication workflows. Learn more about Sheila at https://orcid.org/0000-0002-1196-6279
Melissa Jacquart is an Assistant Professor in the Philosophy Department at the University of Cincinnati and Associate Director for the Center for Public Engagement with Science. Her research focuses on epistemological issues in the philosophy of science, specifically on the use of models and computer simulations in astrophysics. Her research also examines the role philosophy can play in general public understanding of science, and in science education. She also works on ethics & values in science, science policy, feminist philosophy, and educational best practices.
Prior to Cincinnati, she was a postdoctoral fellow at the University of Pennsylvania and the Carnegie Observatories. She has also worked for the National Science Foundation Directorate of Social, Behavioral, and Economic Sciences. She received her PhD, MA in Philosophy from The University of Western Ontario (Canada) and has a BS in Astronomy-Physics, Physics, and Philosophy from The University of Wisconsin-Madison.
This webinar was a part of the Data and Computation Science Series and one of five webinars focused on the Publishing Lifecycle of Data. It occurred on August 10, 2020, at 2:00 pm EDT.
Lawrence Bennett, Fire & EMS Law, https://doi.org/10.7945/yex7-xj45 Larry is an educator who has worked with Fire departments all over the nation. A noted educator, his textbook is used by professional groups and universities.
Abigail Goben, MLS, is an Associate Professor, Data Management Librarian, and Research Data Policy Advisor at the University of Illinois at Chicago. She teaches Evidence-Based Practice for the College of Dentistry, in the Clinical Informatics program, and a graduate Data Management course. Her current research focuses on student privacy and learning analytics, efficacy of data education, and research data policy. She is a co-investigator for the IMLS funded Data Doubles project. She blogs at HedgehogLibrarian.com and can be found on Twitter as @hedgielib.
Session Description: Publishing Data In Repositories - August 10th from 2-3pm
The currency of academia has long been the article. However, with supplemental materials in so many formats, the nature of the scholarly output has changed dramatically. Additionally funders and journals are requiring that the evidence for the articles is also available. Repositories are an excellent venue for these additional forms of scholarly, particular the data. In this session, attendees will learn about the nature of changing publication outputs, how repositories can help provide the needed infrastructure to share data and other research outputs, and how to make a bigger impact with your scholarship through publishing in a repository.
This list contains the titles and publication years of 599 articles from two Archaeology journals, Ancient Mesoamerica and Latin American Antiquity that contain the term, 'bone'. The articles named in this list were used as the dataset to generate LDA topic models for related research.
Six topic models were generated using Latent Dirichlet Allocation, an algorithm that considers the probability of words co-occurring in a document given a collection of documents. The collection of documents that these particular models are based on include 599 articles that include the term 'bone' from two archaeology journals, Ancient Mesoamerica and Latin American Antiquity.
This webinar was a part of the Data and Computation Science Series and one of five webinars focused on the Publishing Lifecycle of Data. It occurred on July 27, 2020, at 2:00 pm EDT.
Due to technical difficulties, the presentation starts at 8:47.
The presenter was Claudio Aspesi, Senior Research Analyst. He joined Sanford C. Bernstein & Co., LLC, in 2004 covering European media stocks. Previously he was Global Senior Vice President of Strategy at EMI Music and was responsible for defining the company’s business model as the music industry entered the digital age. Before joining EMI Music in 2002, Mr. Aspesi was a member of the executive team at Airclic, an Internet infrastructure company, and prior to that a Principal at McKinsey and Co., working with many leading media and entertainment companies. Mr. Aspesi graduated with the highest honors from Universita Luigi Bocconi, Milan, with a Laurea in Economia Aziendale.
Session Description - Open data and metadata - opportunities, risks, and possible actions
Research data is at the core of what universities do. Its value to researchers is, of course, paramount - and open science offers significant benefits to the scientific community. But this data, and the attached metadata, are increasingly valuable for third parties as well. We will discuss how research data and metadata increasingly overlaps with all the other data produced by academic institutions, how it is becoming increasingly valuable outside the academic community, and how it could become even more valuable in the future. The collection, analysis, synthesis and preservation of data and metadata, however, pose significant issues as well; for example, data can and is being used to evaluate individuals (with the biases implicit in developing algorithms to analyze them). More broadly, the collection and analysis of data raises privacy and academic freedom concerns, and so does the lack of transparency and accountability of third party users. Ultimately, the deployment of data analytics and Artificial Intelligence tools should fit with the broader values of the academic community, such as equity and sustainability - whether it does so is controversial.
In addition to the need to establish principles for the use of data analytics and Artificial Intelligence, there are also significant ethical questions that need to be addressed, and that pose significant challenges, and there are questions about how to ensure the long term preservation of data and metadata.
We will close the presentation with a look at possible steps that the academic community ought to take to address all these issues. We hope that a discussion will follow, in order to address questions and issues, as well as to gather points of view from participants
This webinar was a part of the Data and Computation Science Series and one of five webinars focused on the Publishing Lifecycle of Data. It occurred on July 13, 2020, at 2:00 pm EDT.
Jeffrey Layne Blevins (PhD) - is Head of the Journalism Department at the University of Cincinnati and editor of Democratic Communiqué. His scholarly focus is the political economy of U.S. media industries, and his most research includes data visualizations of social media activity involving social justice issues and the spread of misinformation on Twitter. The Communiqué is the official publication of the Union for Democratic Communications
Victoria Carr (PhD) - Professor of Early Childhood Education/Human Development and Executive Director of the Arlitt Center for Education, Research, and Sustainability at the University of Cincinnati, conducts research related to play and learning environments, teacher pedagogies, and children’s experiences in nature. Her research on nature playscapes and STEM education has been supported by the US National Science Foundation. She serves as Co-Editor for Children, Youth & Environments, co-chair of the Leave No Child Inside Greater Cincinnati Collaborative, and as a Board of Directors member for Cincinnati Nature Center. She is an advocate for mindful, sustainable and child-friendly communities.
Theresa Culley (PhD) - is a Professor and Head of the Department of Biological Sciences. As a plant biologist, she co-founded and currently serves as Editor-in-Chief of Applications in Plant Sciences, an online methods journal published by the Botanical Society of America in association with Wiley Publishing. The journal highlights novel methods in all areas of the plant sciences, serving established professionals as well as junior researchers around the world.
Steven Lange - Director, graduated from Heidelberg College in Tiffin, Ohio with a Bachelor of Science degree in Biology. Steve became our director in 2013. He has over 25 years of experience in the leather industry, including tannery, finishing, and automotive cutting/wrapping operations. In addition to continually growing our roster of clients, he has taught over 200 students in our various classes. His knowledge of leather testing procedures and processes is unrivaled. In his free time, he volunteers for the Leader Dogs for the Blind organization, is the editor of the JALCA (Journal of the American Leather Chemists Association) and enjoys spending time with his family and dogs.
Publications have long been the currency for academia. The first publication can be the hardest. And today’s scholarly articles are more than pdfs and can include multi-media supplemental materials including raw or additional data, videos, interactive maps, and other components of your scholarship process. In this one hour web session, UC faculty who are journal editors will discuss how to - dentify the right journal for your work - avoid predatory journals - maximize your research impact through altmetrics and data publishing - increase your understanding of the publishing process through opportunities such as being a guest editor on a special issue or serving as a reviewer. This event is free and open to all seeking to publish their scholarship and maximize its impact.
The current debates revolving around 5G, Huawei, and how they are resolved, are highly visible indicators of the technology based shifts in the global order which are setting the tone for the 21st century. Currently, it seems that many in the US and the PRC are using Cold War and Thucydides Trap paradigms, with a zero-sum mentality. At least in the case of 5G technology, the UK seems to have taken a more nuanced approach.
This article comes as the UK prepares its new National Cyber Security Strategy, reviewing the 5G and cyber security debates surrounding Huawei in a highly interdisciplinary manner, and directing readers to a rich variety of resources. In addition to its analysis of issues and solutions often absent from the discourse, this article’s feature contribution is the argument that the UK can be more than an example of a middle way. Specifically, if the UK scales up and internationalizes its Huawei Cyber Security Evaluation Center, perhaps by creating an International Cyber Security Evaluation Center, it can lead its allies and the world in 5G, 6G, cybersecurity, and international relations, filling a vital leadership vacuum.
This analytical paper asks, does the One-China policy shape the People’s Republic of China’s foreign policy? This paper begins by briefly defining the One-China policy and situating it in the respective histories of China and its current incarnation as the People’s Republic of China (PRC). Then, after untangling the often muddled classifications of soft, sharp, and hard power, the question is interrogated in the context of each class of power (Nye, 2004; Nye, 2011; Nye, 2018; Raby, 2019; Walker & Ludwig, 2017). This analytical essay concludes that the PRC does employ predominantly sharp and hard power strategies that are heavily influenced by the One-China policy.
