innovate with tech!

25
Innovate With Tech! 1. Do the activities listed in the Assignments box. 2. Type in your work at the bottom of each assignment. Name Student Assignment B Assignments Due Date 1: What Is Digital Convergence?Assignment 1. Review the items shown on the Spot the Technology activity sheet. Which items feature technology? Fill out the chart below identifying where you think each item should go. Page 9 2. Read the following definition of technology: Technology is the application of knowledge toward a practical purpose. Technology Not Technology 1

Upload: others

Post on 14-Jan-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Innovate With Tech! 1. Do the activities listed in the Assignments box. 2. Type in your work at the bottom of each assignment.  

  

Name     Student Assignment B 

Assignments  Due Date 

   

1: What Is Digital Convergence?Assignment 

1. Review the items shown on the Spot the Technology activity sheet. Which items feature technology? Fill out the chart below identifying where you think each item should go.  

 

Page 9 

2. Read the following definition of technology: Technology is the application of knowledge toward a practical purpose.  

Technology  Not Technology 

   

   

   

   

   

   

   

   

1

 Therefore all the cards feature technology! Place the technologies in order from least advanced to most advanced.  

 

3. Write the name of the technology that is the most advanced in all three categories (camera, payments, music):  

 This technology is a form of digital convergence: the phenomenon where digital technologies converge or come together in one place. 

4. Consider: What allows phones to translate different kinds of information (voice, video, music, text)? Read the short passage below to learn how phones translate information:  The Power of Code Explain that phones can translate different kinds of information (voice, video, music, text) into digits—or numbers. This code can be sent to other devices, such as tablets and computers, that speak the same digital language. This language uses only two digits—0 and 1—which is why it is called binary code. (The prefix bi- means two. The word binary means involving two things.)  

5. Read the Career Connections magazine about STEM professionals who work with today’s technological advances to create video games, improve online security and protect the environment! 

Pages 10-13 

Exit Slip:  1. Describe digital convergence in your own words.  

   

2. List two or three benefits of a smartphone over older technology for making payments, listening to music, or taking pictures. 

  

Least Advanced → → → → → → → → → Most advanced 

Camera         

Payment System 

       

Music Technology 

       

 

2

  

3. List two or three challenges from having digital convergence in a smartphone.    

Assignment 2: How Can Biometrics Protect Us? 

1. Think about an average day in your family’s lives. Think about the purchases you make and your family members make. What are some of the ways technology systems protect your identity to make sure the correct person is making purchases?   A Need for Protection What if someone downloads a banking app on their phone...and then loses their phone? Because technology makes it easy to access our bank accounts and make purchases, we have also made technological developments over time to help people identify themselves and protect their personal information. Some strategies for protecting personal information may include:  

● presenting identification (like an ID card) ● entering PIN codes or passwords ● providing a signature ● answering security questions ● fingerprint- and facial-recognition technology 

 Which of these technologies have you used or seen? 

 

2. Read the following passage:   

Biometrics is the field of technology that uses a person’s unique biological characteristics to identify or authenticate them. The term “biometric” can be broken into two root words: “bio” and “metric” (metric like measurement). The practice of biometrics applies statistical analysis to biological/human data.   Can you think of examples of biometric technology? 

 

3. Try biometrics! Using your own fingerprint and binary code, you will create an identifying biometric code that is unique to you. 

Page 14 

  

  

3

  

 ✎ You will need: blank paper, graphite pencil (a regular pencil, not a pen), and clear tape  Steps: 1. On a piece of paper, use a pencil to color in a rectangle 

a bit bigger than the pad of your thumb.  2. Rub the pad of your thumb in the rectangle until your 

thumbprint has an even coating of graphite.  3. Press your thumbprint onto the sticky side of a piece of 

clear tape. Place the tape sticky side down onto a clean part of the paper. 

4. Inspect your thumbprint for the features shown in the Encrypt Your Fingerprint activity sheet. If you spot one or more of the features, record its binary code(s) below.  

 My fingerprint encryption codes:  

 

Exit Slip: Imagine you are designing a new app. You will have to consider how users will sign in...and how you will protect them if someone else tries to sign in as them! What strategies will you use to authenticate each user’s identity and keep all accounts secure? Come up with your own ideas and/or use what you learned above.   Explain your plan with a short description below. If appropriate, draw and diagram your idea on a separate paper or using a digital drawing tool.  

