A Breakthrough in Cancer Detection: the ADEPT Imager
TRANSCRIPT Kenneth Tichauer, Associate Professor of Biomedical Engineering: We’re working on a project that we’ve called the ADEPT Imager. Our first application of this imager is to improve the...
TRANSCRIPT Kenneth Tichauer, Associate Professor of Biomedical Engineering: We’re working on a project that we’ve called the ADEPT Imager. Our first application of this imager is to improve the...
TRANSCRIPT So we have a couple different studies that we’re doing. One right now is ongoing, and it’s a 12-week study where we have people come in and pick up avocados and include them in their diet...
On November 9, 2018, the AI in Data Privacy Hackathon was organized as part of the Global Cybersecurity Initiative Conference (GCSI 2018) held at Illinois Tech. GCSI 2018 brought together technology...
Big-data applications—from the analysis of information in industries ranging from health care to entertainment to transportation—have large volumes of data. This data must be maintained, managed, and...
TRANSCRIPT With all the recent data breaches it is hard for consumers really to, I guess, get more control of it. So what an individual can do is they can limit what they actually provide, and they...
For its demonstrated leadership in promoting and supporting the food industry in the Chicago area and the Midwest, the Illinois Tech Institute for Food Safety and Health (IFSH) was honored with the...
Two years after opening, the Smart Tech Lab at Illinois Tech is now home to a new Power over Ethernet (PoE) PowerHUBB™ solution. PowerHUBB was donated by Hubbell Control Solutions, with support...
This fall Illinois Tech not only welcomed its largest class of first-year students in 30 years, but its Department of Civil, Architectural, and Environmental Engineering ( CAEE) in Armour College of...
Cyberattacks on the energy sector and other critical infrastructure systems are on the rise and can significantly impact a city or even a country. Earlier this year, for example, the United States...
Although reports of hacker jobs done from within organizations make the news each year, that a longtime employee, former employee, or trusted business partner could be responsible for company...