Speakers and Presenters
Last Updated : 3/25/2005
Are you a presenter? We have an informational page just for you! Yes. You!
Please note that our Frontiers Technical Symposium speakers are included in this list. These speakers will be part of the Friday professional tracks and will have 2-hour presentations.
|Nick Farr aka NFF|
Jeff Goeke-Smith aka Amishone
Tanner "Koz" Beck
|Photography Hour 1 : Introduction to Photography|
Photography Hour 2 : IntermediateDigital Photography: Tips and Tricks
Photography Hour 3 : Advanced Photography and Imaging Systems
|Dan Bjorklund||US Copyright history and Creative Commons|
|Greg Boehnlein aka Damin||Asterisk, VoIP For The Masses|
|Gaming and Simulation at Case: Learning by Doing (and Playing!)|
|Zach Campbell||C64 RIP (Revival In Progress)|
|Joe Caputo aka Computo||Creating Music Digitally. Part 2|
|David Coulson||Linux-based High Availability Infrastructures|
|Drew Curtis||Patterns in the Media and the Fark backend|
|Rich Drushel||AdamCon and the Coleco Adam. Still alive today!|
|Jim Eastman aka Vitruvius||Community Radio Broadcasting|
|Matthew Fanto||Recent Attacks Against Hash Functions|
|Richard Forno||The Changing Face of Security Analysis: Community-Based Security Informatics|
|Jeff Goeke-Smith aka Amishone||Amateur Radio Topics|
|Walking before we run: how biology is inspiring progress in AI|
|Open Source Entrepreneurialism|
Jeff "Abic" Peckham
|Photoshop This... GIMP that: A Stylish Presentation|
|IrishMASMS||Security & the COTS vendor - an attempt at getting one to understand the other|
|Paul Jarc||Slashpackage : Not as Scary as it Looks|
|Niklas Lindroos aka Gore|
Christopher Ragusa aka Banba
|The BatMUD community - a biased study in running large global communities on the Internet|
|DEFJAM to CUTLASS - One year after|
|Eric Meyer||The Construction of S5; or, How I Learned to Stop Worrying and Love the DOM|
- and -
Humanely Wielding a Clue By Four: Reflections on Managing a Massive Mailing List
|Melinda Minch||Software Testing: The BLEEDING Edge!|
|Jose Nazario||RSS Clustering|
|Stefanie Pakrul aka Steph the Geek||"Show Me Your Boobs!" and Other Subtleties of Building a Highly Interactive Personal Community|
|Bruce Petro||IT Innovation|
|Jerry C. Rockwell||The Evolution of a Tune: My Process of Arranging and Composing in a Home Studio|
|Eric M. aka RootDruid||Sploit-Dev: A hands on intro to coding exploits|
|Mark Stanislav||Get Smart[y]: The Smarty Template Engine for PHP|
|Michael Tetreault, CISSP||Security and the Web Developer|
|Richard Thieme||Living on the Edge: The Sources of Creativity for Security Wizards and Hackers|
|Rick Wash||The Economics of Information Security|
|Christian Wirth aka RaD Man||Steering an Art Collective|
A brief introduction to U.S. Copyright law and the Creative Commons license. A history of copyright law will be presented leading up to the current state, along with a justification for Creative Commons as a mechanism to allow the sharing of creative works. Will conclude with an explanation of a specific example of a Creative Commons licensed project, the Notacon book.
The Notacon big book-o-fun
In a nutshell - A series of blank books passed about the con wherein all are encouraged to draw, sketch, scribble, write poetry, code, their manifesto, pretty much whatever. After the con is over the books will be scanned and converted into downloadable PDF published online under a creative commons license freely available to anyone.
Slightly expanded explanation - There will be volunteers (ie anybody I can rope into doing the job) who will carry the blanks books and various writing tools about Notacon and anyone who wishes to write in a book just needs to ask a book minion (volunteer). The book minions will be recognizable by the colorful "hello my name is" book minion sticker they'll have visable on thier person. Inside the front covers of each book will be the rules of the project and a notice stating that everyone who contributes to the book is freely giving copyright for the page(s) they write on to Notacon. As to rules they are very simple 1) No defacing or writing upon another person's page(s) thats just not cool. 2) No writing of slander, libel, or anything that could land the author/publisher/editor/Notacon officials or representatives in jail.
Dan a graphic designer and commercial printer with a practical interest in Copyright Law.
Asterisk, VoIP For The Masses is an introduction to the Asterisk Open-Source PBX and VoIP (Voice-over-IP) telephony software. Experts predict that sales and implementation of VoIP PBX and Phone Systems will outpace traditional telephony implementations by 2007. Greg will help us to understand the basics of VoIP and explain the features of the Asterisk PBX system, a system primarily developed and implemented on Linux. Audience members can expect to get a basic education on the principals of VoIP and how Asterisk can be used as a Telephony Toolkit to replace proprietary phone systems. Hawaiian shirts are optional.
Gregory Boehnlein is VP of N2Net, a provider of mission critical hosting based in Cleveland, Ohio. In addition to 10 plus years of experience working with telco service providers, Greg is a director on the board of the Linux Users Group of Cleveland and an active Asterisk developer.
This talk will describe the Virtual Worlds Laboratory, a new high-performance gaming simulation lab opening in the EECS department at Case in Fall 2005, and the associated classes the university will be offering. The aim is to provide students with the resources and opportunities to make their own game and simulation projects, thereby enabling them to explore the worlds of interactive simulations by creating their own. The lab also will also be the hub of significant interdisciplinary and inter-school collaboration, creating an environment where experts from different fields work together on cutting-edge projects virtual worlds projects.
