2018 IEEE/ACM TCF Information Technology Professional Conference (TCF-ITPC)

Transcription

2018 IEEE/ACM TCF InformationTechnology Professional Conference(TCF-ITPC)Program BookDate:Time:Location:Friday, March 16, 2018 to Saturday,March 17, 20188:30AM to 5:00PMThe College of New Jersey, Ewing, NJSponsors:Princeton / Central Jersey Chapter of the IEEE ComputerSocietyPrinceton Chapter of the Association for ComputingMachineryIEEE Region 01 - Northeastern USAIEEE Region 02 - Eastern USAPrinceton / Central Jersey Section of the IEEEPage 1 of 27

Table of ContentsConference Committee . 2Conference Logistics . 4TCNJ Campus Map . 6Armstrong Hall Map . 7Presentation Schedule . 89:00 AM Sessions . 9Accelerate Your Technical and Cultural Transformation with Visual Planning . 9Critical issues of IOT empowered by 5G – A case study on self-driving vehicles . 10Careers at the Rapidly Shifting Human-Technology Frontier: Global Engagement, Local Impact . 1110:00 AM Sessions . 12Professional Networking for Engineers: Design Patterns for Success . 12New Corporate Wireless Security Risks and Spectrum Signal Processing Tools. 13Experiential Lessons and Insights from an Innovative Technology Initiative . 1411:00 AM Sessions . 15Keep Your Technical Debt Under Control . 15Embedded Systems Methodologies . 16Product Development Methodologies for Success! . 171:40 PM Sessions . 18Micro-services Architecture Methodology . 18Big Data Market Research in Today's Economy . 19The Actor Model and Queues or “Batch is the New Black” . 202:40 PM Sessions . 22Unikernels and Wearable Devices – Win,Win,Win*! . 22An Ethical HIT Capability . 24Modeling the Future of Bitcoin . 253:40 PM Sessions . 26Building Realtime Access to Data Apps with jOOQ . 26Better Business Graphics: Avoiding Death by PowerPoint . 27Conference CommitteePage 2 of 27

Conference Chair:David SollProgram Chair (honorary):Annette TaylorConference Treasurer:Dennis ManclPrinceton Chapter of the ACM Chair:Dennis ManclPrinceton /Central Jersey Chapter of theIEEE Computer Society Chapter Chair:Rebecca MercuriPrinceton / Central Jersey Section of the IEEE Chair: David SollIEEE Region 1 Director:Babak BeheshtiIEEE Region 2 Director:Kate DuncanTCF ChairAl KatzThank you to our Sponsors, Speakers, Volunteers andParticipants!Also, thank you to the Trenton Computer Festival andthe College of New Jersey.Page 3 of 27

Conference LogisticsDear Participants,Welcome to the 2018 13th Annual IEEE/ACM Information Technology Professional Conference at TCF!We have an exciting program this year and are looking forward to seeing you.Schedule:The ITPC Conference program schedule is posted on our web site Our conference presentations are scheduled to at begin 8:30 AM to 5:00 PM on Friday, March 16, 2018and include extended sessions at 10:15 AM to 5:00 PM on Saturday, March 17, 2018 combined with theTrenton Computer Festival.Registration:Registration is in Armstrong Hall on Friday at 8:15 AM in the Reception area near Room 154. Yourbadge will be good for both Friday and Saturday sessions. Your registration also includes generaladmission to the Trenton Computer Festival.On Friday, a continental breakfast will be available from 8:15 AM until 9:00, prior to the start of thepresentations in Armstrong Hall near the registration area.Presentations:All Friday presentations will be given in Armstrong Hall rooms AR-154, AR-148, and AR-144. AllSaturday presentations will be given in the Education Building. The talks will be in classrooms equippedwith a projector with a VGA style connector. We will also have a spare projector, just in case of a failure.Each presentation is 50-55 minutes and the audience averages 30 people including a diverse mix ofpracticing professionals, educators, interested engineers and students.Lunch:Lunch will be served on Friday, March 16, 2018, at 12:00 PM to 1:30 PM in Armstrong Hall room AR136. Our lunch will include a facilitated networking session as well as some door prizes.TCF Keynote:The TCF keynote featured speaker, Dr. Nick van Terheyden on “Healthcare Innovation Incremental andExponential”. In addition, George Harris will be giving a talk on “Medical Tricorders – Taking ScienceFiction into Reality”.Banquet:There is a Banquet on Saturday evening at 6:00 PM and you are invited! We hope to see you there!The keynote at the banquet will be given by Dr. Nick Van Terheyden.Page 4 of 27

