Alan Turing: the One who became a Zero – a lecture by Dr Andrew Hodges – 3rd Annual Oxford University LGBT Lecture. 5:30pm, Tues 7 Feb 2012, University Museum of Natural History The lecture will be introduced by the Vice-Chancellor. The Equality and Diversity Unit and the LGBT Staff Steering Group present the third annual… Read more »
Category: Archive
Midata or Their Data? Controlling Your Own Customer Record
Wednesday 14 December 2011 14:00 – 17:00 Hosted by Oxford Internet Institute Location: Room 051, Computer Science Department, Wolfson Building, Parks Road, OX1 3QD. Registration: Please email your name and affiliation to events@oii.ox.ac.uk or telephone +44 (0)1865 287209 Speakers Rory Gallagher, Cabinet Office William Heath, Chairman, Mydex Anthony House, Google Georgina Nelson, Which? John Taysom,… Read more »
Christmas Lecture – Professor Heinz Wolff
Professor Heinz Wolff Venue: Sophos plc, Abingdon OX14 3YP Professor Heinz Wolff is perhaps best known to the general public for his appearances in television series such as Young Scientist of the Year and The Great Egg Race. He is an entertaining and humorous speaker. He will carry out experiments in front of the audience… Read more »
[Event Summary] Washing Away Cave Paintings – A technical evolution
13th October 2011: Ian Hughes, Director, Feeding Edge Limited Following our short Annual General Meeting, Ian Hughes (known as ePredator online), Metaverse Evangelist, talked about how computer games and virtual worlds are changing the way that we look at technology and the way that we communicate in business. Ian writes an entertaining blog at www.feedingedge.co.uk/blog… Read more »
Sex, Lies and Instant Messenger and How to think about Security
Alec Muffett, Security Consultant Thursday 22 September 2011 – 7:30pm Venue: Oxford e-Research Centre, 6 Keble Road, Oxford, OX1 3QG Two talks in one! The first, an investigation into the security failures of modern communications from the perspective of adulterous liaisons, and the second, a review of security perspectives which debunk the myths of “Cybersecurity”.… Read more »