Close Menu

News

Finding the motivation to go out for a run can be challenging, but an app developed by an Illinois Institute of Technology alumnus might spark the inspiration to tie on the running shoes. Matthew Knippen (CS ’12) just celebrated the second anniversary of launching Charge Running, which links...
The Department of Computer Science is again offering its summer computer camp for girls entering middle school, grades 7-9, or any returning student.  For information and an application see this page.
On November 9, 2018, the AI in Data Privacy Hackathon was organized as part of the Global Cybersecurity Initiative Conference (GCSI 2018) held at Illinois Tech. GCSI 2018 brought together technology leaders in the Chicagoland area and the Illinois Tech community including a number of academics and...
Big-data applications—from the analysis of information in industries ranging from health care to entertainment to transportation—have large volumes of data. This data must be maintained, managed, and operated on disk-based computer-storage systems via input/output (I/O) systems, which read, process...
Xiaofan Li, interim dean of the College of Science and Professor of Applied Mathematics recently honored five people with Dean’s Excellence Awards. The Dean’s Excellence Awards were presented during an end of year celebration for the college. The celebration took place in the new home of the...
Although reports of hacker jobs done from within organizations make the news each year, that a longtime employee, former employee, or trusted business partner could be responsible for company cyberattacks still comes as a surprise to many. But it shouldn’t. According to a 2018 study by the ...
Big-data applications—from the analysis of information in industries ranging from health care to entertainment to transportation—have large volumes of data. This data must be maintained, managed, and operated on disk-based computer-storage systems via input/output (I/O) systems, which read, process...
Whether it’s a hacker in a basement or a spy from a rogue nation, we tend to think of cybersecurity as defense for attacks from outsiders. But the most serious threats to an organization’s security (in cyberspace or the physical world) come from within—from a trusted employee, former employee, or...
Cyberattacks on the energy sector are on the rise and can cripple a city or country. In Ukraine in 2015, a cyberattack on the electrical grid created a power outage for 225,000 customers. Earlier this year, a U.S. security alert accused the Russian government of hacking multiple U.S. energy,...
Iva Veseli (B.S. BIOL/M.S. CS 5th year) has been awarded a National Science Foundation (NSF) Graduate Research Fellowship Program (GRFP) award to pursue her Ph.D. in the biophysical sciences at the University of Chicago. The GRFP covers expenses for three years of a five-year fellowship period – a...

Pages