Review: Computer Vision: UAVs and Video Processing

On Monday, April 29, DC ACM was privileged to host Dr. Larry Davis, Professor at the Institute for Advanced Computer Studies and the Department of Computer Science at the University of Maryland. His presentation, “Computer Vision: UAVs and Video Processing,” chronicled just how far the field has come since it began in the mid 20th … More Review: Computer Vision: UAVs and Video Processing

Review: Social Media Smarts

On Tuesday, April 16, the Information Systems Security Association hosted Michael Janke, who gave the presentation “Social Media Smarts”, at the Government Printing Office in Washington, DC.  Mr. Janke is the founder of Silent Circle, the author of Take Control, and the co-founder of PGP (Pretty Good Privacy). The technology of PGP is owned by Symantec, and … More Review: Social Media Smarts

Review: Cloud Computing: Where Are We on Security?

On Wednesday, August 1, DC ACM hosted the presentation, “Cloud Computing: Where Are We on Security?” given by Dr. Harry J. Foxwell, an Adjunct Professor in the Computer Science Department at George Mason University, and Principal Consultant for Oracle Corporation.  During the presentation, held at Radio Free Asia in Washington, DC, Foxwell covered a number … More Review: Cloud Computing: Where Are We on Security?

Review: HTTP the Right Way with ASP.NET Web API and MVC 4

DC .NET User Group’s (DC DNUG) June meeting, held in DC at the American College of Cardiology on June 19, featured the presentation “HTTP the Right Way with ASP.NET Web API and MVC 4” given by Steve Michelotti, a software engineer and Microsoft MVP. The title of this presentation refers to the fact that until … More Review: HTTP the Right Way with ASP.NET Web API and MVC 4

Review: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

This book is, among other things, an illustration in prose of the adage “it takes one to know one”.  It is through the writing of Poulsen, a noteworthy ex-hacker himself, that you gain a clear understanding of how and why Max Vision (born Max Butler) became the infamous hacker who stole 1.8 million credit card … More Review: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen

Review: Building Web Applications Using Node.js

DC ALT.NET’s presentation “Building Web Applications Using Node.js” by Troy Goode and Seth Carney was dense, but about as concise as could be expected considering the topic.  They began with an introduction that included how to install and configure Node.  Thereafter, they demoed the code for their shopping cart web app (called express lane), from … More Review: Building Web Applications Using Node.js