Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
for delivery of infrastructure services in a large, complex environment. Designing, monitoring and supporting LAN/WAN to provide effective, reliable and secure transport of communication. Troubleshoot problems
-
robustness against various types of jamming. Integrated Sensing and Communication (ISAC) systems are becoming a key enabling technology for next‑generation wireless networks. However, these systems
-
/wireless/wireline systems, imagers, MEMS, medical/display circuits, power management, 2.5D/3D integrated circuits, and secure computing designs. Successful applicants will be expected to develop
-
, high-performance and secure IT solutions and effective IT governance for the campus. Here at NUS IT, we aim to transform NUS into a borderless computing community providing knowledge at its fingertips by
-
well as Innovative Computing domains including but not limited to Optical Computing, Neuromorphic Computing and AI in Next generation of Wireless Communication Systems. Exceptional candidates only will be considered
-
Director, Office of Student Conduct and Community Standards US-NY-New York Job ID: 2025-14942 Type: University Life (WS1705) # of Openings: 1 Category: Business/Professional Administrative New York
-
hardware, network services, and storage devices. Strong ability to work in a team with excellent customer service attitude and good verbal and written communication skills. Knowledge of security-related
-
for the School of Professional Studies (SPS), working in close partnership with alumni relations and school leadership. Building on NYU's fundraising momentum, the role is accountable for securing a minimum of $10
-
. Performs the setup of equipment for employee use and proper installation of cables, operating systems, or appropriate software. Document all work in ServiceNow, communicate with customers through support
-
communication systems for AI-driven applications. The objective is to investigate, design, and experimentally validate information-theoretically secure coding schemes tailored to the demanding requirements