TRUST Security Seminar, Jan 23
Financial and trade secret theft, fraud, technical attacks, privacy intrusions, malware and other online criminal activity is a significant problem. Millions of internet users and […]
CITRIS and the Banatao Institute
Creating information technology solutions for society's most pressing challenges
Financial and trade secret theft, fraud, technical attacks, privacy intrusions, malware and other online criminal activity is a significant problem. Millions of internet users and […]
Electronic materials are materials in which mobile electrons play an active role in defining their relevant properties. However, their functionalities and applications are not necessarily […]
Energy and Resources Group Fall 2013 Colloquium Series (ER295)
Abstract: Improving the efficiency with which we use energy is often said to be the most cost-effective way to reduce energy use and greenhouse gas […]
With the tremendous growth in cloud-based services, the web platform is now easily the most widely used application platform. In this talk, I will present […]
A premise of the lab-on-a-chip paradigm is the integration of several processing stages of a chemical or biochemical analytical procedure together with microfluidics and detection […]
Live broadcast at http://video.citris.berkeley.edu/playlists/webcast. Ask questions live on Twitter: #CITRISRE. All talks may be viewed on our YouTube channel The schedule for the semester can […]
Don’t miss what promises to be a very timely and engaging conversation with Cindy Cohn, legal director of the Electronic Frontier Foundation, and Nicole Ozer, […]
The price of cellular infrastructure is dropping dramatically, entering the sub 10,000 USD price point in the last few years. This shift has enabled a […]
The History and Theory of New Media Lecture Series brings to campus leading humanities scholars working on issues of media transition and technological emergence. The […]
On Friday, February 7 the College will host Thomas M. Siebel, founder, chairman and CEO of C3 Energy, as the first speaker for the spring […]
Please feel free to drop in to this workshop and brainstorming session where archaeologists with Erik Champion will work through some ideas and plans for […]
In this lecture, I will argue that a century of lived experience in the political economy of expansive capitalism in the rich countries of the […]
In this informal talk, I will discuss classroom experiences (both good and bad) gleaned from teaching game design, especially work by students to develop serious […]
Energy and Resources Group Spring 2014 Colloquium Series (ER295)
The CITRIS Foundry is hosting very first Demo Day to celebrate the graduation of our 2013-14 cohort. The Demo Day will serve as an opportunity […]
How are scholars using surround displays, stereographics, gaming technologies and new peripherals to disseminate new ways of viewing, interacting with, and understanding humanities content, and […]
Learn how to build Chatbots with renowned artificial intelligence programmer and ChatScript language designer Bruce Wilcox as you compete to create the most human chatbot! […]
Jaron Lanier scientific interests include biomimetic information architectures, user interfaces, heterogeneous scientific simulations, advanced information systems for medicine, and computational approaches to the fundamentals of […]
This talk reports on a study about the impact of crowdsourcing on a law-making process in Finland. In the studied process, the off-road traffic law […]
Today we are so used to the enormous capabilities of microelectronics that we can hardly imagine what it might have been like in the early […]
Security is a critical concern around the world, whether it is the challenge of protecting ports, airports and other critical infrastructure, interdicting the illegal flow […]
As we talk about streaming data from smart cities and the Internet of Things, certain questions emerge: What is important? Who is watching? How are […]
How should we strike the right balance between national security and privacy and civil liberties in federal counterterrorism programs? Join members of the U.S. Privacy […]