 

   

        

Assignment 3: How Can You Stay Safe Online? 

1. Think about the activities you may do online, such as playing games, watching videos, streaming music, doing homework, and storing photos and other digital files in the cloud.  

4

 Create a list brainstorming the benefits of online access. 

 

2. Read the Cybersecurity issue of the Classroom Connections magazine. Along with the benefits to online access, there are also risks.   As you read, make a list of the risks the cybersecurity professionals discuss. Add any risks that you know of that aren’t mentioned in the magazine. 

 

Pages 15-18 

3. Discuss the risks you listed with a family member. Ask if they have experienced any of these issues. If you have experienced them, tell your family member about your experience. 

 

4. Complete the Assess Online Risks activity sheet.  Page 19 

Project: Play the role of a cybersecurity expert. Design an app (or other digital tool) that will protect young people’s safety and security anywhere online.   Here’s how: 

1. Brainstorm two or three ideas designed specifically for young people in middle school. 

2. Review the criteria chart below. Choose the idea that meets at least two of the criteria listed on the chart. 

3. Draw and label art that demonstrates how your app or tool functions. Write a brief description, too. 

4. Submit your art for peer review. Ask a fellow student to identify any weaknesses in your app or tool—meaning parts where it could be easier to use, provide better protection, or help more people on more platforms. 

5. Adjust your design and description based on peer feedback. 6. Submit your final design to your teacher. 

      

      

5

  

 

 

Cybersecurity App Criteria 

● Protects against a wide variety of risks ● Provides feedback about safe and unsafe practices to the user ● Engaging and fun ● Easy to use for middle school users 

Assignment 4: How Does Artificial Intelligence Work? 

1. Think about voice-activated digital assistants that can play music or movies, answer questions, and provide directions. These assistants are a form of artificial intelligence.   Predict what you think the following terms mean: 

○ Artificial intelligence: ○ Machine learning: 

 

2. Read the following reading passage and highlight the meaning of the two terms in step one.   Mimicking Human Intelligence Artificial intelligence occurs when computers use algorithms to perform tasks that humans do, like processing language and making decisions. An algorithm is a set of steps that can be followed to complete a task. As artificial intelligence operates, it gains more data on its task. The more times it completes a task, the more the artificial intelligence experiences machine learning, which occurs when a computer program automatically improves as it processes more data.    Because AI runs on algorithms written by humans and uses data created by humans, AI code is not “neutral.” In fact, research has shown that AI technology often reflects the biases and priorities of the people creating it. Has a digital assistant ever misunderstood what you said? It is possible that the data the human coders chose to include in that technology used a limited group of people to determine pronunciation. When there is limited data provided to an AI or limited groups of people used to test a technology, the AI will be more accurate for some people than others. For example, research has found that facial recognition programs developed in the US are far more likely to produce incorrect matches for African American, Native American, and Asian faces than Caucasian ones. This is an example of human coders limiting the effectiveness of artificial intelligence.  

3. Write two paragraphs reflecting on artificial intelligence and data. 6

 In Paragraph 1, reflect on the reading passage in step 2. What are the connections between human bias and AI? 

 In Paragraph 2, consider the fact that artificial intelligence needs large sets of data to operate. Explain why you think AI needs so much data—and why it would be important to keep this data safe, private, and secure. 

 

Project: Now it’s time to brainstorm your own AI innovation using the following steps. 

1. Read “The Fashion Industry Innovator” on page 20 and “The Future of AI” on page 22 of the AI issue of the Career Connections magazine.  

Pages 20-23 

2. Read the AI innovations on the Ready, Set, Innovate page. 

Page 24 

3. Brainstorm AI technologies using the Explore Artificial Intelligence sheet 

Page 25 

4. Design your own AI technology that uses data and machine learning to help people. Consider the following: 

● What problem will your AI technology address, and how? ● How will you make sure the technology will work for everyone (across race, 

gender, ability)?  ● How will you make sure that the data is safe and secure, and people’s 

privacy is respected? 

         

         

7

  

 

 Describe your AI technology concept below, and draw/diagram it on paper or using a digital drawing tool.  

 

         

Bonus Activity: Meet a Real-Life Security Expert 

Watch the Meet a Real Life Cybersecurity Expert video.  Go to: bit.ly/tech4innovation30 

Write down five tips from the video. Explain why you think these five tips are important.  

 

EXPERT TIP  WHY IT’S IMPORTANT 

   

   

   

   

   

8

Spot the Technology!