Marc Buchner was born in Newark, NJ in 1950. He received the B.S. Degree in mathematics in 1971 and the M.S. and Ph.D. degrees in Systems Science from the Electrical Engineering and Systems Science Department, Michigan State University, East Lansing in 1972 and 1976, respectively.
In 1976, he was a Systems Engineer at Teledyne Brown Engineering in Huntsville, Alabama. He then joined the Systems Engineering faculty at Case Western Reserve University in Cleveland, Ohio where he is currently an Associate Professor with the Electrical Engineering and Computer Science Department and Director of the Virtual Worlds lab. He has also served as Chair of the Systems Engineering Department, Director of the Control of Industrial Systems Research Program, and Faculty Director of the Master of Engineering Program at Case. His research interests are in the development and application of signal processing techniques for non-stationary signals, in particular for biological signals and radar images and virtual reality/simulation.
Christian Miller is a student at Case Western Reserve University, set to graduate in 2006 with his BS and MS in Computer Science. A devout coder since age 12, he is primarily self-taught and specializes in games and graphics. He is the president of the university's student ACM chapter, and has given numerous talks on game engines, OpenGL programming, and the like. Most recently, he has been working with Prof. Buchner to establish the cutting edge Virtual Worlds Laboratory, which is on track to open in Fall 2005.
It is now 2005, more than 20 years after the c64 has been released. Most technology would of been all but forgotten in a sea of evolving hardware and software. Just cast aside in the midst of upgrades and breakthroughs. C64 RIP is here to cover the happenings and progress of the global C64 scene as well as recap some of the companies most loved releases of decades past. Discussion will include cutting edge software and hardware that proves that 8-bit still has the capacity to get things done, and show that one little machine can still prove to be a nostalgic time machine and still a viable platform.
Zach has been a Commodore enthusiast and collector since his 4th birthday when he received a Vic-20 and a box full of software. Since then he's coded various programs and games for the C64 as well as re-searched the C64 scene in detail, priding himself as a Commodore historian of sorts. Zach also co-host the Packet Sniffer (www.packetsniffers.org) and uses the show to spread the gospel of the old tech and show off 8-bit power and imagination.
Modern computer hardware and software have advanced the capabilities of audio production in countless ways, enabling users to produce powerful and professional quality music without a large budget. Computo will discuss the basic concepts behind music synthesis, as well as in-depth analysis of industry-standard software, including but not limited to Propellerheads Reason 3.0, Cycling 74's Max/MSP/Jitter, and Ableton's Live. The discussion will cover topics such as envelope shaping, non-destructive audio waveform editing, sampling techniques, signal flow and modular synthesis, among many others. There will also be a question/answer period.
Joseph Caputo has performed with some of the greats in the music world, including Wynton Marsalis and Kenwood Dennard. Along with some of his groups, Joseph has toured throughout the US, Mexico and Europe. A graduate of Berklee College of Music, Joseph performs solo as Computo and with The Sons of Liberty. He is also an avid software designer, multimedia artist, electronic music instrument disassembler, and sound de-constructor.
After the September 11th attacks, the U.S. government has systematically instituted programs to provide information analysis and infrastructure protection from terrorist attacks. One area of concern is the use of cyber space by terrorists to communicate, coordinate activities between terrorist cells, gather intelligence on potential targets, and disrupt and/or disable computer networks as a force multiplier just prior to a physical attack. While this may seem like cyber punk, it is a growing domain that impacts the hacker community. What this talk will present is a foundational understanding of cyber terrorism and the government's initiatives that are changing the way people are being held accountable for the use of computer systems and system intrusions.
Andrew Colarik has a thorough knowledge of the foundations, architectures, and protocols of computer and Internet fundamentals and their associated vulnerabilities. With over twenty-three (23) years utilizing computerized information systems, Andrew has and continues to provide simple, step by step explanations of the risks businesses face and how to protect systems from computer attacks.
Andrew Colarik was awarded a Ph.D. in Information Systems (Security), and is the holder of a Masters in Business Administration (MIS). The combination of his credentials with over eight years of college level teaching, providing training seminars to legal and law enforcement professionals, and over eight years as an independent consultant brings a well balanced insight on key security issues facing organizations today.
As a researcher, author, and inventor, Andrew has been published in top-tier security conferences, authored several information security books, and is an inventor of both utility and design patents. The latest of these publications by Andrew include: Managerial Guide for Handling Cyber-Terrorism and Information Warfare (January 2005), The Home Executive's Guide To Computer Security (November 2004), Update/Patch Management Systems: A protocol taxonomy with security implications (August 2004), World Framework for Security Benchmark Changes (May 2003), and An Integrity Mechanism for File Transfer in Communication Networks (May 2003).
Linux-based High Availability Infrastructures: An introduction into the world of low-cost, high ROI network environments using the popular Linux distribution. Learn how to use Linux to maintain a fully redundant network environment, build a highly available IP router, and expand upon existing infrastructure with Linux devices.
David J. Coulson is an IT Consultant in the City of Cleveland, specializing in deployment of Linux, Unix and Cisco environments. A Linux user, developer and advocate of 10 years, David has contributed to many Open Source projects, including IPTables, User-Mode-Linux and Debian, as well as the Linux kernel itself. David also contributes to numerous IT journals, including Linux Format and Linux.Com, and is also the President of the Linux Users Group of Cleveland.
