diff --git a/events.xml b/events.xml index 250f92c..c3cf829 100644 --- a/events.xml +++ b/events.xml @@ -1,175 +1,135 @@ + + - - Bjarne Stroustrup -

- A good programming language is far more than a simple collection of -features. My ideal is to provide a set of facilities that smoothly work -together to support design and programming styles of a generality beyond -my imagination. Here, I briefly outline rules of thumb (guidelines, -principles) that are being applied in the design of C++0x. Then, I -present the state of the standards process (we are aiming for C++09) and -give examples of a few of the proposals such as concepts, generalized -initialization, being considered in the ISO C++ standards committee. -Since there are far more proposals than could be presented in an hour, -I'll take questions. -

+ Bjarne Stroustrup +

+ A good programming language is far more than a simple collection of + features. My ideal is to provide a set of facilities that smoothly work + together to support design and programming styles of a generality beyond + my imagination. Here, I briefly outline rules of thumb (guidelines, + principles) that are being applied in the design of C++0x. Then, I + present the state of the standards process (we are aiming for C++09) and + give examples of a few of the proposals such as concepts, generalized + initialization, being considered in the ISO C++ standards committee. + Since there are far more proposals than could be presented in an hour, + I'll take questions. +

- - Richard Stallman - -

Copyright developed in the age of the printing press, and was designed to fit with - the system of centralized copying imposed by the printing press. But the copyright - system does not fit well with computer networks, and only draconian punishments can - enforce it.

-

-The global corporations that profit from copyright are lobbying for draconian punishments, -and to increase their copyright powers, while suppressing public access to technology. But -if we seriously hope to serve the only legitimate purpose of copyright--to promote progress, -for the benefit of the public--then we must make changes in the other direction.

-

- Ths CSC would like to thank MEF and Mathsoc for funding this talk. -

-

- The - Freedom Software Foundation's description
- FSF's anti-DRM - campaign
- Why you shouldn't use - Microsoft Vista
- The GNU's Not Unix - Project
-

-
-
+ + Richard Stallman +

+ Copyright developed in the age of the printing press, and was designed + to fit with the system of centralized copying imposed by the printing + press. But the copyright system does not fit well with computer + networks, and only draconian punishments can enforce it. +

+ The global corporations that profit from copyright are lobbying for + draconian punishments, and to increase their copyright powers, while + suppressing public access to technology. But if we seriously hope to + serve the only legitimate purpose of copyright--to promote progress, for + the benefit of the public--then we must make changes in the other + direction. +

+ Ths CSC would like to thank MEF and Mathsoc for funding this talk. +

+ The Freedom Software Foundation's description
+ FSF's anti-DRM campaign
+ Why you shouldn't use Microsoft Vista
+ The GNU's Not Unix Project
+

+
- - A talk by Michael Terry - -

What is the typical monitor resolution of - a GIMP user? How many monitors do they - have? What size images do they work on? How - many layers are in their images? Th - e answers to these questions are generally - unknown: No means currently exist for - open source applications to collect usage - data. - In this talk, I will present - ingimp, a version of GIMP that - has been in - strumented to automatically collect usage - data from real-world users. I will dis - cuss ingimp's design, the type of data we - collect, how we make the data availabl - e on the web, and initial results that - begin to answer the motivating questions. - ingimp can be found at - http://www.ingimp.org. - -

-
-
+ + A talk by Michael Terry +

+ What is the typical monitor resolution of a GIMP user? How many monitors + do they have? What size images do they work on? How many layers are in + their images? The answers to these questions are generally unknown: No + means currently exist for open source applications to collect usage + data. In this talk, I will present ingimp, a version of GIMP that has + been instrumented to automatically collect usage data from real-world + users. I will discuss ingimp's design, the type of data we collect, how + we make the data available on the web, and initial results that begin to + answer the motivating questions. +

+ ingimp can be found at http://www.ingimp.org. +

+
Ken Ho - -

E-mail transactions and confirmations have become commonplace -and the -information therein can often be sensitive. We use email for purposes as -mundane as inbound marketing, to as sensitive as account passwords and -financial transactions. And nearly all our email is sent in clear text; -we trust only that others will not eavesdrop or modify our messages. But -why rely on the goodness or apathy of your fellow man when you can -ensure your message's confidentiality with encryption so strong not even -the NSA can break? Speaker (Kenneth Ho) will discuss email encryption, -and GNU Privacy Guard to ensure that your messages are sent, knowing -that only your intended recipient can receive it. -

-

An optional code-signing party will be held immediately -afterwards; if -you already have a PGP or GPG key and wish to participate, please submit -the public key to gpg-keys@csclub.uwaterloo.ca. -Laptop users are -invited -also to participate in key-pair sharing on-site, though it is preferable -to send keys ahead of time.