The FCC reported that there were about 3.1 million smartphone thefts in 2013. Today nearly everyone owns at least one smart device, and many people tend to keep personal or business information on these same devices. If your device is lost the first reaction you might have is to use attempt to use 3rd party software to locate or wipe the sensitive data from your device, but what happens when the connection to those services is severed? The Fail-Safe Erase application aims to provide you with the ability to wipe your device after its disconnected from reaching network services. After setting up a personalized password and a wipe timer, the Fail-Safe Erase application will run in the background while looking for those services. Once the connection to GPS, network, and cellular service is interrupted the wipe timer begins its countdown. If the user does not access their device to interrupt the wipe timer within the time set by the user, the device will begin to wipe itself of all personal data. Fail-Safe Erase aims to ensure that if you can’t gain access to your mobile device, remotely or physically, the private data on it will be securely erased, hopefully before it falls into the wrong hands.
The use of the GoCart application will have the ability to enhance grocery shoppers’ experience by taking the shopping list and generating the most efficient shopping path. According to the Time Use Institute, the average shopping trip takes 45 minutes. In part, the time spent is attributed to confusing store layout, congested aisles, and uninformed staff (Marks, 2015). Results from our grocery shopping experience has shown that more time is directed towards roaming through the aisles searching for the items. There are applications dealing with allowing us to create a virtual list, but none directed towards the location of the items. Along with GoCart creating the most productive shopping path with the virtual list, there will also be a map with the store layout that pinpoints each item. Having GoCart will make the next trip to the grocery store quick and painless.
Nibbler is an android application used to search and find restaurants based on specific
filters applied by the user. Nibbler gives users the ability to apply multiple filters to their
searches and allows those with dietary restrictions or food allergies to find restaurants that fit
their specific diet. Nibbler also aims to eliminate the issue of analysis paralysis by limiting the
return on food locations that are returned to the user after completing a search. The reason for
this is simple, if there are too many options, then an individual can overanalyze or overthink the
situation. This way the user still has everything they originally searched for, but the decision is
easier due to the fact that they are limited in their options. The application is simple to use and
anyone with an android device can navigate the simple UI. This allows users to store personal
data and health information safely and securely.
Getting a job interview does not mean automatically landing a job. For people in IT, the interview process can be very lengthy and involve multiple face to face interviews and skill testing. These interviews can be stressful and hard to prepare for. No one should be held back from getting a job they are qualified for. In order to help people prepare for interviews, we have created PrepIN. PrepIN will do what sites like Indeed and Hackerrank do not. Anyone would be able to schedule a time for a practice interview. They will participate in a one to one host video call and have access to a video message chat. Having access to a test environment that will put them face to face with someone will better help stimulate the interview environment and process. That way job seekers can work to deal with the stress and anxiety that many face during interviews.
According to cybersecurityventures.com, despite the high demand for new talent in the cyber security field, there are currently not enough cyber professionals to fill this need (Morgan, 2019, p. 1). To generate new cyber talent, the Ohio Cyber Range Institute utilizes its in-house web application to host regional Capture-the-Flag (CTF) events—exciting, cyber-themed competitions that help inform and spur interest in cyber security. Our project, UC CTF, takes that existing web application and greatly expands upon it. UC CTF features a completely redesigned application site, enhanced functionality and quality-of-life improvements for site administrators, and a brand new question repository of fun cyber challenges for CTF players—from beginner to expert and everything in between. UC CTF greatly improves upon the capabilities of the original application, allows for players of all skill levels to engage in an exciting CTF environment, and helps to develop new talent in cybersecurity.
Car maintenance management can be difficult due the different components that are commonly repaired and replaced. Even if an owner has vast knowledge of their vehicle’s maintenance routine, it is common to forget when a component was replaced. Consumer Reports advises that the best way to save money at the mechanic is to do proper research on specific components, and fix/replace components at the right time. iMechanic is a multi-platform web application that allows car owners to take maintenance into their own hands by keeping detailed work logs and allowing owners to efficiently organize their car’s data. The user can input simple vehicle information to create their dashboard, where they can get familiar with common maintenance routines, costs, and local mechanics. When a car owner uses a proper organization management tool, they can increase the well-being of their vehicle, while also saving money from avoiding unnecessary repairs.
According to a study in 2018 from PSYCOM, it was concluded that 50% of teenagers feel they are addicted to their smartphones, 60% of adults say that they believe that their children are having issues with time on their phone and, on average, 60% adults and children state they immediately respond to notifications. HomeWatch is a web-based application that would give everyone ease of mind when it comes to overlogging by tracking the time used on certain websites and applications without limiting time or function. HomeWatch is meant to be a safeguard for expectations set by parents so that children aren’t abusing time on their device. With social media, and easy access apps on smartphones, it is easier to spend more time on the phone than it is to do productive work, and HomeWatch is there to make sure that work and play are budgeted effectively.
According to Marketing Metrics  businesses have a 60 to 70 percent chance to sell to existing customers versus just 5 to 20 percent for other prospects. A database can provide essential insights into a customer’s choices that can be used to grow a business. Unfortunately, many small businesses do not have the knowledge or budget to create and manage a database. EasyDB aims to alleviate the stress on small businesses by providing a tool to learn the basics of database design as well as getting a template database created in real time that a small business can set up quickly with some acquired knowledge. This is done using EasyDB’s guided template builder that walks users through the creation of essential database designs with the intention of creating an end database that the user can download for their own use. When the guided learning databases are not enough there are also templates, that users can edit and download to meet their specific needs. In the case that we tested with a small business owner, the owner was able to step through all of the guides and gain enough knowledge to implement a database that he could use in the future.
FinanaceSmart is a Xamarin based mobile application targeted at middle to late adolescents in order to teach them how to be prepared for financial success with Credit Card debt and financial knowledge.
Credit Card debt and lack of financial knowledge has a negative effect on young adults for adulthood, most adults do not have enough capital saved up to cover them in any financial emergency or are so deep into debt that they are just trying to pay it back but don’t know how to effectively go about it. Also, currently available applications don’t have customizable features that fits user needs.
FinanceSmart will be a cross - platform application with an easy to use intuitive user interface to entice adolescents to take responsibility for their finances and financial literacy. Customizable budgeting features will keep users up to date on financial aspects.
This webinar was a part of the Data and Computation Science Series and one of five webinars focused on the Publishing Lifecycle of Data. It occurred on June 29, 2020, at 1:00 pm EDT.
Presenter Bio: Geoffrey Pinski is the Assistant Vice President for Technology Transfer in the University of Cincinnati's Office of Innovation. Housed in UC's 1819 Innovation Hub, Geoffrey leads the team responsible for identifying and commercializing the research and innovations of UC’s faculty, staff, and students. Geoffrey rose through ranks, holding nearly every position along the way; starting first as an extern during law school. Under his leadership, the office has set records for invention disclosures, licenses, and startups. As the President of the Ohio Technology Transfer Officers Counsel, he helped develop the Ohio IP Promise; a promise by all 14 states and 2 of the private institutions in Ohio to provide a unified process for commercialization.
Session Description: Data is a loaded term - it covers everything from raw numbers to software code. Come learn more about the intersection of Intellectual Property and data; how to protect data, while sharing it; and how and when commercialization might be an avenue. And finally, learn what resources are available to help you navigate the waters of data and Intellectual Property.
There is both a ppt slide deck and a mp4 session.
Many police departments lack technological resources that enables them to track meaningful data. Beginning in 2020, the State of Ohio has mandated that all departments track and collect police incident data. This data is where most police officers’ public contact comes from according to the Bureau of Justice Statistics (Office of Justice Programs). Currently, this data is gathered from notes that the officer makes at the time of the incident and later recorded in an excel document. This process is inefficient and fallible. Patrol is a cross-platform web application that allows officers to easily, accurately and efficiently gather incident data. By creating an application that is cloudbased, officers can easily input information that stores the data at the time of the incident. This data is used to generate reports for the department and state auditors. Patrol's design and development allows officers to save time and difficulty in creating incident reports.
