Print Program

Total Page:16

File Type:pdf, Size:1020Kb

Print Program Monday – 23 April 2018 09:00 – 10:30 ... Monday Morning Opening Plenary, Christian Rudder (Room 517D) 10:30 – 11:30 ... Coffee Break (517 Foyer) 11:30 – 12:50 ... Technical Sessions 12:50 – 14:30 ... Lunch Break (on your own) 14:30 – 15:50 ... Technical Sessions 15:50 – 16:30 ... Coffee Break (517 Foyer) 16:30 – 17:50 ... Technical Sessions 18:00 – 21:00 ... CHI 2018 Reception and Expo featuring Demonstrations (Exhibit Hall/220BC) Tuesday – 24 April 2018 09:00 – 10:20 ... Technical Sessions (Note: Exhibit Hall open 10:20 – 18:00) 10:20 – 11:00 ... Coffee Break (Exhibit Hall/220BC) Late-Breaking Work Posters Rotation 1 Art Exhibitions (VR Lounge) GameJam Demonstrations 11:00 – 12:20 ... Technical Sessions 12:20 – 14:00 ... Lunch Break (on your own) Diversity & Inclusion Lunch (Preregistration required) 14:00 – 15:20 ... Technical Sessions 15:20 – 16:00 ... Coffee Break (Exhibit Hall/220BC) Late-Breaking Work Posters Rotation 1 Student Research Posters Student Design Posters Art Exhibitions (VR Lounge) ScienceJam Lightning Talks 16:00 – 17:20 ... Technical Sessions 17:30 – 18:30 ... Tuesday Plenary, Choir! Choir! Choir!, Daveed and Nobu (Room 517D) 18:00 – 19:30 ... Job Fair (Exhibit Hall/220BC) Wednesday – 25 April 2018 09:00 – 10:20 ... Technical Sessions (Note: Exhibit Hall open 10:20 – 17:30) 10:20 – 11:00 ... Coffee Break (Exhibit Hall/220BC) Late-Breaking Work Posters Rotation 2 Art Exhibitions (VR Lounge) 11:00 – 12:20 ... Technical Sessions 12:20 – 14:00 ... ACM SIGCHI and CHI Joint Town Hall Lunch (Room 520) 14:00 – 15:20 ... Technical Sessions 15:20 – 16:00 ... Coffee Break (Exhibit Hall/220BC) Art Exhibit: Live Coding YouTube Late-Breaking Work Posters Rotation 2 Art Exhibitions (VR Lounge) 16:00 – 17:20 ... Technical Sessions 17:30 – 18:30 ... Video Showcase (Room 517D) 19:00 – 22:00 ... Immersive Art Exhibition Reception Hosted at La SAT (Off site) Thursday – 26 April 2018 09:00 – 10:20 ... Technical Sessions (Note: Exhibit Hall open 10:20 – 13:30) 10:20 – 11:00 ... Coffee Break (Exhibit Hall/220BC) Art Exhibitions (VR Lounge) 11:00 – 12:20 ... Technical Sessions 12:20 – 14:00 ... Lunch Break (on your own) (Note: Exhibit Hall closes at 13:30) 14:00 – 15:20 ... Technical Sessions 15:20 – 15:40 ... Coffee Break (517 Foyer) 15:40 – 17:10 ... Thursday Afternoon Closing Plenary, Sue Gardner (Room 517D) TABLE OF CONTENTS Welcome from General Conference Co-Chairs ....3 From Technical Program Co-Chairs ............................. 4 Territorial Acknowledgement ....................................... 4 Diversity and Inclusion Statement ............................... 4 Conference Committee ..................................................... 6 Papers Associate Chairs .................................................... 8 General Information ........................................................ 12 ACM SIGCHI ................................................................... 12 CHI Steering Committee.............................................. 12 CHI Information and Policies ...................................... 13 Technical Program Monday - Thursday..................... 14 Technical Program Venues .......................................... 15 Saturday - Sunday Invitation Only Events ................. 16 Open Hours .................................................................. 17 Exhibit Hall Zones ........................................................ 17 Special Daytime and Evening Events ......................... 18 Awards................................................................................. 19 SIGCHI Awards .............................................................. 19 CHI Academy ................................................................22 Best of CHI & Video Showcase Awards .....................24 Plenary Speakers ..............................................................25 Technical Sessions ............................................................ 26 Monday ......................................................................... 26 Tuesday ......................................................................... 37 Wednesday ...................................................................50 Thursday .......................................................................62 Workshops and Symposia ..............................................72 Video Showcase................................................................. 