3 resultados para Log Stackers and Sawmill Yard
em University of Southampton, United Kingdom
Resumo:
In this lecture, we will focus on analyzing user goals in search query logs. Readings: M. Strohmaier, P. Prettenhofer, M. Lux, Different Degrees of Explicitness in Intentional Artifacts - Studying User Goals in a Large Search Query Log, CSKGOI'08 International Workshop on Commonsense Knowledge and Goal Oriented Interfaces, in conjunction with IUI'08, Canary Islands, Spain, 2008.
Resumo:
Abstract Google and YouTube are quickly becoming the training resource of choice for the IT literate, especially in relation to computer based applications. Many businesses are addressing this training issue in a number of ways, some more successful than others. Find out what the IT services at the university are doing to adapt to this change and contribute to the discussion on how the approach could be improved. Before the talk you could have a look at the following; * One service that has been licenced is Lynda http://go.soton.ac.uk/lynda or lynda.com (note you have to enter www.southampton.ac.uk as the organisation if you don’t log in through the go.soton link) * The IT training team publish a portfolio of systems and courses at http://www.southampton.ac.uk/isolutions/computing/training/portfolio/index.php. * More and more internal systems are being supported through online guides such as http://go.soton.ac.uk/bgsg
Resumo:
Abstract Passwords are the most common form of authentication, and most of us will have to log in to several accounts every day which require passwords. Unfortunately, passwords often do not do a good job of proving who we are, and come with a host of usability problems. Probably the only reason that passwords still exist is that there often isn't a better alternative, so we are likely to be stuck with them for the foreseeable future. Password cracking has been a problem for years, and becomes more problematic as computer become more powerful and attackers get a better idea of the sort of passwords people use. This presentation will look at two free password cracking tools: Hashcat and John the Ripper, and how even a non-expert on a laptop (i.e. me) can use them effectively. An introduction to some of the research surrounding the economics and usability of passwords will also be discussed. Note that the speaker is not an expert in this area, so it will be a fairly informal since I'm sure you're all tired after a long term.