Actions

Difference between revisions of "Identity and Trust in the Digital Age - Agenda"

From Santa Fe Institute Events Wiki

(Created page with '{{Identity and Trust in the Digital Age}}')
 
Line 1: Line 1:
{{Identity and Trust in the Digital Age}}
{{Identity and Trust in the Digital Age}}
====Wednesday, April 17====
Held at Fidelity Investments, FCAT, 245 Summer Street, Boston, MA
{| width="95%"  border="1" cellpadding="4"
|-
|width="15%"  |7:30 am
  |Breakfast and Registration
|-
  |8:30 am
  |'''Welcome and Introduction to Fidelity''', Thomas Blessing, Fidelity Investments
|-
  |8:45 am
  |'''Welcome and Introduction to the SFI Business Network''', [http://www.santafe.edu/about/people/profile/Chris%20Wood Chris Wood], Santa Fe Institute
|-
  |9:00 am
  |'''The National Strategy for Trusted Identities in Cyberspace: An Introduction to NSTIC''', James Sheire, National Strategy for Trusted Identities in Cyberspace (NSTIC)
|-
  |10:00 am
| |'''Break'''
|-
|10:30 am
  |'''Big Data and Computational Trust Frameworks: A New Social Stack for Sentient Phones & Devices''', [http://idcubed.org/team_member/john-henry-clippinger/ John Clippinger], ID3
|-
|11:30 am
|'''Title TBD''', [http://www.identitywoman.net/about-kaliya/bio Kaliya Hamlin], Personal Data Ecosystem Consortium
|-
|12:30 pm
|'''Lunch'''
|-
|1:30 pm
|'''Can You Trust Your Web Browser?''' [http://www.cs.unm.edu/~crandall/ Jedidiah Crandall], University of New Mexico
|-
|2:30 pm
|'''Title TBD''', Chauncey Holden, Fidelity Investments
|-
|3:30 pm
||'''Break'''
|-
|4:00 pm
|'''Identity as Privacy''', [http://en.wikipedia.org/wiki/Dan_Geer Dan Geer], In-Q-Tel
|-
|5:00 pm
|'''Adjourn'''
|}

Revision as of 19:23, 10 April 2013

Topical Meeting Navigation

Wednesday, April 17

Held at Fidelity Investments, FCAT, 245 Summer Street, Boston, MA

7:30 am Breakfast and Registration
8:30 am Welcome and Introduction to Fidelity, Thomas Blessing, Fidelity Investments
8:45 am Welcome and Introduction to the SFI Business Network, Chris Wood, Santa Fe Institute
9:00 am The National Strategy for Trusted Identities in Cyberspace: An Introduction to NSTIC, James Sheire, National Strategy for Trusted Identities in Cyberspace (NSTIC)
10:00 am Break
10:30 am Big Data and Computational Trust Frameworks: A New Social Stack for Sentient Phones & Devices, John Clippinger, ID3
11:30 am Title TBD, Kaliya Hamlin, Personal Data Ecosystem Consortium
12:30 pm Lunch
1:30 pm Can You Trust Your Web Browser? Jedidiah Crandall, University of New Mexico
2:30 pm Title TBD, Chauncey Holden, Fidelity Investments
3:30 pm Break
4:00 pm Identity as Privacy, Dan Geer, In-Q-Tel
5:00 pm Adjourn