From 604d2db969acbcea4e87b1a78d37e578cf3455f9 Mon Sep 17 00:00:00 2001
From: Brennan Taylor
Date: Fri, 26 Mar 2010 19:50:59 -0400
Subject: [PATCH] Changed talks page to have thumbnails and be awesome.
---
buttons/audio-file.svg | 247 +++++++++++++++++++++++++++++++++++++++++
default.css | 17 +++
media/index.xml | 50 ++++++++-
xsl/media.xsl | 3 +-
4 files changed, 314 insertions(+), 3 deletions(-)
create mode 100644 buttons/audio-file.svg
diff --git a/buttons/audio-file.svg b/buttons/audio-file.svg
new file mode 100644
index 0000000..b21edcd
--- /dev/null
+++ b/buttons/audio-file.svg
@@ -0,0 +1,247 @@
+
+
+
+
diff --git a/default.css b/default.css
index 4433132..92e17af 100644
--- a/default.css
+++ b/default.css
@@ -223,3 +223,20 @@ input.library {
width: 600px;
}
+ul.media {
+ list-style: none;
+ vertical-align: middle;
+ padding: 0px;
+}
+
+img.media {
+ margin-right: 10px;
+ vertical-align: middle;
+}
+
+li.media {
+ border-bottom: 1px solid #ccc;
+ padding-top: 2px;
+ padding-bottom: 2px;
+}
+
diff --git a/media/index.xml b/media/index.xml
index 29b248d..9645254 100644
--- a/media/index.xml
+++ b/media/index.xml
@@ -9,7 +9,28 @@
and we do not recommend attempting to stream them. Most of these should be
available upon request at the Computer Science Club office to be burnt to
CD or DVD should you so choose.
-
+
+
+
+
+ Concurrency is hard. Well maybe not hard, but it sure is annoying to get right. Even the
+ simplest of synchronization tasks are hard to implement correctly when using synchronization
+ primitives such as locks and semaphores.
+
+ In this talk we explore what Software Transactional Memory (STM) is, what problems STM solves,
+ and how to use STM in Haskell. We explore a number of examples that show how easy STM is to use
+ and how expressive Haskell can be. The goal of this talk is to convince attendees that STM is
+ not only a viable synchronization solution, but superior to how synchronization is typically
+ done today.
+
+
+
+
+
+
+
+
+
@@ -18,6 +39,7 @@
He will give a brief introduction to quantum computing and why it matters, followed
by a talk on programming quantum computers. This is followed by tours of IQC Labs.
+
@@ -46,6 +68,7 @@
The slides for this talk can be found here as a pdf.
+
@@ -56,7 +79,7 @@
If you would like to contact Dr. Ragde check out his website or e-mail him at plragde at uwaterloo dot ca.
-
+
@@ -72,6 +95,7 @@
and computational techniques that come into play.
The slides for this talk can be found here as a pdf.
+
@@ -156,6 +180,7 @@
TODO
+
@@ -167,6 +192,7 @@
TODO
+
@@ -193,6 +219,7 @@ outline the properties of Useful Security and Privacy Technologies that
motivated OTR's design, compare it to other IM security mechanisms, and
talk about its ongoing development directions.
+
@@ -222,6 +249,7 @@ jeopradize informational privacy. Dr. Ann Cavoukian talks about how to use techn
included instant messaging, RFID tags and Elliptical Curve Cryptography (ECC). Then Dr. Cavoukian explained the “7 Privacy – Embedded Laws” followed
by a discussion on a biometrics solution to encryption.
+
@@ -259,6 +287,7 @@ Safeguarding Your Privacy in a Networked World."
Dr. Bjarne Stroustrup is the original designer and implementer of the
C++ Programming Language.
+
@@ -278,6 +307,7 @@ Safeguarding Your Privacy in a Networked World."
+
@@ -316,6 +346,7 @@ Safeguarding Your Privacy in a Networked World."
If most of the computing industry and the US Copyright Board don't disagree with your views on copyright, how come no one has gone to change things?
+
@@ -335,6 +366,7 @@ Safeguarding Your Privacy in a Networked World."
+
@@ -347,6 +379,7 @@ Safeguarding Your Privacy in a Networked World."
Ralph Stanton reflects on the founding of the University of
Waterloo Math Faculty.
+
@@ -390,6 +423,7 @@ Safeguarding Your Privacy in a Networked World."
The talk is only available in Ogg Theora, in keeping with Richard
Stallman's wishes.
+
@@ -400,6 +434,7 @@ Safeguarding Your Privacy in a Networked World."
polygons on screen, as well as simple cropping techniques to improve
efficiency. Translation and rotation of polygons will also be discussed.
+
@@ -413,6 +448,7 @@ Safeguarding Your Privacy in a Networked World."
most insights and guard the confidences of the individuals involved, none
of the companies will be identified.
+
@@ -437,6 +473,7 @@ Safeguarding Your Privacy in a Networked World."
looking to revolutionize the way software is written to deliver on the
promise multi-core holds.
+
@@ -481,6 +518,7 @@ Safeguarding Your Privacy in a Networked World."
providing hands-on workshops and lectures on Windows NT internals and
security to various companies.
+
@@ -528,6 +566,7 @@ Safeguarding Your Privacy in a Networked World."
+
@@ -553,6 +592,7 @@ Safeguarding Your Privacy in a Networked World."
Gord Cormack talks about the science, logistics, and politics of Spam
Filter Evaluation.
+
@@ -576,6 +616,7 @@ Safeguarding Your Privacy in a Networked World."
The Computer Science Club would like to thank the CS-Commons Committee for
co-sponsoring this talk.
+
@@ -593,6 +634,7 @@ Safeguarding Your Privacy in a Networked World."
ubiquitous computing to advertising. Simon Woodside (founder) will discuss
what it's like to start a business and how the imaging code works.
+
@@ -611,6 +653,7 @@ Safeguarding Your Privacy in a Networked World."
Note: the slides are hard to make out in the video, so make sure to
download the slides as well.
+
@@ -625,6 +668,7 @@ Safeguarding Your Privacy in a Networked World."
significance. Particular attention will be paid to the challenge of
acquiring cross domain knowledge and setting up effective collaboration.
+
@@ -632,6 +676,7 @@ Safeguarding Your Privacy in a Networked World."
+
@@ -648,6 +693,7 @@ Safeguarding Your Privacy in a Networked World."
Particularly illuminating are his responses to advocates of
free/open-source software.
+
diff --git a/xsl/media.xsl b/xsl/media.xsl
index 3ca72f3..adfb76a 100644
--- a/xsl/media.xsl
+++ b/xsl/media.xsl
@@ -43,7 +43,8 @@
-