diff --git a/events.xml b/events.xml index cb78e58..fc9d0d3 100755 --- a/events.xml +++ b/events.xml @@ -58,6 +58,175 @@ Remember: Monday, January 13, 6:00 PM, MC3001/Comfy Lounge.
+Stephen Kleene developed regular expressions to describe what he
+ called the algebra of regular sets.
Since he was a pioneering
+ theorist in computer science, Kleene's regular expressions soon made
+ it into searching algorithms and from there to everyday tools.
Regular expressions can be powerful tools to manipulate text. + You will be introduced to them in this talk. As well, we will go + further than the rigid mathematical definition of regular + expressions, and delve into POSIX regular expressions which are + typically available in most Unix tools.
+ +sed is the Unix stream editor. A powerful way to + automatically edit a large batch of text. awk is a + programming language that allows you to manipulate structured data + into formatted reports.
+ +Both of these tools come from early Unix, and both are still + useful today. Although modern programming languages such as SNOBOL, + Perl and Python have largely replaced the humble sed and + awk, they still have their place in every Unix user's + toolkit.
+ +Unix was one of the first electronic typesetting platforms. The + innovative AT&T troff system allowed researches at Bell + Labs to generate high quality camera-ready proofs for their papers. + Later, Donald Knuth invented a typesetting system called + TEX, which was far superior to other typesetting + systems in the 1980s. However, it was still a typesetting language, + where one had to specify exactly how text was to be set.
+ +LATEX is a macro package + for the TEX system that allows an author to describe + his document's function, thereby typesetting the text in an + attractive and correct way. In addition, one can define semantic + tags to a document, in order to describe the meaning of the + document; rather than the layout.
+ +It is widely acknowledged that the best system by which to + typeset beautiful mathematics is through the TE + typesetting system, written by Donald Knuth in the early 1980s.
+ +In this talk, I will demonstrate + LATEX and how to typeset + elegant mathematical expressions.
+ ++ The licenses for most software are designed to take away your + freedom to share and change it. By contrast, the GNU General + Public License is intended to guarantee your freedom to share and + change free software---to make sure the software is free for all + its users. +
+--- Excerpt from the GNU GPL+
The GNU General Public License is one of the most influencial + software licenses in this day. Written by Richard Stallman for the + GNU Project, it is used by software developers around the world to + protect their work.
+ +Unfortunately, software developers do not read licenses + thoroughly, nor well. In this talk, we will read the entire GNU GPL + and explain the implications of its passages. Along the way, we + will debunk some myths and clarify common misunderstandings.
+ +After this session, you ought to understand what the GNU GPL + means, how to use it, and when you cannot use it. This session + should also give you some insight into the social implications of + this work.
+ +XML is the eXtensible Markup Language,
a standard
+ maintained by the World Wide Web Consortium. A descendant of IBM's
+ SGML. It is a metalanguage which can be used to define markup
+ languages for semantically describing a document.
This talk will describe how to generate correct XML documents, + and auxillary technologies that work with XML.
+ +XSLT is the eXtended Stylesheet Language Transformations,
+ a language for transforming XML documents into other XML
+ documents.
XSLT is used to manipulate XML documents into other forms: a sort + of glue between data formats. It can turn an XML document into an + XHTML document, or even an HTML document. With a little bit of + hackery, it can even be convinced to spit out non-XML conforming + documents.
+ +The Secure Shell (SSH) has now replaced traditional remote login + tools such as rsh, rlogin, rexec and + telnet. It is used to provide secure, authenticated, + encrypted communications between remote systems. However, the SSH + protocol provides for much more than this.
+ +In this talk, we will discuss using SSH to its full extent. Topics + to be covered include:
+