Grace Hopper Celebration: Call For Participation Open
The Grace Hopper Celebration (GHC) of Women in Computing Conference which is scheduled to be held from November 8th -12th, 2011, in Portland Oregon, is calling for participation.
For those who want to participate the GHC recommends the following:
- Your subject should not be something specific to your organization
- If you have a panel – it needs to span across organizations – not 5 people from the same company discussing an issue in their company
- Combining academics and industry or interdisciplinary discussions are great
- We are encouraging submissions that promote diversity and International participation; Avoid anything that sounds like an infomercial
- A submission in line with the theme of the conference “What If?” would be ideal.
The deadline for submissions is March 15, 2011 and notifications will be sent out by May 17, 2011. Call for participation submission categories include Birds of a Feather (BOFs), New Investigators, Panels, Workshops and Presentations, PhD Forum, and Posters and SRC Posters.
For questions concerning presentation submissions please contact the Grace Hopper Celebration. More information on the Grace Hopper Celebration of Women in Computing Conference and the Call for Participation can be found on their website.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.