News

Breaking the Code: Women Get Together to Program and Build Confidence

According to a report from the American Association of University Women, the number of women in computing has fallen dramatically since 1990, but you wouldn't know it if you happened upon the Women Coding Hour at NYU Tandon. ...

New Book on Verification of Visualization Techniques

An Introduction to Verification of Visualization Techniques By Claudio T. Silva (along with Tiago Etiene of Modelo Inc. and Robert M. Kirby of the University of Utah) Morgan & Claypool Publishers 2015 As we increase our reliance on computer-...

5G Wireless Well within Reach

Brooklyn is now widely accepted within the telecommunications industry as a major hub of 5G wireless research, and the credit goes wholly to NYU WIRELESS. The multidisciplinary academic research center has been at the forefront of investigating the...

A New Center and New Solutions

With digital data now essential to almost every facet of our lives, from our personal finances and healthcare to our jobs, cyber security is becoming ever more crucial and has evolved into a multidisciplinary field that requires cooperation among...

Searching for Big Insights from Online Reviews

There is no question that data are big: 2.5 quintillion new bytes are added every day from our keyboards, sensors, entertainment, and medical scans, to name but a few. Data scientists have begun refining tools to encourage civilians to join them in...

Renter Beware: Study Finds Craigslist Catches Barely Half of Scam Rental Listings

Apartment hunters in big cities know the drill: They spot a listing for a well-priced, attractive place and make an inquiry, only to be met with demands for an instant credit check or an upfront fee to access the full listing. Savvier home hunters...

Big-Data Visualization Experts Make Using Scatter Plots Easier for Today’s Researchers

Scatter plots—which use horizontal and vertical axes to plot data points and display how much one variable is affected by another—have long been employed by researchers in various fields, but the era of Big Data, especially high-...

Verification Code or Cyber Attack?

Two-factor authentication is a computer security measure used by major online service providers to protect the identify of users in the event of a password loss. The process is familiar: When a password is forgotten, the site sends an SMS text...

NYU Researcher’s “Time Machine” for Analyzing Computer Code Honored By R&D Magazine

Computer security researchers face a major hurdle in studying software systems: Once a piece of code runs, that precise execution, along with its flaws and vulnerabilities, is gone forever. Studying whole operating systems, web browsers, or embedded...

When The United Nations Puts a Call Out to Data Pros...

Recently, Atefeh Riazi, the Chief Information Technology Officer for the U.N. issued a public appeal. “I invite the global community of data scientists to partner with the United Nations in our mandate to harness the power of data analytics...