March 7-Girl Scout Entertainment Technology Badge

On Saturday, March 7th, ACM hosted girl scouts for a Girl Scout Entertainment Technology Badge. The girls got to make their own games, place Olaf the Snowman on the Moon, make their own ringtones, and other fun activities. As always, we want to thank our ACM members and alumni for volunteering their time to make this event a success.
CAM00106

Alrayyashi, Kawthar
Bruck, Zachary
Drewes, Steven
Gardner, Eric
Gutterman, Michael
Hadid, Abdullah
Nazelli, Margaret
Nazzal, Mo’ath
Nitos, Victor
Pohutski, Molly
Yackley, Jeffrey
Dr. Bruce Maxim – Event Organizer

Thanks for your hard work everyone!

CAM00062

CAM00064

CAM00065

CAM00076

CAM00079

CAM00080

CAM00090
IMAG0161

IMAG0158

February 7th – Highschool Gaming Day

On Saturday, February 7th, ACM members volunteered their time to welcome area high-school students to the University of Michigan-Dearborn. Members helped introduce students to the concepts of Software Game Design, as well as giving students a taste of the UMD college experience. ACM volunteers at this event were:

Bruck, Zachary
Alrayyashi, Kawthar
Nazelli, Margaret
Nazzal, Mo’ath
Drewes, Steven

Thanks for your hard work everyone!
2015-02-07 11.57.16(mod)
CAM00021

ACM Community Volunteering – Boy Scouts Programming Badge

On Saturday, January 10, ACM members volunteered in giving back to the community by staffing the Boy Scouts Programming Badge. Volunteers spoke to the scouts about a variety of topics ranging from the milestones in the evolution of programming to the different positions that are held by current programmers in the IT field. Scouts also were introduced to programming concepts using Construct 2, JavaScript and Logo.

This Semester’s volunteers were:CAM00236

Bruck, Zackary
Drewes, Steven
Gardner, Eric
Maxim, Bruce
Nazelli, Margaret
Nazzal, Mo’ath
Yackley, Jeffrey

Thanks for your hard work everyone!

20150110_122800 CAM00226 CAM00227 CAM00230

ACM Network Security Competition

We are hosting our local chapter’s very first network security competition. In this competition we will be exploring the Vigenere Cipher. We will talk about how this cipher is executed and see how it is attacked. The exercise will use the Vigenere Cipher visualization tool. The exercise can be found in the attachment. More information about the Vigenere Cipher can be found here.

2-Vigenere-Cipher-lab