Drew Curtis will give us his account of how technology turned his daily list of links into a clearinghouse for boobs and the bizarre for many thousands of us online. He will also present his thoughts on how the media has changed in recent years and some of the patterns he sees emerging from his daily deluge of article submissions.
Drew Curtis was born and raised in Lexington, Kentucky. Realizing that goat herding just wasn't going to pay the bills, Drew started Fark.com in his spare time between daily soccer and beer rituals. Somehow word got out and the site grew to humongous size, without the help of pills or lotions. Fark's daily traffic exceeds most daily newspapers from across the globe, no small feat when you consider that Fark is basically only one page and gets no pageviews from clicks on articles. If you ask anyone who knew Drew from high school or college what they think about his success with Fark.com, they will answer "not at all surprised." Drew spends his spare time raising his son Storm, who at 18 months of age can almost say the word "bunghole".
The Coleco ADAM was one of dozens of interesting microcomputer architectures that were developed during the adaptive radiation period of the home computer in the early 1980s. When Coleco abandoned the ADAM in January 1985, during the great extinction caused by the emergence of the IBM-PC standard, nearly a million units had been sold, most to ordinary folks who had never before used or owned a computer. Unfazed, ADAM owners banded together in various ways to support their computer, trade information, fix bugs, and push it to heights undreamt of by Coleco's engineers. Through local users groups, monthly newsletters, BBSes run on ADAMs, the Internet, and 16 ADAMcons held all over the US and Canada, the ADAM community remained vibrant into the new century. This is the story of how one quirky home computer created a unique and enduring family, one that will share ADAMcon 17 in Ontario this July.
Rich got his first Coleco ADAM computer in 1988 when he saved his Dad's buggy Revision 59 system from the trash. Working on his own, he reverse-engineered a commented source code listing for the operating system ROMs and wrote various utility programs in SmartBASIC until discovering a local users group on the Cleveland Freenet in 1990. He helped to run ADAMcon IV in 1992 and while there learned that (1) there was a large international ADAM community, and (2) he had technical knowledge about ADAM internals that nobody else did. Since then, Rich has attended all but one ADAMcon, chaired ADAMcon XIII, worked on many hardware and software projects, and amassed a large collection of original Coleco documentation and prototypes. In real life, "Dr. D." teaches anatomy, physiology, and autonomous robotics, and develops 3-D computer models of feeding in giant marine slugs. It goes without saying that he has found productive ways to use his ADAMs at work.
Want to be a radio broadcaster without selling your soul to Clear Channel? While pirate radio broadcasting seems to be getting all the attention, there's an entire world of legitimate and legal radio broadcasting that is noncommercial and community-based. From college-owned radio stations to the rise of community Low Power stations, many opportunities exist to get involved in radio broadcasting. We're here to introduce you to this world and to let you know how you can get involved.
Jim has spent the past year as General Manager of WRUW-FM 91.1 and has previously held positions of Operations Director and Senior Technician; he also co-hosts two radio programs, one of which is music-oriented and the other of which is public affairs programming. Additionally he holds a Technician Class Amateur Radio License and is working towards a General Radiotelephone Operator's License. He will be graduating in May with a B.S. in Electrical Engineering from Case Western Reserve University.
In recent months, a large amount of research into the security of cryptographic hash functions has revealed serious flaws in every widely used hash function, including MD4, MD5, RIPEMD, HAVAL, SHA-0, and SHA-1. These flaws have far reaching consequences, as hash functions are used everywhere, from storing passwords to determining the integrity of system binaries and packages (md5sum, for example). Due to nature of these attacks, some environments are now very vulnerable, whereas other environments are unaffected. This talk will cover the state of hash function cryptanalysis, future directions of hash function design, as well as how non-cryptographers can evaluate future results to judge their impact on specific environments.
Matthew Fanto is currently employed at the United States Department of Commerce, National Institute of Standards and Technology. His primary area of research is public key infrastructure, as well as design and analysis of cryptographic primitives, including block ciphers and hash functions. Other areas of interest are mandatory access controls and exploit mitigation techniques.
This presentation will examine the dichotomy between the traditional secrecy-based and more modern community-based methods of information-sharing both to understand some successful forms of community-based information-sharing and demonstrate how the cybersecurity profession has changed the nature of security analysis in the real world. It concludes that absent a formal revision to the traditional mindsets embracing secrecy-based information sharing favored by the United States government and large corporate constituencies, and despite some shortcomings, a community-based approach to security analysis should become the preferred mechanism for identifying, analyzing, and resolving emerging cybersecurity concerns in a timely and effective manner.
Richard Forno's career in information assurance centers around security program development and management, incident response operations, security awareness, and emerging trends analysis. His career highlights include helping build the first incident response and computer crimes investigation program for the United States House of Representatives and serving as the first Chief Security Officer at Network Solutions (the InterNIC) where he designed and managed the global information assurance program for one of the Internet's most critical infrastructures. In recent years, he provided independent strategic consulting services to military and commercial clients on critical infrastructure protection and information warfare projects. He is also an active advisory board member at several innovative and successful technology companies.
In 2001, Richard developed (and delivered) American University's first modern course on information security and conducted monthly lectures on information warfare at the National Defense University in Washington, DC from 2001-2003. He is a founding member of the Academic Advisory Board for Northern Virginia Community College's Information Security Program and also participated in the 2000 White House Office of Science and Technology Policy Information Security Education Research Project.
