Free ACM Learning Webinar, November 13: “Condos and Clouds–Patterns in SaaS Applications”


Free ACM Learning Webinar, November 13: “Condos and Clouds: Patterns in SaaS Applications”


Register NOW to attend the next free ACM Learning Webinar, “Condos and Clouds: Patterns in SaaS Applications,” presented on Tuesday, November 13, 2012 at 2 PM EST (11 AM PST/12 PM MST/1 PM CST/7 PM UTC). Software architect Pat Helland will deliver this engaging presentation and SIGMOD Chair Yannis Ioannidis will moderate. The presentation will be followed by a live question and answer session.

(Note: You can stream this and all ACM Learning Webinars on your mobile device, including smartphones and tablets.)

Over the last 100+ years, the way people design, build, and use buildings has evolved. It is now normal to construct a building without knowing in advance who will occupy it. In addition, we increasingly have shared occupancy of our homes (apartments and condos), retail, and office space. To accomplish this change, the way we use the buildings has evolved. There is a new trust relationship, customs, and laws that establish the relationship between the occupants and the building managers.

Recently, our industry has been moving to implement Cloud Computing and, in particular, Software-as-a-Service (SaaS). This has been very successful in some applications and very challenging in others. This talk posits that many of the challenges we’ve seen in cloud computing can be understood by looking at what has happened in buildings and their occupancy. Standardization, usage patterns, legal establishment of rights and responsibilities are all nascent in the area of cloud computing. We examine a very common pattern in the implementation of “software as a service” and propose ways in which this pattern may be better supported in a multi-tenant fashion.

Duration: 60 minutes

Presenter
Pat HellandSoftware Architect, Salesforce.com
Pat Helland has been working in distributed systems, transaction processing, databases, and similar areas since 1978. For most of the 1980s, he was the chief architect of Tandem Computers’ TMF (Transaction Monitoring Facility), which provided distributed transactions for the NonStop System. With the exception of a two-year stint at Amazon, Helland has worked at Microsoft Corporation since 1994 where he was the architect for Microsoft Transaction Server and SQL Service Broker. Until September, 2011, he was working on Cosmos, a distributed computation and storage system that provides back-end support for Bing. Pat recently relocated to San Francisco and joined Salesforce.com* to work on multi-tenanted data and lots of cloud stuff. (*This talk was written before Pat joined Salesforce.com and the architecture described is not identical to Salesforce’s architecture.)

Moderator
Yannis IoannidisUniversity of Athens; SIGMOD
Yannis Ioannidis is currently a professor at the Department of Informatics and Telecommunications of the University of Athens as well as the President and General Director of the “Athena” Research and Innovation Center. His research interests include database and information systems, cloud computing, dataflow management and data analytics, scientific systems and medical informatics, personalization and social information systems, and digital libraries and repositories, topics on which he has published over 150 articles in leading journals and conferences and holds three patents. His work has been funded by government agencies and private industry (Europe, Greece, USA) through more than fifty research projects. He is an ACM & IEEE Fellow and a member of Academia Europaea, and has received several awards for his research and teaching work. He currently serves a four-year term as the ACM SIGMOD Chair (after four years of service as Vice-Chair) and a three-year term as a member of the Greek National Library Board of Directors.

Click here to register for this free webinar and be sure to share this with friends and colleagues who may be interested in this topic. And check out our past events, all available on demand.

ACM Learning Webinar – Recommender Systems: The Power of Personalization

http://learning.acm.org/webinar/recommender

Thursday, September 20, 2012 at 12:00 PM EDT/11:00 AM CDT/9:00 AM PDT/4:00 PM UTC

Personalization is the key to helping guide users through the morass of available choices to the products and information they seek. Industry leaders such as Amazon.com, Microsoft, Google, and E-Bay have long used recommender systems to improve their offerings and better serve their customers. But recommender systems aren’t limited to big technology firms—they’ve been widely used by small information providers, retailers, and service firms.

This webinar provides an introduction to recommender systems, describing the different types of recommendation technologies available and how they are used in different applications today.

What You’ll Learn About:

  • What are recommender systems and how are they used today?
  • The different types of recommender systems:

o content-based vs. collaborative recommendation o ephemeral vs. persistent personalization

  • User profiles, site logs, and the information used in recommendation
  • An introduction to the basic technology of recommendation
  • Pointers to resources for further learning

ACM Webinar: 2012 – Big Data: End of the World or End of BI?

