Skip to main content Skip to navigation

Computer Science

Computer hacker in a dimly lit room
Spring 2022

Cybercrime and how to protect yourself online

While cybercrime is constantly evolving, the good news is there are a few simple security measures anyone can take to increase their online security, whether they have a doctorate in computer science or a hard time printing attachments from their Hotmail account.

First and foremost, experts agree using strong, unique passwords is the easiest way for an internet user to protect their personal and financial information online. A strong password is typically at least 15 characters long and includes letters, numbers, and special characters.

Another pro-tip is never to reuse passwords. This is because one of the easiest ways hackers gain access to a user’s … » More …

Spring 2019

Medical Big Data

Big data is a powerful new tool in the medical bag, and one that can put patients in charge of their own health. Medical students at Washington State University are learning about the potential use of the tool on medical teams, while a new data analytics program at WSU teaches future data analysts. » More ...
Summer 2018

Nella Ludlow comes home

Nella Ludlow knew who she really was from an early age. “As I got older, I thought, I just can’t do this anymore,” she says. So she came out as a transgender woman.

After earning a degree in math and physical sciences at Washington State University, the 1982 graduate joined the Air Force. There she trained as a fighter pilot, worked in military intelligence, and earned a doctorate in artificial intelligence from the University of Edinburgh, and did post-doctoral studies at Cambridge University.

She retired at the end of the Cold War and entered the business world at the height of the dot com … » More …

Summer 2017

AI

One of the most memorable moments of Matthew Taylor’s life so far would look to most people like just a jumble of numbers, brackets, and punctuation strung together with random words on a computer screen.

IF ((dist(K1,T1)<=4) AND
(Min(dist(K3,T1), dist(K3,T2))>=12.8) AND
(ang(K3,K1,T1)>=36))
THEN Pass to K3

And so on. Line after line of computer code flowing like a digital river of expanding possibilities.

Although sophisticated and wonderfully complex, it wasn’t so much the code itself that made this such a pivotal moment.

It was what came next.

Taylor, a graduate student in Texas at the time, … » More …

Robot typing
Summer 2017

Robowriters

Subject. Verb. Object.

These are the basic building blocks of written communication. It’s what you need to make a complete sentence like the one you’re reading now.

Structured. Logical. Direct.

This also is why parts of my chosen career are ripe for takeover by robots.

For millions of Americans, the defining realization of how fast artificial intelligence is evolving came in 2011 when Watson — IBM’s now-celebrated language processing computer — won the popular TV quiz show Jeopardy by beating two of the game’s top champions.

I watched with fascination as well. But, for me, the point was driven home even harder a few years … » More …