2200, Noether
Speaker(s): Sebastian Holst, Alexander Urbelis
This past May, in response to the growing sophistication of cyberattacks and application exploits, U.S. lawmakers (almost unanimously) passed the first-ever federal law concerning trade secret protection: the Defense of Trade Secrets Act. Under the DTSA, however, reverse engineering is protected and deemed 100 percent legal. Within weeks, the EU followed with their own directive increasing trade secret protection while protecting reverse engineering. This talk discusses how this new law impacts reverse engineering, the pros and cons of tying reverse engineering to the courts, best practices for code development, limitations on reverse engineering, counterattacks to those limitations, and counterattacks to the counterattacks.

Information Overload and the "Last Foot" Problem

2200, Friedman
Speaker(s): Nick Lum, Andrew Cantino
There's so much to read and so little time. Unlike past generations who awoke to find a single newspaper on their doorstep, we open our smartphones and computers to find thousands of newspapers, websites, and blogs beckoning our attention. With this deluge of reading material, we're left with a "last foot" problem: how do we get all this information from our screens into our brains? This talk will give a brief history of the written word, describe neurological aspects of the reading process, and explore some of the new innovations that aim to let us read more quickly and efficiently on-screen.

Now and Then, Here and There

2200, Lamarr
Speaker(s): Jason Scott
In the last few years, the Internet Archive (archive.org) has steered deeply into the worlds of software history, hacker presentations, and artifacts from all parts of technology's past and present. Jason Scott, the Archive's software curator and inside man, walks through both the current stacks of technology and hacker culture history and reveals in what directions the nonprofit library hopes to expand. Lots of amusing imagery and endless lost weekends will ensue.