74 Courses ................................................................................ 75 Student Events .................................................................. 76 Doctoral Consortium ................................................... 76 Research Competition ................................................. 76 Design Competition .....................................................77 Late-Breaking Work .........................................................78 Rotation 1: Tuesday ......................................................78 Rotation 2: Wednesday ...............................................82 Demonstrations ................................................................86 Art Exhibitions ..................................................................89 Exhibitors ...........................................................................90 Monday Exhibit Hall Map (CHI Expo) ............................ 92 WIFI (case sensitive) Tuesday - Thursday Exhibit Hall Map ........................... 93 SSID: CHI2018 Palais des Congrès Facility Map ....................................94 Password: ENGAGE2018 CHI 2019 Save the Date .......................... inside back cover CHI 2018 Palais des Congrès de Montréal | Montréal, Canada | 1 NOTES 2 | ACM Conference on Human Factors in Computing Systems CHI 2018 WELCOME FROM CHAIRS We are very pleased to welcome you to Additionally, we broadened the scope of who can engage CHI 2018 in Montréal, Canada! This year, the with CHI content. We are pleased to launch the first-ever CHI with live-streaming of every paper session. Live-streaming theme is Engage. Our hope is that over the next paper presentations allows our authors to reach a diverse six days, you engage with technology and world- audience that includes the friends, family, and colleagues class research, engage in discussions with your who have supported the presented research, but are unable community of designers, researchers, students, to attend. We support people with disabilities or travel and practitioners, and—most of all—that you restrictions to remotely attend through telepresence robots. We are offering onsite childcare that helps people with engage with CHI! caregiving responsibilities attend CHI. We also have several The engage theme informed our planning and we are excited initiatives to support diversity, inclusion, and accessibility to present a vibrant program for you to experience. In including a nursing room, gender-neutral bathrooms, 2018, we are celebrating the 50th anniversary of Douglas badge pronouns, and a dedicated blackout (desensitization) Engelbart’s Mother of all Demos. To celebrate and honour this room. Tiohtiá:ke, (Montréal) is historically known as a historic event, we are hosting the CHI Expo—a reception on gathering place for many First Nations, and we wish for Monday night that will give you the opportunity to engage our attendees to carry this spirit of connection into how we with the technology of the future, as presented by your engage with each other at CHI 2018. colleagues. We are also excited to present the CHI 2018 Art We are so grateful to our extraordinary volunteers who Exhibition in association with La SAT (La Société des Arts made CHI 2018 possible, especially to those who organized Technologiques). Much of the virtual and mixed-reality art the venues and provided logistics support. We are greatly can be seen in the Exhibit Hall; however, please attend the indebted to each of the 101 volunteers on our organizing reception on Wednesday night at La SAT to experience the committee for their service in making CHI 2018 happen. impressive Satosphere—a 360° digital dome environment Thanks also to the more than 175 student volunteers with artworks that explore immersion. This year, we are who carry out on-the-ground efforts in helping CHI to run launching the inaugural CHI GameJam and ScienceJam, smoothly. Finally, we are deeply grateful to the ACM, to where participants can engage with mentors and peers in SIGCHI, and to the CHI Steering Committee for their support a two-day frenzy of activity and excitement. We are also of CHI 2018. bringing back the plenary Video Showcase session on Wednesday afternoon. We welcome you to Montréal and encourage you to Engage with CHI! We are thrilled with our dynamic keynote speakers, who each bring unique perspectives to our theme. Christian Rudder (author of Dataclysm) opens CHI with his insights on what data from the dating site he co-founded (OkCupid) reveals about human behaviour. Sue Gardner (former executive director of Wikimedia Foundation, co-chair of the campaign to pardon Edward Snowden) closes CHI by discussing her desire to ensure that everybody in the world has access to the information they want and need. And Choir! Choir! Choir! leads us in a plenary session on Tuesday afternoon on General Conference Chair General Conference Chair achieving creativity through shared vulnerability. Regan Mandryk Mark Hancock University of Saskatchewan University of Waterloo University of Waterloo CHI 2018 Palais des Congrès de Montréal | Montréal, Canada