Both a technologist and student of national security studies, Richard is a frequent lecturer at assorted government, industry, and academic symposia. Along with several articles, he is the author of The Art of Information Warfare (1999), Incident Response (2001), and Weapons of Mass Delusion: America's Real National Emergency (2003). He is also a contributor to CERT/CC Advisories 1999-17, 2000-01, and the CERT/CC Report on Distributed Intruder Tools.
Richard holds undergraduate and graduate degrees from the American University and Salve Regina University, and is also a graduate of Valley Forge Military College and the United States Naval War College. He is currently pursuing his doctorate by examining several aspects of vulnerability disclosure that pertain to critical infrastructure protection.
His professional affiliations include the National Military Intelligence Association (Past President, Potomac Chapter) and the Regional Computer Forensics Group.
Amateur radio is a wide field full of interesting communication systems to play with. Communications systems, however, only work when there are people that want to communicate. When any group of people communicate, regularly, a community of sorts is formed. This year, we will be focusing on the technical and social aspect of an amateur radio repeater network. The talk will explain how an amateur radio repeater works, and briefly how a repeater network operates. Additionally, this talk will cover some of the various communities that I interact with while working on repeaters. If time permits, some discussion of packet radio will happen.
Working as a network manager drove Jeff to acquire an Amateur Radio license in the fall of 2000. Ignoring all common sense and good judgment, he dove right into the middle of building repeaters. Along the way he ended up working with dozens of groups and picking up a photography addiction. Additionally, Jeff has been distracted by various other technical topics and shiny objects. Look for him holding the camera in one hand, and the radio in the other.
Computers may be outstanding tools for processing data, but they still require constant human oversight and perform poorly at many tasks that come naturally to even "lower" animals. Meanwhile our attempts at making computers do these sorts of tasks are giving biologists and psychologists new insight into how natural systems work.
This talk will show you examples of recent work in artificial intelligence that draws its inspiration from biology, and life sciences research that is informed by computer models. We hope to convince you that these are useful for everything from spam filtering to Mars rovers to diagnosing heart failure.
Sean Psujek is a doctoral candidate in the National Science Foundation sponsored program in Neuro-mechanical systems at Case Western Reserve University. He is currently investigating the role of development on the evolution of behavior. His educational background in electrical engineering and neurobiology help him see how one discipline can impact another.
Eldan Goldenberg is a psychology graduate working towards a computer science PhD. His work uses evolution to generate and test robot controllers that are loosely modeled on the nervous system.
Write software, Give it away, ...Profit. It is possible to build a successful business by using FOSS as the cornerstone. How you get there, particularly with the current economy is not so easy. We hope to share our experience in starting a company, from business plan and paperwork through the first clients, and have some discussion of markets where members of the community can start their own competitive enterprises.
Nick Hanek currently develops solutions in management and technology as a primary consultant for APChange. Prior to this he served as Director of Business Development for a national higher education technology consortium. Nick received his BA in communications Science from Case Western Reserve University
Micah J Waldstein is a graduate from CWRU who now does nothing with his majors (B.S. Astronomy and B.S. Physics), Micah is the co-founder of APChange - a general purpose business consulting firm specializing in Political and IT consulting. Long long ago in an uninspired dorm room he found Linux, the FOSS movement, and WRUW which he would later manage at the cost of his social life.
Jeff and Corey will be showing the basic aspects of graphic design using both free (GIMP) and non-free (Adobe Products) software that people interested in graphic design could utilize. They will be covering topics ranging from filters, to plug-ins, to the basic tools of each program. During their presentation they compare and contrast the different aspects of their respective software. They will also present some examples of what you can do with each program and may even let you try your hand at design!
Corey is a senior at Eastern Michigan University majoring Graphic Design. He currently works for his university as a graphic design artist utilizing Photoshop, Illustrator, In Design, and other Adobe products. Corey is member of the university's American Institute of Graphic Artists (AIGA) chapter, working with the group to put on art shows in the area and share knowledge of their trade.
Jeff is double-majoring at Eastern Michigan University in Computer Science and Math, and is currently a sophomore. He works for the university technology department as a technician dealing with every facet of university computing. He is a member of the Eastern Michigan Computer Science club, as well as the Video Game Design club. Jeff uses GIMP (GNU Image Manipulation Program) for the most part in his graphic design endeavors. He plans to go onto graduate school majoring in Computer Science and aspires to be a Computer Science Professor.
Deciding on a proposal for the annual vendor's users group conference, I chose to fulfill the request of some fellow users. So I submitted a proposal titled 'Hacked? We can't be cracked!" with the intent to disprove the common paradigm and demonstrate that the system does not have vulnerabilities that could be exploited. To my surprise, the proposal was accepted by the conference planning committee and the vendor. To my bigger surprise, the support individuals at the vendor agreed to support the presentation as well; by setting up and configuring a spare system they have for my presentation development & the actual presentation.
What actually happened? How did I protect myself from any retribution? Any aftermath & consequences? Did the presentation come off & how was it received by the conference attendees and the vendor? This presentation is an exploration of the good intentions from a well meaning system administrator with a security mind set, trying to have the vendor & users realize that security is important and critical for their operation.
IrishMASMS is an old school hardware & network guy, and has degrees in Management of Information Systems, computer programming, networking technology, micro-computer programming, and aviation/aerospace management. Certainly not a bit-head by any means, but he will figure out how to write some code if forced. After exploring the wonders of the early years with TRS-80's, Mac Plus, and even some Unisys mainframes and a clustered DEC VAX, he is currently employed by a Defense contractor in the information/network security realm. During off time he helps with the local Linux User's Group and other local IT organizations; also enjoys a few LAN parties, attending & presenting at other Cons, his NES, and his cat. No one can confirm or deny that he was a founding member of the 241_Crew, a locally based group of misfits who explore technology and the local music & epicurean scene.
