This degree prepares the student for careers such as computer application programmer, medical records specialist, computer security professional, database administrator, computer system manager, computer network manager, software engineer, Management Information Systems (MIS) manager, customer support engineer, computer sales representative, or educator and trainer in the field of computer applications. Computer Technology at WSU is an interdisciplinary program. Students have the opportunity to take engineering technology and computer science courses. This exposes students to more faculty members, more cutting edge technology, and more ideas. While students cross-train they also have the opportunity to work with students from both departments, so they graduate with an extended “personal network” as well.
It takes a master degree in technology management to understand fully how the changing technology landscape affects the strategic planning of an organization. This advanced level of education is a necessity in today’s business world. UAT’s technology management masters degree focuses on technology leadership and hardwires the skills and thinking needed to move into management and technology administration.
The Modular One was comparatively expensive. It was somewhat exotic in that its modular design resulted in almost every system delivered being somewhat different, which created a high maintenance burden. It never sold widely outside of the UK, and even in the UK it was surpassed in sales by DEC and Data General before the end of the 1970s. 2 Over the mid ’70s to mid ’80s the systems were cost reduced with TTL bitslice technology and 8-bit microprocessor communications controllers, retreating from the radical modular design, but it never gained a significant market share.
Managers, designers, and administrators of database systems are needed in a wide range of industries and disciplines, from healthcare and nonprofits to government and technology. Curriculum for the software engineering master degree aims to capture and propel the fluid movement of software development. Graduates with a masters in computer science stand ready to innovate and advance the field further by developing cutting edge research and innovative applications.
Assistant Professor Jun Li’s research targets network security, distributed systems, Internet protocols, and network simulation and performance analysis. His ongoing research projects include automatic defense against unknown self-propagating Internet worms through distributed monitoring; detecting and tracing attacks against the BGP routing protocol; robust communication architecture for security monitoring and warning systems; and secure data sharing among data clients.