Quantcast
Channel: Research – Information Technology and Management Loopback
Browsing latest articles
Browse All 12 View Live

Image may be NSFW.
Clik here to view.

ITM Faculty and Students active at ACM SIGITE Conference

ITM faculty members and students will not only attend, but will present and chair sessions at the 14th Annual Conference in Information Technology Education (SIGITE) and the 2nd Annual Conference on...

View Article



Image may be NSFW.
Clik here to view.

ITM Students win Best Paper at ACM RIIT

ITM students Bill Wesselman and Maya Embar display their award for ACM RIIT 2014 Best Paper. The Best Paper Award at the 3rd annual Association for Computing Machinery’s Research in Information...

View Article

ITM’s Jeremy Hajek quoted in Security Sales & Integration magazine

Jeremy Hajek’s, Industry Associate Professor of Information Technology and Management, comments appear in the article “Home Security Systems, Peripherals Said to Be Vulnerable to Hacking” in Security...

View Article

Dean’s article appears in the International Journal of Innovation Science

The article titled “Exploiting Intellectual Capital for Economic Renewal” was written by Dr. C. Robert Carlson, Dean of the School of Applied Technology, former ITM professor Praveen Gupta, and Helena...

View Article

Automated Drone presentation by Jeremy Hajek and Mark Milhouse

Jeremy Hajek, ITM Industry Associate Professor, and ITM student Mark Milhouse spoke at the 25th Annual DePaul Law Review Symposium “The UAS Dilemma: Unlimited Potential, Unresolved Concerns”, on their...

View Article


IIT Real-Time Communications (RTC) Projects Presentations

See ITM student presentations, demonstrations and poster sessions on Wednesday, April 29 from 5:30-8:30 PM. Free Presentations include: Indoor Location for NG911 NG9-1-1 test beds The Gateway Project...

View Article

We need Student Volunteers for an ACM Conference!

We need students to help with the 2015 ACM Special Interest Group in IT Education (SIGITE)/Research in Information Technology (RIIT) Annual Conference, September 30th through October 3rd. The...

View Article

NIST Big Data interoperability Framework

Most of us are familiar with the huge quantity of cybersecurity publications from the National Institute for Standards and Technology, but they have a standardization role that reaches far beyond...

View Article


Image may be NSFW.
Clik here to view.

Post-Quantum Cryptography

Quantum computing is expected to change the face of cybersecurity. What is the quantum threat to  public key #cryptography? Over in the CNSP #blog, CSNP COO and co-founder Emily Stamm shares the...

View Article


Image may be NSFW.
Clik here to view.

WiCyS Call for Participation is now OPEN!

Ready to share knowledge and experience with students, educators, researchers and professionals at the next Women in Cybersecurity WiCyS Conference in 2021 in AURORA, CO on March 25-27, 2021? The four...

View Article
Browsing latest articles
Browse All 12 View Live




Latest Images