NAME

Cut out the cards along the dotted lines and group them in three categories: technologies used for music, photography, and payment transactions.

Activity

Ph

oto

s: ©

Mas

terc

ard

; © P

op

artic

/iSt

ock

.

9

CONNECTIONS

C RA E E RSPONSORED EDUCATIONAL MATERIALS

SCH

OLA

STIC

and

ass

ocia

ted

logo

s are

trad

emar

ks a

nd/o

r reg

ister

ed tr

adem

arks

of S

chol

astic

Inc.

All r

ight

s res

erve

d. ©

201

9. 6

8781

9.M

ASTE

RCAR

D a

nd a

ssoc

iate

d lo

gos a

re tr

adem

arks

and

/or r

egist

ered

trad

emar

ks o

f Mas

terc

ard.

All r

ight

s res

erve

d. P

hoto

: © C

arlin

a Te

teris

/Get

ty Im

ages

.

The coolest jobs in STEM

the 4 surprising skills you’ll need to get ‘em

#goals

Sponsored by Mastercard

+

10

2 Career Connections

PROFILES

Phot

o: ©

Dre

am L

over

/Sto

cksy

Uni

ted.

IN STEM

Who says that playing Fortnite or Overwatch isn’t educational? Not

these video game creators! With collaboration, creativity, and curiosity,

these STEM professionals build digital worlds to fascinate and entertain.

Do you have the skills to succeed

in a STEM job?

Matthew Ostil

Game Developer at

AXS Studios

My Strengths Problem solving, planning, collaboration, willingness to learn.

In My Job I build video games and apps using code. When I first started coding, I felt behind everyone else who had been creating games for years. I learned quickly that my feelings, not my abilities, were standing in the way of my success. I started practicing, challenging myself to solve problems, and teaching myself new things.

Growing Up I fell behind in math class. I felt lost and like I couldn’t grasp the concepts. I would get stressed out and give up.

Pro Tip When a tough problem arises, ask for help! I’ve made so many good friends from working together on problems.

Andrea Luc

Game Designer

& Producer at TVO

My Strengths Seeing things through, digging into details, creativity, collaboration.

In My Job I work with a team to create characters, concepts, and mechanics for

video games. Although I was scared of math growing up, now I create educational math and STEM games

for kids. I get to make tough concepts fun and easier for kids to understand. Weaving narrative into the games I create is one of the most fun things I get to do every day.

Growing Up It was scary to admit when I didn’t understand something, like math.

Pro Tip Mistakes are bound to happen—what matters most is how you move on.

Britney Coates

3-D Artist at Sinking

Ship Entertainment

My Strengths Artistic, organized, curious, adaptable.

In My Job I use 3-D computer software to create video game environments. Everything is constantly changing, and it’s easy for me to feel anxious if I’m assigned a task I’ve never done before. Something that I have come to embrace is that I will always be teaching myself something new.

Growing Up Art was my favorite class. I took classes outside of school to get even more practice and learn about different kinds of art.

Pro Tip Invest time in activities that combine your interests and abilities. Remind yourself that you don’t have to like something simply because you’re good at it.

THE

GAMERS

2.73 BILLION Number of gamers projected

by the year 2021

11

3Career Connections

Phot

o: ©

JG

I/To

m G

rill/G

etty

Imag

es.

People with strong problem-solving and

innovation skills build the technology that helps

protect your privacy.

Kathy Zant

Cyber Security

Consultant at

Defiant

My Strengths Communication, persistence, curiosity, bored by boredom.

In My Job I help protect companies against Internet security threats. I work with a team of researchers and developers to investigate malware found on websites. We use security tools to find out how it got there and to protect the site from future attacks. When I first started in my role, I sometimes felt overwhelmed. In Internet security, there’s always a new problem and there isn’t always one right solution. Now I’ve learned strategies to refresh and start again.

Growing Up I was bored in classes I didn’t find challenging. I wasn’t motivated by getting “easy” good grades. I liked to explore topics on my own time, in my own way.

Pro Tip If you start to feel overwhelmed, get away from a problem for a few minutes. Solutions to problems come more easily after taking a deep breath and attacking again with a new mind-set.

THE

CRIME BUSTER

EVERY 39

SECONDSHow often

hackers launch

attacks on computers

Roughly 85 percent of the jobs that will exist in 2030 haven’t been invented yet! So future-proof

yourself with these so-called “soft skills” that experts agree are key to succeeding in any career.