Enterprise data migration was a common practice amongst businesses in corporate America. Organizations chose to migrate databases for a variety of reasons including trying to reduce costs by moving to cloud-based databases, seeking specific database features and functionality, or their existing systems were simply outdated and unable to keep up with the demands of the business (Alooma 2019). As companies continued to expand and evolve, features such as agile data migrations and integration capabilities became more integral. Company acquisitions and departmental mergers were common catalysts for data migrations. Upon these occurrences, the responsibility had been given to the IT department to migrate and integrate the data into the new environment to allow end users to complete daily functions. DataGrate was conceived to provide data solutions to both the technology professional and the end user. Data functions included on the front end allowed users to easily pull, clean, and organize data for the end user. At the end of the project lifecycle, DataGrate solutions had been developed into a fully functional data migration software with dynamic capabilities and user functionalities, making the product a success for both the DataGrate Solutions team and the end user.
22 percent of turnover happens in the first 45 days from the start of employment. Onboarding is critical for the longevity of a new hire’s career at any company. Minerva was a web application which held all the resources that new hires received during their training period. The application dedicated drive space to each employee and held their resources. It was a new employee’s one stop service for onboarding resources. It used ASP.NET, SQL server, and Bootstrap to hold the entirety of a user’s resources. The user could access files saved to their drive, complete learning courses, and surf the company wiki. Minerva created network drives for each employee on hire and assigned them all the materials they needed for their specific training. This allowed trainers and trainees to have their resources available and to be prepared before the first day of training.
According to NIH (National Institute of Drug Abuse), an estimated 52 million people have used prescription drugs for nonmedical reasons at least once in their lifetimes. There are many applications that allow healthcare organizations to view patient’s history, but they lack the flexibility of allowing other organizations to view the same information. SafeMeds is a cloud-based web solution that allows healthcare providers to be connected, preventing patients going from office-to-office to acquire prescriptions. Our product allows pharmacists and their prescriber to be alerted to patient activity. SafeMeds allows pharmacists to view the prescription sent over by doctors or prescribers, while doctors can view the history and prescribing prescriptions page. SafeMeds now makes it easy for prescribers and pharmacists to view trends and identify abuses in prescriptions. Prescription drugs can be regulated and the use of medications for nonmedical reasons can decline gradually using SafeMeds.
WhereToPics is a web application built on the foundation and spirit of community with the intention of sharing the best picture locations around the world! Statista.com reported 1.323 billion international tourists as of 2019, compared to 911 million just 10 years ago. Everyone will be able to add their best photograph locations and check to see if there are any other incredible picturesque spots nearby! WhereToPics is unique in that it is the only application that provides precise information about the absolute best places to take pictures. We designed WhereToPics as a website application platform so that everyone can access it from their device via internet connection. The control and monitoring of content will be overseen by elected regulator site managers. WhereToPics will continue to bring people together and reinforce the importance of sharing, interaction, and strong community. Never miss a wonderful opportunity to capture a beautiful memory again!
According to a recent Microsoft survey, over 90 percent of people say that dealing with a company
that uses outdated technology would cause them to reconsider business relations due to concerns over
security, privacy or user-friendly convenience.( www.microsoft.com) This is the problem for which the
Use Case was developed. With modern network infrastructure, businesses are able to operate more
efficiently and securely as well as improve the quality of life of both their customers and employees. The
solution being implemented is a modern VoIP solution and additionally an IP-Based NVR system. This
will maximize workplace security and provide a unified communications solution for employee/customer
collaboration. With the solution, a business will be able to focus solely on business, and not all the
headaches that can come with outdated unsupported system. Customer relations will greatly improve, andthe business itself will have better communications equipment and security.
Head StARt is an interactive Augmented Reality (AR) application designed to aid incoming freshmen going through college orientation. The current college orientation process is very heavy on information in the form of stacks of paper. This can lead to students feeling overwhelmed and missing key information. Paired with a brochure or document of choice, Head StARt allows you to use your phone to scan the document and bring up interactive AR experiences, helping students better understand and retain key
information. Our application will also have an easy to read map, with pictures and models of the buildings provided when you scan the map. Head StARt can take any brochure or pamphlet to the next level by engaging the audience in an exciting way and helping new students better retain important information.
In today’s market, large game distribution platforms take a sizable cut of developers’ game sales, which significantly impacts indie developers’ ability to grow. In the recent GDC State of the industry that was held in March of this year, it was polled that “ just 6% of nearly 4,000 respondents believe that Steam justifies the 30% cut it takes from developers” (Sinclair 2019) . Our team will create a blockchain network based on Ethereum that will function as the ledger and transaction engine for our digital game distribution platform. We are developing this platform to create a marketplace focused on allowing indie game
developers to earn a larger cut of their sales. In addition, our platform will provide infrastructure by crowd-sourcing hardware from nodes in our network by incentivizing users to host content and provide downloads in return for a small gratuity. Through a combination of Hyperledger frameworks and IBM blockchain technology, we will be able to minimize the middleman and shrink the necessary infrastructure to a fraction of traditional methods.
Over 200 million 911 calls are made every year1. For first responders and dispatchers fast flowing information and communication during an ever-changing emergency is crucial to saving lives. No One Left Behind has focused on improving emergency response by managing and presenting data to 9-1-1 dispatchers and has improved upon the existing process of dispatching. Currently, the standard way of first responders receiving information is through a slow relay over radio between dispatcher and first responder. With No One Left Behind we improved communication, enhance situational awareness, and better crisis remediation through our easy to use UI. NLB is designed to utilize user’s smartphones for a quicker yet more accurate and detailed description of what is happening. Furthermore, NLB was built to improve upon ‘Areas of Refuge’ that currently lack in assisting the disabled. Our UI has been tailored for quick and easy use by both dispatchers and users.
There are around 2700 locations with National Park in their title on our planet, and more than 6500 locations with Category II type of protected areas that defines “National Park” per International Union for Conservation of Nature (IUCN), and its World Commission on Protected Areas (WCPA). So far, there is not a single website or mobile app dedicated to the World’s National Parks where all the information about the parks is available on a map. If any user wants to search information about the world’s national parks, he or she will have to rely on Wikipedia, TripAdvisor, travel blogs, or find the park’s official website. Searching for a list of World National Parks on online search engines usually returns an incomplete Wikipedia page or short list of well-known or well publicized National Parks. That makes the search very difficult and doesn’t give all the information. Also, there is not a single database or API with all the world’s national parks on the Internet. We’ve created The World’s National Parks website and mobile application that provides a brief information and a map of all the National Parks. Mobile Application has features like finding parks nearby and directions.
IT security teams at small companies are often understaffed and overworked, according to a survey published by Sophos (June 2019). ReapRE is an automated malware analysis tool designed to assist analysts at small businesses. Unlike other costly solutions, the analyst will not have to worry about potential confidential data leakage resulting from a 3rd party application breach, as everything will be hosted internally. A potentially malicious document will be uploaded by an analyst into a locally hosted instance of our application, where it will then be run against a stack of malware analysis tools. A
summarized report will be given to the analyst based on its findings and a list of indicators of compromise (hashes, IPs, URLs, domains, etc.). After review, the analyst is able to import the IOCs into a local database, Malware Information Sharing Platform (MISP).
According to IEEE, agile methodologies have drive organizations to alter their infrastructure at an ever-increasing rate. Thus, it is important to also accelerate the deployment time for external monitoring systems to provide fast and continuous feedback to security, development, and infrastructure teams. VMware's vCenter is a product that, according to VMware's hardening guides, requires external monitoring from the moment it is put into production. Existing solutions (e.g. SexiGraf, psview, and checkmk) do not adhere to infrastructure-as-code principals, and are instead deployed as complex, monolithic and non-integrating applications. In response to this need, we built OmegaGraf, a one-click vCenter monitoring solution. OmegaGraf is an entirely open-source, containerized solution, confused and deployed through a simple web interface, providing dynamic dashboards, granular time series data, environment aggregation, and alerting. Best of all, OmegaGraf is deployable in under five minutes, allowing IT professionals to provide value to their organization faster than ever before.
According to research done by IEEE (2016), “recording attendance is inefficient and takes up too much class time especially with larger groups of students,” and if attendance takes 5 minutes of a 45 minute period, that means that 10% of class time is lost taking attendance. Another research report completed by UC Berkley (2017) stated that time in class is when students are most productive. Important class time is wasted taking attendance, so being able to remove the amount of time taken by attendance would be beneficial to students. AutoAttend assisted with this issue by using a fingerprint scanner to sign students into the classroom. AutoAttend saved time taking attendance, which helped improve student performance.
