VU Business School Together With CERN is Changing the Traditional Study Model

VU verslo mokykla


Artificial intelligence, genetic engineering, electromobiles or quantum computers are the next generation technology innovations the world is focusing on today. They change not only industry, but also the lives of each of us and future generations. The need for specialists able to operate in the dynamic business environment and implement research-based innovations is growing. To this end Vilnius University (VU) Business School in conjunction with the European Nuclear Research Organization (CERN), one of the world’s largest scientific research organizations, will offer Deeptech Entrepreneurship, a unique Master’s Degree programme in the Baltic countries, in the next academic year.

VU Business School, together with CERN, scientists in the field of physics, mathematics and computer science, and business professionals, open up new perspectives. Our aim is to transform the traditional mindset and build an innovative culture that combines business, technology and leadership. VU is just the place where a culture of innovation based on values marries entrepreneurship and leading technological solutions. I believe that it is in this programme that the future business unicorns will start their rich and exciting journey,” Programme Manager Prof. Saulė Mačiukaitė-Žvinienė, said.

This programme combines the fields of technology, entrepreneurship and strategic leadership. The programme has been jointly developed and implemented with VU Faculty of Mathematics and Informatics, VU Faculty of Physics, CERN, and lecturers from abroad. Students who establish start-ups during their studies will have an opportunity to test their business project at CERN.

“From a global network to a PET scanner for cancer therapy or simply a touch screen – these are the various types of applied research carried out by CERN, which have helped to change the world we live in. Today, every smartphone relies on the knowledge of quantum mechanics and general relativity. Such famous scientists as Max Planck or Albert Einstein could never have imagined these innovations. These are disruptive innovations which depend on fundamental research where results may take decades or even centuries. CERN invites entrepreneurs who share the same vision and are not only interested in the existing CERN technologies, but are also able to understand original ideas and transform them into new products – unknown today, but required tomorrow,” Prof. Christoph Schäfer, CERN advisor and lecturer in the programme, said.

The world is changing, so traditional ways of investing or recovery from an economic crisis are no longer effective. The Deeptech Entrepreneurship programme is tailored to those who project themselves or operate in the fields of both business and technology. After the start of Industry 5.0 all countries must invest in science-based innovation and take advantage of the unique opportunities they offer. According to the 2016–2018 statistics, 45.3% of all companies implemented innovations in Lithuania, however in 2020, Lithuania ranked only 40th in the Global Innovation Index. Lithuania therefore needs highly qualified specialists who understand two different worlds – science and business – and whose creativity and competence of entrepreneurship will open up ways for new technological solutions.

“The breakthrough countries, international organizations, technology parks, business clusters and companies are looking for entrepreneurs, developers and leaders able to combine technology with future solutions. The new study programme is offered at the intersection of science and business, implementing the knowledge and practices of technology, data science, innovation management and entrepreneurship. The Deeptech Entrepreneurship Master’s Degree programme brings together different sectors to better prepare students to become the next generation technology entrepreneurs able to combine technological and entrepreneurial experiences, thus perfectly complementing and enriching the portfolio of international master’s programmes of VU Business School,” Dr Birutė Miškinienė, director of VU Business School, said.

Become VU Student for a Day on 19-30 April

Studentas 1 dienai EN

We are excited to invite you to Become Vilnius University Student for a Day, the event taking place on 19-30 April. This is a great opportunity to step into the shoes of VU students and be part of online lectures or seminars. Lecturers and current students look forward to welcoming you!

You can experience real time lectures at Vilnius University and you can easier make a decision what to study!


The times for the lectures are in UTC+3

List of lectures

Risk Management April 19 d. 18:00                

Lecturer: doc. dr. Martynas Manstavičius

Master degree programme Financial and Actuarial Mathematics.            


Software Quality April 23 d. 15:00

Lecturer: doc. dr. Sigitas Dapkūnas

Master degree programme Software Engineering.


User Experience Engineering April 26 d. 17:00                

Lecturer: doc. dr. Kristina Lapin

Master degree programmes Informatics and Software Engineering.