LEARNING

& ADAPTING

Be willing to learn new things and adapt to change.

DESIGNING

Think of and create the best ways for systems to work.

SPEAKING

& WRITING

Communicate ideas in ways that are easily understood.

COLLABORATION

Work together with a team to solve problems and innovate.

FUTURISTIC41 2 3 4

12

Phot

o: ©

Sam

i Sar

kis/G

etty

Imag

es.

4 Career Connections

Jillian Morris-Brake

Marine Biologist, Shark Conservationist at Sharks4Kids

My Strengths Passionate, hardworking, adventurous, teaching others.

In My Job My job is different every day. Some days I am underwater, filming and photographing sharks. Other days I’m in the field, conducting research and tagging sharks. Often, I am spending time educating young people with Sharks4Kids, a nonprofit organization that teaches kids in classrooms all over the world about sharks and ocean conservation. Having a strong background in math and science has helped in my fieldwork, but I believe having a passion for my work is my greatest asset.

Growing Up At age 8, I met my first manatee and nurse shark while snorkeling in Florida. I knew I wanted to be a marine biologist. Science would help me learn more about the world, and art let me be creative. My favorite things to draw and paint were sharks and dolphins.

Pro Tip Don’t let anyone discourage you or make you feel that you don’t belong.

Kyle Shaughnessy

Solar Project Manager & Entrepreneur at Rise Solar Canada Inc.

My Strengths Empathy, relationship-building, communication, brainstorming.

In My Job I maintain rooftop solar installations to make sure they’re generating power efficiently. I ended up in a STEM career because I want to make a positive impact on the environment. I want to be a part of the growing movement toward sustainable and renewable energy and away from technologies that pollute.

Growing Up I always thought I would end up becoming a teacher or a lawyer. I’d never really excelled in math or science and had no experience working with electricity or engineering. Throughout school, I played volleyball and basketball, which is where I learned that the best teams work with each other’s strengths and around each other’s weaknesses.

Pro Tip It’s OK if things don’t come naturally. Work as hard as you can and draw on your other strengths to succeed.

Do you love the planet and all of its creatures?

With passion and empathy you can use science and

technology to change the world!

THE

ECO-CRUSADERS

4 Number of days

Portugal powered its entire country

using only wind, solar, and hydro-

generated electricity

13

My fingerprint encryption codes:

Encrypt Your Fingerprint

NAME

Try biometrics! Using your own fingerprint and binary code, create an identifying code that is unique to you.

Activity

1. Use a graphite pencil to color in box A. Rub the pad of your thumb in the box until your thumbprint has an even coating of graphite.

2. Press your thumbprint onto the sticky side of a piece of clear tape. Place the tape sticky side down so your thumbprint appears inside box B.

3. Inspect your thumbprint for the features shown in the diagram on the right. If you spot one or more of the features, record its binary code(s) below.

A B

How a Print Can Unlock a Phone When you first scan your fingerprint, the scanner creates a binary code that matches the ridges in your print (just like the exercise you did above). Those ridges in turn match the unique binary code that will stay stored in your phone. So even your identical twin can’t get in!

CORE 01000010 U-turn in the ridge pattern

DELTA 01000001 Y-shaped meeting of ridges

DEAD END 01000100 ridge that ends

SPLIT & REJOIN 01000111 a single ridge that splits into two and joins to become one ridge again

ISLAND 01001000 a gap inside of a Split & Rejoin

SPUR 01001001 a small ridge that branches from a longer one

DIVIDE 01000011 ridge that splits into two ridges

INDEPENDENT 01000101 a short ridge that isn’t attached on either end

14

CONNECTIONS

C RA E E RSponsored Educational Materials

Tips to Stay Safe

Online

+

5 Cool Jobs inCYBERSECURITY(That You Might Have Someday!)

SCH

OLA

STIC

an

d a

sso

ciat

ed lo

go

s ar

e tr

adem

arks

an

d/o

r re

gis

tere

d t

rad

emar

ks o

f Sc

ho

last

ic In

c. A

ll ri

gh

ts r

eser

ved

. © 2

019

Ph

oto

: Ko

ron

/Get

ty Im

ages

Developed with MasterCard

15

Ph

oto

: Fat

cam

era/

iSto

ck, o

pp

osi

te p

age:

Co

urt

ney

Hal

e/iS

tock

Meet the Cybersecurity Superheroes

Online security experts may not wear capes, but they’re working hard to protect you from the bad guys—the computer hackers and criminals who want to steal your private information. These pros use technology to solve problems, innovate new solutions, and crack codes—which keeps us all safer.

