[segment id=”college-intro” style=”padding: 70px 0 40px;”]

Mining the Krypton Way

[tab_slider slideshow=false animation=slide direction_nav=false]

  • [six_col]15079956398_38d0ed0f79_k[/six_col][six_col_last]

    Artifact Integration

    Recommendations and suggestions are integrated with existing content platforms and systems already in place in the organization. When none are yet in place, we create local or cloud-based rapid deployment intranets to serve as repositories for those artifacts.

    [button size=”large” color=”theme” href=”/contact-us” ]Contact[/button]

    [/six_col_last]

  • [six_col]Eric Medina (West Chicago Community High School) and his mother Martina[/six_col][six_col_last]

    Cross-Domain Fertilization

    Concepts from one discipline can enrich perspectives in another. Starting with a deep understanding of analogy and metaphor in human cognition, existing frameworks can be enhanced while laying the foundation for new ways of thinking.

    [button size=”large” color=”theme” href=”/contact-us” ]Contact[/button]

    [/six_col_last]

  • [six_col]9661987923_90e1bc2ab1_k[/six_col][six_col_last]

    Taxonomies to Go

    Standardizing the way knowledge is tagged and structured within an organization is essential to predictable automation outcomes as well as reliable search results.

    [button size=”large” color=”theme” href=”/contact-us” ]Contact[/button]

    [/six_col_last]

  • [six_col]13946526586_aef0d7dfde_o[/six_col][six_col_last]

    Realistic Information Assurance

    You can’t blame computer specialists for wanting to solve security and privacy issues with hardware- and software-based solutions. Unfortunately, the approach has serious limitations. An approach more similar to safety engineering is favored by Krypton. It’s worth learning about, especially if you do not have an unlimited budget for high end security solutions of undetermined value.

    [button size=”large” color=”theme” href=”/contact-us” ]Contact[/button]

    [/six_col_last]

[/tab_slider]

[/segment]

[segment background_color=”#eeeeee”]

[heading2 title=”In The News” pitch_text=”News that even Krypton couldn’t dent.”]

[post_snippets_carousel id=”news-carousel” post_type=”news” navigation=”true” post_count=6 image_size=’medium’ display_title=true show_meta=true display_summary=true show_excerpt=”true” excerpt_count=80 hide_thumbnail=”false” navigation=”true”]

[/segment]

[segment class=”heading”]

[heading2 title=”Take a capabilities tour” pitch_text=’Taste some of the sweet spots where we play.’]

[/segment]

[show_post_snippets post_type=”gallery_item” number_of_columns=4 post_count=8 image_size=’medium’ no_margin=”true”]

[twelve_col class=”call-to-action clearfix”]

[responsive_carousel id=”spotlight-carousel” pagination=”true” navigation=”false” items=3 items_desktop=3 items_desktop_small=2 items_tablet=2]

[parent_wrap class=”zero-margin”]

video-play

[wrap class=”bottom”]

Storytelling as Instruction

Storytelling is so important that a related specialty — narratology — exists to understand how stories are formulated and understood. It may be that what makes a story good is more important than what makes a storyteller good.

Play Video

[/wrap]

[/parent_wrap]

[parent_wrap class=”zero-margin”]

img-portfolio

[wrap class=”bottom”]

The Pipe Organ Dream

Because patrons want to see them, organ pipes are sometimes left in venues which have long since replaced them with electronic counterparts.

See the ‘Grandeur’ of Facade Pipes

[/wrap]

[/parent_wrap]

[parent_wrap class=”zero-margin “]

Bricktronics Sensors via Wayne and Layne

[wrap class=”bottom”]

Security, Privacy and Provenance for IoT

Interested in learning more about security, privacy and provenance issues in the Internet of Things (IoT?). Message us on Twitter @kryptonbrothers.
Image credit: Wayne and Layne.

Tweet at Us

[/wrap]

[/parent_wrap]

[parent_wrap class=”zero-margin last”]

Photo of graduates wearing cap and gown

[wrap class=”bottom”]

You Graduated.  Now What?

If lifelong learning is the direction most see, what are fixed-duration, fixed-outcome educational settings still the main focus?

Learn [sic] More

[/wrap]

[/parent_wrap]
[/responsive_carousel]

[/twelve_col]

[segment id=”blog” background_color=”#eeeeee”]

[heading2 title=”Selected Stories” pitch_text=”Use the scroll controls on the lower right of this section to browse past articles.”]

[post_snippets_carousel id=”blog-carousel” post_type=”post” navigation=”true” items=4 post_count=6 image_size=’medium’ excerpt_count=85 display_title=true show_meta=true display_summary=true show_excerpt=”true” hide_thumbnail=”false” navigation=”true”]

[/segment]

[segment id=”featured-sources”]

[heading1 title=”Krypton Brothers & Staff Experience”]

[wrap class=”featured-list”]

[two_col]Logo 1[/two_col]

[two_col]Logo 2[/two_col]

[two_col]Logo 3[/two_col]

[two_col]Logo 4[/two_col]

[two_col]Logo 5[/two_col]

[two_col_last]Logo 6[/two_col_last]

[/wrap]

[/segment]

[segment class=”quote-banner” background_image=”/wp-content/uploads/2015/05/classroom-background-image-light-blue-low-contrast-via-livemesh.jpg” background_color=”#2A9DD6″ parallax_background=”true” background_speed=”0.4″]

Our Mission

[wrap class=”text”]

To improve the practice of software engineering through the integration of ontologies and other knowledge-based practices.

To enhance enterprise productivity through workflow, process mining and other operational improvements.

[/wrap]

[/segment]

[segment id=”stats-section” background_image=”http://kryptonbrothers.com/wp-content/uploads/2014/10/geo-bg4.jpg”]

[heading1 title=”Big Data Security and Privacy” separator=true]

[number-stats]

[responsive_carousel id=”stats-carousel” navigation=”false” pagination=”true” items=3 items_tablet=2 items_tablet_small=1 items_desktop_small=3 items_desktop=3]

[number-stat icon=”icon-user14″ title=”Avg Data Breach Cost”]$3,800,000[/number-stat]

[number-stat icon=”icon-pencil6″ title=”Petabytes of User Facebook Data”]30+[/number-stat]

[number-stat icon=”icon-lab” title=”% Users Unhappy About Sharing PII”]72%[/number-stat]

[number-stat icon=”icon-study” title=”% Enterprises to Discover a 2015 Breach” text=”That’s just the sensitive data breaches”]60%[/number-stat]

[number-stat icon=”icon-shop” title=”Number of Web-Enabled Sensors by 2020″]30 Billion[/number-stat]

[number-stat icon=”icon-world” title=”% of all Data that is Unstructured”]75%[/number-stat]

[number-stat icon=”icon-star” title=”Number of Photographs Processed by Facebook in 2010″ text=”per Second”]1,000,000[/number-stat]

[number-stat icon=”icon-megaphone4″ title=”Hours of Video Uploaded to YouTube” text=”Per Minute”]300[/number-stat]

[number-stat icon=”icon-paperplane” title=”Number of YouTube Users”]1 Billion[/number-stat]

[number-stat icon=”icon-study” title=”E-Meter Readings Per Day by a Utility” text=”for a typical large utility”]220 million[/number-stat]

[/responsive_carousel]

[/number-stats]

[/segment]