Advanced reservations are requested. The cost for the banquet 30. Payments are accepted andrequired at registration. Please make your reservation as soon as possible by sending an email to: AlKatz alkatz@tcnj.edu.Posted Presentations:Some of the presentations may be posted on the website: http://princetonacm.acm.org/tcfpro/Maps:The TCNJ Campus map can be found at: s-map/The Education Building (ED) floor plan will be provided at the TCF registration desk on Saturday.Parking:Parking for Friday, March 17, 2015 is in Lots 1 and 2, which are the closest to Armstrong hall, but youare free to use any other open parking lot on the campus. Parking for Saturday is in Lots 17 and 18 bythe Education Building (ED).Lodging:Please refer to the TCF website: s/ for moreinformation. There is a group discount for “The College of New Jersey Conference.”TCF:The 42th Annual Trenton Computer Festival will be held at The College of New Jersey, Ewing Township,NJ on Saturday, March 18, 2015 between 9 am and 5 pm. This year’s theme is “Autonomous Vehicles”.The program includes over 50 panel sessions, workshops, tutorials, demonstrations, educational eventsand a Flea market. For more information go to: www.tcf-nj.org.Thank you for your participation,David SollConference ChairIEEE Information Technology Professional Conferencehttp://princetonacm.acm.org/tcfpro/Page 5 of 27

TCNJ Campus MapPage 6 of 27

Armstrong Hall MapPage 7 of 27

Presentation ScheduleFriday, March 16, 2018 Information Technology Professional ConferenceTrack 1AR-1548:00AMTrack 2AR-148Track 3AR-144REGISTRATIONAccelerate Your Technical and9:00 Cultural Transformation withAMVisual PlanningGreg TutunjianCritical issues of IOTempowered by 5G – A casestudy on self-driving vehiclesAmruthur NarasimhanCareers at the Rapidly ShiftingHuman-Technology Frontier:Global Engagement, LocalImpactFahmida N. ChowdhuryProfessional Networking for10:00 Engineers: Design Patterns forAMSuccessJaron RubensteinNew Corporate WirelessSecurity Risks and SpectrumSignal Processing ToolsJoe JessonExperiential Lessons andInsights from an InnovativeTechnology InitiativeSridhar RaghavanEmbedded SystemsMethodologiesDwight BuesProduct DevelopmentMethodologies for Success!Jerry Bellott11:00AM12:00PMKeep Your Technical DebtUnder ControlDennis ManclLUNCH & FACILITATED NETWORKING SESSION1:40PMMicro-services ArchitectureMethodologyJyothi SalibindlaBig Data Market Research inToday's EconomyDonald HsuThe Actor Model and Queuesor “Batch is the New Black”Brad Whitehead2:40PMUnikernels and WearableDevices – Win,Win,Win*!Brad WhiteheadAn Ethical HIT CapabilitySabatini J. MonatestiModeling the Future of BitcoinSamuel J. Bouiss3:40PMBuilding Realtime Access toData Apps with jOOQMichael RedlichBetter Business Graphics:Avoiding Death by PowerPointJoe LevyPage 8 of 27