Software installation is a rich source of troubles: how do we keep from clobbering other software? How do we find dependencies? How do we upgrade without breaking things? How do we handle incompatible versions? How do we deal with the multitude of build systems used by various packages? Many packaging systems have been developed that solve some of these problems, but they typically leave some significant problems entirely unsolved, or they solve problems downstream - where the effort must be duplicated by others - instead of upstream, where the benefit can be shared by all. The slashpackage system, for Unix-style OSes, takes a new approach by relying heavily on the filesystem to make packages both more easily accessible and more safely insulated from each other. I will cover its design features, show how to use it effectively, and address the most common objections.
Paul Jarc was an early adopter of the slashpackage system. He published the first slashpackage-style software, including a build system designed with slashpackage in mind. He also wrote a set of package management tools, and has converted all the software on his system to live under slashpackage.
Christopher Ragusa aka Banba
The presentation will provide the audience with a brief introduction to MUDs, followed by a more detailed description of the early days of LPMuds (including the founding of BatMUD). From there the presentation will focus on BatMUD's development, both involving the actual game as well as the real life events that have been tied to BatMUD. The presentation aims to point out the challenges in maintaining an active global community where people from different backgrounds and cultures interact on an equal basis, as well as details on how BatMUD has tackled those challenges and the rewards of it.
Finally, we will attempt to share our views on the future of Internet communities such as BatMUD, in a world where commercial MMORPGs are becoming more and more common.
Niklas Lindroos has 15 years of experience in the MUD-scene, as player and developer. For the past decade he has in his spare time focused extensively on building and administrating BatMUD, the world's largest and oldest continuously running LPMud. He is located in the arctic country of Finland.
Christopher Ragusa lives in Northern Virginia with his wife, son and two dogs. He has managed to accumulate 15 years of online gaming as well and has recently committed to assisting with the content development of Batmud. An avid mudder, his heart still lies in the realm of paper and dice D&D adventures.
BatMUD, a free multiuser game on the Internet, was opened to the public in April 1990. During its 15 year journey, the game has had tens of thousands of players and hundreds of developers from all corners of the world. BatMUD is a registered trademark of Balanced Alternative Techniques Ry, a Finnish non-profit organization.
One year ago, at the first Notacon, the Cutlass project was born as a cooperative effort (under a different name, but it was born here). Since then, our baby's grown. We've got functional software that encrypts file transfers, voice, and text messaging, all in a P2P framework. We've presented at ToorCon and ShmooCon, and had great reactions at each.
We're not done yet. We're looking for additional developers, testers, and people with ideas. If you're interested in joining the Cutlass project, or just want to see a demo of a cool open-source encrypted VoIP P2P tool, come on by to the talk. We'll talk about project goals, protocol design, code architecture, and demo the existing tool.
Todd MacDermid has created a wide variety of open-source security tools, including steganographic network tunnels, encrypted mailing lists, and packet-mangling libraries. He has spoken at many conferences, including ToorCon, BlackHat, RubiCon, Notacon, ShmooCon, and HOPE.
Jack Lloyd is your basic crypto/coding/Unix geek. He has written, among other things, a variety of crypto libraries and tools, a VNC password cracker, and a Linux Security Module. In the past, he has spoken at ToorCon and ShmooCon. His website is at http://www.randombit.net/
Humanely Wielding a Clue By Four: Reflections on Managing a Massive Mailing List
for "The Construction of S5; or, How I Learned to Stop Worrying and Love the DOM"
for "Humanely Wielding a Clue By Four: Reflections on Managing a Massive Mailing List"
In its first three years, the mailing list css-discuss has generated nearly 60,000 messages (over 50 per day) and acquired over 5,500 subscribers. Despite this, its signal-to-noise ratio remains high and it is regarded as a very helpful and worthwhile community. List Chaperone Eric Meyer shares his experiences and reflects on being a benevolent dictator, outgrowing a home, augmenting the list with other resources, community direction, and warding off trolls, flames, and holy wars without trampling on everyone in sight.
Eric A. Meyer has been working with the web since late 1993 and is an internationally recognized expert on the subjects of HTML, CSS, and Web standards. He is currently Principal Consultant for Complex Spiral Consulting, focusing on helping clients understand and use open Web standards to cut costs and improve efficiency. When not otherwise busy, Eric is usually bothering his wife Kat in some fashion.
This talk is for anyone who is curious about the state of software testing research and the current hot topics in the field. Learn about the testing techniques that will be showing up in industry in the next few years. Go back to work and impress your boss with your astounding prescience with regards to up and coming approaches to test selection and prioritization, getting the most out of user data, and test automation. You'll pay for your whole seat, but you'll only NEED THE EDGE!
Melinda is currently finishing her Master's degree at Case Western Reserve University, with a specialization in software testing and reliability. Her body of research includes work on regression test staleness and automated methods for clustering and prioritizing software failure reports. She intends to save the world from bad software, or die trying.
