IEEE Smart Tech Metro Area Workshop series is coming to Westchester, NY, on 1920 October 2012.

The two-day intensive workshop will be held at the Crowne Plaza White Plains. Receive two days of instruction, plus meals, for only US$159 for members* and US$209 for non-members.

Smart Tech Workshops offer parallel, all-day track sessions that allow attendees to immerse themselves in a given technology. Below you will find the agenda and course description for each track. Attendees may choose one full-day track on each day of IEEE Smart Tech or two half-day courses.

As a special incentive for non-members, if you choose to wait and join IEEE on site at the workshop, you will receive a US$50 credit toward your first-year membership dues in lieu of the member discount on your registration fee.

*Society affiliates are not eligible for the member rate.

Workshop Schedule

All times are ET.

Friday, 19 October

Saturday, 20 October


Three tracks run concurrently all day. Choose one full day or two half-day sessions:

  • Track 1: Introduction to Smart Grid (full day)
    • Morning Session: Smart Grid Principles including renewable and energy storage options, definitions, focus areas and monitoring equipment » Afternoon Session: Integration of Smart Grid applications and equipment into utility operations; cyber security and network communications technology and techniques 
  • Track 2: Computer Engineering 
    • Morning Session: Foundations of Software Security
    • Afternoon Session: Managing a Secure Software Development
  • Track 3: Wireless Communications
    • Morning Session: Cyber Security - Cellular vs. IP
    • Afternoon Session: Machine to Machine Communications

Three tracks run concurrently all day. Choose one full day or two half-day sessions:

  • Track 1: Wireless Communications
    • Morning Session: AppInventor Course
    • Afternoon Session: AppInventor Course (repeated) 
  • Track 2: Computer Engineering
    • Morning Session: Cloud in the Business Environment 
    • Afternoon Session: Cloud Governance & Security
  • Track 3: Career Assistance (full day)
    • Morning Session: Develop networking, job seeking, professional-development and organizational skills 
    • Afternoon Session: Utilize IEEE resources to help manage your career, prepare resumes, prepare for interviews, and search for jobs
7:00am8:00amRegistration and Continental BreakfastRegistration and Continental Breakfast
8:00amOpening Session Opening Session
8:30am10:00amTrack SessionTrack Session
10:30am12:00pmTrack SessionTrack Session
1:00pm2:30pmTrack SessionTrack Session
3:00pm4:30pmTrack SessionTrack Session
4:30pm5:30pmNetworking BreakWorkshop Series Ends at 4:30pm
5:30pm7:30pmKeynote Address and Evening Reception 


Introduction to Smart Grid

Friday, 19 October (all day)

This course provides a basic introduction to Smart Grid from multiple stakeholder perspectives. It covers the Smart Grid principles that accommodate all generation types, including renewable and energy storage options. These principles drive the goals and objectives that enable new products, services, and markets; optimize asset utilization and operating efficiencies; improve system reliability and power quality; and enable informed customer participation. The NIST Conceptual Model and its domains and interfaces will be explained. Smart Metering will be explored. The various definitions and focus areas of Smart Grid will be described, as will the current state of Smart Grid applications and how these drive infrastructure requirements. Monitoring equipment used by Smart Grid applications in the network to generate data for analysis and improve customer service will be highlighted. Issues involved with the integration of Smart Grid elements into utility operations will be explored. There will be a look at how distribution automation can be an enabling technology for Smart Grid. The terminology and techniques of Smart Grid cyber security and the technology and techniques used to provide security will be introduced. The Smart Grid standards framework and the challenges associated with it will be described. An overview of Smart Grid network communications and the data needed in/out of the network will be explained.

Recommended for all technology professionals. CEU credits are earned by completing this course.

