Free ACM Learning Webinar, November 13: “Condos and Clouds: Patterns in SaaS Applications”
Register NOW to attend the next free ACM Learning Webinar, “Condos and Clouds: Patterns in SaaS Applications,” presented on Tuesday, November 13, 2012 at 2 PM EST (11 AM PST/12 PM MST/1 PM CST/7 PM UTC). Software architect Pat Helland will deliver this engaging presentation and SIGMOD Chair Yannis Ioannidis will moderate. The presentation will be followed by a live question and answer session.
(Note: You can stream this and all ACM Learning Webinars on your mobile device, including smartphones and tablets.)
Over the last 100+ years, the way people design, build, and use buildings has evolved. It is now normal to construct a building without knowing in advance who will occupy it. In addition, we increasingly have shared occupancy of our homes (apartments and condos), retail, and office space. To accomplish this change, the way we use the buildings has evolved. There is a new trust relationship, customs, and laws that establish the relationship between the occupants and the building managers.
Recently, our industry has been moving to implement Cloud Computing and, in particular, Software-as-a-Service (SaaS). This has been very successful in some applications and very challenging in others. This talk posits that many of the challenges we’ve seen in cloud computing can be understood by looking at what has happened in buildings and their occupancy. Standardization, usage patterns, legal establishment of rights and responsibilities are all nascent in the area of cloud computing. We examine a very common pattern in the implementation of “software as a service” and propose ways in which this pattern may be better supported in a multi-tenant fashion.
Duration: 60 minutes
Thursday, September 20, 2012 at 12:00 PM EDT/11:00 AM CDT/9:00 AM PDT/4:00 PM UTC
Personalization is the key to helping guide users through the morass of available choices to the products and information they seek. Industry leaders such as Amazon.com, Microsoft, Google, and E-Bay have long used recommender systems to improve their offerings and better serve their customers. But recommender systems aren’t limited to big technology firms—they’ve been widely used by small information providers, retailers, and service firms.
This webinar provides an introduction to recommender systems, describing the different types of recommendation technologies available and how they are used in different applications today.
What You’ll Learn About:
- What are recommender systems and how are they used today?
- The different types of recommender systems:
o content-based vs. collaborative recommendation o ephemeral vs. persistent personalization
- User profiles, site logs, and the information used in recommendation
- An introduction to the basic technology of recommendation
- Pointers to resources for further learning
Thursday, June 28, 2012 at 12:00 PM EDT/11:00 AM CDT/9:00 AM PDT/4:00 PM UTC
According to some, the world will end at the Winter Solstice this year. If not, it’s certainly time to take a closer look at Business Intelligence (BI) and ask: “After 20 years, is it still fit for purpose? Can it deliver the type of support needed for decision-making in the next decade?” We are witnessing the birth of a new “biz-tech ecosystem,” where business and technology have become symbiotic and collaborative behavior is the norm. In this environment, decision-making is very different from what is supported by today’s BI.
This webinar explores the emerging ecosystem and poses some interesting challenges for BI vendors and implementers in 2013… Assuming we’re all still here…
Registration and more information:
What you’ll learn about:
- The meaning and emergence of the biz-tech ecosystem
- The re-convergence of operational and informational systems
- Data, information and knowledge – reopening Pandora’s Box
- Millennials and team decision making – the whys and wherefores
- Architectural models for 2013 and beyond
|Thursday, April 12, 2012 at 2:00 PM EDT/1:00 PM CDT/11:00 AM PDTSecurity is inherently different from other aspects of computing due to the presence of an adversary. As a result, identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. Proper security engineering—or the lack of it!—affects everything from website scripts to supply chain management to electronic health records to social networks to mobile phones…and the list goes on. Security is further complicated by the translation of social notions—such as identity and trust— into an online world. Worse, security itself is often viewed by both developers and users as the adversary! This learning webinar will introduce the fundamentals of security, describe the security mindset, and highlight why achieving security is difficult.
What you’ll learn:
Carrie Gates, Senior Vice President and Director of Research, CA Labs
Dr. Gates has opened new avenues for collaboration in the field of cyber security for CA Technologies by leveraging government programs that further research between CA Labs and academia. She has given over 20 invited talks internationally, authored more than 40 peer-reviewed publications related to information security, and co-authored an amendment on cloud security research for the America Competes Act that was signed into law in December 2010. In October 2010, Dr. Gates was recognized for her work with a Women of Influence award from CSO magazine.Moderator:
Christopher W. Clifton, Associate Professor of Computer Science, Purdue University
Dr. Clifton works on data privacy, particularly with respect to analysis of private data. This includes privacy-preserving data mining, data de-identification and anonymization, and limits on identifying individuals from data mining models. He also works more broadly in data mining, including data mining of text and data mining techniques applied to interoperation of heterogeneous information sources. Christopher also works on database support for widely distributed and autonomously controlled information, particularly issues related to data privacy. Prior to joining Purdue in 2001, Dr. Clifton was a principal scientist in the Information Technology Division at the MITRE Corporation. Before joining MITRE in 1995, he was an assistant professor of computer science at Northwestern University.
|Attendance for this webinar is free. Space is limited.This webcast provided by:
Twitter Handle: @NodeSummit
Discount Code (25% Off): ACMQUEUE
Discount Registration Link (25% Off): http://nodesummit2012sf.eventbrite.com/?discount=ACMQUEUE
A challenge to all bright minds in the IT and CS world: Can you disassemble a program for an unknown computer, given only the compiled ROM image?
I hereby announce a challenge, beginning immediately, to gather as much information as possible about the program file linked below.
Imagine finding a crashed flying saucer….