Risk Management April 26 d. 18:00                

Lecturer: doc. dr. Martynas Manstavičius

Master degree programme Financial and Actuarial Mathematics.


Software Quality April 30 d. 15:00

Lecturer: doc. dr. Sigitas Dapkūnas

Master degree programme Software Engineering.


Vilnius University Introduces a New Era of Scientific Investigations: New High Performance Computing Cluster

HPC 642x410


Vilnius University (VU) introduces a new era of scientific investigations in Lithuania with a tenfold boost in processing power from its new high-performance computing cluster. To meet the need to enable students and researchers to undertake new areas of scientific investigation the Faculty of Mathematics and Informatics of VU decided to build a new high-performance computing (HPC) cluster, replacing an existing stack that was expensive to maintain and approaching its end of life.

“One word sums up Dell Technologies and Novian Technologies (formerly BAIP), and that word is ‘professional.’ It’s a pleasure working with them. Everything happens when it should,” Povilas Treigys, Vice Dean for Information Technologies at Faculty of Mathematics and Informatics of VU says.
The results of this new technology is Tenfold performance improvement since it will support new areas of scientific investigations; help educate graduates to fill the IT skills gap in Lithuania and enable areas of research that benefit society.

Lithuania has a shortage of around 13,000 IT professionals, so the Faculty of Mathematics and Informatics at VU plays an important role in bridging the skills gap. Undergraduates are allowed to work within businesses outside the university while carrying out their studies.


Upgrading to a new level of performance

Researchers and students in the faculty were using a high-performance computing (HPC) cluster that was nearing the end of its life and expensive to maintain because of the high energy costs required to run it. It was impossible for the faculty to pursue some of its research goals because the current system did not provide enough processing power.

The faculty secured financing from the Lithuanian government to invest in a new HPC cluster. It already knew and trusted Dell Technologies from using its laptops and desktops. So, as part of a stringent public-sector procurement process, Dell Technologies and local partner Novian Technologies proposed a solution.

The university chose the Dell Technologies HPC cluster because it would be simple to manage and could support the faculty for at least eight years and be easily expanded if needed. And with 10 times the processing power, the HPC cluster could run a wide range of teaching and research applications.

“Having most of the stack from one vendor will make this HPC cluster much easier to manage than the previous one. It also uses power more efficiently,” Eduardas Kutka, lecturer and HPC network administrator at VU, says.


A groundbreaking implementation

The HPC cluster solution provides a full stack of carefully selected and powerful hardware technologies including more than 750 TB of storage, 1,728 computing cores and NVIDIA GPUs.

This is the first time that Dell EMC PowerEdge C6420 servers have been installed within Lithuania’s scientific community. The faculty worked closely with Dell Technologies and Novian Technologies to identify the high-performance components required to meet its needs.

The power-hungry processing applications that will run on the HPC stack include neural networks, artificial intelligence, cyber security and medical research. Among many other uses, it will be particularly beneficial for cancer research programs.“Together with partners, we have to analyse medical images that contain millions of cells, which we then have to count and classify. Up until now, we didn’t have the resources for all that storage and analysis,” Treigys explains.


Establishing a strong research resource

The HPC stack means the faculty will be able to open up access to the rest of the university as well as commercial businesses, helping to build a research ecosystem around the university. “The Dell Technologies HPC stack will extend our scientific community around the university and could even open up new revenue streams,” says Treigys. “We can share resources and widen areas of research as well as prove our capabilities globally.”

The new HPC stack will also help attract academics, researchers and students who want to work with the most powerful and up-to-date technologies. “This is a new era of computational and experimental investigations at the university. Researchers and students will have access to HPC with GPU technologies, which means they will not only be familiar with their capabilities, but also with what can be achieved by employing this kind of technology in the future,” Treigys says.

 „Dell Technologies“ information

VU Scientists: Cyber Espionage Threat Growing

kibernetinis snipinejimas 642x410

The State Security Department of the Republic of Lithuania has recently presented an assessment of national security threats to the public. It states that in 2020 there were many instances of cyber-attacks, with websites of institutions being repeatedly hacked, and fraudulent emails with fake information being sent. Experts from Vilnius University (VU) also note that the threat of cyber espionage has increased during the COVID-19 pandemic. State-supported cyber groups have seized the opportunity of the pandemic to carry out cyber-attacks on national authorities, national security authorities, and energy and other strategic companies of other states.