9:00 AM SessionsAccelerate Your Technical and Cultural Transformation with Visual PlanningBy Greg TutunjianVisual planning tools and techniques have proven to be much more effective when you need toaccelerate your planning, development and delivery cycles, engage a broader audience of technicalcontributors and create evolutionary road maps to transform your culture, organization, products andteams. In this presentation, we’ll examine proven tools and techniques including real-world examplesand identify steps you can take for successful adoption. You will leave this presentation with checklistsof actions you can take and pointers to additional information for your continued success. Stopplanning tomorrow’s solutions with yesterday’s tools and techniques.About Greg Tutunjian:Greg Tutunjian is a Lean-Agile Coach and Consultant who has helpedorganizations plan and deliver innovative products that differentiate themfrom their competitors for more than 20 years. He takes an appliedapproach to Lean and Agile so that the adoption of principles, practices andtools is based on common sense, real world experience and inherentwisdom. Greg has coached, mentored and trained individuals, teams and organizations as diverse asAngel-funded startups, privately owned technology companies and Fortune 100 multinationals. He hasalso planned and led enterprise-wide programs introducing and adapting Agile frameworks, principles,practices and tools. Prior to working in leadership roles and as a coach, Greg was a software engineerengaged in software, hardware and systems engineering programs. Greg is an IEEE Life Member inaddition to being a member of a diverse set of technology, management and personal developmentprofessional organizationsPage 9 of 27

Critical issues of IOT empowered by 5G – A case study on self-driving vehiclesBy Amruthur NarasimhanThe proliferation of Internet of Things (IoT) devices in connected automobile systems creates challengesof harnessing large data empowered by 5G while maintaining security and confidentiality, as well asbusiness, social and legal challenges. The sheer scope of IoT carries countless security and privacyimplications for businesses, individuals and organizations. The proliferation of IoT devices createschallenges of harnessing large data empowered by 5G while maintaining security and confidentiality, aswell as business, social and legal challenges.In this talk some use cases of autonomous vehicles will be discussed for their implications on security,privacy, social and legal challenges.Proliferation of large-scale deployment of IoT devices without proper design for solutions to security,privacy and big-data challenges has attracted the auto industry's attention. Proper administrative, socialand legal changes are needed by people, government and businesses.About Amruthur Narasimhan:Amruthur Narasimhan is a consultant in Information Security, Cyber Security andprivacy areas. He has over 25 years of experience in System Engineering,Architecture, Technical Leadership and Management, Software Development,Communication Protocols, and Project Management. He has held variouspositions in multinational companies: Software Engineer Manager Chief at SAIC,Security Consultant at Northrop Grumman, President of Amrutek Services, Technical Manager at Avaya,Principal Technical Staff Member at AT&T, and Associate Professor in Department of Computer Scienceat Stevens Institute of Technology.Narasimhan was chair of the IEEE conference on Mobile Security/Cyber Security and Privacy held in2014 and 2015. He received the IEEE third Millennium Medal for contributions in Electronic Commerceand Multimedia Technology in May 2000. He also received IEEE Region 1 award for technicalachievement in 2002, and for eBusiness and Internet Technologies and technical achievements forInnovation in Artificial Intelligence Technology in 1997. He has been coordinator and speaker for variousIEEE conferences on VoIP security, WLAN security and Multimedia security. He was chair of IEEE NJ coastsection consultant’s network, chair of IEEE NJ Coast Section PACE, Chair of IEEE NJ Coast Section (19962002) and Chair of IEEE NJ Computer Chapter (1993-1996).Narasimhan has good communication skills being a coach for Dale Carnegie courses on Human relations.He has graduated as Competent Toast Master in Public Speaking from Toast Masters International. Hereceived a Ph.D. in Computer Science from Indian Institute of Science, Bangalore, India, one of theprestigious institutions in India.Page 10 of 27

Careers at the Rapidly Shifting Human-Technology Frontier: Global Engagement, LocalImpactBy Fahmida N. ChowdhuryThe last decade has witnessed some rapid progress in science and technology, and the humantechnology frontier has shifted considerably. In this talk, I argue that in the engineering community,career paths in this changed world should include not only technical fields but also administrative fields,entrepreneurship, science and technology education, and very importantly, policy and diplomacy atlocal, national and international levels. Adopting such a broad viewpoint would open up manyinteresting and highly satisfactory career paths, and may bring personal and professional fulfillment inunexpected ways. Technical education and training should provide a highly transferable skill-set that canbe valuable in many other fields, including that of national and international science and technologypolicy.About Fahmida Chowdhury:Dr. Fahmida N. Chowdhury is a Program Director in the Office of International Scienceand Engineering (OISE) at the US National Science Foundation (NSF). Prior to joiningNSF in 2008, she was a Professor of Electrical and Computer Engineering at theUniversity of Louisiana, Lafayette, USA, where she held the W. Hansen Hall and MaryO. Hall Endowed Chair in Computer Engineering. Dr. Chowdhury has been active inIEEE for many years; she served on the editorial boards of two IEEE Transactions: on Control SystemsTechnology and on Neural Networks. She was an elected member of the IEEE Control System Society'sBoard of Governors, and also IEEE Computational Intelligence Society's AdCOM. Her research interestsinclude complex systems modeling and analysis, non-traditional applications of dynamic systems theory,and detection of abnormal conditions (faults) in dynamic systems. She has deep interest in internationalscience, technology and educational collaborations, science and engineering diplomacy, and servingsociety through humanitarian technologies and policy-level engagements.Page 11 of 27

