Explore content produced by Syracuse University's online graduate programs.

20 of the Most Powerful Military Photos of 2016

At the end of every year, it’s easy to reflect and tally up all of the negative things that happened. With global tragedies and celebrity deaths, plus the added stress of a spite-fueled national election, 2016 was no different. Instead of focusing on the negativity of the past year, we want to reflect on a group of Americans who never stop, no matter how heavy the workload. In honor of their service, we have compiled 20 of the most powerful military photos from 2016.

How Data Helps Create Successful Sponsored Content

Creating successful content requires analyzing the behavior and the preferences of your audience. You have to understand what type of articles interest the people you are writing for and their reactions to the posts you publish. Péter Szántó, the founder of and product manager for SpringTab shares his tips for creating effective sponsored content.

The Best Countries for Book Lovers

Using data from the Online Computer Learning Center Inc. (OCLC) and the World Bank, iSchool@Syracuse ranks the 20 best and worst countries for book lovers measured by the most and fewest libraries per 100,000 residents.

175 Years of Presidential PR [Infographic]

Throughout American history, campaigns have used slogans to distill complex campaign goals into short and easily digestible messages. We compiled some of the most prominent presidential campaign slogans in the last 175 years. Take a look at the infographic and let us know which slogan you think is most effective.

The Traveler's Guide to Cybersecurity

Although you should always pay attention to your cybersecurity, when you travel for business, it is imperative to be even more vigilant about protecting your digital assets. When you are on the road, you are also responsible for safeguarding your organization’s property and information—and you’re slightly more vulnerable to cyberattacks. This guide provides a few pointers on how to develop safe cybersecurity habits when you travel for work.

Certified Security by Design: Securing Devices in the IoT Era

Security for computer systems—and all IoT devices are computers—is a fundamental concern for businesses, consumers, and governments. The reality, however, is that security is not being considered in the design phase of most IoT devices, leaving them vulnerable to remote hacking. The need for certified security by design is a vital issue for the future of the IoT.