Chief operations officer at Acceptto, a cybersecurity company in Portland, Oregon

My Strengths Pragmatic, hardworking, results-oriented

In My Job My team and I are working toward a world where your online data is protected by your private digital DNA. Like your real DNA, digital DNA can differentiate you and prevent bad guys from accessing your data. We create it by measuring your digital behaviors—like how long it takes you to enter a password. If you’re taking longer than normal to input the “rhythm” of your password (which could happen if someone is trying to login as you), my company’s technology will alert you.

What I Like Best About My Job There are some similarities to the technology in a spy movie. While we aren’t hanging from ceilings to avoid laser lights, we are using cool technologies that mix artificial intelligence, machine learning, and behavior modeling.

Growing Up I was always interested in math and science, but I was not fantastic in it. I just worked hard in school!

Pro Tip Regardless of your interest in cybersecurity, take some classes in logic. It’s the foundation of critical thinking.

Assistant professor of informatics and cyber operations at University of Arizona

My Strengths Curious, innovative, not afraid to try and fail

In My Job I teach classes on video-game development and interface design. (An interface is what humans interact with to make a machine work—like using a navigation menu or giving your phone voice commands.)

I help students understand how people interact with computers, machines, robots, and software.

What I Like Best About My Job I get to play with virtual reality, augmented reality, and video games—and call it work! I help my students find their passion and turn it into a career.

Growing Up I always loved literature, music, and art. Then, in middle school, a friend and I built a computer in a plastic storage bin and it worked.

It was like a magic trick. At that point, I was sold.

Pro Tip Study everything you can get your hands on. It doesn’t matter if it seems totally unrelated at the time. Creativity, even in technical fields like cybersecurity, is vital.

$6 TRILLION

The annual projected costs

of cybercrime by 2021

2 Career Connections

THE

TECH TEACHERRyan Straight

THE

SECURITY SLEUTHNahal Shahidzadeh

16

3Career Connections

Sneaky cyber criminals are always trying to steal your stuff. Here’s how to protect yourself online.

DO create strong passwords. Try using “nonsense” words and a combination of numbers and special characters.

DON’T use your real name as a screen name or username. Cyber criminals steal accounts with these easy-to-guess combinations all the time!

DO keep your social media posts clean and appropriate. Try to think of it this way: Would your grandma be OK with what you’re about to post? If the answer is yes, then go ahead.

DON’T give out your full name, address, or phone number to anyone. Cyber criminals will try to build your trust and give you a seemingly good reason to reveal your personal info. Don’t be fooled: There’s never a good reason!

DO avoid public WiFi. Or at least don’t enter passwords and other sensitive information over WiFi at a coffee shop, library, or other public place. Those details could be seen (and stolen) by strangers.

CYBERSECUITY

DOS AND DON’TS

THE

VIRUS DETECTIVEJessica Chowning

300 BILLION

The estimated number of

passwords used by humans and

machines worldwide by 2020

Senior security analyst at Mastercard in O’Fallon, Missouri

My Strengths Logical, problem-solver, technical

In My Job I see my job as a combination of being a guard dog and a janitor. My team and I try to make sure nothing gets in to hurt or affect our machines or our computer networks, and if that does happen, we clean up.

What I Like Best About My Job Tackling challenges, like finding the source of suspicious traffic or a virus. For example, I recently helped a computer owner figure out why her computer was infected. I asked her some questions about her activity, and we discovered that her machine got a virus from a flash drive, which is a really common way to infect computers!

Growing Up I was really into the Harry Potter series, and my grandmother taught me to knit just like Hermione did. I loved working with my hands and doing something by myself. That’s why I also learned to bake, and why I learned to love problem-solving, which I now get to do every day!

Pro Tip I got my college degree in mathematics, but now there are full programs for cybersecurity degrees. There are also so many ways you can explore cybersecurity on your own. Discover what you like best through fun activities like hackathons and online challenges.

17

Ph

oto

: Mar

tin B

arra

ud

/Cai

aim

age/

Get

ty Im

ages

Professor of computer science, engineering, and public policy at Carnegie Mellon University in Pittsburgh

My Strengths Problem-solver, creative, collaborative

In My Job I teach security and privacy courses to college students, and I conduct research into how to make security and privacy tools more usable.