Recommended publications
  • A Study of the Nature of the Photochromic Mechanism in Various Sodalites
    A STUDY OF THE NATURE OF THE PHOTOCHROMIC MECHANISM IN VARIOUS SODALITES by RICHARD MARTIN CHARNAH B. Sc., A.R.C.S. A Thesis submitted for the Degree of Doctor of Philosophy in the University of London. September 1973 Department of Electrical Engineering IMPERIAL COLLEGE University of London • - Abstract The major inorganic photochromic materials are reviewed, and in particular sodalite in greater detail. The growth of sodalites by hydrothermal and fluxed- melt techniques and by a low temperature aqueous medium method from kaolinite is dealt with, and the production of a novel material with more convenient activation properties than hitherto is described. Using chiefly epr measurements and spectra reconstructions the electron centres previously suggested as the source of the photochromic activity are eliminated and a new model developed, though others are also considered possible. Other effects in sodalites are explained using configuration co-ordinate diagrams, and suggestions are made concerning non-photochromic sodalites. • To my wife, Haze • - iv - Acknowledgements I would like to thank Dr D W G Ballentyne for his encouragement and supervision during this work. I am also grateful to Dr E A D White for advice on crystal growth, to Professor J C Anderson for his interest and support and to Dr J F Gibson for providing unhindered access to the Varian epr spectrometer and with whom I had many illuminating discussions. May I also thank my colleagues and friends of the materials section for their advice and criticism and for the environment they created, and the technical staff of the electrical engineering department, especially Mr P Robinson whose guidance on hardware saved much time.
    [Show full text]
  • Report to the President: MIT and the Prosecution of Aaron Swartz
    Report to the President MIT and the Prosecution of Aaron Swartz Review Panel Harold Abelson Peter A. Diamond Andrew Grosso Douglas W. Pfeiffer (support) July 26, 2013 © Copyright 2013, Massachusetts Institute of Technology This worK is licensed under a Creative Commons Attribution 3.0 Unported License. PRESIDENT REIF’S CHARGE TO HAL ABELSON | iii L. Rafael Reif, President 77 Massachusetts Avenue, Building 3-208 Cambridge, MA 02139-4307 U.S.A. Phone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
    [Show full text]
  • Nra Plans to Keep Prices Reasonable to Alcorn
    T E N P i^ G B S PRICE V O L. L n « NO. 280. / (Ohi—IfUnI Adwtiitaf on S) BfANCHESISi^ (X>NNi; S A ? I^ AU60Sir26; 19^ Camera River Drama At Philadelphia D ETM INSULL TO NRA PLANS TO KEEP dO R D ER FR O N PRICES REASONABLE F E D ^ H E A D S ALCORN ARE Codes Almost Ready for H O m SHERIDAN Former C h k a ^ Utilities Op- -A I kAo$, Coal and Retail LEASED; ID BE en ter b Reid in Greece ARMY OF BLUE H e r e Is Nothing to the Re­ T rader May Reach Final as D. S. Gorernment ports,*^ He Says, as An- Accord Later in Day. MUCH IMPROVED EAGLE IS READY Makes New Mmre. thorities Coitinne Search Washington, Aug. 26.— (AP) — Springfield Man Takes Over FOR BIG MARCH for Seven More Men Athens, Greece, Aug. 28— (A P )— Action to keep prices reascmable all Samttel Tnimn under indictment in the way from the factory to the Property; Lobby to Be on the United States in connection with Thoo^t to Be Members buyer emerged today as a necessary the coUapae of Ms utility interest, Great Offensive to . Start in and major job for the recovery ad­ was detEdned here today. Ground Floor, Landlord ministration. It may get underway The former CMcEigo . utilities of the Gang. right after the p e n d ^ big codes operator weu lodged temporarily in Manchester Monday With of fair practice — for the automo­ Bas Long Experience. the office of the head of the Athens bile, coal and retail trades — are out police force.
