Skip to main content

Magazine Search

3 results found
Student Experiences Fall 2008 Summer 2020 Winter 2012
Imagine hacking into a Furby, picking a lockbox, shooting targets with Nerf guns, diving into piles of (clean) trash, and sliding under string “laser beams,” all with the end goal of identifying—and then fixing—vulnerabilities in a wireless computer security system.
Signs mark the entrance: Production Area, Authorized Personnel Only. Inside, observers stand behind a line of caution tape, taking notes intently. In front of them a rumbling machine shuffles orange, green, and yellow balls along conveyor belts, through tubes, and down ramps.
An average person attending a lecture about “model-driven system development” would likely be lost and confused within minutes. Likewise, as Stephen Liddle has attempted to teach this concept in his ISys 532 class, he is often met with blank stares.