Search for tag: "georgia tech"

David Levin - Revocations Are Dead, Long Live Revocations

The importance of the web’s public key infrastructure (PKI) cannot be overstated: it is what allows users to know with whom they are communicating online. Central to its correct operation is…

From  Kathryn Gentilello 5 Months ago 17 views 0  

Holly M. Dragoo - What Constitutes an Act of War in Cyberspace?

Is cyberspace merely another domain for 21st Century kinetic battles to operate in, or does it merit special consideration and unique rules of engagement? In this talk, Holly Dragoo will explore the…

From  Kathryn Gentilello 7 Months ago 48 views 0  

Kennon Bittick - The Scalability of Vulnerability Analysis

Analyzing software for vulnerabilities is an important capability in ensuring the security of a computing system. As software has become more complex and ubiquitous, however, traditional…

From  Kathryn Gentilello 5 Months ago 26 views 0  

Probing Active Nematic Films with Magnetically Manipulated Colloids - David Rivas

Active nematics are non-equilibrium liquid crystalline systems composed of self driven particles whose motility creates flows that lead to perpetual changes in the local nematic director. We…

From  Kathryn Gentilello 2 Months ago 4 views 0  

"Cellular packing, mechanical stress and the evolution of multicellularity - Shane Jacobeen

The evolution of multicellularity set the stage for sustained increases in organismal complexity. However, a fundamental aspect of this transition remains largely unknown: how do simple clusters of…

From  Kathryn Gentilello 2 Months ago 3 views 0