    [Show full text]
  • Proquest Dissertations
    MI u Ottawa L'Universite canadierme Canada's university FACULTE DES ETUDES SUPERIEURES run FACULTY OF GRADUATE AND ET POSTOCTORALES U Ottawa POSDOCTORAL STUDIES L'University* eanadieime Canada's university Stephen B. Quinlan AUTEUR DE LA THESE / AUTHOR OF THESIS Ph.D. (Religious Studies) GRADE/DEGREE Department of Classics and Religious Studies FACULTE, ECOLE, DEPARTEMENT/ FACULTY, SCHOOL, DEPARTMENT The Ilaid, the Athlete and the Ancient Greek Polis A Descriptive Study of Homer's Iliad %$>• Hero Myth TITRE DE LA THESE / TITLE OF THESIS Dominique Cote DIRECTEUR (DIRECTRICE) DE LA THESE / THESIS SUPERVISOR Anne Vallely CO-DIRECTEUR (CO-DIRECTRICE) DE LA THESE / THESIS CO-SUPERVISOR Theodore De Bruyn Francisco Gonzalez Gregory Nagy (Harvard Univeristy) Karin Schlapbach Gary W. Slater Le Doyen de la Faculte des etudes superieures et postdoctorales / Dean of the Faculty of Graduate and Postdoctoral Studies The Iliad, the Athlete and the Ancient Greek Polis A Descriptive Study of Homer's Iliad as Hero Myth Stephen B. Quinlan Thesis submitted to the Faculty of Graduate and Postdoctoral Studies In partial fulfillment of the requirements For the PhD in Religious Studies Department of Religious Studies Faculty of Arts University of Ottawa © Stephen B. Quinlan, Ottawa, Canada, 2009 Library and Archives Bibliotheque et 1*1 Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington OttawaONK1A0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-66013-3 Our
    [Show full text]
  • Keeping Secrets in Hardware: the Microsoft Xboxtm Case Study
    Keeping Secrets in Hardware: The Microsoft XboxTM Case Study Andrew Huang Massachusetts Institute of Technology, Cambridge MA 02139, USA, [email protected], http://www.xenatera.com/bunnie/ Abstract. This paper discusses the hardware foundations of the cryp- tosystem employed by the XboxTM video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and verifies portions of an external FLASH-type ROM. The presence of the secret boot block is camouflaged by a decoy boot block in the external ROM. The code contained within the secret boot block is transferred to the CPU in the clear over a set of high-speed busses where it can be extracted using simple custom hardware. The paper concludes with recommendations for improving the Xbox security system. One lesson of this study is that the use of a high-performance bus alone is not a sufficient security measure, given the advent of inexpensive rapid prototyping services and affordable high-performance FPGAs. 1 Introduction and Background Every cryptosystem is based on some kind of secret, such as a key. Regardless of the cipher, the security of a cryptosystem is only as strong as the secrecy of the key. Thus, some of the most startlingly effective attacks on a cryptosystem involve no ciphertext analysis, but instead find flaws in the protocols that manage the keys. Cryptosystems based on symmetric ciphers are particularly vulnerable to protocol attacks, since both the sender and the receiver must be trusted to have a copy of the same secret key.
    [Show full text]
  • A Study of the Application of Free and Open Source Software Licensing Ideas to Art and Cultural Production
    Sandbox Culture A Study of the Application of Free and Open Source Software Licensing Ideas to Art and Cultural Production Aymeric Mansoux Supervisor: Matthew Fuller Thesis presented for the degree of Doctor of Philosophy Centre for Cultural Studies, Goldsmiths, University of London, February 2017 I, Aymeric Mansoux, confirm that the work presented in this thesis ismy own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. Date: February 19, 2017 Signed: Abstract In partial response to the inability of intellectual property laws to adapt to data-sharing over computer networks, several initiatives have proposed techno-legal alternatives to encourage the free circulation and transfor- mation of digital works. These alternatives have shaped part of contem- porary digital culture for more than three decades and are today often associated with the “free culture” movement. The different strands of this movement are essentially derived from a narrower concept of soft- ware freedom developed in the nineteen-eighties, and which is enforced within free and open source software communities. This principle was the first significant effort to articulate a reusable techno-legal template to work around the limitations of intellectual property laws. It also of- fered a vision of network culture where community participation and sharing was structural. From alternate tools and workflow systems, artist-run servers, net- work publishing experiments, open data and design lobbies, cooperative and collaborative frameworks, but also novel copyright licensing used by both non-profit organisations and for-profit corporations, the impact on cultural production of practices developed in relation to the ideas of iii free and open source software has been both influential and broadly ap- plied.
