School of Computing and Information

Simpson in a black jacket and hot pink shirt
After attending Pitt, Shawndya Simpson (SCI ’87, LAW ’90) made her way from assistant New York attorney general to bureau chief to civil court judge — then all the way to the Supreme Court of New York State.
X-ray of pair of lungs
Scientists at the University of Pittsburgh are investigating the causes and progression of chronic obstructive pulmonary disease — the third-leading cause of death in the United States — through the development of novel computational tools.
two students holding gold puzzle pieces
Each year, Pitt celebrates the accomplishments of its faculty, staff, students and alumni in a public report. Read it online now.
Noelle Conover, a project coordinator in the Hematology/Oncology Division of Children’s Hospital of Pittsburgh of UPMC, has been...
a simulated nursing environment with rows of beds and monitors
New labs; new homes for centers, departments and clinics; and updated classrooms and infrastructure are some of the campus improvements that greeted staff, faculty and students this term.
a child's drawing of an American flag
Faculty help young children understand the 9/11 attack in an emotionally healthy manner through a volunteer effort coordinated with the National Park Service Flight 93 National Memorial.
two women in nursing jackets taken from a side angle
A new school, new degree programs, new majors and opportunities for novel research open up to students as Pitt continues to anticipate the needs of an evolving workforce.
Ndunge Mulwa
Air Force Association CyberCamp at Pitt featured coursework focused on everything from the anatomy of a computer system and the principles of cyber ethics to defending against network hacking and vulnerabilities to the long-term career prospects for a cyber professional.
David Hickton in a tan suit jacket and salmon tie
Large campuses and companies use a variety of techniques to safeguard research archives and computing grids. But for smaller colleges and organizations without the staff or budget to protect against cyber threats, learning what expertise and resources are available is key.