As of 2019, Windows 7 has been discovered to possess 1283 security vulnerabilities, according to the Common Vulnerabilities and Exploits including 250 this year alone. In addition, effective January 2020, Microsoft will discontinue providing support, updates, and software patches and fixes for Windows 7. According to both CVE and Microsoft, the main solution to remediate these vulnerabilities is to upgrade to Windows 10. However, due to its user-friendly interface and stability, most companies still contain several computer workstations that run Windows 7 causing a major increase in security risks. AutOSImage provides the IT personnel with a cutting-edge software solution that can automate an upgrade from Windows 7 to Windows 10 on multiple computers at a time. This is done by utilizing features that perform the necessary tasks in the following order: Automatically backup user data; determine software and driver compatibility prior to beginning the upgrade, deploy the Windows 10 image to Windows 7 systems.
Extreme Makeover: Tech Edition is an initiative to help a small business develop a technology presence. According to the Small Business Administration, approximately 33% of all small business owners are 35-49 years old and 51% are 50-88 years old. Studies, such as the “Older Adults and Technology Use” study conducted by Pew Research Center, have shown that the majority of older adults need assistance when learning new technology. At the rate that technology progresses, some business owners do not know where to start. The owner of Four Source Restoration and Remodeling fell into this category. Kelly Winhoven is a 48-year-old, small business owner with limited technology skills. Winhoven was looking for a way to improve the technology within his small business. Our team partnered with him to achieve this goal. We created a website to enhance and increase customer engagement. We built a database to organize the data structure to ease management and optimize data. We secured the company’s network and devices to protect the company from threats and vulnerabilities. We also modernized the company’s logo and gave them a social media presence. All these factors came together to create a full business technology makeover for Four Source Restoration and Remodeling.
The Internet of Things is an emerging market that is expected to grow to 43 billion devices by 2023. This exponential growth comes with security concerns, as 80% of devices including cloud and mobile applications fail to require complex passwords, and 70% of devices did not encrypt traffic to and from its connected network. Identifying the security risks can be difficult, since every network has a different combination of devices. The use of PotPi’s testing ground for emerging IoT devices provides the necessary foresight to combat the increasing number of security threats in homes and workplaces worldwide. PotPi provides this service to a growing industry and creates targeted objectives to reduce security concerns by allowing the community to discover vulnerabilities and be rewarded for doing so.
Creating a game-like platform is not a new concept. In fact, there are many companies that have adopted this concept due to its increased user interaction and ability to relate to the audience it is trying to reach. Giving the community a way to show their progress and accomplishments gives companies data on what is working and what needs to be changed. More incentive to complete objectives leads to more solutions and a better market.
UC Route Assistant is a mobile web application that allows the user to input their schedule and needs and determines the most optimal appropriate route for them to take on campus. This application was originally inspired by the vast quantity of new students coming to the University of Cincinnati each year. With over 7,000 new first year students in the 2019 fall semester, it is apparent that there is a need for assistance navigating the large campus. We built a mobile web application that enables the user to upload their course schedules, extracurricular activities, and accessibility preferences. UC Route Assistant processes this information and leverages Google Maps Application Programming Interface (API) to determine the fastest route that the user can take in order to reach their various destinations, while accounting for accessibility preferences and other major on-campus events. This results in less headaches having to reroute, less surprises running into blockades, and overall reduced travel time for the user.
Today everyone is a target for cyber-attacks, hackers are only getting more sophisticated and persistent. According to Verizon’s 2018 annual breach report, Cyber-attacks against small businesses make up 58% of targeted attacks, and 76% of all attacks are financially motivated. This makes small financial institutions a prime target for cyber-attacks. These smaller businesses also lack proper cyber defense, only 27% of businesses say they are prepared for a cyber-attack. SOC-In-A-Box is a cyber security solution for businesses that brings the best of on-site and cloud-based architectures together to help solve the growing problem of cyber-attacks and data breaches. SOC-In-A-Box's cutting-edge system is modularly designed to quickly scale and easily integrate with existing solutions, allowing businesses to maintain visibility over their IT and OT infrastructure and trust that their data and business operations are always safe and secure.
According to Forbes, the sports industry is expected to reach an all-time high value of $73.5 billion by the end of 2019. The University of Cincinnati Athletic Department was looking to engage more with their fanbase by learning what events are their fans attending? Is this fan following UC’s social media accounts? When should they send a retargeting campaign to season ticket holders? A system designed to answer these questions typically costs thousands of dollars and is usually cumbersome to incorporate into the user’s daily workflow. Introducing GameSuite, the simple solution to a complex problem. GameSuite is a web-based application with a collection of games that users can play once per day to compete for a chance at a high score to be awarded a prize. User authentication is performed through Twitter API and the user’s name, email and location are collected for marketing material.
Many of the top companies in the world use a SIEM to collect and monitor network events to ensure their environment is secure. Looking at the top SIEM solutions, these products struggle at having all necessary capabilities out of the box. Our team developed Scout, Scout provides a missing value which will minimizes setup in environment’s and reduce security event response times, thus preventing security breaches. Scout is able to scan and discover all relevant and important asset details within an environment and integrate them directly into your companies SIEM. Rapid7 claims, “…connecting your tools and automating security processes can save up to 83 percent of the time spent manually fetching data and other triage and incident response tasks.”. Staying on budget is something that all companies need to keep in mind, and our solution, Scout, will be able to save companies thousands, if not more.
According to the Center of American Progress, over a quarter of people in the United States send their children to daycare facilities. Parents often wonder how their children are at daycares, which is why every daycare facility have daily reports and sign-in sheets. Some daycares have subscriptions with a phone/web app to provide this information to the parents, while other daycares cannot afford those applications. These other daycares rely on paper to provide the information to parents, such as the Pleasant Run Church of Christ Child Development Center. Now, the Kids Day Care app is a mobile application for daycares that couldn’t afford these other phone/web app. Our app is an affordable and user-friendly phone application for daycare staff and parents. Teachers are be able to input every child’s daily activities at the daycare, and parents thus have access to this information at any moment.
According to a study published by Ohio State University news (Grabmeier, 2018), many college students have schedules that are all over the place. Seventy percent of college students are stressed about finances. A lot of them must budget their money as many are living on savings or working part-time. Many students also have a social life to balance as well. Planning to see others while working out a budget can be difficult. Palendar is a web-based application that allows users to create a monthly budget to help manage their money, as well as a social calendar to plan their time. There are social calendar and financial planner applications out there, but there aren’t any that appeal directly to the younger demographic as well has having a budgeting tool built in. Having a web app that helps with both important areas of young people’s lives allow Palendar to be a great app for many people to use.
Social media is the single-most powerful marketing tool available to influencers and small businesses looking to expand their audience and reach more potential online customers. The largest of these platforms (Facebook, Twitter, etc.) are aware of this and reduce the average account’s potential reach to pressure businesses to pay for ad-space. According to the 2018 Sprout Social Index, Facebook controlled 84.9% of its social video ad growth. We have designed FindUS, which is an automated service that helps users who lack funding to reach their target audiences. FindUS monitors posts made by accounts under our service and provides statistics based on each post’s performance and provides additional services to help reach followers. This includes mailing lists, additional offers, or customizable content a business can notify their audience of. FindUS provides valuable marketing information to expand to small businesses through monitoring and automatic post services.
Technology is exponentially evolving, sometimes faster than we expect it to. Because of this, it’s difficult for those who are just trying to keep up with the newest technologies. Of course, there are many outlets that people can look to for help. However, trying to troubleshoot over the phone can be frustrating for others on both ends and some problems just simply go unsolved. With Tech Wizard, we are providing an extra hands-on approach to users who are facing technical difficulties at home. We created an app that allows users to sign up and search for an available Tech Wizard in the area that can offer support via chat, phone support, or in person. We expect the result of this is to increase the availability of tech support to people of all ages and all levels of technical knowledge.
The main goal of our EZTask program is to allow our users to break down big projects and goals into simple, manageable steps so that they can more easily accomplish big things. EZTask is a .NET web application designed to aid users of all ages and situations in accomplishing their daily home and work tasks. The EZTask program is flexible enough to be used in a range of different environments. It can be implemented into a work environment by an administrator to help organize the workloads of his/her employees and boost their productivity. It also works well for a group of students working together on a project, or even a single user trying to organize their own personal project. EZTask breaks down big, potentially overwhelming projects or ideas into a series of small, easier steps. It makes it easy to work with others by allowing you to share/assign some of these steps, and track who is or isn’t accomplishing their goals on time. It also makes the process of getting started on your work each day much smoother by clearly presenting each user with their individual goal for the day right when they login. Clear, concise tutorials combined with an intuitive interface make it simple to add tasks to the list while giving a satisfying text congratulating the completed work. This help app is unique due to its web-based platform, allowing users with a wide variety of phones, computers, and other devices to access their tasks lists so that no one is left out. This will allow group work to be done in a wide variety of long-distance situations as well as easy access from home regardless of the many different types of devices team members or employees might have.
