Pretty image
Author sightings, partner events, and other notable happenings.

Thanks to David Copeland for creating a tool to make it easy for authors to generate the code I need to post these! Here’s what’s coming up in the next three months:

Author Appearances

Who’s where, and what for.

O’Reilly Events

Upcoming events from our friends at O’Reilly.

  • June 25–27, Velocity Conference Santa Clara, CA
    Velocity Conference: “Velocity is the best place to learn from peers, exchange ideas with experts, and share what has worked (and equally importantly, what has not worked) in real world applications. The focus is on practical, large-scale web development, presented by experts.”
  • July 16–20, O’Reilly Open Source Convention Portland, OR
    OSCON: “If you work with open source, you’ll want to be here. With a dozen plus tracks and hundreds of sessions, you’ll find practical tutorials, inspirational keynotes, and a wealth of information on open source languages, platforms, and development.”

USENIX Events

What’s coming from our USENIX friends.

  • SYSTOR 2012: “SYSTOR 2012, the 5th annual international systems and storage conference, promotes experimental and practical computer systems research.”
  • HotPar ’12: “HotPar will bring together researchers and practitioners doing innovative work in the area of parallel computing. HotPar recognizes the broad impact of multicore computing and seeks relevant contributions in all fields, including application design, languages and compilers, systems, and architecture.”
  • HotCloud ’12: “HotCloud brings together researchers and practitioners from academia and industry working on cloud computing technologies.”
  • FCW ’12: “Back for 2012, USENIX is combining established conferences and workshops into a week of research, trends, and community interaction.”
  • WiAC ’12: “This is an all day event for those interested in advancing women in computing representing both academia and industry.”
  • USENIX ATC: “USENIX ATC has always been the place to present groundbreaking research and cutting-edge practices in a wide variety of technologies and environments. USENIX ATC ’12 will be no exception.”
  • HotStorage ’12: “Over the past few years, storage has been changing like never before. Architectures are evolving rapidly, with many fundamental shifts. The HotStorage workshop aims to provide a forum for the cutting edge in storage research where researchers can exchange ideas and engage in discussions with their colleagues.”
  • WebApps ’12: “WebApps ’12 is designed to bring together experts in all aspects of developing and deploying Web applications. The program includes refereed papers on topics such as distributed systems and browser extensions, Java and client extensions, and more, in addition to keynotes by Douglas Crockford (Yahoo!), and Yehuda Katz (Tilde, Inc.)”
  • TaPP ’12: “Provenance provides important documentation that is an essential part of the quality of data, and it is essential to the trust we put in, for example, the data we find on the Web and the data that is derived from scientific experiments. TaPP ’12 covers topics related to theoretical or practical aspects of provenance, including but not limited to: provenance in databases, workflows, programming languages, security, software engineering, or systems; provenance on the Web; real-world applications of or requirements for provenance.”
  • NSDR ’12: “NSDR ’12 will provide a venue for researchers to propose and discuss ideas concerning the design, implementation, and evaluation of new computing and communications technologies to support the sustainable development of developing regions. NSDR ’12 specifically focuses on the technical networking and systems research challenges that arise in the design, implementation, and deployment of new computing solutions appropriate for developing regions.”
  • July 23–24, Asia-pacific Systems Workshop Seoul, South Korea
    APSYS 2012: “Building on the success of its 2010 and 2011 predecessors in New Delhi, India and Shanghai, China, APSys 2012 will be a lively forum for systems researchers and practitioners across the world to meet, interact, and collaborate with their peers from the Asia/Pacific region.”
  • Aug 8–10, 21st USENIX Security SymposiumBellevue, WA
    USENIX Security ’12: “The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The Symposium will span three days, with a technical program including: Keynote Address by Dickie George, Johns Hopkins Applied Physics Laboratory; over 40 Refereed Papers covering the latest research including topics such as browser security, CAPTCHAs, and passwords; privacy enhancing technologies; botnets and Web security; and more.”
  • EVT/WOTE ’12: “EVT/WOTE ’12 brings together researchers from a variety of disciplines, ranging from computer science and human-computer interaction experts through political scientists, legal experts, election administrators, and voting equipment vendors.”
  • HealthSec ’12: “The focus of HealthSec ’12 will be on the development of new techniques and policies to ensure the privacy and security of next-generation healthcare systems and devices.”
  • WOOT ’12: “WOOT ’12 aims to bring together researchers and practitioners in systems security to present research advancing the understanding of attacks on operating systems, networks, and applications.”
  • FOCI ’12: “FOCI ’12 seeks to bring together researchers and practitioners from technology, law, and policy who are working on means to study, detect, or circumvent practices that inhibit free and open communications on the Internet.”
  • CSET ’12: “The science of cyber security is challenging for a number of reasons. Meeting these challenges requires transformational advances, including understanding of the relationship between scientific method and cyber security evaluation, advancing capabilities of underlying experimental infrastructure, and improving data usability.”
  • HotSec ’12: “HotSec places its singular emphasis on new ideas and problems. HotSec takes a broad view of security and privacy and encompasses research on topics including, but not limited to, large-scale threats, network security, hardware security, software security, physical security, programming languages, applied cryptography, privacy, human-computer interaction, emerging computing environment, sociology, and economics.”
  • MetriCon 7.0: “How to define, generate, and communicate security metrics you can use today.”

Other Happenings

  • June
    In this month in 1957, computer science legend Donald Knuth published his first article, “Potrzebie System of Weights and Measures,” in Mad Magazine.
  • June 1
    Tim Paterson, whose operating system made Bill Gates a jillionaire, is 55.
  • June 8
    Tim Berners-Lee is 57.
  • June 23
    Vint Cerf is 69.
  • June 23
    Mathematica is 24.
  • June 28
    Firefox co-creator Dave Hyatt is 30.
  • July 2
    Gordon Letwin, one of first dozen Microsoft employees and lead Microsoft architect on OS/2, is 60.
  • July 5
    Linguist Victor Yngve, creator of COMIT, the first string processing language, is 92.
  • July 6
    Adi Shamir, the S of the RSA encryption algorithm, is 60.
  • July 7
    Smalltalk co-creator Adele Goldberg is 67.
  • July 9
    Marc Andreessen is 41.
  • July 10
    Legendary game designer Scott Adams is 60.
  • July 16
    Dan Bricklin is 61.
  • July 22
    Alan Cox, early Linux kernel contributor, is 44.
  • July 24
    Al Lowe, creator of Leisure Suit Larry series of computer games, is 66.
  • July 26
    Hakon Wium Lie, creator of Cascading Style Sheets, is 47.
  • July 29
    James Duncan Davidson is 42.
  • Aug 9
    Alfred Aho, co-creator of AWK language, is 71.
  • Aug 11
    Steve Wozniak is 62.
  • Aug 20
    Game developer John Carmack is 42.
  • Aug 29
    Boy genius Stephen Wolfram is 53.