    [Show full text]
  • A Hands-On Security Course
    A HANDS-ON SECURITY COURSE by ANDREW HENNESSY Submitted in partial fulfillment of the requirements for the degree of Master of Science Department of Electrical Engineering and Computer Science CASE WESTERN RESERVE UNIVERSITY May 2017 CASE WESTERN RESERVE UNIVERSITY SCHOOL OF GRADUATE STUDIES We hereby approve the thesis of Andrew Hennessy candidate for the degree of Master of Science*. Committee Chair Dr. Kenneth Loparo Committee Member Dr. Francis Merat Committee Member Dr. Gregory Lee Date of Defense April 6, 2017 *We also certify that written approval has been obtained for any proprietary material contained therein. Contents List of Tables v List of Figures vi Acknowledgments viii Abstract x 1 Introduction 1 1.1 Other Courses at Different Universities . .2 1.2 Organization of the Thesis . .3 2 Laboratory Environment 4 2.1 Equipment and Tools Needed . .5 2.2 Experimental Board . .6 2.2.1 Purpose-Designed Board . .6 2.2.2 Off-the-shelf Boards . 18 3 Syllabus 20 3.1 Prerequisites . 20 3.2 Credit Hours . 20 3.3 Course Description . 20 3.4 Key Concepts . 21 i CONTENTS 3.5 Course Requirements . 21 3.6 Student Expectations . 21 3.7 Lecture Schedule . 22 3.8 Grading . 22 3.9 Student Conduct and Academic Integrity . 23 3.10 Expected Outcomes . 23 4 Lab #1: Buffer Overflows 24 4.1 Objectives . 24 4.2 Assignment . 24 4.2.1 Introduction . 24 4.2.2 Instructions . 25 4.3 Assignment Files . 26 4.4 Solutions . 29 5 Lab #2: Diffie-Hellman Key Exchange 32 5.1 Objectives . 32 5.2 Assignment .
    [Show full text]
  • Hacking the Xbox
    $24.99 ($34.99 CDN) SHELVE IN: PC HARDWARE/GENERAL HACKING THE XBOX Get Hacking the Xbox before Microsoft Does! qANQR1DBwU4DiyVm0iq7P8gQB/9IoylwNnOxHExELKfHCTyOxX1m/eKe3+bgN/kc afpcdG1BR0ZV3degJhP2ru8h58Tw/MLU+h+jMYPUOCulwRAMyhxqX+0K1fU0oNAd 1UKi0e8sju0mks0XXzEOXNpM6BO8L90/NCSUTWPBUMgR6/KtezsFJUDAIOlxVuBX IpN1x+6A3O6Tayrg0+Qp+hD3FDRSIVKoD/uiaCnxkp5wxXh3JPRU3JMHWtUcwsr2 ThN1xhandO6Tn gg0dep+hDhackingKwas iaCcekledxby3JheUoriginalwsr2 This hands-on guide to hacking was canceled by the original Hacking publisher out of fear of DMCA-related lawsuits. Following the author’s self-publication of the book (during which time he sold thousands directly), Hacking the Xbox is now brought to you by No Starch Press. Hacking the Xbox begins with a few step-by-step tutorials on the Xbox hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. It progresses into An Introduction to Reverse Engineering a discussion of the Xbox security mechanisms and other advanced hacking topics, emphasizing the important subjects of computer security and reverse engineering. The book includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips, and an Xbox hardware reference guide. Hacking the Xbox confronts the social and political issues facing today’s hacker, and introduces readers to the humans behind the hacks through several interviews with master hackers. It looks at the potential impact of today’s legal challenges to legitimate Andrew “bunnie” Huang reverse engineering
    [Show full text]
  • S.A. Raja Pharmacy College Vadakkangulam-627 116