-
-
+

+ E-mail transactions and confirmations have become commonplace and the + information therein can often be sensitive. We use email for purposes as + mundane as inbound marketing, to as sensitive as account passwords and + financial transactions. And nearly all our email is sent in clear text; + we trust only that others will not eavesdrop or modify our messages. But + why rely on the goodness or apathy of your fellow man when you can + ensure your message's confidentiality with encryption so strong not even + the NSA can break? Speaker (Kenneth Ho) will discuss email encryption, + and GNU Privacy Guard to ensure that your messages are sent, knowing + that only your intended recipient can receive it. +

An optional code-signing party will be held immediately + afterwards; if you already have a PGP or GPG key and wish to + participate, please submit the public key to + + gpg-keys@csclub.uwaterloo.ca. +

+ Laptop users are invited also to participate in key-pair sharing + on-site, though it is preferable to send keys ahead of time. +

+ Peter Macdonald - -

The purpose of the talk is to address how students interact -with the -internet, and possibilities for how they could do so more -efficiently. Information on events and happenings on UW campus is -currently hosted on a desperate, series of internet -applications. Interactions with WatSFIC is done over a Yahoo! mailing -list, GLOW is organized through a Facebook group, campus information -at large comes from imprint.uwaterloo.ca. There has been -historical pressures from various bodies, including some thinkers in -feds and the administration, to centralize these issues. To create a -one stop shop for students on campus. -

-

It is not through confining data in cages that we will finally link -all -student activities together, instead it is by truly freeing it. When -data -can be anywhere, then it will be everywhere students need it. This is -the -underlying concept behind metadata, data that is freed from the confines -of -it's technical imprisonment. Metadata is the extension of people, -organizations, and activities onto the internet in a way that is above -the -traditional understanding of how people interact with their networks. -The -talk will explore how Metadata can exist freely on the internet, how -this -affects concepts like Web 3.0, and how the university and the federation -are -poised to take advantage of this burgeoning new technology through -adoptions -of portals which will allow students to interact with a metaverse of -data. -

-
-
- +

+ The purpose of the talk is to address how students interact with the + internet, and possibilities for how they could do so more efficiently. + Information on events and happenings on UW campus is currently hosted + on a desperate, series of internet applications. Interactions with + WatSFIC is done over a Yahoo! mailing list, GLOW is organized through a + Facebook group, campus information at large comes from + imprint.uwaterloo.ca. There + has been historical pressures from various bodies, including some + thinkers in feds and the administration, to centralize these issues. To + create a one stop shop for students on campus. +

+ It is not through confining data in cages that we will finally link all + student activities together, instead it is by truly freeing it. When + data can be anywhere, then it will be everywhere students need it. This + is the underlying concept behind metadata, data that is freed from the + confines of it's technical imprisonment. Metadata is the extension of + people, organizations, and activities onto the internet in a way that is + above the traditional understanding of how people interact with their + networks. The talk will explore how Metadata can exist freely on the + internet, how this affects concepts like Web 3.0, and how the university + and the federation are poised to take advantage of this burgeoning new + technology through adoptions of portals which will allow students to + interact with a metaverse of data. +

+ - - A talk by Richard M. Stallman (RMS) [CANCELLED] - -

- -Richard Stallman has cancelled his trip to Canada. -

-
+ + A talk by Richard M. Stallman (RMS) [CANCELLED] +

+ Richard Stallman has cancelled his trip to Canada. +

- - - A talk by Simina Branzei - -

- Abstract coming soon! -

-
+ + A talk by Simina Branzei +

+ Abstract coming soon! +

http://ist.uwaterloo.ca/security/vulnerable/
http://ist.uwaterloo.ca/security/security-wg/reports/20061101.html
http://ist.uwaterloo.ca/security/position/20050524/