At the end of this course, attendees will:

  • gain a high-level understanding of the levels of the NIST Conceptual Model and be able to identify the conceptual model's seven domains and describe their functions;
  • be able to compare smart grid applications of today and tomorrow and explain how they impact infrastructure requirements and deployment challenges;
  • gain a high-level understanding of the large volume of data required to enable the smart grid and how this data is obtained;
  • gain an understanding of issues important to energy consumers and how monitoring enabled by the smart grid can help utilities address these issues;
  • gain a high-level understanding of security principles and how these principles are applied to smart grid concerns;
  • gain a high-level understanding of the various types of equipment used in distribution automation and the benefits of distribution automation;
  • gain an overview of the need for interoperability and how the explosion of data that results from smart grid will require a common method of communication;
  • be able to list the categories of standards in the Smart Grid Standards Framework and relate these to stakeholder benefits;
  • understand the employment trends, necessary skills, and other components needed to make a successful transition into Smart Grid.

About the instructor:

Robert (Bob) Uluski, Technical Executive at EPRI, has over 35 years of experience in the electric utility industry. He has served as Project Manager or Lead Technical Consultant on numerous projects involving distribution automation and distribution management systems. Bob has conducted DA/DMS seminars at DistribuTECH and other forums for over 10 years. He also was primary author of “Down Line Automation – A Guidebook for Electric Distribution Co-ops.” In 2010, the IEEE Power Engineering Society awarded Bob the Douglas M. Staszesky Award for contributions in the field of Distribution Automation. Bob serves as the Vice Chair of the IEEE PES Working Group on Smart Distribution and as secretary of the IEEE PES task force on Volt-VAR control. He also serves as chair of the IEEE PES DMS task force.

Computer Engineering: Software Security

Friday, 19 October

Morning Half-Day Session: Foundations of Software Security

Software security is becoming increasingly important due to the numerous emerging threats exploiting software vulnerabilities. This course provides a broad overview of various software security threats and some of the most effective countermeasures used to thwart both well-known and newly emerging software security threats. By taking this course, software practitioners will learn how to build security into their software products throughout its lifecycle. Although it is impossible to accomplish “perfect security” in software, the participants will be exposed to the best practices and tools available today to minimize their chances of falling a victim to a common software security attack. Topics to be covered include:

  • introduction to software security;
  • sources of software security threats;
  • software security best practices;
  • software security lifecycle;
  • software security testing;
  • careers in software security.

At the end of this session, attendees will be able to:

  • understand and relate the significance of software security;
  • describe the major sources of software security threats;
  • overview software security best practices;
  • outline and explain the secure software life cycle;
  • describe the processes involved with secure software testing;
  • discuss the career outlook in software security and how to prepare.

CEU credits are earned by completing this course.

Friday, 19 October

Afternoon Half-Day Session: Managing a Secure Software Environment

Whenever a software system is developed and deployed, there is always an entity that will attempt to corrupt or misuse that software. Software security is thus a critical thread that must run through the entire software development life-cycle. The development of secure software is the ultimate goal. Software security involves a layered approach designed to deal with myriad threats and attack vectors based on an overall security policy that takes into account a variety of threat scenarios, the ROI of software security, the security supply chain, software assurance risk management and system evolution in an environment of never-ending threats. This course examines software security from the perspective of managing secure software development. Specific topics to be covered include:

  • Introduction to Secure Software
    • development nature of software
    • software development life cycle
    • software as a system
    • basics of security employment
    • demands and trends in software security
  • Security in Detail
    • layered approach to security
    • threats and attack vectors
    • security policy and its importance
    • security from an ROI perspective
    • security supply chain
  • Software Security Risk Management
    • risk management overview
    • incident response
    • in-house versus COTS
    • testing for security
    • system evolution
  • Assurance Management
    • ownership issues
    • assurance management

CEU credits are earned by completing this course.

About the instructors:

Jungwoo Ryoo is Associate Professor of Information Sciences and Technology (IST) at the Pennsylvania State University-Altoona. He is also an affiliated faculty member of the college of IST at Penn State. His research interests include information assurance and security, software engineering, and computer networking. He is the author of numerous academic articles, and he conducts extensive research in software security, network/cyber security, security management (particularly in the government sector), software architectures, architecture description languages (ADLs), object-oriented software development, formal methods, and requirements engineering. Many of his research projects have been funded by both state and federal government agencies. He also has substantial industry experience in architecting and implementing secure, high-performance software for large-scale network management systems. He received his Ph.D. in Computer Science from the University of Kansas in 2005.

