Close Menu

News

The Department of Computer Science at the Illinois Institute of Technology invites applications for multiple tenure-track/tenured faculty positions at all ranks, appointments to start in Fall 2020.... continued
The two-day Workshop on Big Data Analytics will introduce scalable data analytics and machine learning in a hands-on setting .... more details
Sanjiv Kapoor, professor of computer science, has been elected a senior member of the National Academy of Inventors. According to the NAI website, senior members foster a spirit of innovation within their communities through enhancing an inventive atmosphere at their institutions, while...
Finding the motivation to go out for a run can be challenging, but an app developed by an Illinois Institute of Technology alumnus might spark the inspiration to tie on the running shoes. Matthew Knippen (CS ’12) just celebrated the second anniversary of launching Charge Running, which links...
The Department of Computer Science is again offering its summer computer camp for girls entering middle school, grades 7-9, or any returning student.  For information and an application see this page.
On November 9, 2018, the AI in Data Privacy Hackathon was organized as part of the Global Cybersecurity Initiative Conference (GCSI 2018) held at Illinois Tech. GCSI 2018 brought together technology leaders in the Chicagoland area and the Illinois Tech community including a number of academics and...
Big-data applications—from the analysis of information in industries ranging from health care to entertainment to transportation—have large volumes of data. This data must be maintained, managed, and operated on disk-based computer-storage systems via input/output (I/O) systems, which read, process...
Xiaofan Li, Professor of Applied Mathematics recently honored five people with Dean’s Excellence Awards. The Dean’s Excellence Awards were presented during an end of year celebration for the college. The celebration took place in the new home of the College of Science in the renovated suites 252...
Although reports of hacker jobs done from within organizations make the news each year, that a longtime employee, former employee, or trusted business partner could be responsible for company cyberattacks still comes as a surprise to many. But it shouldn’t. According to a 2018 study by the ...
Big-data applications—from the analysis of information in industries ranging from health care to entertainment to transportation—have large volumes of data. This data must be maintained, managed, and operated on disk-based computer-storage systems via input/output (I/O) systems, which read, process...

Pages