According to Enjoy Safer Technology (ESET, 2019), 97% of people are unable to identify sophisticated phishing attacks. Though phishing attempts use scare tactics, website forgeries, or scams to increase their effectiveness and chances of success, research shows that the heart of the problem resides in a lack of effective training. Phishing Guard is a FREE, comprehensive, and easy to navigate web application designed to provide its users with the ability to receive interactive and effective training. In addition to creating a new approach to learning about phishing, this application will revolutionize the way these attacks are prevented. Phishing Guard has an easy to use menu system that includes short interactive quizzes, up to date videos, games, and more. These resources allow Phishing Guard to stand out among its peers, as it not only effectively decreases the success rate of phishing attempts but also increases user retention and awareness rate.
Companies are generally hyper-focused on releasing software quickly to meet strict deadlines or to stay ahead of the competition. This generally results in implementing security once software is near release. In applying DevSecOps best practices early, companies can not only catch and fix security problems early but train their teams in what to avoid in the future. For those organizations that implement DevSecOps, it is found to be implemented during the beginning stages of their software development projects. Most of which is focused on identifying and displaying the source of security misconfigurations. AutoDSO will base their security best practice requirements based off the OWASP DevSecOps model. AutoDSO takes DevSecOps a step further by focusing on establishing security baseline requirements and allowing the users to select metrics specific to their DevSecOps policies and procedures. The application generates an automated DevSecOps policy document which can be used by security analyst and given to auditors to monitor a company’s DevSecOps processes. This allows companies an efficient way to document their security best practices and ensuring that security becomes a part of continuous integration and continuous development (CI/CD) in their organization.
Zendesk states that 69% of support tickets were resolved with just “one touch”, and yet many tickets require resolution times of over 24 hours. Incident Management, Change Management, and Service Request management are key elements to combat with an end user's daily frustration regarding problematic or unavailable business needs.
MyHelpDesk eliminates the need for an end user to reach out to Managed Services for assistance by providing a wide selection of tools to use, including, but not limited to: training videos, trusted software solutions, access to Statement of Work’s and Client/Company process documentation, and in-app scripting all in one convenient location. MyHelpDesk allows end users of any technological experience to easily operate this centralized application for all things troubleshooting, training, workflow, and support within their network scope.
According to a 2015 survey conducted by the Pew Research Center and published in a September 2016 Internet and Technology report, 52% of adults are relatively hesitant to use digital tools because of lower levels of digital skills and trust in the online environment. As technology has evolved to become an essential part of our modern everyday lives, it is important for end users to understand how to both utilize it effectively, and keep themselves and their data safe. From email to online banking, technology has introduced new ways to organize and manage our lives. However, it has also introduced new sets of risks and challenges never before faced by users. This is where Athena Systems can help. Athena Systems is a multi-platform web application that both protects and assists users with catching up to the functionality of modern technology. It provides interactive lessons and opportunities such as registering and collaborating with a community of Athena Systems users. The security tool also provided by Athena Systems allows users to cross check websites and domains for legitimacy by running them against a blacklist database. Stay smart and stay safe with Athena Systems.
Gaming has become less social than ever, with 67% of gamers strictly playing solo, while the rest are constantly connecting to games full of random players (Forbes). We want to create a way for gamers to reconnect with each other by finding out they have a similar taste in games as their friends. With the influx of new game releases, it can be difficult to keep track who wants to play what. Co-op Queue will be an application that has all new games imported into it, allowing users to tag which games they like. This marks whether or not they’re interested in playing that game. Then, once the user indicates that they are interested in a game, it will automatically inform them of their friends who are also interested in the game and give the user an opportunity to message them. Helping more people to fill their co-op queue.
According to The Hechinger Report “On the eastern edge of Silicon Valley, school districts have gone into debt by, authorizing a $16.2 million sale of general-obligation bonds intended almost exclusively for laptop purchases.” (Marcus, 2019) CyberPods is a system designed to let high school classes delve into the world of Cyber Security, leveraging the cheap used hardware market. Designed using the existing Proxmox Virtualization platform, CyberPods provides a way of easy installation and operation of Virtual Machines, so the focus can be on learning about Cyber Security, rather than battling configuration files. By utilizing the power of the cloud, CyberPods automatically configures and installs itself on hardware. A web-based user interface provides easy management and deployment of pre-configured Virtual Machines that are ready for a classroom environment.
Five out of every six home router devices are inadequately updated, leaving sensitive data and connected devices unprotected from known vulnerabilities. The American Consumer Institute Center for Citizen Research released this information after the FBI sent out a warning in the 2018, stating hackers from Russia had successfully compromised hundreds of thousands of routers and were collecting user information. Users treat routers as plug and play devices where, once installed, they are left sitting with no further configurations made. However, blame does not fall solely on the user. ISPs and manufacturers fail to educate their customers of the proper steps to take after installation. NetLock was created with the user in mind, to act as a guide and walkthrough after router installation. Once connected to the router and opened via desktop application, NetLock will assist the user with proper setting configuration while providing network security best practices throughout the setup
The Wireless Charging SmartBag is the ultimate solution for users on the go, who fail to find time to recharge devices. The combination of proprietary smart device connection cables, adapters, and battery banks into this SmartBag can substantially increase the freedom and organization of users of Qi enabled devices. Current market research shows no viable all-in-one solution that provides this ease-of-use. According to Cisco VNI, the number of networked devices per person is expected to jump to fourteen by 2022. This paper discusses the work, validation, and development of the resulting fully inclusive system utilizing a mobile application to allow users to view battery percentage data for each registered device including the backpack itself, as well as the ability to prioritize device charging based on need and available charging capacity. Additional features include a SmartBag charging dock, GPS tracking, and Global Wifi HotSpot.
Have you ever actually completed a New Year’s Resolution? Neither have we! According to Forbes, 80% of Americans set a New Year’s Resolution, but only 8% will actually complete their goal. The simple fact is that these self-improvement goals require motivation and discipline that most people lack. That’s why we’ve created Purrsistent Pet. While there are many solutions available to keep track of your study and workout habits, there are none that also give you additional inspiration towards completing those goals. Purrsistent Pet provides this by making the user responsible for their own digital pet, and to care for it the user must make progress towards their goals. We’ve built this application on the fact that it is easier to motivate yourself when your new digital friend is relying on you, too, so please give it a try and improve yourself today!
Since the year 2000, there have been on average over 400 natural disasters per year affecting rural and metropolitan areas alike. These disasters leave communications networks broken and segmented. The victims are left merely helpless while they wait for assistance and emergency first responders to save their lives. Even after these tragic events, communication services may not be restored for months or even years. This leaves families and individuals vulnerable to further hardship due to lack of supplies. Our solution aims to reconnect disaster victims faster. With our GoKits, families and emergency services will come back online in dramatically less time. A GoKit includes everything you need to connect to our emergency communications network. With this GoKit, users can connect from up to 15km away from our eNAP (Emergency Network Access Point). PEW believes access to communications networks should remain a human right.
How would you like to save $120 a year? By opting to purchase your router, rather than renting one from your Internet Service Provider (ISP), not only will you save money, but you will also get the best security and performance out of your broadband connection. ISP4ME is a web application that aims to be an all-in-one solution for consumers that will allow them to effortlessly make this transition, regardless of their technical background. Using a concise and intuitive user evaluation, ISP4ME will determine the most suitable broadband speed for the user’s specific situation. It will then recommend a compatible and budget-friendly router that is optimal for their network needs. ISP4ME will provide users with the information necessary to make financially wise decisions when selecting a broadband package and networking equipment, as well as everything they need to know to implement the best network security configurations for their equipment.
According to a study done by TouchBistro, sixty-three percent of restaurant goers say that the type of food has the biggest impact on their restaurant choice. Many people that have dietary restrictions or specific eating lifestyles can have difficulty choosing a place to eat that meets their needs. Currently, there are applications that target one specific eating lifestyle, (e.g. vegetarian, vegan, gluten free, etc.) but none encompass the full spectrum of eating lifestyles a person can follow. The Possibility mobile application is a food finding application that allows users to enter their specific eating lifestyle and view menu options of nearby restaurants that accommodate their needs. The application features tools for reviewing restaurant choices and sharing recipes with other users. Whether a person is looking for vegan, vegetarian, keto, paleo, gluten-free, or allergy-free options, they will find the best place to eat using the Possibility App.