Dr. Remzi Seker is Professor and Chair of the Computer Science Department at University of Arkansas at Little Rock (UALR) and Director of the Center for Excellence for Assurance, Security, and Software Usability, Research, and Education (ASSURE). His research interests are safety and security critical systems and computer forensics. His research is motivated by the trend in rapid penetration of computer-based technologies into the society. When computer-based technologies become commodities on which people rely, the vulnerability of the society to these technologies increases as well. Remzi, as a researcher, focuses on ways to address the asymmetric threats that arise from rapid yet necessary use of technology. He is co-author of one of the very first papers that was published on Mobile Phishing and possible techniques for preventing it. Aside from professional activities, he participates in a variety of venues for increasing public awareness on security.


Wireless Communications: Cyber Security and Machine to Machine Communications

Friday, 19 October

Morning Half-Day Session: Cyber Security – Cellular Vs. IP (IP Security in Wi-Fi Networks)

With increased use of the Internet by the public and corporations, attacks have become more sophisticated. Service and application providers often wonder where and how attacks can be deterred. This course addresses the challenges from cyber attackers for whom access through Wi-Fi seems straightforward and discusses typical prevention methods in the traditional IP world. Specific topics that will be covered include:

• IP addressing scheme;
• methods used in routers/switches for routing;
• back-door entry: how cyber attackers try to enter;
• the deterrents used by service providers;
• importance of firewall;
• VPN and other private network schemes;
• do’s and don’ts for enterprise network security;
• examples of a good security approach, how to catch loopholes;
• cellular security (methodology and intricate paths in standards);
• authentication process in cellular calls (voice and data);
• the strengths of cellular authentication and encryption;
• Wi-Fi vs. cellular;
• NIST guidelines on network security (AES comparison and contrasts);
• SIM card, smart phone security features;
• employment demand and trends in cyber security.

CEU credits are earned by completing this course.

Friday, 19 October

Afternoon Half-Day Session: Machine to Machine (M2M) Wireless Communication

This course deals with non-human, wireless communications (no voice) and mobile M2M methods. Wireless communication could be as simple as temperature and pressure monitoring, or it could be a ticket vending machine or even a camera to send pictures when there is some movement. Most commonly, it involves sensors in manufacturing plants spread over a wide area. Wireless service over a wide area provides the advantage of collecting information from a variety of sensors on a 24-hour basis. Specific topics covered include:

• modem and wireless access (resource allocation at tower);
• sensor interface and connection;
• sending data/receiving commands;
• event reporting structure;
• interactive systems (need for central control);
• security issues relating to M2M systems;
• access delay and impact (network management systems);
• examples of a typical payment networks (credit cards, NFC units);
• cellular handoff (authentication for mobility and usage);
• round-trip delay and limits based on mobility;
• periodic updates of location, conditions;
• encapsulation of sensitive data (user perceptions);
• advantages to transportation authorities;
• public concerns on radiation safety in enclosed spaces;
• SIM card, integrated systems (security features);
• cellular standards view of M2M systems;
• limitations of data rate (types of camera and sensors);
• upgrade and maintenance of modems (use of OTAP and NMS);
• trends and employment demands in wireless communications.

CEU credits are earned by completing this course.

About the instructor:
Krishnamurthy Raghunandan (Raghu) is a Construction Administrator in MTA/New York City Transit. His current responsibilities include bringing the latest wireless technologies into mass transit, including piloting new products/systems. Prior to joining MTA, he worked on cellular technology for over a decade in Bell Labs, developing products, field trials methods and standards for cellular handsets and infrastructure. Earlier, he worked on satellite and launch vehicle systems that provided him with a strong background in systems reliability and test methods.

