Feeds

Couldn't be there? Our conference vids for you

The Register and Intel LIVE 2011

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Last week The Register teamed up with Intel to put on an all-day conference in Millbank, central London. We had a great line-up of speakers, which included Professor Brian Cox and security God Bruce Schneier - for me a stand-out.

We filmed the proceedings for those of you who couldn't be there. The event went down a storm with the invitation-only audience (which included five winners of a lucky dip competition). And we think you will like it too.

So to our video /show report.

Dr Genevieve Bell, anthropologist and Intel Fellow, opened the day with her keynote on what would Data look like if it were a person. She is a thought-provoking and accomplished speaker.

Watch Video

Ed Moore, ex-CTO of Carphone Warehouse and now on his third mobile start-up, was next up talking about the evolution of the smartphone. Among other things, he points to the dangers that RIM faces. His presentation is here (pdf).

Watch Video

We threw Genevieve and Ed to the mercy of the attendees with a Q and A hosted by The Register’s Tim Phillips.

Watch Video

Our second session was all about HPC and kicked off with Peter Maccallum from Cancer Research UK talking about HPC skills, challenges and science. His presentation is here.

Watch Video

Martha Bennett from our the analyst firm Freeform Dynamics was next on stage to dive into the facts and fiction of Big Data. You can download her presentation here.

Watch Video

Closing off the HPC session, Peter and Martha take questions from the floor.

Watch Video

Next up, the security session began with Jim Walter from McAfee who runs through the latest Malware threats and the rise of Hactivism. His presentation is here.

Watch Video

Continuing our stride into security, Dr Bruce Schneier took the stage with a must-see talk about Cyber War.

Watch Video

As Bruce closed off his talk, Jim and Tim joined him on stage to take questions from the floor.

Watch Video

We dipped into science for final session. Professor Brian Cox who did an excellent talk on fundamental physic. Sadly, we can’t compete with BBC contracts, so we don’t have any video of Brian, but you you can read our write up here. Following our fop haired hero was Andrzej Nowak from CERN with a presentation titled: From Femtoscale to Exascale: Computing at CERN. If you’ve ever wondered how these guys do what they do, watch this – it’s quite amazing.

Watch Video

Andrzej's presentation is here. ®

Remote control for virtualized desktops

More from The Register

next story
Official: European members prefer to fondle Apple iPads
Only 7 of 50 parliamentarians plump for Samsung Galaxy S
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.