Colloquium Archive

Payment Card Security

Kim Wagner, VISA Worldwide Services, San Francisco

10/06/2005

Payment card fraud is a billion dollar global industry. Moreover, the fraud picture is constantly changing due to the rapid emergence of new payment mechanisms as well as the evolving battle between new frauds and new countermeasures. This presentation will give a snapshot of the prevailing threats and countermeasures, with a focus on card-present transactions.

The Design Of The Vmware Vmkernel --An Os Kernel For Managing Virtual Machines

Kinshuk Govil, VMWare, Palo Alto

10/13/2005

VMware ESX Server is a platform for running many Intel-x86 virtual machines on a single physical machine for purposes of consolidating workloads and simplifying system management. ESX Server runs an OS kernel specifically designed to manage virtual machines (VMs). This OS kernel, known as the VMkernel, provides strict resource allocation guarantees for VMs, highly efficient I/O, and advanced reliability features. It runs on servers with up to 16 processors and can manage up to 10 VMs per processor. This talk describes the architecture of the VMkernel, some of the unique issues that it solves in order to manage VMs effectively, and interesting research topics that remain.

1+1 =3

Marc LeBrun , Fixpoint, Inc., Novato

10/20/2005

“Incredible systems abound, but of pleasant construction or of a sensational kind.” – Jorge Luis Borges, “Tlön, Uqbar, Orbis Tertius.” We entertain the thesis that there are no bugs, only under-appreciated outputs. Probing familiar primitive operations at subatomic scales, we sketch an introductory natural history of some arithmetics from alternate universes. This in turn recommends more systematic spelunking in the wide dark space of programs, attending carefully to the whispering vox machine. (Note: While abstaining from inventing any allegedly New Kinds of Science, we cannot rule out possible wild discursions into the nature of knowledge and the future of culture.) As a concrete warm-up exercise, you are invited to contemplate what the simple expression x & -x computes for integral x.

Managing Oracle Applications: Introduction

Eric Levinson, Turin Networks, Petaluma

10/27/2005

This session will give a "big picture" look of what it takes to set up users, employees, responsibilities, accounting codes, reporting structures, and signing limits. We will cover how to run concurrent jobs (such as reports and bulk modification code), how to see if they are completed successfully, and how to change desired outcomes of programs already running.

What's Next In Wireless Security?

Paul Lambert, PicoMobile Networks, Mountain View

11/03/2005

The latest IEEE wireless LAN standards have patched the blatant flaws of the WEP algorithm. The cryptographic algorithms have been improved, but there are still interesting system security issues and potential attacks to wireless LANS. This presentation describes new wireless protocols and emerging new security threats. The technologies covered will include 802.11i, WiFi Alliance protocols, FMC architectures and new device enrollment protocols. New system level threats like 'Evil Beacons', 'Countermeasure DoS', and 'NFC touch and steal'will be described.

Pages