Geoffrey L. Smith is Vice President of Business Development and Strategic Sales at Proxim. In this role, he is responsible for expanding Proxim's business in all security applications, which include Transportation, Public Safety, and Federal Government. Geoffrey has been with Proxim since 2002 and has led R&D, Sales, Marketing, and Product Management. He introduced the first WPA2 equipped Wi-Fi access point, pioneered pre-WiMAX technology, which uses AES encryption for CCTV applications, and created the industry's first FIPS 140-2 level 2 certified Point to Multi-Point Radio for fixed and mobile federal security applications. Prior to joining Proxim, Geoffrey worked for Agere, Lucent, and AT&T Bell Laboratories leading wireless, DSL, and modem R&D teams.

Wireless Communications: Designing Smartphone Apps for Android Devices Using the AppInventor Platform

Saturday, 20 October

Half-Day Session (Repeated Morning and Afternoon) 

Learn how to create Android apps with AppInventor in this hands-on workshop. AppInventor is the "easy" drag-and-drop visual programming system (similar to Scratch) for creating apps for Android phones and tablets. AppInventor comes with an "emulator," which mimics a phone, so a real Android phone/tablet is not needed to test your apps. To maximize instruction time, workshop participants are required to bring their PC or Mac laptop on which AppInventor has already been installed and tested (directions will be provided to you on registration) and participate in a checkout procedure on Friday afternoon that will test your preparedness for this hands-on workshop. The course agenda will include:

  • an introduction to AppInventor;
  • a 15-minute demo during which a variation of a phone raffle app is developed from scratch;
  • participants will build a couple of apps on their own with instructor/assistants helping as much or as little as needed;
  • employment trends and demand in app invention.

By the end of the course, attendees will:

  • gain an understanding of how the App Inventor platform was created and is being used;
  • be able to install and run App Inventor on their computers;
  • build one or two mobile apps during the workshop;
  • gain an introduction to how App Inventor is being used in computer-science education;
  • know where to look for additional information about App Inventor and the App Inventor community.

Plus, attendees with their own Android phones will be able to leave the workshop with one or more of their own apps installed on their phones.

CEU credits are earned by completing this course. Note that there is a 30-person limit per morning and afternoon session for this track.

About the instructor:

Ralph Morelli is a pioneer in creating high school and college curricula based on AppInventor. Morelli graduated from the University of Connecticut in 1969 with a B. A. in Mathematics. He has an M.A. and Ph.D. in Philosophy as well as an M.S. in Computer Science from the University of Hawaii. He has been teaching at Trinity College since 1985, the same year the computer-science major was first offered. He is one of the principal investigators for the Humanitarian Free and Open Source Software (HFOSS) project, an NSF-funded effort to get undergraduates engaged in building free and open-source software that benefits the public. In summer 2011, a team of Trinity HFOSS students and faculty traveled to Haiti to build an open-source mobile application that helps register and manage beneficiaries for a humanitarian aid organization.

Computer Engineering: Cloud Computing, Governance, and Security

Saturday, 20 October

Morning Half-Day Session: Cloud Computing in the Business Environment: A Manager’s Perspective

Managers are often faced with having to decide if and how to upgrade their IT infrastructure and how to pay for it. In an environment of tight budgets and soaring hardware and software costs, they are also looking for alternatives to making huge investments that will have to be upgraded again and again. The Cloud can be that solution. Managers need information to make intelligent decisions, however. This course is designed to provide that information.

Topics covered include:

  • concept of virtual services;
  • the platform (hardware) as a service;
  • software as a service;
  • services as a service;
  • virtual systems (PCs);
  • virtual software;
  • levels of service: a broad overview;
  • keeping track of your data and processes understanding the user’s admin responsibilities.

CEU credits are earned by completing this course.