The rapid growth of RSS feeds, both in production and in reading, has facilitated the consumption of information that has been part of the promise of the Internet for several years. One consequence of this is that many RSS users are unable to manage to use their feeds easily due to an overwhelming number of new stories that never ceases. For subjects like world news, many of these stories are redundant, adding a burden to the reader to sort out what stories they have already read. To deal with these twin problems of flooding and redundancy, a mechanism which uses both of these attributes has been developed. This system reduces the number of items to read and uses the overlapping information to divine interesting topics. a prototype system has been developed to gather, distill, and present world news and has been used by the author for over one and a half years with success.
Dr. Jose Nazario has been screwing around with computers since the days of the TI99 and causing havoc on the internet since 1991. While he never received a formal education in the field, he's been quite successful through self learning and listening to others. His interests include information security and unstructured data mining techniques. In his off time he enjoys screwing around.
More than just the evolution of StephTheGeek.com over the years, but a look at the whys, hows, and whats of the site and girl behind it. Stephanie will talk about the personal impact of living her life online, site development highlights, and getting the most out of managing a growing community.
Stephanie Pakrul is better known on the internet as StephTheGeek. She's a 22 year old IT student from Toronto, Canada who finally outgrew her annoying, teenage dot-com entrepreneur phase, but maintained the enthusiasm. At the end of 2003, Stephanie released her debut album, Not A Victim, to critical acclaim. StephTheGeek.com started in 2001 as a small personal website, and turned into one giant case of scope creep.
Stephanie has been featured on TechTV, CBC's Street Cents, and in Young Entrepreneur, CosmoGirl, and several newspapers. Her diverse interests include increasing efficiency in everyday life through innovative uses of technology, adult industries, and consumer rights, but she is best known for her extensive site that now has a strong community of 40,000 unique visitors each month. StephTheGeek.com is her personal playground, sharing every detail of her life, from the mundane to the wild. She fully expects her site to one day gain sentience, kill her in her sleep, and take over as the real Steph.
Innovation is in the news and is a cornerstone for the growth of many companies in 2005. This presentation will make the case that Information Technology has a major role to play in making it happen in both the small company and the large corporation. Examples and some direction for what to do next are provided.
Throughout his career, Bruce Petro has been involved with combining emerging technologies with emerging business opportunities. He has had the privilege of acting as the chief technologist for the American Greetings CreataCard business and Internet initiatives. One of the founding members in 1994 of AG Interactive, Bruce has contributed to product and business development areas, as well as technology. As CTO of AG Interactive, he is responsible for both the technology operations and application architectures across multiple business units. Recently his duties have expanded to oversee both business and technology initiatives for AG Interactive.
Mr. Petro serves as a board member or an advisor to several educational institutions, helping to foster innovative uses of technology for entrepreneurial and intrapreneurial opportunities by students, business, and the community.
Introduction: This is a musical performance and demonstration which will consist of me playing electric guitar and acoustic and electric dulcimer over backing rhythm tracks (on CD) recorded at my home studio. My purpose is to give some deep insights into my creative process, and how a tune can evolve and morph into a multi-genre adventure that takes the listener on a journey, and actually tells a story.
The Tunes: I will use two tunes for the demo: Skip Variations and a medley of Cold Rain & Snow/Little Maggie.
The Evolution: The fundamental idea behind the development of each tune is the TELLING OF A STORY: each tune will gradually evolve from a literal statement of the melody - to a decorated and syncopated "playful" version of the melody - to some more abstract improvisations around the underlying chord progression. The harmony will be embellished as the tunes progress as well.
Jerry C. Rockwell is a fulltime musician/hand builder of acoustic and electric mountain dulcimers based in Guysville, Athens County, Ohio. He has been working with MIDI and electronic music tools since the advent of the Mac and FM synthesis; composing, recording, and publishing music with a range of influences from jazz/blues/traditional roots to microtonal. He writes an email newsletter devoted to music theory and improvisation for mountain dulcimer players and folk musicians and maintains a website at www.jcrmusic.com that covers his continuing musical enquiries (grooves, polyrhythms, improvising, and alternate tunings and temperaments) as well as showcasing his mountain dulcimers. Jerry graduated from the School of Music at The Ohio State University cum laude in 1989, where his principal instrument was jazz guitar.
Hacking can cover a wide range of loosely related technical and not so technical pursuits. But when we talk about classic or "real" hacking it comes down to system security. In this talk I will be demonstrating a simple buffer overflow, format string exploit, and a heap based attack for those who may never have seen how an exploit is written. The only tools used will be objdump, gcc, gdb, and emacs. Emphasis will be placed on simplicity and open analysis, for anyone interested more complex exploitable code will be provided for those who want to try on their own. Some discussion will be dedicated to modern glibc implementations and how they affect these common attacks, as well as what exactly things like propolice and other common security patches actually do. While all the demonstrations will be against C code running on linux systems, analogies can be drawn to a number of security issues faced "in the wild". At the end some time will be dedicated to discussion. This will be an excellent opportunity to find out what one major facet of hacking is all about.
Druid is a self-taught security enthusiast hailing from New York City. He has spoken at the CCC (Chaos Communications Congress) in Berlin and is excited about this opportunity to speak to an American audience. He has participated in a number of WarGames (Hacking challenges) where he learned the skills he will be demonstrating in his talk. He holds down a crappy job at a help desk. Donations of beer in exchange for information are always welcome.
OneCleveland represents an ultra broadband technology platform that eliminates many critical barriers to collaboration and development of high value community applications. This OneCleveland initiative is internationally recognized for its achievements and is positioning Greater Cleveland as one of the world's leading digital communities. However, our next challenge has little to do with technology, we need to engage and lead our community to contemplate the adoption of new thinking, models, tools, goals, collaborations and innovations that will help transform the region's ability to build on its leadership position in the delivery of community services, quality of life, and ability to generate greater prosperity throughout the region.