What I Like Best About My Job I get to combine my interest in security with some of my personal passions, like quilting. I made a quilt called “Security Blanket,” featuring the most stolen passwords from a video game website. When I won an award for it, I sewed a dress to match!

Growing Up My mother was a math professor and my father was an engineer—and they both encouraged my interest in STEM when I was a kid. My father taught me computer programming when I was in elementary school, and he let me use the computer in his research lab at work.

Pro Tip Cybersecurity careers require you to have technical skills and people skills. If you are interested in math and computer science and you like to solve interesting challenges, cybersecurity may be a great career for you!

President of Electrosoft, an IT and cybersecurity firm in Reston, Virginia

My Strengths Optimistic, focused, exploratory, innovative

In My Job I specialize in identity management. That means I help make sure that people are who they say they are when they attempt to enter government buildings or log on to networks. The government uses a smart card, something like your school ID, and stores important information about you—your name, your electronic keys, even your fingerprints—in a powerful chip within the card. If you’re supposed to have access to a system or building, the card lets you in.

What I Like Best About My Job Leading a team of experts who help our government prevent bad guys from stealing data or taking over our country’s computer systems.

Growing Up I loved math and taking things apart to see how they worked. I discovered that breaking up big problems into smaller steps makes challenges more manageable.

Pro Tip Every business will need cybersecurity pros to protect their systems and information in the future. Focus on STEM subjects in school to prepare for an exciting career!

THE

IDENTITY EXPERTSarbari Gupta

THE

PASSWORDS PROLorrie Cranor

You get to use the latest tech (or even create it!).

You get to beat the bad guys.

You get to solve fun and challenging problems.

You get to be part of a cool community, like “white hat hackers.”

You get to still be around some of the smartest people—in person!

5 WAYS CYBERSECURITY IS LIKE

GAMING...BUT BETTER!

1 2 3 4 5

18

Activity

Assess Online RisksConsider these typical activities that tweens and teens do online. What are the pros and cons of each? Are they safe and secure? Why or why not?

Name

Sponsored Educational Materials

The browser on the school laptop offers to save my login and password for me.

I won’t have to remember my password!

We’re going to work on our group project over the weekend using collaborative cloud presentation software.

My friend emailed me the link to a cool game I can download.

Maybe not. I need to figure out if the game will be downloaded from a trusted source.

The app I watch videos on constantly recommends other videos I might like.

I got a friend request on social media from someone I don’t know. They said they’re friends with one of my friends.

Signing up for the software account means that our personal information is stored online.

Online activity Pro (positives) Con (negatives) Safe and secure?

19

Sponsored Educational Materials

SCH

OLA

STIC

an

d a

sso

ciat

ed lo

go

s ar

e tr

adem

arks

an

d/o

r re

gis

tere

d t

rad

emar

ks o

f Sc

ho

last

ic In

c. A

ll ri

gh

ts r

eser

ved

. © 2

021

Ph

oto

: Jo

y B

uo

lam

win

i po

rtra

it: T

he

Fem

inis

t P

ort

folio

/ P

ho

tog

rap

hy

Tom

Lin

db

oe

Meet six different cybersecurity experts and artificial intelligence specialists who are at the forefront of technology, keeping us safe from online criminals and

figuring out how to make technology better, faster, and smarter.

THE FASHION-INDUSTRY INNOVATORShana ChuCEO/Founder of STYL.wrap and

Advocate for Sustainability

What I Do and Why I Do It Sometimes when we shop online, we order the wrong size. This leads to waste, high return rates, and a notable environmental impact. I founded STYL.wrap to help make the fashion industry more sustainable. We use AI to solve size and fit issues, from helping to streamline the design process to recommending sizes to online shoppers.

What Inspired Me I worked in the industry as a garment technologist, and I could see the industry needed to change. I knew I had to put myself out there and solve it.

How I Tackle Challenges Starting a business is not for the fainthearted. This journey has been a thrilling roller-coaster ride, pushing me out of my comfort zone daily and testing my endurance and my ability to bounce back from rejection. It was a challenge at the start to hear criticism and “no,” but rejection was a learning opportunity that brought me closer to “yes,” and I’m thankful for the difficult experiences along the way.

Words of Advice Learn as much as possible about the human experience—after all, machines are built by humans and reflect our logic. In the fields of AI and cybersecurity, knowledge of language, art, psychology, and sociology are as valuable as knowledge of coding.

