Tucker challenges Portland ‘Occupy ICE’ protester


During the protesters' month-long occupation of ICE facilities, Portland Mayor Ted Wheeler announced his support for them and refused to have police

Israel gears up for upcoming security Challenges – Jerusalem Studio 328


This year, the month of May, presents challenges to regional stability, in general, and poses dangers to Israel's security, in particular. To discuss

“Challenges in Ethics and Computing” at ACM Turing 50 Celebration


Recently the computing and ethics communities have come to realize that computing ethics (a topic of interest to ACM since the 1950s) is more complicated

Micro-grids: Best Practices Around Technology Challenges


Speakers in this webinar highlight their organizations’ experience with the challenges and solutions associated with micro-grids,

Unleashing Forensic DNA through Computer Intelligence


DNA is powerful, yet everywhere it is in chains. Biological evidence from explosives, murder weapons and rape kits that could identify

The Security Vulnerability Assessment Process, Best Practices & Challenges


Title: The Security Vulnerability Assessment Process, Best Practices & Challenges Speaker: Kellep Charles @kellepc Security BSides Delaware 11/9/2012