About the instructor:

As Cofounder and Chief Technology Officer, Don Shafer developed Athens Group’s oil and gas practice and leads engineers in delivering software services for exploration, production, and pipeline monitoring systems for clients such as BP, Chevron, ConocoPhillips, ExxonMobil, and Shell. He led groups developing and marketing hardware and software products for Motorola, AMD, and Crystal Semiconductor. From the development of low-level software drivers to the selection and monitoring of semiconductor facilities, he has led key product and process efforts. He received a B.S. from the United States Air Force Academy and an MBA from the University of Denver. Twice treasurer of the IEEE Computer Society Board of Governors, past editor in chief and chair of the IEEE Computer Society Press, an IEEE senior member, and a Golden Core member, he is a software-engineering subject-matter expert for the Cockrell School of Engineering’s Advanced Research in Software Engineering Center at the University of Texas at Austin. Don has contributed to three books, has written more than 20 published articles, and is coauthor of Quality Software Project Management, published by Prentice-Hall. He is a contributor to the 2010 edition of the Encyclopedia of Software Engineering and is a Certified Software Development Professional. His current projects include the development of a multi-volume set of Software Engineering Proven Practices for the oil and gas industry based on more than a decade of extensive engineering work done at Athens Group. His current patents deal with control-system hardware and software virtualization for functional and performance validation and verification in a virtualized, cloud environment.

Saturday, 20 October

Afternoon Half-Day Session: Cloud Governance and Security

Migrating IT infrastructures to the Cloud is becoming a cost-effective solution to the ever-increasing burden of maintaining complex software and hardware systems. As with any new concept that plays a central role in business, the Cloud must be understood. Specifically, the differences between managing an in-house IT infrastructure versus a Cloud-based infrastructure are critical.

Seeing the Cloud as a process rather than a product, implementing a governance plan, and developing Cloud metrics are all part of Cloud governance.

Additionally, securing data and processes within the Cloud is central to any migration considerations. Issues such as risk profiles, what information should and should not be committed to the Cloud, roles and rules, and access control must be taken into account. This course will examine these and other key concepts central to Cloud governance and data security.

After attending this course, attendees should be able to:

  • overview the key governing concepts of Cloud computing;
  • describe and discuss the key governing metrics of Cloud computing;
  • relate a generic governance process;
  • explain the principle risks involved with using the Cloud;
  • discuss what kinds of data should and should not be committed to the Cloud and why;
  • identify key issues involved with protecting Cloud-based data and processes, including roles, rules and access.

CEU credits are earned by completing this course.

About the instructor:

Barry Lewis is President of Cerberus, a firm specializing in the delivery of information-security training and consulting. He has over 40 years of experience in the computer field and has spent the last 30 years specializing in Information Security. He is co-author of several books, including Computer Security for Dummies, Teach Yourself NT Server in 21 Days, Teach Yourself Windows 2000 Server in 21 Days and Wireless Networks for Dummies. His books have been translated into more than a half-dozen languages around the world. Barry lectures and consults worldwide on numerous security topics, including Windows, governance, wireless networking, and security best practices.

Career Assistance: Managing Your Career as a Business

Saturday, 20 October

Managing Your Career Like a Business

Presented by volunteer members of the IEEE-USA Employment and Career Services Committee (ECSC), the goal of the workshop is to assist engineers and technology professionals in developing lifelong employability in a continuously changing career and employment environment by focusing on their own professional and career development.

Throughout the Career Assistance track, presenters will highlight the unique resources that IEEE makes available to help engineers and technology professional manage their careers, including the wealth of online tools and the power of the IEEE network.

Specific topics that will be discussed in the workshop include:

• managing your career as a business;
• developing an effective career strategy;
• avoiding career derailers;
• the critical role of networking and how to do it effectively;
• targeted job searching;
• preparing winning resumes;
• nailing the interview;
• consulting as a career option.

The workshop will provide information and tools that will help engineers and technology professionals in:

• developing networking and job-seeking skills;
• achieving career satisfaction;
• improving the ability to take responsibility for personal career and professional development;
• emphasizing that career and professional development involves both technical and non-technical areas;
• learning how to make organizations more productive.

CEU credits are earned by completing this course.

About the instructors:

Don Herres is the IEEE Region 1 Employment & Career Activities Coordinator and also Syracuse Section Chair. He has been involved with Career Activities Workshops with IEEE for a number of years and was awarded an IEEE-USA Citation of Honor in 2006 for these efforts. Don has a B.S. in Electrical Engineering from SUNY Buffalo and an M.S. in Electrical Engineering from Syracuse University. He is a licensed Professional Engineer in New York State. Don has extensive experience in product design and manufacturing, holds three patents, and is currently employed as Senior Design Electrical Engineer with the Switches, Sensors and Controls Business Unit of Marquardt Switches in Cazenovia, NY.

