Robotics manufacturing shows Michigan’s automation leadership In August 2019 Michigan Tech and Northwestern Michigan College (NMC) formalized a partnership and seven new articulation agreements designed to expedite degree completion for engineering students transferring to Michigan Tech from NMC. Under the 2+2 agreements, which took effect with the fall 2019 semester, engineering students are able to complete their first . . .
Gary Tropp (Computer Network and System Administration ’22), along with Abigail Kuehne (Psychology and Communication, Culture, and Media/ Applied Cognitive Science and Human Factors ’21), Sam Raber (Psychology ’22), and Lindsay Sandell (Biomedical Engineering ’21), has been named a University Innovation Fellows by Stanford University’s Hasso Plattner Institute of Design. The global UIF program trains . . .
EET alumnus Aaron Zarembski was recently named one of 20 emerging leaders by Production Manufacturing magazine. The magazine’s annual list recognizes professionals under the age of 40 who are making a difference in the precision machined parts industry. Selections are based on nominations received by readers of the publication. The emphasis is on leadership and potential leadership, . . .
Ford Motor Company will host a Meet & Greet on Wednesday September 4, 2019 , 2:00 PM—5:00 PM, in the Rekhi Hall 2nd Floor Lounge. Computer scientists from Ford Motor Company will be on hand to discuss CS and careers at Ford. All Department of Computer Science students, as well as other interested students, are invited. Complimentary food and beverages . . .
Michigan Tech hosted two week-long GenCyber camps this summer. The first, held June 17–21, 2019, hosted 30 local middle/high school students. The second camp, August 12–16, 2019, hosted 21 local K-12 teachers. Camp participants gained cybersecurity knowledge, understood correct and safe online behavior, and explored ways to deliver cybersecurity content in K-12 curricula. A story . . .
By Karen S. Johnson, ICC Communications Director We live in a world where pretty much everything and everybody – individuals, companies, governments, critical infrastructure – are increasingly dependent on connected systems, networks and devices. And, as newspaper headlines reveal, those systems may be insecure and vulnerable to hackers. “Nowadays, everybody is using computers, and more . . .