According to Dr Renata Danielienė of VU Kaunas Faculty, one of the aims of such state-supported groups is to obtain as much confidential information as possible from the institutions of another country, business organizations or research bodies carrying out relevant research, developing new or improving existing inventions. Danilienė believes that the activities of such groups pose a serious threat to organizations using online strategic information systems.

“The attacks previously carried out by cyber groups in other countries show that the aim may be not only state or industrial espionage, but also an attempt to undermine any activity, such as the attacks during the US election campaigns. Attempts were made to break into the accounts of high officials, to publish secret information in order to shape the opinion of the population in a certain direction or to take revenge for critical statements against the country from which the attack is likely to have taken place,” Danielienė said.

Assoc. Prof. Dr Linas Bukauskas of VU Faculty of Mathematics and Informatics, also agrees that there has been a trend of information manipulation via social engineering, where the electronic space of non-friendly countries is used to achieve certain goals.

“In such cases, the aim is to lure people into a trap by means of social engineering attack. For example, citizens receive invitations to events or conferences taking place in a non-friendly country, often fully paid. Those who become interested may slowly become involved in activities that could be qualified as anti-state activities – to disclose scientific, state and technological secrets. The person’s vigilance is tested by using information. It must be remembered that ‘there is no such thing as a free lunch’, there is usually a hidden agenda,” Bukauskas warned.

Targets – public authorities and media sites

When evaluating reports of institutions responsible for security of Lithuania and recent cases in the media, VU researchers note that the number of cyber-attacks against Lithuania is increasing. According to experts, several elements related to cyber security can be distinguished: data loss, information manipulation, vulnerability of cyber security and the use of this vulnerability in state or critical infrastructure systems.

Internet sites of public authorities and media are often targeted. Criminals publish fake information in order to compromise organizations themselves and to form a certain opinion of the population. According to the National Cyber Security Centre at the Ministry of Defence of the Republic of Lithuania, in December 2020 alone, 22 public sector internet sites were hacked. Most of the internet sites were those of Lithuanian municipal authorities, where fake information was published.

According to Danielienė, Lithuania is not unique – many countries face similar problems. “The report published by the Estonian Foreign Intelligence Service in 2020 highlights that anyone can be the target of an attack, because hackers are looking for the weakest links, for example, an insufficiently protected device which can be linked by hackers to the cyber-attack infrastructure, thus becoming part of criminal activity,” the VU researcher noted.

Renata Danieliene asmeninio archyvo nuotr 1Human error is the Achilles heel

When assessing the cybersecurity situation, Bukauskas distinguishes the use of indirect human errors in the public space in 2020. Human errors are left in the development or installation of systems, variables are not processed sufficiently safely or weak login passwords are created. These errors are used to leak data. In addition, people’s shared files or errors in software solutions are used by hackers.

“The most common attempt is to hack in by taking over passwords, exploiting vulnerable systems to run a variety of botnets. At VU Cyber Security Laboratory we use net flow sensors to monitor illegal connections. These sensors indicate the activity of hackers and the passwords used. An automated attack is looking for unsafe systems or unprotected places left by people, checking vigilance. For example, an individual system may be subject to 200 illegal hacking attacks on average in “quieter” weeks, but there can often be thousands and more,” Bukauskas said.

In order to avoid human errors in cyber security, professionals responsible for cyber security must be trained appropriately. At VU Cyber Security Laboratory, researchers are implementing several projects developing methodologies to identify early cyber security risks and also to improve the competences of cyber security specialists.

One-off investment is not sufficient

The population may suffer a variety of consequences due to cyber-attacks: from disconnected energy supplies to stolen personal data and financial losses. Meanwhile, the companies that are hacked may be disconnected from their critical systems, their confidential data and that of their customers and partners may be stolen, and financial losses due to the inability to provide services are incurred. In addition, they may be penalized for the disclosure of confidential data, suffer reputational loss, and loss of customer trust, all which may require considerable efforts to recover.