When Joy Buolamwini was a graduate student at MIT, she was doing research using visual recognition software that was supposed to identify her face. But the software couldn’t do its job correctly unless Buolamwini, who is Black, was wearing a white mask. The implications of this were far-reaching and alarming, and Buolamwini started researching how bias can be built into technology and perpetuate inequities based on race, gender, and class. She shared her research in a popular TED Talk called “How I’m Fighting Bias in Algorithms.” Buolamwini went on to found the Algorithmic Justice League, an organization whose mission is to raise public awareness about the impact of AI.

CONNECTIONS

C RA E E R

SPOTLIGHT ON...

Joy BuolamwiniFounder of the

Algorithmic Justice

League and

Algorithmic Bias

Researcher

20

Ph

oto

s: t

op

, go

lero

/iSt

ock

; bo

tto

m, v

inn

sto

ck/i

Sto

ck; p

ort

rait,

ph

oto

co

urt

esy

of

Mas

terc

ard

The internet gives you access to information, places, and people. It also gives cybercriminals access to you. But don’t worry—there are lots of things you can do to stay safe!

Change your passwords regularly. Some hackers steal personal information from computers and phones. Changing your passwords—and making them complicated by using numbers, letters, and symbols—helps keep them safe.

Think twice about uploading to the cloud. A good rule to follow: If you wouldn’t want people to see it, don’t upload it! That includes photos, personal information, and even text messages.

Block viruses and other malware. Virus-protection software and firewalls—programs that block certain kinds of data—can block attacks to keep your computer safe. Ask a trusted adult if your computer is protected.

Beware of email scams. It’s easy to avoid opening emails from people you don’t know, but cybercriminals can hack your contact list and send emails pretending to be someone you do know, from addresses you might recognize. If you’ve opened a message that seems off, don’t click on any links, don’t download any attachments, and don’t hit reply. Reach out to your contact in a new email.

PROTECT YOUR TECH

THE CYBERSECURITY INVESTIGATORJennifer BucknerSenior Vice President of Technology Risk

Governance and Standards at Mastercard, and

retired Brigadier General of the U.S. Army

What I Do and Why I Do It At Mastercard, I oversee and work with teams of cybersecurity specialists to protect the company’s technologies and customers from cyber threats. Teamwork is important! Our success depends on using our different skills to work together.

How I Got Where I Am I studied mechanical engineering, which taught me a disciplined approach to problem-solving. But I also like to “hack the problem.” I consider curiosity my superpower. Asking questions—rather than being told what to do and how to do it—helps me better understand the problem. Some of my best ideas come from brainstorming in small groups where nothing is too crazy to consider and everything has the potential to inspire.

How I Tackle Challenges A tough challenge can feel intimidating. But once I take a few initial steps, I’m able to see different paths to a solution. I might get it wrong at the start, but failing is a critical part of problem-solving. It allows us to learn and almost always helps us find a solution.

Words of Advice Math, coding, and robotics are important skills for working in cybersecurity, but so are design, psychology, and creative writing. A lot of my job involves storytelling—communicating technical topics through stories helps others understand what I need. Study what you love, and there will be a way to apply your skills in cybersecurity.

CONNECTIONSC RA E E R

21

THE ETHICAL HACKERJack CableFounder of Lightning Security and college

student at Stanford University

THE PRIVACY PROTECTORChasity WrightFounder and CTO of

Infiltron Software Suite

What I Do I’m a hacker. I use my abilities to help protect people and companies by discovering vulnerabilities before adversaries—bad hackers—do. I’ve worked at the Pentagon to help secure the Department of Defense, as well as with individual companies (Google, Facebook, and Uber) to help improve their security.

What I Bring to It I think curiosity is my most important trait. I got into security because I was curious to see how things worked. Curiosity and creative thinking go a long way when I’m looking behind-the-scenes to find vulnerabilities [a security weakness in software].

How I Got Where I Am I started programming in middle school by watching online lectures and reading books. Later, in high school, I accidentally discovered a vulnerability in a financial website. Fortunately, the company ran a “bug bounty” program—a program where they paid people like me for discovering vulnerabilities. From there I began exploring the field of cybersecurity.

How to Get Started A great first step is learning to code. If you know how something works, it’s easier to secure it. From there, try to find vulnerabilities in your code, then figure out how to make it more secure.

