Events Archive: Winter 2013

Code Party 1

| 7:00 PM EDT | Comfy Lounge

The Computer Science Club is running the second code party of the term! Come join us and hack on open source software, your own projects, or whatever comes up. Everyone is welcome; please bring your friends. There will be foodstuffs and sugary drinks available for your hacking pleasure.

View details

The Computer Science Club is running the second code party of the term! Come join us and hack on open source software, your own projects, or whatever comes up. Everyone is welcome; please bring your friends. There will be foodstuffs and sugary drinks available for your hacking pleasure.

Unix 101

| 6:00 PM EDT | MC 3003

*by Calum T. Dalek*. New to the Unix computing environment? If you seek an introduction, look no further. We will be holding a tutorial on using Unix this upcoming Monday. Topics that will be covered include basic interaction with the shell and use of myriad powerful tools.

View details

New to the Unix computing environment? If you seek an introduction, look no further. We will be holding a tutorial on using Unix this upcoming Monday. Topics that will be covered include basic interaction with the shell and use of myriad powerful tools.

If you're interested in attending, make sure you can log into the Macs on the third floor, or show up to the CSC office (MC 3036) 20 minutes early for some help.

Using Computers to Find Evidence in Litigation

| 4:30 PM EDT | MC 4020

Professor Gordon Cormack will be presenting a talk on using machine-learning based spam filters to accurately locate relevent electronic documents - a process which has typically been very manual, and very expensive.

View details

In a lawsuit, each party is typically entitled to Discovery, in which the other party is compelled to produce any "documents" in its possession that may be pertinent to the case. Documents include not only traditional paper documents, but email messages, text messages, computer files, and other electronically stored information, or ESI. Suppose you were compelled to produce every document in your possession pertaining to software downloads or purchases? How would you do it? If you were a large corporation, you would probably hire an army of lawyers to read all your email, plus your assignments, and any other files on your UW account, your laptop, your phone, and your tablet, at a cost of one dollar or more per file. As a CSC member, you know there must be a better way. But what is that better way, and how do you convince the court to let you use it?

It turns out that spam filters that employ machine learning can do this job well -- better than that army of lawyers. But lawyers aren't happy about this. This talk will outline how the technology works and how to prove that it works, so as to convince scientists, lawyers, and judges.

Machine Architecture, Performance, and Scalability: Things Your Programming Language Never Told You

| 4:30 PM EST | DC 1302

"Herb Sutter is a leading authority on software development. He is the best selling author of several books including Exceptional C++ and C++ Coding Standards, as well as hundreds of technical papers and articles [and] has served for a decade as chair of the ISO C++ standards committee." - http://herbsutter.com/about

View details

High-level languages insulate the programmer from the machine. That's a wonderful thing -- except when it obscures the answers to the fundamental questions of "What does the program do?" and "How much does it cost?"

The C++ and C# programmer is less insulated than most, and still we find that programmers are consistently surprised at what simple code actually does and how expensive it can be -- not because of any complexity of a language, but because of being unaware of the complexity of the machine on which the program actually runs.

This talk examines the "real meanings" and "true costs" of the code we write and run especially on commodity and server systems, by delving into the performance effects of bandwidth vs. latency limitations, the ever-deepening memory hierarchy, the changing costs arising from the hardware concurrency explosion, memory model effects all the way from the compiler to the CPU to the chipset to the cache, and more -- and what you can do about them.

Elections

| 4:00 PM EST | Comfy Lounge

CSC Elections have begun for the Winter 2013 term, nominations are open!

View details

It's elections time again! On Wednesday January 16th at 4:00PM, come to the Comfy Lounge on the 3rd floor of the MC to vote in this term's President, Vice-President, Treasurer and Secretary. The sysadmin, librarian, and office manager will also be chosen at this time.

Nominations are open until 4:00PM on Tuesday January 15th, and can be written on the CSC office whiteboard (yes, you can nominate yourself). All CSC members can vote and are invited to drop by. You may also send nominations to the Chief Returning Officer. A full list of candidates will be posted when nominations close.

Good luck to our candidates!