Thursday, June 28, 2012 at 12:00 PM EDT/11:00 AM CDT/9:00 AM PDT/4:00 PM UTC

According to some, the world will end at the Winter Solstice this year. If not, it’s certainly time to take a closer look at Business Intelligence (BI) and ask: “After 20 years, is it still fit for purpose? Can it deliver the type of support needed for decision-making in the next decade?” We are witnessing the birth of a new “biz-tech ecosystem,” where business and technology have become symbiotic and collaborative behavior is the norm. In this environment, decision-making is very different from what is supported by today’s BI.

This webinar explores the emerging ecosystem and poses some interesting challenges for BI vendors and implementers in 2013… Assuming we’re all still here…

Registration and more information:

http://learning.acm.org/webinar/bi
What you’ll learn about:

  • The meaning and emergence of the biz-tech ecosystem
  • The re-convergence of operational and informational systems
  • Data, information and knowledge – reopening Pandora’s Box
  • Millennials and team decision making – the whys and wherefores
  • Architectural models for 2013 and beyond

Security: Computing in an Adversarial Environment

Logo
Thursday, April 12, 2012 at 2:00 PM EDT/1:00 PM CDT/11:00 AM PDTSecurity is inherently different from other aspects of computing due to the presence of an adversary. As a result, identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. Proper security engineering—or the lack of it!—affects everything from website scripts to supply chain management to electronic health records to social networks to mobile phones…and the list goes on. Security is further complicated by the translation of social notions—such as identity and trust— into an online world. Worse, security itself is often viewed by both developers and users as the adversary! This learning webinar will introduce the fundamentals of security, describe the security mindset, and highlight why achieving security is difficult.

What you’ll learn:

  • The security mindset – what it is, why it’s needed
  • The social side of security – usability, adoption, identity, trust
  • A deeper dive on insider threat as a case study – what it is, how to detect it, how to prevent it
Presenter:
Carrie Gates
Senior Vice President and Director of Research, CA Labs
Dr. Gates has opened new avenues for collaboration in the field of cyber security for CA Technologies by leveraging government programs that further research between CA Labs and academia. She has given over 20 invited talks internationally, authored more than 40 peer-reviewed publications related to information security, and co-authored an amendment on cloud security research for the America Competes Act that was signed into law in December 2010. In October 2010, Dr. Gates was recognized for her work with a Women of Influence award from CSO magazine.Moderator:
Christopher W. CliftonAssociate Professor of Computer Science, Purdue University
Dr. Clifton works on data privacy, particularly with respect to analysis of private data. This includes privacy-preserving data mining, data de-identification and anonymization, and limits on identifying individuals from data mining models. He also works more broadly in data mining, including data mining of text and data mining techniques applied to interoperation of heterogeneous information sources. Christopher also works on database support for widely distributed and autonomously controlled information, particularly issues related to data privacy. Prior to joining Purdue in 2001, Dr. Clifton was a principal scientist in the Information Technology Division at the MITRE Corporation. Before joining MITRE in 1995, he was an assistant professor of computer science at Northwestern University.
Attendance for this webinar is free. Space is limited.This webcast provided by:

 

http://learning.acm.org/webinar/current

Node Summit 2012 – San Francisco

Node Summit 2012 is the only conference to focus on how Node.js is transforming the future of computing on January 24-25, 2012 in San Francisco. Node Summit is the first-ever conference devoted entirely to the business implications of the server-side JavaScript environment Node.js. Business leaders and technology experts will convene at Node Summit to discuss how Node.js is enabling the creation of real-time, high performance, scalable, networked applications – and debate how the technology will impact businesses and consumers in the coming years.

URL: www.nodesummit.com

Twitter Handle: @NodeSummit

Discount Code (25% Off): ACMQUEUE

Discount Registration Link (25% Off): http://nodesummit2012sf.eventbrite.com/?discount=ACMQUEUE

The Crypto-CS-SETI challenge: An Un-programming Challenge

Poul-Henning Kamp

A challenge to all bright minds in the IT and CS world: Can you disassemble a program for an unknown computer, given only the compiled ROM image?


I hereby announce a challenge, beginning immediately, to gather as much information as possible about the program file linked below.

Imagine finding a crashed flying saucer….