Scot is a serial entrepreneur, successful business executive and experienced management consultant. As president of OneCleveland, the first ultra-broadband community network, he strives to accelerate the creation and adoption of innovative technologies, products and services that will bring greater prosperity to this region.
Previously Scot was president of a national information technology products and services company with more than 35 offices nationwide where he helped lead the management buyout and successfully turnaround of the company. He has spent most of his career helping turn around large industrial businesses and facilitating spin-offs of Global 2000 companies. He has also advised many early stage high-tech organizations, including leading his own software and consulting business through angel investment, venture funding and ultimately its sale. As an adviser to many other early stage organizations, he has helped in strategic planning and fundraising which have led to the raising of tens of millions of dollars in angel and venture investment.
Scot serves on several boards including PreEmptive Solutions - a software security company with applications built directly into Microsoft's development tools; MCPc, a national IT Products and Consulting business; the Friends of the Cleveland School of the Arts; and he is a founding partner of Cleveland Social Venture Partners, a venture based philanthropic organization which helps actively build capacity for select non-profits. He recently joined the Ohio TechAngel's Fund.
In 2004 Scot was selected for Crain's 40 Under 40 Class of 2004, Crain's Cleveland annual recognition of business leaders making significant contributions to the Northeast Ohio community.
Mark Ansboury is the Chief Operating Officer of OneCleveland
Mr. Ansboury is responsible for the overall vendor management, engineering, financial and network operations of the OneCleveland Network.
Mr. Ansboury previously served as Vice President of Managed Services and Chief Technology Officer for Telsource Managed Network Services. Prior to joining Telsource, Mr. Ansboury was a consultant with NGT Partners, LLC, and handled the financial, business development and sale for Aperian to FourthStage Technologies.
Mr. Ansboury has held various leadership roles within the information technology and telecommunications industries. He was Executive Vice President of Engineering, Chief Technology Officer (CTO) and Director of ClearData Communications and responsible for the national deployment of an IP/ATM/WDM network. Prior to that he was President and founder of Information Technology Partners (ITECH Partners), responsible for the development of wireless and national deployment of IP/ATM and network management infrastructures for OPTUS Communications/Advanced Radio Telecom, and Winstar. Mr. Ansboury also has consulted for AT&T, Intermedia, Digex, and other communications and technology companies. Prior to going back to the private sector, Mr. Ansboury served as Director of Telecommunication Services for the Department of Information Resources for the State of Texas where he developed and managed the deployment and operations of CAPNet, VidNet, Statewide IP Network, Statewide Telecom Strategic Plan, Statewide Telemedicine Strategic Plan, consulting on HB2128 Telecom Deregulation and supported the State's participation in the Greater Austin Area Telecommunication Network (GAATN) a community based network supporting local and state government.
Mr. Ansboury is a Certified Information Systems Security Professional (CISSP), Disaster Recovery Planner. He served nine years in the US Navy and earned an IEE Certificate in Communications, as well as a BSBA. from Hawaii Pacific College, and an MSSM from the University of Southern California.
Perhaps one of the handiest frameworks for PHP. Smarty allows designers to design, and programmers to program. Smarty allows you to not only create templates but also manipulate those templates with variable modifiers to handle tasks you would rather not waste time doing in your software. More so, it also enables you to cache the site, or just parts of the site for better performance. Mark will be going through many of the features of Smarty, and show demonstrations of much of its extended functionality. Don't forget to bring your Wi-Fi enabled laptop too, because you will have the opportunity to program alongside Mark, testing what you learn during the presentation on a PHP server setup for the presentation!
Mark is a sophomore at Eastern Michigan University majoring in Computer Science and currently works there for the technology department as a technician. His former jobs range from UNIX administration to PHP programming. Mark is a member of his university's Computer Science club, the local Linux Users Group, as well as the ACM. He currently holds a Linux+ certification and is focused on pursuing a graduate certificate in Information Security and is currently working to obtain his CISSP and Security+ certifications.
Web application security is an ever increasingly important part of the overall threat profile. This presentation will provide developers with the tools to find, assess, and correct application layer security risks. This session will be one part technical, dealing with the how and why to secure applications, and one part theoretical, providing an overview of threat modeling, an approach to profiling, analyzing, and remediating threats and vulnerabilities in applications.
Mike Tetreault has over a decade of experience in the IT realm, most of it spent working exclusively with internet technologies. While focusing on applications for the past five years, he has a broad background in servers, networks, and security as well. While he enjoys dabbling in all the areas of IT, applications have been his love since learning 6502 assembler at the age of 12.
Creativity can not be commanded but there are plenty of things we can do that make it much more likely that it will occur. Thieme is arguably a pretty creative guy and old enough to have a clue as to how he got that way. Some of it can't be helped but a lot of t can, and that's the part he illuminates for hackers.
Richard Thieme speaks, writes and consults on how to respond creatively and effectively to technology-driven change. Clients include GE Healthcare, Medtronic and Microsoft Israel ... the FBI, the Pentagon, and the US Dept of the Treasury ... Neohapsis, Network Flight Recorder, and Psynapse ... and nine years speaking at the Black Hat Briefings, Def Con and many other cons.
