Swapped security talks, updated Erlang reimbursement info

This commit is contained in:
Elana Hashman 2013-11-07 17:19:02 -05:00
parent b4d9222025
commit 0ed4733d3f
1 changed files with 56 additions and 33 deletions

View File

@ -4,40 +4,33 @@
<eventdefs>
<!-- Fall 2013 -->
<eventitem date="2013-11-26" time="5:00PM" room="MC 2038" title="TBD">
<short><p>
This talk's topic has not yet been determined!
</p></short>
<abstract><p>
This talk's topic has not yet been determined!
</p></abstract>
</eventitem>
<eventitem date="2013-11-23" time="TBD" room="Toronto, ON" title="CSC Goes
to Toronto Erlang Factory Lite 2013">
<short><p>
The CSC has been invited to attend this Erlang conference in Toronto. If
you are interested in attending, please sign up on our <a
href="http://goo.gl/8XOELB">web form</a>. If we can confirm enough attendees,
we will be able to provide transportation to all CSC attendees! (You will be
responsible for your conference fee.) More details about the conference within.
you are interested in attending, please sign up on our <a
href="http://goo.gl/8XOELB">web form</a>. We have submitted a MEF proposal
to cover the transportation fees of up to 25 math undergraduates.
</p></short>
<abstract><p>
The CSC has been invited to attend this Erlang conference in Toronto. If you
are interested in attending, please sign up on our <a
href="http://goo.gl/8XOELB">web form</a>. If we can confirm enough attendees,
we will be able to provide transportation to all CSC attendees! (You will be
responsible for your conference fee.) From the <a
href="https://www.erlang-factory.com/conference/Toronto2013">conference
website</a>:</p>
<p>"Our first ever Toronto Erlang Factory Lite has been confirmed. Join us on
23 November for a full day debate on Erlang as a powerful tool for building
innovative, scalable and fault tolerant applications. Our speakers will
showcase examples from their work experience and their personal success
stories, thus presenting how Erlang solves the problems related to scalability
and performance. At this event we will focus on what Erlang brings to the table
in the multicore era."
The CSC has been invited to attend this Erlang conference in Toronto. If you
are interested in attending, please sign up on our <a
href="http://goo.gl/8XOELB">web form</a>, so we can coordinate the group.
We have submitted a MEF proposal to cover the transportation fees of up to
25 math undergraduates to attend. You will be responsible for your
conference fee and transportation, and if the MEF proposal is granted, you
can submit your bus tickets/mileage record and conference badge to MEF for
a reimbursement. From the <a
href="https://www.erlang-factory.com/conference/Toronto2013">conference
website</a>:</p>
<p>"Our first ever Toronto Erlang Factory Lite has been confirmed. Join us
on 23 November for a full day debate on Erlang as a powerful tool for
building innovative, scalable and fault tolerant applications. Our speakers
will showcase examples from their work experience and their personal success
stories, thus presenting how Erlang solves the problems related to
scalability and performance. At this event we will focus on what Erlang
brings to the table in the multicore era."
</p></abstract>
</eventitem>
@ -57,15 +50,45 @@ title="Hackathon-Code Party!!">
</p></abstract>
</eventitem>
<eventitem date="2013-11-12" time="5:00PM" room="MC 4060" title="Disk Encryption">
<eventitem date="2013-11-26" time="5:00PM" room="MC 2038" title="Disk Encryption">
<short><p>
The fifth lecture of our security and privacy series. By MMath alumnus
The last lecture of our security and privacy series. By MMath alumnus
Zak Blacher.
</p></short>
<abstract><p>
The fifth lecture of our security and privacy series. By MMath alumnus
Zak Blacher.
In Zak's talk, "Disk Encryption: Digital Forensic Analysis &amp; Full
Volume Encryption", he aims to cover filesystem forensic analysis
and counter forensics by addressing the entire design stack; starting with
filesystem construction, design, and theory, and drilling down to the inner
workings of hard drives (modern platter hdds, as well as mlc-ssds). This
talk leads in to a discussion on full volume encryption, and how this helps
to protect one's data.</p>
<p>The sixth and final lecture of our security and privacy series.
</p></abstract>
</eventitem>
<eventitem date="2013-11-12" time="5:00PM" room="MC 4060" title="Trust in ISPs">
<short><p>
This is the fifth lecture of six in the Security and Privacy Lecture
Series. By founding member of the Canadian Cybersecurity Institute and
employee of local ISP Sentex Sean Howard.
</p></short>
<abstract><p>
Bell's recent announcement of their use of Deep Packet Inspection (DPI)
brings to light a long-standing issue: your internet service provider (ISP)
pwns you. They control your IP allocation, your DNS, your ARP, the AS paths.
The question has never been about ability&mdash;it's about trust. Whether
Rogers, AT&amp;T, Virgin, Telus, Vodafone or Wind, your onramp to the
internet is your first and most potent point of security failure.</p>
<p>Founding member of the Canadian Cybersecurity Institute and employee of
local ISP Sentex Sean Howard will vividly demo the reasons you need to be
ble to trust your internet provider. Come for the talk, stay for the
pizza!</p>
<p>This is the fifth lecture of six in the Security and Privacy Lecture
Series.
</p></abstract>
</eventitem>