UCC Tech Talks 2013
We try to run weekly talks during semester which cover a wide range of topics from UCC services to general computing.
For updates on future Tech Talks and other things 'techy', sign up to the tech mailing list.
The Magic of Data Compression (From Something to Nothing and Back Again) - David Gow [SLX], 2013-04-10
Ever wondered how a .zip file can actually be smaller than its constituant parts? Do you have an insatiable lust for information theory? Do you want to know the secrets behind JPEG artifacts?
Get excited by compression algorithms from RLE to ogg vorbis, taking in Huffman, LZ, JPEG, MPEG and some other awesome algorithms! Compress text, images, movies and (good) music.
Building and Breaking Your First Computer - Mitch Pomery [BG3], 2013-04-24
You will always remember the first computer you build for yourself, and the last thing you want to remember is spending hours trying to figure out why it won't turn on. Come hear a guy who has built numerous computers and made numerous mistakes give you a quick walk through the whole process. From choosing parts to assembling it, he will answer any questions you have.
Long Days Are Prophesied (LDAP) - David Adam [DAA], 2013-05-02
A tour of the concepts and implementation of what started as a phone directory, and has evolved into a complex and frustrating system underpinning Microsoft's Active Directory and UNIX networks such as the UCC.
JVB's Pretty Good TuTORial - Jonathan Van Buren [ODF], 2013-05-08
A beginners guide to the Deep Web. With a guide on; setting up Tor (for browsing and relay setup), PGP and other methods for secure messaging, a discussion on user legal rights and good security practices. Perhaps a BIT on Bitcoins.
Code to Circuits - John Hodge [TPG], 2013-05-15
A brief description of CPU design, from high level languages down to logic gates.
Introduction to Ethical Hacking - Ranz Adamson [RNZ], 2013-05-22
Ethical hacking is an area of Computer Science and Security Science that deals with finding and fixing security vulnerabilities in computer systems. We will discuss methods and the use of some tools for penetration testing and social engineering issues. These talks usually bring up all kinds of moral/ethics discussions, so we'll leave plenty of time for Q&A - and some interesting facts about privacy will also be revealed.