According to Danielienė, cybercriminals, whether organized groups or individual programmers, are constantly looking for vulnerable places in information systems or infrastructure, but they also use people’s credulity.

“The analysis of the attacks shows key issues such as security gaps in the infrastructure, the lack of knowledge of cyber prevention and cyber security managers and personnel, as well as a lack of leadership competences. There is often no information on the organization’s security policy or it is not complied with and, in the event of a cyber incident, nobody knows how to respond. In addition, organizations still do not pay sufficient attention to regular training and awareness raising in cyber security,” Danielienė added.

In order to reduce the risk of cyber-hacking, Danielienė believes that organizations need to take coherent and integrated measures, implement and maintain a cyber security culture within the organization, and managers and individuals in charge must be constantly attentive to trends in the cyber world and be ready to respond accordingly by taking certain security measures. “In this world of information technologies, it is not enough to invest in infrastructure once. Today organizations must allocate funds regularly to both infrastructure upgrade and cyber risk management,” Danielienė emphasized.

Linas Bukauskas 199x300None of the system escapes attacks

According to Bukauskas, all systems, whatever they may be, will one day experience a cyber incident. According to the researcher, taking care of cyber security must be routine work, because the technologies used today do not have known vulnerabilities for now, but will be broken later.

“It is important to periodically monitor cyber security events, update software solutions, and monitor the environment as to who is interested in you as an organization. For example, if you see that you have received 1,000 queries from different IP addresses with a similar request, you should already be concerned about your security and monitor or look for vulnerable points. Cyber security professionals regularly monitor data vulnerability databases, which do not expose vulnerabilities, but only identify product x as vulnerable with indicators of compromise. They participate in threat-sharing networks, which help to obtain early information about the patterns of an ongoing attack or the characteristics of attackers,” Bukauskas noted.

Bukauskas once again reminds us that organizations seeking to avoid cyber security incidents must regularly update their software solutions, change passwords or use two-factor authentication. System administrators should also avoid using popular passwords that are easy to guess.

According to the expert, it is necessary to monitor not only the vulnerability of the systems used by the company, but also the applications and platforms used by employees during their workday, especially if personal devices such (i.e. shadow IT) as mobile phones and tablets are admitted to the network of the organization. Employees must be trained to assess the safety of the software. The applications, mobile apps or web browser extensions used for easy password storage in an organization also need to be monitored, because sometimes there is demand for excessive rights or even full-text passwords are stored in systems outside the EU.

The researcher also draws attention to the safety of mobile applications developed by technology start-ups. Start-ups should pay more attention to the safety of the products they develop and comply with the secure coding standards.

“Start-ups adapt the latest technologies, but very often forget to perform cyber security tests, and don’t always comply with the secure coding standards. The main purpose of such companies is to produce a product as soon as possible, sometimes without paying sufficient attention to the safety of the product. Young people are often involved in the development of such systems and may not always have sufficient experience in terms of security. Learning secure coding and programming techniques is a serious activity that requires specific knowledge based on experience,” Bukauskas concluded.

Arqus Twinning Activities Accelerated – Dates and Mobilities Planned

The Arqus European University Alliance, which brings together the universities of Bergen, Granada, Graz, Leipzig, Lyon, Padova and Vilnius, completed the application process for its unique Twinning activities and announced the selected participants. Vilnius University, which received the most applications out of all seven universities, is planning to carry out the first exchange in September 2021.

2021 03 17 map380x250According to Head of Studies Quality and Development Department Andrius Uždanavičius, Arqus Twinning aims to strengthen subject-related collaboration of staff and students and create possibilities to carry out joint learning and teaching activities through piloting short-term mobility schemes: “The Alliance’s aim is to respond to the societal challenges and to advance towards deeper European integration”.

