Computing in the Cloud - Part 1: "Introduction" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 1 includes introductory remarks by H. Vincent Poor, and a survey talk by
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 1: "Introduction" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 1 includes introductory remarks by H. Vincent Poor, and a survey talk by
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 2: "Possession and ownership of data" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 2 includes the first panel of the workshop, entitled "Possession and own
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 2: "Possession and ownership of data" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 2 includes the first panel of the workshop, entitled "Possession and own
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 3: "Security and risk in the cloud" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 3 includes the second panel of the workshop, entitled "Security and risk
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 3: "Security and risk in the cloud" – January 14, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 3 includes the second panel of the workshop, entitled "Security and risk
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 4: "Princeton Research" – January 15, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 4 includes a presentation and discussion of Princeton research. Sponsor
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 4: "Princeton Research" – January 15, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 4 includes a presentation and discussion of Princeton research. Sponsor
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 5: "Civics in the cloud" – January 15, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 5 includes the third panel of the workshop, entitled "Civics in the clou
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 5: "Civics in the cloud" – January 15, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 5 includes the third panel of the workshop, entitled "Civics in the clou
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 6: "What's next?" – January 15, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 6 includes the third panel of the workshop, entitled "What's next?". Wh
Author(s): No creator set

License information
Related content

Computing in the Cloud - Part 6: "What's next?" – January 15, 2008
"Computing in the cloud" is one name for services that run in a Web browser and store information in a provider's data center — ranging from adaptations of familiar tools such as email and personal finance to new offerings such as virtual worlds and social networks. This workshop will bring together experts from computer science, law, politics and industry to explore the social and policy implications of this trend. Part 6 includes the third panel of the workshop, entitled "What's next?". Wh
Author(s): No creator set

License information
Related content

Anthony Scaturro: Cyber Security for Non-technical Users Non-technical Users
Lunch 'n Learn presentation: Your work or home computer may contain information about yourself, (e.g., tax returns and other personal information), about others (e.g., work-related reports, databases), or about matters you are working on (e.g., research) that you may not want to share with the public. It is not uncommon for computer users to assume that the various computer and software vendors sell products that will protect such information “out-of-the-box.“ While their products may conta
Author(s): No creator set

License information
Related content

Anthony Scaturro: Cyber Security for Non-technical Users PDF
Lunch 'n Learn presentation: Your work or home computer may contain information about yourself, (e.g., tax returns and other personal information), about others (e.g., work-related reports, databases), or about matters you are working on (e.g., research) that you may not want to share with the public. It is not uncommon for computer users to assume that the various computer and software vendors sell products that will protect such information “out-of-the-box.“ While their products may conta
Author(s): No creator set

License information
Related content

Reunions Seminar 2009: Family Wealth, Values, and Legacies – May 30, 2009
Thomas C. Rogerson, Managing Director, Family Wealth, BNY Wealth Management, presented an inspiring and informative session to Princeton alumni on how families with significant means can ensure that personal wealth is transferred where and how they choose. Held on May 30, 2009 at the Frist Campus Center.
Author(s): No creator set

License information
Related content

Brian Kernighan: Millions, Billions, Zillions -- (In)numeracy Still Matters - February 3, 2010
Lunch 'n Learn presentation: As calculators and computers have become steadily more powerful, they have buried us in an avalanche of numbers and graphs and charts, many of which claim to present the truth about important issues. But at the same time, our personal facility with numbers has diminished, often leaving us at the mercy of quantitative reasoning and presentation that is sometimes wrong and often not disinterested. For the past ten years, Dr. Kernighan has been teaching a course that s
Author(s): No creator set

License information
Related content

Brian Kernighan: Millions, Billions, Zillions -- (In)numeracy Still Matters PDF - February 3, 2010
Lunch 'n Learn presentation: As calculators and computers have become steadily more powerful, they have buried us in an avalanche of numbers and graphs and charts, many of which claim to present the truth about important issues. But at the same time, our personal facility with numbers has diminished, often leaving us at the mercy of quantitative reasoning and presentation that is sometimes wrong and often not disinterested. For the past ten years, Dr. Kernighan has been teaching a course that s
Author(s): No creator set

License information
Related content

Reunions Seminar 2010: Thoughtful Legacy Planning in an Uncertain Environment
Francis J. Mirabello ’75 P07, a partner and the manager of the Personal Law Practice of Morgan, Lewis & Bockius LLP in Philadelphia, presented a practical discussion to Princeton alumni on how to ensure their estate plans achieved their goals for family and philanthropy, particularly in light of changing federal estate and transfer tax laws under consideration in Congress.
Author(s): No creator set

License information
Related content

Reunions Estate Planning Seminar presented by the Office of Gift Planning - June 2, 2007
Robert N. Grant '67 P02 P07 and Francis J. Mirabello '75 P07, Fellows of the American College of Trust and Estate Counsel discuss achieving personal and financial goals through estate planning, and Vice President and Treasurer Christopher McCrudden P93 discusses the investment strategies and performance of planned gifts managed by Princeton.
Author(s): No creator set

License information
Related content

22 - Repeated games: cheating, punishment, and outsourcing
In business or personal relationships, promises and threats of good and bad behavior tomorrow may provide good incentives for good behavior today, but, to work, these promises and threats must be credible. In particular, they must come from equilibrium behavior tomorrow, and hence form part of a subgame perfect equilibrium today. We find that the grim strategy forms such an equilibrium provided that we are patient and the game has a high probability of continuing. We discuss what this means for
Author(s): No creator set

License information
Related content