10:00 AM SessionsProfessional Networking for Engineers: Design Patterns for SuccessBy Jaron RubensteinEngineers have a reputation for being exceptional problem solvers, identifying challenges theyencounter and applying past approaches to ensure successful solutions. Those exceptional problemsolving skills often fall down when it comes to building, maintaining, and leveraging one's professionalnetwork.In software engineering, a software design pattern is a general reusable solution to a commonlyoccurring problem within a given context. In this presentation, you'll learn proven design patterns thathave worked for the speaker over the span of his 20-year career as a software engineer, CTO, and nowCEO of a small software company. New and veteran engineers and IT professionals will gain a toolbox ofpatterns they can apply to their own professional network efforts, along with ideas, strategies, andtactics to those efforts are more effective, more productive, and more fun.About Jaron Rubenstein:As President of RubensteinTech, Jaron leads the growth and development of thebusiness while also setting the strategic vision. Since founding the company in2002, he has seen his small startup expand beyond consulting services into a 30person, best-in-class enterprise software firm. In addition to his leadershipresponsibilities, Jaron takes an active role in client relationships and productinnovation. Trained as a software engineer, his expertise runs the gamut from advising C-suite officerson information technology strategy to managing the details of complex code in modern developmentlanguages and systems. Jaron also mentors junior team members on topics ranging from Linux systemsadministration to network security. Before founding RubensteinTech, Jaron was CTO at Logicept and asoftware engineer at Lockheed Martin. He is an Eagle Scout, an avid camper, and has a weakness forNerds (the candy).Page 12 of 27

New Corporate Wireless Security Risks and Spectrum Signal Processing ToolsBy Joe JessonJoe discusses the latest portable interception tools and signal process knowledge now possessed byhackers (both black hat and white hat) are employing. Motivated by low-cost FPGA SDR transceivers,rainbow software tables, Van Eck radiation interception/demodulation hardware, and the various toolsand techniques revealed in Wikileaks, the techniques Joe will illustrate was previously the exclusivedomain of the NSA and CIA . Tools such as low-cost ( 15) spectrum analyzers and open source data SDRbaseband correlation tools is employed to receive, demodulate, decode, analyze, and store, and displaythe data protocols. New and portable wireshark pcap sniffers and tiny WiFi deauth tools will be shown.Finally, Joe will give suggestions how to protect your assets, how firewalls are bypassed.and to reviewthe design and use of cellphone man-in-the-middle attacks (e.g. Stinger) and what can be done toprotect corporate information and IP assets.Good luck sleeping the night after hearing this talk!About Joe Jesson:Joe Jesson is currently the CEO of RFSigint Inc, a Wireless IP/Patent advisory service. Patentclaims are compared and mapped and expert witness offerings on IoT, M2M, Telematics,and Telemetry patents. Also, Joe is CTO for Assurenet Inc, a NY video telematics companyand CTO of Able Devices, a wireless software expert on a SIM card. Joe is an engineeringresearcher on a DOT grant and teaches, as Adjunct and Visiting Professor at TCNJ, engineering classesand Labs. In 2007, Joe received the GE Edison Award by the Chairman of GE, Jeff Immelt, while CTOand co-founder of GE's Asset Intelligence (now ID System's Asset intelligence) IoT business. Joe wasInstrumentation Engineer at the University of Chicago Jones laboratory and has advanced degrees fromDePaul University and currently finishing a PhD in security at NJCU.Page 13 of 27