    S.A. RAJA PHARMACY COLLEGE VADAKKANGULAM-627 116 MEDICINAL CHEMISTRY -III VI SEMESTER B. PHARM PRACTICAL MANUAL CONTENT S.No Experiment Name Page No. 1. Synthesis of Sulphanilamide 01 2. Synthesis of 7- Hydroxy -4- methyl coumarin 03 3. Synthesis of Chlorbutanol 05 4. Synthesis of Tolbutamide 07 5. Synthesis of Hexamine 09 6. Assay of Isonicotinic acid hydrazide 11 7. Assay of Metronidazole 13 8. Assay of Dapsone 16 9. Assay of Chlorpheniramine Maleate 18 10. Assay of Benzyl Penicillin 20 11. Synthesis of Phenytoin from Benzil by Microwave 23 Irradiation 12. Synthesis of Aspirin Assisted by Microwave Oven 26 13. Drawing structure and Reaction using Chemsketch 28 MEDICINAL CHEMISTRY- III Experiment No: 01 Synthesis of Sulphanilamide Aim: To synthesis and submit sulphanilamide from p-acetamido benzene sulphanilamide and calculate its percentage yield. Principle: Sulphanilamide can be prepared by the reaction of P-acetamido benzene sulphanilamide with Hydrochloric acid or ammonium carbonate. The acetamido groups are easily undergo acid catalysed hydrolysis reaction to form p-amino benzene sulphonamide. Reaction: O HN H2N HCl O S O O S O NH NH2 2 4 Acetamidobenzene sulphonamide p Amino benzene sulphonamide Chemical Required: Resorcinol - 1.2 g Ethyl acetoacetate - 2.4 ml Conc. Sulphuric acid - 7.5 ml Procedure: 1.5 gm of 4- acetamido benzene sulphonamide is treated with a mixture of 1 ml of conc. Sulphuric acid diluted with 2 ml water. This mixture is gently heated under reflux for 1 hour. Then 3ml of water is added and the solution is boiled again, with the addition of a small quantity of activated charcoal.
    [Show full text]
  • 1 United States District Court District of Columbia Matthew Green 4506
    Case 1:16-cv-01492 Document 1 Filed 07/21/16 Page 1 of 32 UNITED STATES DISTRICT COURT DISTRICT OF COLUMBIA MATTHEW GREEN 4506 Roland Ave. Baltimore, MD 21210, ANDREW HUANG 233 Bain St. #10-01 Singapore 180233 Singapore, and ALPHAMAX, LLC Civil Case No. __________ 560 Lodge Lane Kalamazoo, MI 49009, COMPLAINT FOR DECLARATORY Plaintiffs, AND INJUNCTIVE RELIEF v. U.S. DEPARTMENT OF JUSTICE, LORETTA LYNCH 950 Pennsylvania Ave., NW Washington, D.C. 20530, LIBRARY OF CONGRESS, CARLA HAYDEN 101 Independence Ave., SE Washington, D.C. 20540 U.S. COPYRIGHT OFFICE, MARIA PALLANTE 101 Independence Ave., SE Washington, D.C. 20559-600, Defendants. 1 Case 1:16-cv-01492 Document 1 Filed 07/21/16 Page 2 of 32 Plaintiffs Matthew Green, Andrew “bunnie” Huang, and Alphamax, LLC, by and through their attorneys, allege as follows: INTRODUCTION 1. This lawsuit challenges the “anti-circumvention” and “anti-trafficking” provisions of the Digital Millennium Copyright Act (“DMCA”), 17 U.S.C. §§ 1201(a), 1203, and 1204 (collectively “the DMCA Anti-Circumvention Provisions”). Enacted in 1998, these provisions broadly restrict the public’s ability to access, speak about, and use copyrighted materials, without the traditional safeguards—such as the fair use doctrine—that are necessary to protect free speech and allow copyright law to coexist with the First Amendment. The threat of enforcement of these provisions chills protected and noninfringing speech that relies on copyrighted works, including independent technical research into computer security systems and the discussion of that research, and accessing copyrighted works in order to shift the content to a different format, space, or time.