What I Do With so many devices in our world, hackers have more opportunities to break through digital security and access private data. I developed a cybersecurity software suite that integrates across phones, computers, and other tech to protect users on multiple devices. My software analyzes user behavior and gives corrective solutions.

What I Bring to It After 18 years working in the technology field, I realized many communities are not represented in tech. So I use my company to create opportunities for veterans, women, and minorities.

What Helped Me Succeed Like many young women, I lost interest in math and science in middle school. When I became interested in tech as a young adult, I didn’t give up when I was rejected or things didn’t go my way. On my path to becoming a STEM engineer and entrepreneur, I learned that rejection is not always a negative thing.

Words of Advice Pay attention in each subject to see what excites you most. Find STEM camps and online courses for your age group. If you like doing detective work, cybersecurity might be a great field for you.

CONNECTIONSC RA E E R

Robots can lift super heavy objects or touch materials that are too hot for human hands. Now, thanks to AI, robots can become even more helpful to humans.

Eldercare robots already entertain senior citizens and bring them food and water. As the technology improves, these robots will help with more complex tasks like finding the remote and assessing how the seniors are feeling using facial recognition technology.

Tiny robots—known as medical nanorobots—are already injected into people to diagnose disease and perform some surgeries. In the future, they may “swim” through the body to deliver medicine to exact locations, helping to eliminate medicinal side effects. They may also perform surgeries on parts of the body that surgeons can’t reach.

Someday, you might open your door to find a delivery drone bringing you pizza! Drones aren’t making home deliveries yet, but they are delivering medical supplies in remote areas around the world.

THE FUTURE OF AI

22

:

CONNECTIONSC RA E E R

THE SECURITY STRATEGISTJazmin TorresVulnerability Analyst for Mastercard

What I Do and Why I Do It My job is to identify security issues in Mastercard’s systems and make sure they get fixed so criminals can’t break in. By keeping Mastercard’s systems secure, I ensure that our customers’ money and personal information stays safe.

What I Bring to It The bad guy’s methods are constantly evolving and changing, so my approach must evolve and change as well. I’m a creative

person—I try to think like a bad guy so I can stay one step ahead of them.

What I Like About It Working in cybersecurity helps to protect people and the data that is precious to them. The work I do helps people feel safer. I knew this job was for me because it allowed me to combine creative thinking with my desire to protect.

Words of Advice Don’t be afraid to try different things so you can figure out what really interests you—when you find your passion, success follows. Also, if you’re given a challenge and it seems overwhelming, break it down into pieces, work through it one step at a time, and never be afraid to ask for help!

FIND YOUR CAREERWhich Computer Science Job Is Right for You?

Check off the activities below that you do regularly or that interest you the most.

Now, see what kinds of jobs might be in your future. (Don’t recognize the job title? Put your computer skills to use and do some research!)

I like the arts: video game developer, multimedia programmer, technical writer, web designer

I like helping others: cybersecurity consultant, security analyst, IT consultant, systems analyst, health information technician

I like inventing and/or using my hands: app designer, information systems manager, IT architect, hardware engineer

I like brainteasers: computer programmer, database designer, data scientist, software engineer

I Like...the Arts

❑ Writing or making videos

❑ Playing an instrument

❑ Painting or drawing

I Like...Helping Others

❑ Teaching others how to do things

❑ Listening to others’ problems

❑ Assisting others with physical challenges

I Like...Inventing and/or Using My Hands

❑ Building or taking apart machines

❑ Assembling furniture

❑ Fixing broken toys

I Like...Brainteasers

❑ Conducting science projects

❑ Playing math games

❑ Learning HTML and/or coding

23

24

Explore Artificial IntelligenceAI is all around us! Complete this chart to organize your ideas.

Name

Activity

AI Term Example Another ExampleWays It Can

Solve Problems and Help People

autonomous: something built to work on its own (without a human operating it)

robot vacuum

chatbot: a program that has been set up with automated responses so it can have a “conversation” with a human

confirminga doctor’s appointment through automatic text messages

facial recognition: a program that can identify faces

using your face to unlock a smartphone

machine learning: a program that processes large amounts of data in order to find patterns and get better (over time) at making choices

over time, a map app gets better at predicting traffic

predictive algorithm: the steps a computer follows to make predictions

a search engine predicts what you want to search for before you finish typing

speech recognition: computers that match sounds to words

voice typing

1

2

3

4

5

6

25