Experiential Lessons and Insights from an Innovative Technology InitiativeBy Sridhar RaghavanIn this talk, Dr. Raghavan will share his experiential insights from leading a major innovation called SMILEat Motorola/NSN. In a nut-shell SMILE (for Smart Mobile Innovations for Life Style Enrichment)technology consisted of a wafer thin SIM add-on accessory embedding an advanced Micro Controller,Secure Element & NFC Chip, Smart Router and Open-standards based Secure Application Developmentand Execution. Though initiative has ended now, the underlying technology and products paradigmremain relevant for domains such as Mobile Payment and Remittances, Bit Coin, IOT and Healthcaredomains, But what is far more valuable is the data point it has created for furthering the understandingof the practical realities of innovative technology development and product engineering, that can becounter to and challenging conventional wisdom.About Sridhar Raghavan:Dr. Sridhar Raghavan is currently engaged in Technology Incubation andentrepreneurial activities. His interests span a wide range of technologies withindustrial scale Software Engineering & Management as the common underlyinganchors. Prior to his incubation activities, he served in leadership capacities asFellow of Technical Staff at Motorola, Nokia Siemens, Nortel and Digital. Sri earned his PhD in ComputerScience and Business from Georgia State University and MTech/BTech in Electrical Engineering from IITMumbai. He is a Senior Member of IEEE and an active contributor to standards working groups at IEEE(and formerly at W3C and OMG).Page 14 of 27

11:00 AM SessionsKeep Your Technical Debt Under ControlBy Dennis ManclTechnical debt is a term that was coined by software design pioneer Ward Cunningham in 1992 toexplain certain kinds of complexity in the process of software development. Technical debt is someredesign or recoding work that developers defer to a later date. They might say "it would be nice tomake this search operation faster" or "we have to clean up our device handlers", but then decide towork on something else instead. In the twenty-first century, this "debt" concept has been talked aboutmore often as agile and iterative development methods have become more popular. Technical debt hasbecome a popular and powerful metaphor for small teams, projects with very short development cycles,and teams following agile development practices, but it can apply to development projects of any size orcircumstances. It can be hard to avoid technical debt, but there are ways to reduce the risk that massivetechnical debt will be a long-term drag on new feature development. This talk will present a set of goodpractices for monitoring and keeping technical debt under control.About Dennis Mancl:Dennis Mancl is a New Jersey-based software process and software design expert. Heworked as a Distinguished Member of Technical Staff at Alcatel-Lucent, where he hasbeen involved in object oriented design techniques, design patterns, softwarearchitecture, and agile development practices for over 20 years. Dennis is now anindependent writer and researcher on software engineering topics.Page 15 of 27

Embedded Systems MethodologiesBy Dwight BuesSince Embedded Systems commonly have low development overhead, minimal memory or storage perunit, and are heavily cost-driven, there are significant market pressures to "shoot the Engineer and put itinto production" and not heavily invest in design rigor. The Internet of Things (IoT) has proved that whilecapabilities can be delivered inexpensively, releasing products that have Safety or Securityvulnerabilities can cost hundreds of thousands of dollars in rework or MILLIONS in lawsuits.Jay Thomas, in the Embedded magazine article "Software Standards 101: Tracing Code toRequirements," stated that it is an industry standard that making systems safe or secure includes "tensteps" of design rigor, such as using a formal requirements capture process, tracing code back to sourcerequirements, tracing test cases to requirements, and collecting artifacts for certification needs.This session is designed to provide the audience with several methodologies for Integration, Verification,Validation, and Transition that, when employed, will ensure that the target system will support theSafety and Security needs of the Customer.About Dwight Bues:Dwight Bues is a Georgia Tech Computer Engineer with 35 years' experience incomputer hardware, software, and systems and interface design. He has workedin Power Generation, Communications, RF, Command/Control, and Test Systems.He is the author of numerous technical articles in Design News, EE Times, and IoTInstitute magazines and blogs. He has presented at ESC conferences in 2013, 2014, 2016, and 2017.Dwight is a Certified Scrum Master and teaches courses in Architecture, Requirements, and IVV&T. He isalso a certified Boating Safety instructor with the Commonwealth of Virginia and the United StatesPower Squadrons. He has worked several STEM projects, sponsoring teams for competitions in theAerospace Industries Association's (AIA) Team America Rocketry Challenge (TARC) and the RoboticsEducation and Competition Foundation's, Vex Skyrise Robotics Challenge, and presented Engineeringand Design information in several Middle and High School venues.Page 16 of 27

