20-07-2018 02:42:03

Styrk din viden og få fagligt indblik med IDAs on-demand webinarer. Mange af IDAs arrangementer er optaget, så du kan se dem, når det passer dig. Alle on-demand webinarer er gratis.

On Demand IT Driving IT: Privacy - Security, Music & the 3 Laws of Thermodynamics
"You can't win, you can't break even, and you can't get out of the game," and this talk will offer insights to security professionals on their seemingly futile task to protect users. And music? Come hear "how music hath charms..." and the surprising ways in which we can get traction against the seemingly intractable laws of thermodynamics.

Security, Music & the 3 Laws of Thermodynamics

"You can't win, you can't break even, and you can't get out of the game,"  and this talk will offer insights to security professionals on their seemingly futile task to protect users.  And music?  Come hear "how music hath charms..." and the surprising ways in which we can get traction against the seemingly intractable laws of thermodynamics. 

Daniel V. Klein
Has a long and checkered history in computer science and computer security, most recently as a software engineer for Google.

Se også
Andre har også set disse videoer

OK15-resultatet på det kommunale og regionale område - ondemand webinar

På dette webinar vil Thomas Damkjær Petersen, IDAs repræsentant i ACs forhandlingsudvalg og Formand for IDA Offentlig præsentere IDAs anbefaling til resultatet. Dernæst vil det kommunale og regionale forligs hovedelementer blive gennemgået.

Fra dansk til global højteknologi

Jens Maaløe optaget på Ledelse der styrker 2015

Driving IT: Tools - Cross Platform Benchmarking C/C++ code

In this talk I will present gauge, an open source cross platform benchmarking library for C/C++ applications. I will present the motivation behind the library and demonstrate the basic functionality.

Testing and Analysing Privacy in Mobile Applications

We will present how we scientifically tested several mobile applications using various strategies such as network captures, man-in-the-middle attacks, or decompilations to analyse their behaviours related to privacy. The results and their implications will then be discussed.


Deltag i debatten

luk
close