During the application period, Vilnius University received and will carry out a total of 12 mobilities. The first exchange is expected to take place in September 2021 – Prof. Dr Aistis Raudys from the Faculty of Mathematics and Informatics, and his students, will visit the University of Granada in Spain. The team will be working on a joint research project to improve the accuracy of people counting on public transport during crowded conditions to allow for better transport planning, optimisation, and a less polluted environment. The aim is to create a joint paper on the topic of passenger counting and flow forecasting.

Other activities are scheduled for the year 2022. Dr Jolanta Šinkūnienė from the Faculty of Philology and a group of students, will visit Granada in March. Her team will work on building a body of specialised language for tourism, focussing on aspects of discourse analysis, as well as translation challenges, cultural conceptualisation differences and their implications. Ieva Giedraitytė, from the Institute of International Relations and Political Science, and students, will travel to Padova in Italy. This exchange will be intended for master degree level students, who will participate in the virtual module “Europe as a Global Actor”.

During the fall semester of 2021, other Arqus universities will also carry out different types of Twinning activities. Up until the end of September 2022, Granada will implement 10 mobilities: Bergen and Padova will have 4 teams, another 3 will visit other universities from Leipzig and there will be 2 teams from Graz and Lyon. A total of 4 activities from other Arqus universities will be carried out at Vilnius University.

“Even though originally it was planned to fund 14 initiatives (2 per university), seeing the success of this initiative, the quality of the applications and motivation of our academic staff, almost all universities decided to find more resources and fund more. As a result, 37 accepted applications will be funded: 25 by Arqus and the rest from other sources, (other programs or internal budgets). That is not the end, we still have plans to announce another call next academic year,” Andrius Uždanavičius says.

The exchanges that will be carried out by Vilnius University are blended Twinning activities. According to Uždanavičius, this is a unique way to follow the plan even in difficult circumstances, while adjusting to both physical and online activities.

“Twinning activities are expected to contribute to the achievement of the Alliance’s objectives and may vary in their mode and type. They may include joint workshops, internships, participation in international conferences, summer schools, group projects, etc. They may be implemented only physically when students from different universities meet for workshops face to face or be blended – when students from two universities are working virtually on a common project and eventually meet physically to complete and present the results,” Andrius Uždanavičius explains.

The eligibility deadline for Twinning visits is end of September 2022. Another call for Twinning initiatives is planned to be announced during the 2021 fall semester.

VU and Partners Aim to Improve the Competences of Cybersecurity Specialists

2020 12 30 saugumas380x250Highly skilled cybersecurity specialists are in demand all over the world. In more than 90% of cyber incidents an individual is either an indirect perpetrator of a cybercrime (a victim) or a specialist who protects infrastructures and has sufficient subject-related and generic competences. There has been little research to properly measure the importance of personal traits and their role in the cyber kill chain.

The project ADVANCES, which aims to improve the performance of cybersecurity specialists, will bring together scientists of Vilnius University (VU), General Jonas Žemaitis Military Academy of Lithuania, the Norwegian University of Science and Technology, Østfold University College, Riga Technical University, Tallinn University of Technology, the University of Liechtenstein, and Vidzeme University of Applied Sciences. Researchers will analyse the human biological system and people’s behavioural habits and will assess the skills and expertise of cybersecurity specialists involved in the project.

Cyber Security Depends on More than Technological Skills

Leader of the project, Dr Agnė Brilingaitė, also a researcher at the Institute of Computer Science at the Faculty of Mathematics and Informatics (FMI) of VU says that up to now no appropriate methodology has been developed to train cybersecurity specialists, or to allow for their continuous professional development. The only materials available at the moment are really only geared towards computer science professionals.

“Our goal is to attract as many specialists as possible to develop this particular approach and to develop a methodology to allow us to personalise it for specialist development or competence improvement. We will perform an in-depth analysis of people’s behaviour, their characteristics from the perspective of genetics and their technological competences,” the researcher explained.

The price of a cyber incident is leaked personal or sensitive data, malfunctioning in service provision, and, certainly, damaged reputation, and in the most extreme cases – lost lives.

