Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
university system. Through this network, we expand opportunities for flexible, student-centered learning and collaborative, solutions-focused research. Northeastern’s comprehensive array of undergraduate and
-
computing and infrastructure platform design, software driven networking, software engineering/model driven design and architecture techniques, real-time 3D graphics, Metaverse design and deployment, digital
-
program integrates the study of wireless networking, protocols, sensor networks, security, software development, embedded systems, data analytics, and big data to provide students with the knowledge and
-
efficiently. Lead the development of scalable, secure, and innovative platforms. Work with product teams to define product roadmaps and monitor platform performance. AI & Technology Integration: Spearhead
-
, the college collaborates across the university, the Northeastern network, and partners around the globe. Responsibilities: The School of Criminology and Criminal Justice in the College of Social Sciences and
-
global network of campuses and partners for students and faculty to leverage for learning and research; a deep investment in lifelong and experiential learning; a premium placed on pedagogical innovation
-
network of campuses. This leadership role provides a unique opportunity to mentor and coach a growing team and play a pivotal role in shaping the future of Northeastern's global enrollment strategy. II) Key
-
computing, machine learning/AI, eco-scale application engineering, cloud computing and infrastructure platform design, software driven networking, software engineering/model driven design and architecture techniques
-
networking and IoT infrastructure, and enhance security and privacy. Foundations of AI: areas of interest include machine learning, LLMs and SLMs, natural language processing, computer vision, theory, and
-
requires occasional availability outside of traditional working hours to address urgent business needs as they arise, including, but not limited to, responding to security incidents, supporting software