THIS CONFERENCE WAS NOT RECORDED BY CONFREAKS
Anyone who has seen a graph of newspaper sales over the past decade knows that it resembles nothing so much as a giant slalom ski course, hurtling the print news industry toward a pain financial crash. Magazines aren't doing much better, many going to online-only editions, or folding entirely.
So where is our news going to come from in this new world? For years, journalists have been asking that very question, without coming to much in the way of useful conclusions. For breaking news, maybe cell phones and citizen journalists are enough, but how about the in-depth analysis and investigative work that puts breaking news in context?
Fortunately, some answers are starting to emerge, although the future is still a very murky place for a reporter or editor. Let's take a look at where the industry is today, what new developments such as the iPad and Kindle might mean, and what this means for public policy and the need for an informed citizenry.
The airlines, fares, and frequent flyer programs a complicated semi-opaque rules based system. Systems are hackable. This talk will show examples of how to hack and manipulate. It'll include how to fly around the world, in first class, for free. How to get free upgrades, and why somebody would do a mile run.
SNORT is popular Network Intrusion Detection System (NIDS) tool that currently uses a custom rule based system to identify attacks. This presentation emphasizes on writing the algorithm to write generate the rules through GA and the integration of them into nProbe, a similar network monitoring tool written by Luca Deri with a plug-in architecture.
Genetic Algorithms are dependent upon identifying attributes to describe a problem and evolving a desired population. In this case, the problem is an attack through the network and identifying the attack through connection property attributes. Genetic Algorithms depends upon training data. DARPA datasets provide training data, in categorized format (attack vs. normal) along with a corresponding raw network recorded format called tcpdump. nProbe has a plug-in architecture allowing for customization.
This presentation explains original code in C to evolve rules. It uses the same chromosome attributes used by Gong. The development verifies and contrasts against the research performed by Gong. It also presents the code for integration into nProbe.
A useful but not entirely serious exploration of cloud computing. Cloud computing, from 14,000 feet to ground level. A fast and furious overview through the mist. Will there be rainbows, or hailstones?
Imagine travelling 'round the world
In search of new ideas.
Try things you've never done before
And face up to your fears.
Now let's mix in some open source;
Its great community.
You'll have the most amazing time
From folk who value free.
So gather round, and hear a tale
Of lessons that I know
And maybe give your own ideas
Of living 2.0
You've seen them: the speakers who really know how to suck on stage. Don't you which you could be as bad as they are? Josh Berkus, veteran presenter, will teach you the Seven Habits so that you can be extremely mediocre too!