Information Security Management In The Enterprise
Joe Dupre, Sonoma State University, IT
Information and knowledge are valuable and worth protecting. We need efficient methods of protection in large homogenous environments. How do you get smart people with divergent ideas moving in the same direction on information security? Do the following: strategic alignment, risk management on all issues, provide value -reduce support costs, enhance competitive stance, assure success of strategy deployment resource management -people, technology, process assurance process integration -get connected and involved with other security groups in your enterprise. Performance measures -Did we do what we set out to do, does the data indicate we should be doing something else? Multiuse of metrics. This talk is based on the curriculum for the ISACA.org Certified Information Security Manager (CISM) certification. Pizza after talk in Darwin 28
Bee3: Silly Putty For Computer Scientists!
John Davis, Microsoft Research, Mountain View
Parallel computing for the masses has arrived. Unfortunately, software, tools, research, and pedagogy are lagging behind with only niche successful parallel applications existing, print statements still being used for debugging, research limited to using existing platforms, and few colleges and universities offering parallel programming and computer architecture classes for undergraduates. Let me present BEE3, the Berkeley Emulation Engine, version 3. BEE3 is a reconfigurable computing platform that we are using to target three main research areas: Computer Architecture, Systems, and Application Acceleration. Using these examples, I will demonstrate how we are using reconfigurable computing systems to help build parallel software and tools, conduct fundamental research, and provide a pedagogical platform. Finally, I will also present some of the current limitations of reconfigurable systems.
Privacy And Anonymity In A Networked World: 20Th Century Law And 21St Century Technology
Shane Witnov, University of California, Berkeley
Social networks record the details of associations, document indiscrete moments and preserve long forgotten comments. Cell phones provide logs of one’s location. An analysis of this information can reveal intimate details of a person’s life threatening privacy on two fronts. First, technology has far outpaced the law leaving much of our online activities with few legal protections. Second, new technological developments threaten our ability to remain anonymous online and off. This talk will examine some recent examples of this conflict among the law, technology, and privacy.
User Interface Design – The Past, Present & Future Of Design
Todd Ziesing, Terrace Software, San Francisco
Everyone interacts with computers through software each and every day. Software on your phone, the Internet, your computer, your television, your DVR, your car, etc. Software ‘wins’ or ‘loses’ in the marketplace based on the user experience. Software determines if hardware ‘wins’ or ‘loses’ in the marketplace. And software determines what features are offered to what user at what time. This discussion will follow the progression of user interface design and review some of the new promising technologies that will impact the future of our interaction with machines.
Automated Tagging And Categorization Of Blogs
Chris Brooks, University of San Francisco
Tags have recently become very popular as a means for annotating and indexing online content such as blogs, due to their ease of use, as well as the ability to share tags between users. There are potential advantages and weaknesses of tags as a mechanism for organizing and retrieving content online. We will present a brief overview of the necessary machine learning and information retrieval techniques, and then describe results characterizing the sorts of tasks for which tags are well suited. We will then describe techniques for automatically annotating documents and an algorithm for automatically inducing relationships between tags as a first step to creating a more expressive tagging scheme. We will end with a discussion of current work on automatically recommending tags and visualizing related tags.