“Everyone needs to be reminded that human beings are not robots. Most cyber incidents are prevented by technology controlled by specialists. However, containment of some incidents requires precise and fast use of personal skills and personal characteristics in response to the continuously changing environment,” Dr Brilingaitė added.

According to Dr Brilingaitė, people usually think that cyber security depends only on the skills and expertise of a cybersecurity specialist. But, she emphasises, cyberattacks and incidents also result from stress, fast-changing technology and external threats, when in addition to the technological component human factors are availed of to create a cyber incident.

Psychologists and Geneticists Engaged in the Project

For the purpose of the project, an international cross-disciplinary group of scientific research is to be established. The group will explore human potentials and risks in all stages of the cybercrime chain. Lithuania, Latvia and Estonia and their partners from Norway and Liechtenstein will examine the behaviour of cybersecurity specialists under stress conditions through a combination of data on computer science technology, psychology and the human genome.

“It is not only the scientific results of the project that will be important; the project is also significant for its cooperation with different partners, sharing knowledge, and creating added value for society. Specialists from many different fields are involved in the project, including psychologists, human geneticists, cybersecurity specialists, IT specialists; they have educational, training experience or experience of developing environments to help improve subject-specific competences,” Dr Brilingaitė elaborated.

VU is the project promoter. For this international consortium, it will contribute researchers from the Cybersecurity Laboratory of the Institute of Computer Science of FMI and the Department of Human and Medical Genetics of the Institute of Biomedical Sciences of the Faculty of Medicine.

The project is aimed at developing a science-based interdisciplinary methodology to help evaluate the generic and subject-specific competences of cybersecurity specialists, as well as the personal risks in the competence development process. Development of the methodology will be based on research of the behaviour of real participants in an international cyber security exercise.

Risk assessment, testing and educational components of the methodology will be verified by working with computer science students and students of computing-related fields. Data analysis and artificial intelligence methods will be used to process and interpret the multidimensional data.

The "Advancing Human Performance in Cybersecurity", ADVANCES, benefits from an almost €1 million grant from Iceland, Liechtenstein and Norway through the EEA Grants. The aim of the project is to advance the performance of cybersecurity specialists by personalising the competence development path and risk assessment. Project contract with the Research Council of Lithuania (LMTLT) No is S-BMT-21-6 (LT08-2-LMT-K-01-051


Dr. J. Jankauskas: “It is time to create added value for Lithuanian science”

Dr. Jonas Jankauskas, after almost 9 years spent abroad, is returning to Lithuania and will be running exercise classes for the students at the Faculty of Mathematics and Informatics of Vilnius University (VU) from this semester on. Recently he also has been elected to the Young Academy of the Lithuanian Academy of Sciences (YALAS). We talk about the career of a scientist and lecturer, as well as problems of cooperation between researchers working in Lithuania and abroad, and his future goals.

2021 02 11 J Jankauskas380x250Experience as a lecturer was gained in Lithuanian and foreign universities

"I started my teaching career while I was still studying. I worked at ISM, and later, during my PhD years, as a teaching assistant I did tutorials in mathematics (problem solving practice classes) for students of the Faculty of Mathematics and Informatics at VU" the researcher said.

J. Jankauskas also gained significant teaching experience abroad during his postdoctoral years in Canada. It is mandatory for early career academic staff to gain experience in teaching.

"In Canada, I worked at two universities - Simon Fraser University and Waterloo. At the first one I would teach the first course in mathematical analysis (Calculus-I), and at the second - Calculus II and linear algebra for students in sciences and engineering. So I saw all the ins and outs. For example, linear algebra lectures were given to more than a thousand students at a time. The team of lecturers consisted of 6 lecturers who taught groups of 100 to 200 students each, " dr. J. Jankauskas said.

According to the interviewee, each of these large courses had one coordinator appointed. The coordinator was responsible for setting up a course plan (the subject content and the teaching schedule) and supervising other lecturers. “In my second year at Waterloo I was assigned to coordinate the linear algebra course and prepare all the lecture material, assignment problems etc. It's not that simple and takes a lot of time".

