Search Results for: ,NGi
Waste Not: Making the Most of Wireless Resources
Few things are as frustrating as a phone conversation interrupted by a bad signal. It is a perfect example of a technology’s purpose being nullified by its own limitations. Unfortunately, despite advances, this problem hasn’t been entirely addressed and the…
Sustainable Success: SU-IAC Recognized for Third Consecutive Year
A group of engineering students in the Syracuse University Industrial Assessment Center (SU-IAC) earned third place at the New York State Pollution Prevention Institute’s (NYSP2I) Research and Development student research project competition this spring. This marks the third year in…
iSchool, Time Warner Create ‘Data Day’ for Local Students
The School of Information Studies (iSchool) and Time Warner Cable have joined forces to create “Data Day,” an event targeting Syracuse-area middle and high school students where they will explore the science, technology, engineering and math (STEM) fields. “Data Day”…
VPA Fashion Show Hits New York City
The fashion design program in the College of Visual and Performing Arts (VPA) recently hosted its annual New York City fashion show at the University’s Lubin House. In addition to students winning the honor of showcasing their designs in New…
Whitman Professor Implements Innovation Generation Process at Molson Coors
Patrick Penfield, assistant professor of practice in supply chain practice and director of executive of executive education at the Martin J. Whitman School of Management, recently worked to implement a process for innovation at the Molson Coors Brewing Co. He…
Bhatia Receives 2015 WEPAN University Change Agent Award
On June 11, Meredith Professor Shobha K. Bhatia was honored at the 2015 WEPAN Change Leader Forum as a University Change Agent. WEPAN, which stands for Women in Engineering ProActive Network, confers its University Change Agent Award in honor of an…
Professor Explains How to Track a Computer Hacker
“A typical footprint is the IP address of the computer. If you hack into a computer, there will be a record that shows what device actually connected with this computer. But an amateur hacker is easily caught, especially if they…
INSCT, NATO CCDCOE to Host Cyber Espionage Workshop
Contemporary cyber spies—often under the control of nation states—are just as likely to be plundering the intellectual property and customer information of international businesses as waging covert cyberwar against military enemies. With cyber espionage becoming a growing economic as well…
Physicist Awarded Grant to Study Physical Cell Biology
A physicist in the College of Arts and Sciences has been awarded a major grant to study how the shape and motion of individual cells mold biological tissues into three-dimensional shapes. M. Lisa Manning, associate professor of physics, is part…
Syracuse University Retail Expert Comments on the Closing of Gap Stores
“What ails The Gap is bigger than a couple of hundred underperforming stores. For the past several years the brand has lost its identity, relevance and resonance with the American public,” says Amanda Nicholson, associate dean and professor of retail practice…