Business communications are becoming more and more demanding as technology continues to advance in our ever-changing world. VOIP communications allow a business to stay connected with a reliable and flexible method of handling their telecommunication needs. However, VOIP must have optimal networking conditions for it to work properly and reliably. We created a solution to allow businesses to stay connected while minimizing any impacts they may have on their everyday communications. Using Dynamic routing we were able to shift network traffic from overloaded VOIP servers in order to keep communications up and running. According to PriceItHere.com VOIP Solutions can cost $20 to $40 per month per user, which can add up fast. We were able to keep costs low by using open-source software. The result is a quick and reliable VOIP solution that can handle large amounts of traffic and keeps client costs low.
In 2017, US motorists spent an average of 17 hours a year attempting to find parking after reaching their destination. In wasted time, fuel, and emissions this costed an estimated $345 per driver over the course of the year.1 The amount of time spent looking for parking is expected to increase as more Americans begin driving. SpotCheck is an end-to-end solution to provide mobile users the ability to quickly and reliably find parking wherever they are. Using machine learning to process images from cameras arrays stationed around local parking lots, our application suite determines where open parking is, so you don’t have to. Our applications allow users to quickly identify and get directions to the closest open parking spaces without the hassle. Parking lot information can be easily managed using our admin web application, allowing parking lot owners to easily make changes that are immediately available to SpotCheck users.
eZsell is an online marketplace for buying and selling surplus technology. According to a study done by Statista, the average lifespan of IT equipment is five years, and the Department of Information Resources in Texas claims that maintaining equipment past this lifecycle can be up to 59% more expensive than maintaining new equipment. eZsell allows companies, universities, and individuals to recoup some of these maintenance costs by providing a quick and convenient way to market their excess technology. Users of this application are able to sell technology that would otherwise be more expensive to maintain, facilitating a market of usable bargain surplus for other interested parties.
Our web application “Pocket Shelves” ensures small business owners save money by simplifying inventory management for our users. According to Small Business Trends, it’s estimated that businesses around the country lose over 300 billion dollars annually due to poor inventory management . Pocket Shelves allows users to document and edit inventory live, as well as track and organize inventory physically with barcodes. Pocket Shelves also features analytics to help the user better manage their inventory financially. Pocket Shelves allows the user to share their information among an established group with easy to use permissions to restrict use. The user-interface of our application was built to work on any browser with the Bootstrap framework. The backbone of Pocket Shelves was written in Python 3, built with the Flask micro-framework, and primarily using PostgreSQL. Proper inventory management has never been easier, thanks to easy to use applications like Pocket Shelves.
In 2018, disruptiveadvertising.com reported that 3.03 billion people are using some sort of social media. The most popular apps provide something for everyone, but very few actively connect video makers with their audience. NQ is an app designed to connect video makers with knowledgeable critics within their niche. Users will no longer need to worry about using the unhelpful thumbs up, thumbs down rating system to determine what viewers think of their work. All viewers comments are monitored by NQ to ensure high quality feedback. Every feature offered in the app will help artists create their best content every time.
Ten billion IoT devices will be added to consumer home networks by 2020 (Leuth, 2018), with little regard for security. Users are unaware of what it takes to secure their networks and there are currently no security standards in place to hold manufacturers accountable. HomeKOP raises awareness of security issues amongst users and equips them with the right tools to secure their smart home networks. We conducted a vulnerability assessment of smart home networks, gauged consumer awareness using surveys, and created a set of standards for IoT devices. Based on the set of standards, we developed a risk score calculation system that helps users visualize risk. We then built onto the Mozilla Web of Things Gateway that employs a user-friendly dashboard to monitor these devices as they are added to a network, creates a risk score based on how well these devices meet the HomeKOP standards and walks users through securing their networks. HomeKOP is revolutionizing the world of security by putting the user back in control.
Phishing Emails are a problem as ubiquitous as email itself. According to Digital Guardian, over 90% of all cyber attacks now start with a phishing message (Guest, 2017). Additionally, with over 12% of targets clicking on any given phishing message (Verizon, 13), and 95% of all attacks on enterprise networks begin as a result of spear phishing, it is critical to not only know who clicks on these links, but also when a link was clicked. While there are many tools trying to prevent the message from ever getting in, only Hypersafe will enable instant visibility and scoping when a message inevitably gets through. This is accomplished by intercepting all inbound messages to a target’s email system, and then scanning messages for spam and malicious content, and then replacing every link contained within the message with a custom link that points to the Hypersafe Link Resolution Service. When a user clicks on a link, they first go through the Link Resolution Service to ensure that the link has not been identified as a phishing or otherwise malicious message. If the link is clean, then the user is seamlessly redirected to their intended target. If the link is malicious, the user is redirected to an education and awareness page, thus hindering the attack. In order to ensure reliable service, Hypersafe is built atop the proven Amazon Web Services Platform to enable best in class availability, scalability, and security. The email processing and link resolution services are serverless, enabling Hypersafe to scale without any administrative burden and also cost very little to operate. Finally, there is a web administration portal that administrators can use to interact with the service to manually flag links, senders, and domains as malicious as well as view statistics on who has clicked on a certain link. By taking the uncertainty of email away from the user, Hypersafe will be an invaluable partner in each customer’s defense toolkit.
"Today, a public cloud is a top priority for many enterprises. Statistics show cloud infrastructure usage has grown from 29 percent in 2017 to 38 percent in 2018." With a wide variety of options, finding the right cloud solution can be inefficient and costly for companies. This is where Omni-Cloud Solutions helps during their digital transformation journey. Our organization aims to make finding the right solution simple with an easy to use web application-based wizard, which will help organizations choose between IaaS, SaaS, XaaS, PaaS, and different storage options from a variety of cloud service providers. The service we provide will allow the organization to provide specific details about them and receive a tailored cloud solution plan based around important metrics such as cost, storage, and availability. Reducing the amount of research previously devoted to migrating their organization to the cloud solution will save time and money allowing them to focus on their own projects.
Passwords are not safe, and create vulnerabilities, yet, we rely heavily on them in nearly everything we do. A good password will exceed 10 characters, use a combination of numbers, upper case, lower case, and special characters. Good practice tells us not to
reuse passwords. This is a lot to remember when accessing various tools and accounts in our work and private lives. Can a large company trust that a person is not using the same password when accessing company assets as they are at home? This issue is solved by
using a MAGIK STICK as a multifactor authentication device that eliminates the need for employees to remember passwords for a company network. MAGIK STICK solves this conundrum by authenticating users via biometrics and generating a token for accessing applications and devices. This token is based on a TOTP (time based one-time password) algorithm.
Gartner reports that there will be around 20.8 billion [IoT devices] by 2020. Among these devices are countless vulnerabilities and security concerns. As of now, there is no single device that remediates those vulnerabilities or even detects them. The Mirai botnet incident took countless websites offline and affected millions of people. What if there was a device that could have detected this sort of activity? Our product would have thwarted an attack of this type via network monitoring of each IoT device on a user’s home network. Our product would function as a plug and play device and would be able to detect abnormal IoT network activity. The objective is to ensure the devices are only operating based on necessity. This gives the owners peace of mind that their IoT devices are functioning normally. The number of IoT devices is going to surpass the number of mobile phones and computers in the coming years. This will require the need for additional security measures similar to that of antivirus. Our product is a step in the right direction for securing these devices
Imagine learning a new activity or going somewhere alone without feeling social isolation, loneliness, or anxiety. With Be Epic, you will never feel that way again. Be Epic is a social app which allows the user to select interests that they are already involved with or would like to be and create a personalized profile where they can share their adventures with others in a safe space. It includes different feeds depending on their selected interests where users can post information about what they are doing, where they are going, or who they are with. Users can stay updated and meet with one another in real time. Users can meet new partners, make connections, and even learn with a more experienced user. Never fear learning something new or doing something alone again with the help of Be Epic.
Many musicians and music fans currently do not have a dedicated social media platform to network with other like-minded people in their area. Because of this, users are resorting to websites not designed with music in mind, like Facebook and Craigslist, to interact. Concerto is an innovative website that looks to
allow users to network, discover, and promote anything music related on its unique platform. Musicians and listeners alike can find valuable information on bands, upcoming shows, as well as receive recommendations based on their music listening preferences. Concerto is also a hub to connect fellow musicians who are looking for new band mates. By giving music fans a dedicated tool in Concerto, we strive to help strengthen musical communities and create a unique experience for our users.