Thieme's fiction and non-fiction have been published widely and are taught in universities around the world. Richard Thieme's Islands in the Clickstream was published in July 2004 by Syngress Publishing and his riff on Identity/Destiny was published in Prophecy Anthology, Volume 1, a full-color book featuring sequential art by Shannon Wheeler, Scott McCloud, Sho Murase, Yuko Shimizu, Nathan Fox and Bernie Mireault.
Computer and Information security has become a major topic in recent times due to a rash of well-publicized attacks. Most of the new ideas in this area are very technical ideas that attempt to design new technologies to combat this problem. But the problem is fundamentally a social problem, where rational people are choosing to attack for various reasons. In the past few years a growing community of researchers has began studying this problem in its larger context. I will discuss a number of the new ideas that have arisen from this community, including both new techniques for security that incorporate social science ideas and new ways of looking at and understanding the problem. Then I will attempt to synthesize a coherent picture of this larger perspective on security.
Rick Wash is currently a PhD student at the School of Information at the University of Michigan. His research interests include understanding incentive structures. He currently studies the economics of information security systems in order to design better security systems. He also studies the incentives of semi-structured UI systems, with the goal of promoting better adaptive use of computer systems and messaging.
The creative process is inherently fluid and changing, but the need to produce a "product" on a regular basis is not. Whether working on a website, pushing out a magazine, or even adding to a collection, a regular schedule helps keep your audience. But how do you reconcile that structure with dozens of artists working by their own internal creative clocks?
For years, ACiD productions, an ANSI Art group, pushed out regular "art packs" on BBSes and later the Internet, expanding from text-based art to high-resolution creations and even into music. Running the show was Christian Wirth, aka "RaD Man". As leader of ACiD Productions, he was responsible for ensuring there was artwork available for each upcoming release, quality control, and membership issues. Each of these required skills learned on the way and at what sometimes ended up being intense personal cost. Hear the stories and lessons learned from his 15 years in the artscene, and how you can apply these lessons to your own projects.
Christian "RaD Man" Wirth is a computer artist and historian who has been actively involved in text-based artwork for over 15 years. As a member of the Aces of ANSI Art (AAA) in the late 1980s and co-founder of the art group ACiD Productions (ANSI Creators in Demand), he has witnessed a large swath of computer art history as it played out online in the 1990s. Now in semi-retirement as the leader of ACiD, he has focused on tracing as much historical knowledge as possible in the field of text-based and computer-assisted artwork of the 20th century. He is the host of a monthly online radio show, The ARTS (Artscene Radio Talk Show) that chronicles different art scenes and the players within them. He lives in California.
Jeff Goeke-Smith aka Amishone
Tanner "Koz" Beck
Photography Hour 2 : Intermediate Digital Photography: Tips and Tricks
Photography Hour 3 : Advanced Photography and Imaging Systems
Photography Hour 1 : Introduction to Photography
Hosted by Nick Farr and Jeff Goeke-Smith
Learn the basics of image composition and capture, including lighting, white balance, and flash, for both digital and film cameras. Basic editing of images will be discussed as well, including cropping and simple level adjustment. Questions will be answered. Complex questions will be delayed for part 2.
Photography Hour 2 : Intermediate Digital Photography: Tips and Tricks
Hosted by Jim Tantalo
Learn what all those setting on your camera are for and why you might want to use them. How to light a picture, and how to work with existing light. Learn what your camera is actually doing inside to capture those pictures you are taking with it. Tools for the Digital Darkroom, bundled and extra, will be discussed. Again, questions will be answered.
Photography Hour 3 : Advanced Photography and Imaging Systems
Hosted by Gabe Schaffer and Tanner Beck
Explore different ways of image capture and reproduction, including metallic prints from digital photos and scanner slit cameras. Advanced photography topics to explore on your own will be suggested. The exploration is left to you.
Nick Farr is the Director of the Social Engineering Program at Osric University and Treasurer/Co-Founder of the Hacker Foundation, a California Non-Profit Organization. He is not an agent, employee or otherwise operating under the auspices of any government agency foreign or domestic.
Jeff Goeke-Smith aka Amishone
As part of the advanced scouting mission and vanguard of the invasion army, "Jim Nieken" spends his days collecting intelligence on Earth peoples. From defensive capabilities and governmental mechanisms, to natural resources and analyzing the potential for six billion new slave laborers. At night he dreams of crushing this disgusting planet, shackling it forever under the tyranny of the Imperium. When the war fleets arrive, blood will rise like a tide. Under blacked skies and scorched earth, humanity will kneel before our falchion as they are slaughtered mercilessly. By the thousand hands of God, this planet will be purged! Jim wishes only to complete his mission and return to the tender embrace of the home world.
Having always liked math, Gabe started to learn programming at the tender age of 6 on a Timex-Sinclair 2068, and learned to read shortly thereafter. Twelve geeky years later, he went to CWRU to get a computer scientology degree, but Case was so boring that Gabe decided to take up photography instead. After burning hundreds of rolls of film, he went digital in 2001 with a Canon EOS D30, and hasn't looked back since. Lacking a real job, Gabe is a freelance photographer by day and computer consultant by night, often combining the two skills to program photo lab software using such wonderful tools as Perl and ImageMagick.
Tanner "Koz" Beck
Tanner Beck has been photographing things since he was a wee lad. He's been doing his own darkroom work since 1998. Aside from the obvious, he's made short videos, entirely digital pieces, album art, painful music and barely presentable web sites. He's also worked for a variety of companies as a programmer and NOC-Monkey. Tanner has plenty of free time and is bored easily, which may explain why he's flailing about in academia, studying photography and Asian languages instead of just finishing his computer science degree.