    [Show full text]
  • "Bunnie" Huang, and "The Linux Command Line"
    Stories Firehose All Popular Polls Deals Submit Search Login or Sign4 5up Topics: Devices Build Entertainment Technology Open Source Science YRO Follow us: Catch up on stories from the past week (and beyond) at the Slashdot story archive Nickname: Password: 6-20 characters long Public Terminal Log In Forgot your password? Sign in with Google Facebook Twitter LinkedIn Close 403 Forbidden nginx 403 Forbidden Learn to Build 14 Websites with 28 Hours of Instruction on HTML, JavaScript, MySQL & More for $14 × nginx Humble Bundle Announces 'Hacker' Pay-What-You-Want Sale (humblebundle.com) Posted by EditorDavid on Saturday April 30, 2016 @01:30PM from the supporting-the-EFF dept. An anonymous reader writes: Humble Bundle announced a special "pay what you want" sale for four ebooks from No Starch Press, with proceeds going to the Electronic Frontier Foundation (or to the charity of your choice). This "hacker edition" sale includes two relatively new titles from 2015 -- "Automate the Boring Stuff with Python" and Violet Blue's "Smart Girl's Guide to Privacy," as well as "Hacking the Xbox: An Introduction to Reverse Engineering" by Andrew "bunnie" Huang, and "The Linux Command Line". Hackers who are willing to pay "more than the average" -- currently $14.87 -- can also unlock a set of five more books, which includes "The Maker's Guide to the Zombie Apocalypse: Defend Your Base with Simple Circuits, Arduino, and Raspberry Pi". (This level also includes "Bitcoin for the Befuddled" and "Designing BSD Rootkits: An Introduction to Kernel Hacking".) And at the $15 level -- just 13 cents more -- four additional books are unlocked.
    [Show full text]
  • Brian M. Willen (D.C
    Case 1:16-cv-01492-EGS Document 16-1 Filed 09/29/16 Page 1 of 40 BRIAN M. WILLEN (D.C. BN 490471) CORYNNE MCSHERRY WILSON SONSINI (CA SBN 221504) GOODRICH & ROSATI, P.C. KIT WALSH (CA SBN 303598) 1301 Avenue of the Americas ADAM SCHWARTZ (CA SBN 309491) 40th Floor ELECTRONIC FRONTIER New York, NY 10019 FOUNDATION Tel. (212) 999-5800 815 Eddy Street San Francisco, CA 94109 STEPHEN GIKOW (CA SBN 302484) Tel. (415) 436-9333 LAUREN GALLO WHITE (CA SBN 309075) WILSON SONSINI GOODRICH & ROSATI, P.C. One Market Plaza Spear Tower, Suite 3300 San Francisco, CA 94105 Tel. (415) 947-2000 Counsel for Plaintiffs UNITED STATES DISTRICT COURT DISTRICT OF COLUMBIA Matthew Green, Andrew Huang, and ) Alphamax, LLC, ) Civil Case No. 16-cv-01492-EGS ) Plaintiff, ) ) MEMORANDUM OF POINTS AND v. ) AUTHORITIES IN SUPPORT OF ) MOTION FOR PRELIMINARY U.S. Department Of Justice, Loretta Lynch, ) INJUNCTION ON BEHALF OF ) PLAINTIFF MATTHEW GREEN Library Of Congress, Carla Hayden, ) PURSUANT TO FED. R. CIV. P. 65(a) U.S. Copyright Office, and ) Maria Pallante, ) Judge: Emmet G. Sullivan ) Defendants. ) Hearing Requested ) ) MEM OF POINTS AND AUTHORITIES ISO MOT. FOR PRELIMINARY INJUNCTION CASE NO. 16-CV-01492-EGS Case 1:16-cv-01492-EGS Document 16-1 Filed 09/29/16 Page 2 of 40 TABLE OF CONTENTS Page INTRODUCTION ...................................................................................................................... 1 FACTUAL BACKGROUND ...................................................................................................... 2 A. To Perform His Important Security Research, Dr. Green Must Be Able to Circumvent Access Controls On The Works He Studies ....................................... 2 B. For His Research To Be Effective, Dr. Green Must Be Able To Discuss How To Circumvent Access Controls and Publish His Results ............................
    [Show full text]