In modern business/enterprise environments, automation has become the driving force to improve products, workflow, and business practices. Managing where, when, and how these automated jobs are running can become an unwieldy task for many. Windows Task Scheduler, SQL Server Agent, SQL Server Report/Integration Services, and numerous other automation tasks all have their own interfaces. WAM (Windows Automation Manager) is a web-based automation application that allows users to quickly access scheduled jobs, log information, and access a job creation interface to perform a variety of automation tasks. Through it’s simplistic and to the streamlined design, WAM will allow system and network administrators to spend less time monitoring and scheduling tasks, and more time on projects and maintenance.
In 2015, the sale of tabletop games by small publishers topped $1 billion in the United States and Canada for the first time.1 In 2017, this total skyrocketed above $1.5 billion.2 In an age where digital screens are often uncomfortably pervasive, people have a growing desire for human contact away from technology. The explosive popularity of tabletop gaming showcases this very clearly. Currently, an average of over 10 tabletop games are being published each day, a staggering number.3 Due to the ever-growing number of choices, it can be very difficult to select a game that everyone will enjoy playing. To address this issue, the GameNight mobile application helps the members of a group select a range of games from their collection by breaking games down into their mechanical components, and then searching for a common interest for the group by looking for a commonly occurring mechanic. The application then suggests games that utilize this mechanic, providing an experience that everyone at the table will enjoy. The application can be used in multiple ways: for example, a user can designate games they already own as being in their collection, or they can designate games they are considering purchasing, using it as a purchasing aid. GameNight saves time and energy that can be better spent getting straight to gaming!
The current Google search tool worked when searching for keywords but cannot answer specific questions well, leaving a void and many confused users. The current solution to this problem was to programmatically put in solutions for common questions, but many still go unanswered. This caused users to put a strain on the website owner’s helpdesk for problems it faces. The Smart Assistant was a powerful QnA bot that provided more accurate search results for to UC-related questions by leveraging Azure’s powerful AI system, tracking users when he/she interacts with the bot and remembering what solutions he/she selects for similar questions by future users. It was built on the Azure Cognitive Services platform and featured language recognition for similarly worded questions, a robust cloud network that can be scaled up/down as needed, and self-learning technology that required little maintenance by administrators
“In 2016, Researchers from the University of Illinois left 297 unlabeled USB flash drives around the university campus to see what would happen. 98% of the dropped drives were picked up by staff and students, and at least half were plugged into a computer in order to view the content. For a hacker trying to infect a computer network, those are irresistible odds” (Kaspersky Labs). Plug-and-play (PNP) technologies have become very common in today’s world, but there’s no reliable way to ensure that everything plugged into a computer will play nicely. Operating System Customs (OSC) aims to maintain the “plug-and-play” name by introducing a new layer to ensuring that everything plugged in is verified as 100% safe. This project ensures your computer’s safety as well as your network’s, identifying your external medium and scanning it to verify if a virus/malware was installed without your knowledge. After the scan, it’s either verified to be safe or dangerous and lists off any discovered corrupt files. OSC allows users to operate in a safe network and grant system administrators peace of mind.
Many people dread calling up their cell phone company, electric company or any other company with an automated answering system to fix an issue. Currently, the only way to call them is to call and listen through the options before you hear the option you need which is a waste of time. Based on an article on www.westuc.com, the average consumer can expect to spend around 43 days of their life waiting on hold listening to the automated answering machine. Our Phone Call Enhancement App is a way to make this process easier. The app will have a list of companies and their phone number with department information. Once you select the department the number will open in your phone app ready to be dialed. Once you hit the call button the call will be sent to the specific department of your choice, so you do not have to listen through all the options. Having this application available to users will avoid time wastage waiting when calling companies with automated answering machines.
Many people envision the cloud as a service that “just works”. What most do not realize though, is that the “cloud” is in fact a co-location center, a building housing a massive datacenter that is willing to provide its resources to companies for an annual cost. Someone needs to maintain these co-location centers, and when searching, recruiters often look for someone with experience. Acquiring enterprise level, hands-on experience for the job can be both quite expensive and hard to come across. VR Datacenter (VDC) plans to fix this. VDC is an application that leverages users’ consumer hardware to simulate an enterprise level environment. VDC aims to allow users to create assets that not only appear physically in the virtual reality environment, but also have functionality tied into a VMWare vSphere server environment. This includes controlling device connectivity, power, rackmount location (RU), readouts from the virtual machines (VMs), etc. VDC plans to better define the breadth of knowledge that an entry level IT administrator possesses.
Keeping up with new music and finding similar songs to our favorite tunes is hard. That’s why we developed Hullabaloo! Hullabaloo is an online music scraping web app featuring regular audio player controls like shuffle, skipping, volume, and more. Hullabaloo collects data on popular music from websites like YouTube, Spotify, Soundcloud, Reddit, etc. With this data, Hullabaloo will display trending songs. The songs list of the site allows users to browse top songs immediately or a user can further customize the music displayed with sources and playlists. Users are able to add their own sources for Hullabaloo to scrape songs from and then create playlists broken down by genre, artist, mood, length, or popularity. An important feature of Hullabaloo is allowing music tracks from different sources to be added to the same playlists, so a user can listen to a song from Soundcloud, following one from YouTube. With a focus on new and popular music, Hullabaloo updates the songs it displays every couple hours to keep up with the changing landscape of tunes. Hullabaloo is planned to be a cross-platform service, reaching those on Android and iOS mobile devices.
SIEMStack is a full featured, ready to deploy, Open Source SIEM solution tailored towards small business, nonprofit, and educational users. SIEMStack comes with pre-packaged configurations and an installation experience that makes it a breeze for organizations to deploy SIEM. SIEMStack models its alerting on the MITRE ATT&CK framework, an industry standard set of TTP (Tactics, Techniques, and Procedures) used by cyber adversaries; both primitive and advanced. Our mission is to strengthen the security posture of our user’s organizations and prevent the widespread damage caused by cyber breaches.
The use of a free, web-based tool for speech pathologists has economic and environmental benefits, yet few currently exist. Speech language pathologists often have limited budgets to buy supplies. Sticker books, flash-cards, and “fill in the blank” booklets are the primary items used by professionals. These tools break down, with some even being one-use. The result is that teachers often spend their own time and money creating their own solutions. Our team decided to create a web-based application that mimics the exercises in already existing paper products. Such applications do exist, but the quality apps cost around $70.00 per year. Our project, Click.Pic.Communicate will be free. It will alleviate economic burdens on teachers and speech pathologists while also reducing the waste of paper product.
The rise of smart home devices has allowed a cheap alternative to in-home security systems.With the increasing variety of different branded smart home devices such as lights, switches, motion sensors, and IP cameras, issues have become prevalent when trying to get the smart devices to work together. Many smart devices require a user to install a specific app based on the brand of the smart device. When more than one smart device from different brands is being used, this results in many smart device apps with no easy way to manage all smart devices together. Using an open source application called Home Assistant, our product will allow even a non-tech savvy user to easily manage all of their devices within one easy to use application. The user will be able to fill out an online form which will automatically create a Home Assistant instance that is configured precisely to the smart devices they have. This will allow users to quickly and easily set up a cheap in-home security system.
Students need reliable places to study. When students are successful with their studies, they do better in class and achieve higher grades. Currently, there is no single solution at the University of Cincinnati to locate and reserve places to study. This is why our team built Book It. We want to put the power back in the hands of students, by providing them with a single solution which gives them access to real time data. The Book It web application solves these problems by delivering a tool that allows students to connect and find quality spaces to study together.
With over 250,000 unique logins per day, Kroger Citrix requires significant administrative resources. Ticket counts periodically exceed the capacity of the Kroger Support Center (KSC) - most issues are simple but have time consuming fixes. To reduce overhead, this team intends to implement a tool for KSC members that will streamline functions such as: (1) resetting Citrix users’ profiles, (2) verifying Citrix entitlements, and (3) viewing user Active Directory information. An additional goal is to enable KSC members to resolve an increased number of tickets without the need for escalation. This team predicts a recovery of approximately ten to fifteen minutes per incident, providing significant cost and time savings. Reduced overhead will allow more resources for investigating potential access violations and improving account controls.
Since early 1800s, yard sales and sale types alike have been a great way to declutter your house, discover rare items, and find a good deal. According to the poll conducted by Statistic Brain Research Institute, the average number of self-arranged sales held weekly in the USA is 165,000. However, the method of advertising and promoting these sales has not kept up with modern technology. Introducing: Hometown Bazaar! This sophisticated, mobile-responsive web application allows buyers and sellers to take advantage of modern technology. It saves time and effort, maximizes profits while still promoting the small-town person-to-person interaction of personal item sales. Hometown Bazaar offers advanced search features and filtering, communication with the seller, customization, feedback options, and a community event organizational system. All of this is free of charge while providing functional performance, easy navigation and eye-appealing design, as well as ensuring high security of all transactions and personal information.