Product Development Methodologies for Success!By Jerry BellottElectrical Engineers can increase their ability to innovate, plan, and develop new products that succeedin the marketplace by following product development methodologies, using current standards andpractices, and continuing education. They can also facilitate success by understanding how marketing,engineering, and business financial planners work together to plan products that address customerneeds and expectations plus devise a schedule and budget that will lead to company profit.“Product Development Methodologies for Success!” will empower you to: Position yourself to be innovative by planning continuing education on current technologies,standards, and practices to fuel creative thinking.Position your company for success by using your creative potential to plan new products thataddress customer needs well.Improve product quality by addressing customer needs and expectations.Succeed at producing quality products on time by following a structured methodology to breakthe execution phase down into steps.Increase peer interaction to have fun and learn from others through formal and informal peerdiscussion and review.Students will gain insight into the corporate world they will be working in after graduation.About Jerry Bellott:Jerry Bellott has an MSEE from Georgia Tech with a computer design emphasis. Healso has a BSEE from WVU (cum laude). Mr. Bellott has more than 30 years experiencedesigning, testing, and writing about products for the Personal Computer, officecommunication systems, data networking, broadband switch, wireless, and DSP multiprocessor circuit industries. He is a former member of the AT&T PC DevelopmentDepartment. Mr. Bellott was on the team that designed the first truly compact 2G digital cell phonecircuits which were used by Motorola in the StarTac in 1993. He served as Senior Systems Engineer atViaGate Technologies in 2000, where he co-designed a 2Gbps broadband switch that used IP over ATMand could deliver HDTV and Ethernet connectivity to up to 240 rooms. Mr. Bellott co-designed the VT4000 1 GHz 64-core MathStar DSP circuit board for Valley Technologies in 2004, and designed test plansand wrote project documentation for PC, PowerPC, LAN and fibre channel SAN equipment, plusapplication GUI’s for DSP analysis at DSPCon between 2005 and 2008. He has also writtendocumentation for microwave HD video links and streaming video over LAN products at IMT, Inc. Mr.Bellott currently delivers talks on design topics and is a book author.Page 17 of 27

1:40 PM SessionsMicro-services Architecture MethodologyBy Jyothi SalibindlaMicro-services became the hot term since 2014. Micro-services involve an architectural approach thatemphasizes the decomposition of applications into single purpose and is a new software developmentstyle that has grown from recent trends in software development/management practices. Microservices are composable fine-grained modules which can be independently deployable and scaled up ordown both vertically and horizontally which empowers the development, manageability and speed tomarket by adopting to Agile methods, DevOps culture, cloud, Linux containers, and ContinuousIntegration/Continuous Development methods. Also I will present the API security options and need forsecuring the all back-end Micro-services. I will present this new approach which will be useful for manypeople.About Jyothi Salibindla:Jyothi Salibindla is currently a Java/J2EE and BPM lead for Karsun Solutions LLC. Shehas 15 years of experience in the Information Technology industry, specializing inAnalysis, Design, Development, Implementation and Testing of enterprise applicationsusing Java/J2EE, BPM technologies. She has played a critical role in the success ofseveral Agile BPM implementations and have extensive expertise in all facets of theJ2EE/BPM lifecycle. She's spearheaded complex cloud to cloud integration strategies and solutionarchitecture touching several existing, internal, and external systems. Jyotha is also a volunteer in IEEEand mentor in Women in Technology in Washington DC area, in addition to working as a reviewer forIJERT international Journal. She enjoys learning new technologies and spending time in

also planned and led enterprise-wide programs introducing and adapting Agile frameworks, principles, practices and tools. Prior to working in leadership roles and as a coach, Greg was a software engineer engaged in software, hardware and systems engineering programs. Greg is an IEEE Life Member in