Holly M. Cyrus is currently a project manager for the Airport Safety Technology R & D Section, ANG-E261, at the FAA William J. Hughes Technical Center, Atlantic City, NJ. She performs research and development of Visual Guidance equipment and Pavement Marking Materials. She has been with the Federal Aviation Administration for 24 years. Her experience includes two years with the Environmental Engineering Branch, Depot Engineering, AAC-445C, where she found replacements for obsolete parts for lighted navaids and engine generators. She worked for 11 years with the Navigation and Landing Branch, AOS-240, in Oklahoma City, OK, performing modifications and field support of lighted navaids. Holly is a graduate of the University of New Mexico, Albuquerque, New Mexico, U.S.A. She received her B.A. in Mechanical Engineering. She is a graduate of Capella University, Minneapolis, MN. She received an MBA. Holly has been in Toastmasters for 11 years and is a Distinguished Toastmaster (DTM). She has also been an IEEE member for 11 years and is an IEEE Southern New Jersey Employment and Career Activities Coordinator Region 2 and Women In Engineering (WIE) Committee Member at the International level.

Gary L. Blank, Ph.D., is the IEEE-USA Vice President, Career and Member Services, 20102012, responsible for the IEEE Consultants Networks Coordinating Committee, the Employment and Career Services Committee, the Entrepreneurs Activities Committee, the Licensure and Registration Committee, and the K12 STEM Literacy Committee. He teaches review courses for the FE and PE Exams. He is an independent consultant in the areas of power, controls, and electronics. As a consultant to the US Department of Energy, he also teaches courses in smart grid, renewable energy, and electric cars for college instructors and high school science teachers.

Tarek Lahdhiri, Ph.D., PE, PMP, SM-IEEE, is the IEEE Region 4 PACE Chair and the IEEE Region 4 representative to the IEEE-USA Employment & Career Services committee. He is the recipient of the 2001 IEEE-USA Professional Achievement Award, the 2004 IEEE-USA Professional Leadership Award, and the 2007 IEEE-USA Citation of Honor Award. Tarek is a licensed Professional Engineer in Michigan and a licensed Project Management Professional by the Project Management Institute. He works at General Motors Corporation, where he is the Strategy Leader for Real-Time Control Systems.

Keynote Address: Gary L. Blank

Get Smart!

The dawning of a new technological era and a changing global economy has caused everyone to make decisions about lifestyles and careers. Engineers are concerned about their future and the profession. Where will the jobs, the business opportunities, and the consulting opportunities be found? How can the engineer adapt to the new technologies? What will be the impact of the smart grid, electric vehicles, renewable energy, wireless communication, cybersecurity, and biomedical developments? The engineer must GET SMART.

With a wealth of experience and background in both industry (as an employee and as a consultant) and academia (as a professor of electrical engineering), Dr. Gary L. Blank addresses these issues and suggests possible action plans for the engineer.

About the keynote speaker:

Dr. Gary L. Blank has successfully divided his professional career between industry and academia. He worked for Honeywell, Litton, and Unisys in the areas of controls and electronics. He was a professor of Electrical and Computer Engineering at Illinois Institute of Technology (I.I.T.), Northern Illinois University, Marquette University, and U.C.L.A. Gary has published dozens of technical papers and has earned grants for his universities.

He is a full-time consultant and has provided consulting services for over 40 industrial corporate clients. He was chosen by the U.S. Department of Energy and I.I.T. to create and conduct courses in renewable energy, smart grid, and electric vehicles. He teaches review courses for the FE/EIT and PE exams.

Gary received his Ph.D. from the University of Wisconsin, Madison (Ford Foundation Fellow); his M.S. from the University of Idaho (Kaiser Corp. Fellow); and his B.S. from Illinois Institute of Technology (Ingersoll Foundation Scholar). All degrees are in Electrical Engineering.