Current claim-check technology relies on a numbered, two-part paper ticket. But, according to the New York Times, anywhere from 5 to 20 percent of patrons who check items, lose their tickets (Bruni, 2018). TagIT will replace these fragile paper tickets and streamline the item check-in process using common handheld devices and wireless access to cloud computing. With TagIT, an attendant will create a unique record for each patron, adding images of the checked items using a smartphone or tablet’s onboard camera. The attendant will select the item image and scan the storage bin Quick Response Code, or QR code, in which the item is stored. When all items have been imaged and added to the record, the patron will receive an E-mail with a Web link to the record. The images, QR codes, and bin identification are now part of the patron’s record and can be viewed and verified using the link. The link will also provide a means to request the return of the checked items. And if a patron forgets to retrieve an item, TagIT will provide the means to contact the patron with retrieval instructions.
The use of Phishing Audit System has the potential to train and educate organizations and their employees to be more proactive when dealing with phishing emails. Phishing is the leading cause of cyber-attacks around the world and is increasing each year. Phishing comes in the form of an email that is made to look like it’s coming from a trusted source but contains malware or takes you to an illegitimate website to steal personal information. Our solution to reduce the number of attacks is to create the Phishing Audit System. This system creates a customized, scheduled, and automated phishing simulation. This allows you to track the progress of users understanding and interacting with phishing emails. Additionally, this system provides users with the necessary training material to identify the phishing attacks.
Fortune 500 companies need a simple, single solution to help them track their progress towards their Social Responsibility goals. To make the social responsibility value come to life, companies allow their employees to take paid time off to volunteer. Companies also sponsor community outreach events via employee-led Business Resource Groups (BRGs). Today, most companies don’t have a single solution or single source of truth that tracks where the company’s money or employee volunteer time is going. To solve that problem, our team created Employees Becoming Neighbors. Our product is a “one-stop shop” for companies to track their employees’ paid volunteer time off and give their BRGs a tool to manage their community events. Our product also gives company Executives one place to run reports to see how their company is meeting their goals. We are doing this because we wanted to make a product that meets a real-world need and applies to the private sector.
Within the past five years, The University of Cincinnati hasn’t had a consistent Campus Link solution for managing student groups, none of which have had a mobile solution. The current University solution does not reach the expectations of students and organization leaders. Campus Connect provides an active and intuitive user experience with both web and mobile. The project aims on giving the users an all in one solution that allows them to actively see posts and meetings from the clubs or organizations they have joined through the application. Campus Connect will consist of a series of features that allow the user to search and join organizations of their choice. Organizations create and edit posts as well as their own personal organizational pages. Campus Connect allows for an easy communication between students and organizations.
Information about data ‒ known as Metadata, has the potential to provide a vast range of knowledge about data or a target in question. Metadata can provide information including the creation date, geolocation, software used to create the file and more ‒ which can be useful for many users in the information security field. We created Metaforge to fill the gap in the information gathering arsenal to provide the user with a clean and efficient program. The application includes a simple GUI that creates a dynamic HTML report with multiple pages that displays raw and filtered metadata and a useful statistics page. Current existing metadata tools are outdated and unmaintained which results in a difficult user experience. The capabilities Metaforge includes are detailed metadata analysis, a practical report, and efficient functionality with the final outcome of a positive user experience.
Spam Detection over Encrypted Emails with Intel SGX Emails play a pivotal role in business and everyday communication. There are millions of email messages being sent each day that contain incredibly sensitive information. This sensitive data can be easily parsed by passive attackers on an email server. Leveraging Intel’s SGX we can mitigate this problem by using enclaves. These are private regions of memory that are protected from processes running at higher privilege levels. Decrypting emails using SGX on an Encrypted mail server makes it much more difficult for passive attackers to get any useful data. On top of that this solution takes into account that sender reputation filters are not very effective since it is quite easy for an email address to be compromised. Decrypting emails via Intel SGX improves the general security of Emails on servers where it is running.
The training that is required in the manufacturing industry is costly and dangerous. When a new employee is hired, a senior, more experienced employee must take time to train them. This leads to slower production and an increased cost in labor. There are also significant risks when the new employee is interacting with heavy machinery. The new employee does not likely have the knowledge of how to use the machinery and is at a higher risk of injuring themselves or others. Maneuvr VR is a VR solution that solves these problems. It’s simulation can supplement job training in a way that other mediums cannot. This allows for the more skilled employees to spend more time in the production environment and reduces the risk compared to traditional training. The environment will feel familiar to the new employee and will result in a higher level of professional confidence.
According to mediapost.com, the average American will own 13 internet connected devices by 20211. That means a family of 4 will have close to 50 devices connected to their home network. In the current climate of large-scale vulnerabilities, ransomware, and other digital threats, how can we protect our devices, and those of their family members, when we may not even know exactly what is connected to our network? Vigil is a home network sentry that constantly monitors and scans every device connected to your wireless network and sends an alert when it detects an outdated or vulnerable device and when a new, unrecognized device connects to the network. Vigil allows its users complete transparency into the devices on their network, and also offers easy to understand, actionable information to non-technical users. This paper summarizes the process and technical details for the development of Vigil and its real-world usage data
According to the International Agency for the Prevention of Blindness, an estimated 36
million people are blind and an additional 217 million have moderate to severe visual
impairment. This means that a total of 253 million individuals must rely on their four
available senses, primarily touch, in order to perceive their surroundings. One major
limitation of this is that the individual must be within arm’s reach (or cane’s reach) in order
to determine what is in front of them. Iris changes this by providing a mobile application with
a voice-controlled user interface to improve environmental awareness for the blind. With
Iris, users are able to take a picture and have the application describe it to them with
additional information on specific entities within the picture if requested. Through
accessibility features and the power of machine learning, Iris is an extension to the user’s
Critical infrastructure are the systems deemed necessary to live with our current modern standards. These systems require a combination of support systems and SCADA systems that control the machinery to provide us our essentials we take for granted such as power and water. Qualified cybersecurity professionals are becoming increasingly more difficult to find to defend these networks. We created a learning tool to help facilitate college student’s knowledge of defending critical infrastructure, and as we know, the best way to defend is to learn how the attacker will think. This tool consists of a series of virtual machines within two sub scenarios, a water treatment plant and a power plant. Students will be able to conduct penetration tests of these in a simulated environment in order to learn more about critical infrastructure and how to defend it.
Amazon Web Services (AWS) and Microsoft Azure are the two leading cloud solution services in a market worth $18.2 billion in 2016, and it is expected to worth $40 billion by the end of 2018. Microsoft’s Azure market share has grown from 8.7% in 2016 to 29.4% in 2018 thanks, in large part, to their cloud-first strategy in recent years. Many enterprises have been left cloudlocked, leaving them stuck working with either AWS or Azure due to budget and time restrictions, while some larger enterprises utilize both AWS and Azure. Being able to securely and cheaply switch between cloud services today will save companies time and money, as well as keep their options open if one works better for them than the other. Thunder Cloud will help solve this cloud lock issue between AWS and Azure for companies by taking data from one service, converting it the format of the other, and then uploading it to that platform
According to the CDC, the prevalence of obesity was 39.8% and affected about 93.3 million of US adults in 2015-2016. Our team wants to make an impact and tackle this obesity epidemic in America. Our fitness application, OneFit, will take one stride closer to finding a solution. Our objective with this application is to create an application that consolidates all health tools into one resource while providing an accessible and engaging user experience for all ages. Our team will use critical fitness data analysis and provide thorough measurable results for our end users. We will utilize custom planning, personalized work out strategy, and overall health monitoring technology to critique a wholesome health plan for each person. This application will create a fitness network to connect and build a more collaborative workout environment. We envision that this application will inspire people and progress society overall towards a healthier lifestyle.
Carpooling is the sharing of car journeys so that more than one person can travel in the same car. Due to the increase in population and the rapid increase in urbanization, there are many problems in transportation. This tends to problems like an increase in the number of vehicles on the road, traffic, pollution, parking problems, and stress. To overcome these hurdles, we developed “Uride” a web-based car sharing application that will allow travelers to post and search if vehicles are available for carpool in their desired path. Uride is an alternative to existing services that aims to connect travelers in order to share transportation costs and reduce stress on their next scheduled trip. This will enable people using this application to share their everyday expenditure on traveling, not worry about hiring a cab.