In mathematics - already 18 years

As dr. J. Jankauskas says, to achieve success in any academic field, a systematic work and good self-discipline is a must: “I am not exactly an ideal type of a scientist. I am more of an owl type person, I like to sleep longer in the morning. I prefer working in the evening. It is very good when I also teach while doing scientific work - it helps to keep up with the day cycle and improves my work discipline”.

Dr. J. Jankauskas research area covers polynomials, matrix based digit systems, and computations. He obtained his PhD in mathematics at Vilnius University. His PhD thesis was recognized as one of the best in Lithuania in 2012, and the dissertation made into the final round of the Stefan Banach contest organized by the Polish Mathematical Society. The young researcher has published more than 20 papers in international peer-reviewed scientific journals.

In his research, dr. J. Jankauskas does a lot of calculations on a computer: “Many hypotheses arise first when performing a computer experiment, seeing the regularity, the patterns, and then one gets an idea how it all functions. Then you have to prove it mathematically”. He also enjoys deriving and writing down formulas. “By trial and error, one observes what works and what doesn't - it's probably what mathematics is".

Having started studying at the Faculty of Mathematics and Informatics almost 18 years ago, J. Jankauskas recalls professors who made him fall in love with mathematics, who got him and other students interested in their topics: "Hamletas Markšaitis, for instance, was considered to be ‘an axe’ (a lecturer who is hard to a common folk), but I liked him, he inspired me and many other people so much”. “I can also mention Ričardas Kudžma for his non-standard, but interesting approach to the first year Calculus course, and Vigirdas Mackevičius for his classical, carefully worked out second year Calculus course in multiple variables and Fourier series. And, of course, the unforgettable Romualdas Kašuba – later, I had the privilege to work side by side with him at many mathematical contests and at “Kangaroo” math summer camps. That's how mathematics got me and I chose to remain in this field."

Reasons that led to the return to Lithuania

Dr. J. Jankauskas says that he had job offers abroad, but decided to return. One of the reasons is personal - the wish to be closer to friends and family members. In addition, he says he remained in close touch with Lithuania all these years, by following the Lithuanian media and news, and writing papers with his Lithuanian colleagues: “I feel that it’s time to come back and give something in return. There is an opportunity to build your own research team and achieve results here".

A member of the LAS Young Academy notices the lack of cooperation between local scientists and émigrées working abroad. He is convinced: we need to communicate more pro - actively so that we do not become alienated.

“Two separate scientific communities are emerging: the local one in Lithuania and that of emigrants working abroad. The ties between them are not particularly strong. Lithuanians living abroad have little idea what can be done in Lithuania, whether there would be any prospects or not. They create their own images of how it is here. On the other hand, there exist somewhat conservative, defensive attitudes among the local Lithuanians, there is a lack of live communication. Each side is waiting for the other to reach out first,” the scientist said.

One of the goals of dr. J. Jankauskas, as a member of the LAS Young Academy, is to establish and maintain active contacts with Lithuanian scientists who are working abroad. “The idea is to build an active community of early career mathematicians in Lithuania and abroad - and try to do things together, like organize visits of our émigrée working abroad with lectures and seminars. For those returning to live and work in Lithuania - to help orient themselves, maybe to help to write a funding application, and things like that”, says a member of the LAS Young Academy, a coordinator of the Annual Meeting of Lithuanian Early Career Mathematicians, adding that he would like as well to contribute to the revival of the community.

Graduation event

2021 01 20 Graduation event900x342

On the 3rd of February at 10 a.m. there will be a graduation event for graduates of the Bachelor of Information Technology and Master of Modeling and Data Analysis, Computer Modeling, Financial and Actuarial Mathematics.

Graduates will be greeted by University representatives, guests, lecturers and classmates.

We invite everyone to watch the live broadcast via Vilnius University's Facebook

! As we will not be able to provide diplomas during the remote broadcast, we invite graduates to choose the most appropriate option for collecting the diploma.

!! We also invite all graduates to contribute to the joy of creating a festive mood and submit your photo to display during a virtual event until the 31st of January.

Information about settlement with Vilnius University can be found here.

We invite you to celebrate together with the graduates!

Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies. More information