Speakers and Presenters
Last Updated: 04/13/2011
Speakers will be listed as they are accepted. Schedule will be available starting in March. Don't forget to register.
To see what sort of presentations Notacon has offered in the past, please see our archives.
A reference for accepted speakers can be found here.
At Notacon 2011, Project Ruori will help ensure that virtual marbles and living humans continue, as ever, to fall through space.
is an underground mob
firmly plagiarized from the anarchist nontradition.
We forage for concrete music and rock formations,
dancing on the moon,
and some incidental cordless green ideas
to enthrall theatregoers
with a decadent transcendent trauma.
Hacking The Man: Your Guide to the CourtroomSynopsis
Someday, you'll get jammed up with your jurisdiction's legal system. Hear and learn from one man's epic story of courage, determination, clear writing, and cool logic-resulting in the overturning of a bogus conviction for running a stop sign in Cleveland.
This presentation isn't just about traffic violations. It's for anyone facing (or contemplating) civil or criminal proceedings that are too important to ignore, too small to justify professional legal help, and perhaps too interesting to leave alone.
catfood has been hacking artlessly since implementing a FORTRAN preprocessor in the Lotus 1-2-3 macro language in 1988. Now, he helps software dev teams get projects done faster without burning out. This presentation is based on his recent pro se adventures in the courts of Ohio. (catfood is not a lawyer and no part of this presentation constitutes legal advice.)
The Greatest Show on Earth: How to Create, Populate, and Delegate a Successful EventSynopsis
Many people like to attend conferences, but how many get a chance to see what happens behind the scenes? In this talk, aestetix will cover the fundamentals of what anyone should know to create and maintain a successful event, including promotion, establishing and building reputation, and, if it's a recurring event, how to keep it running without going stale. He'll draw from lessons learned in the electronic music community, his experience working with the HOPE conference in New York City, as well as his own Noisebridge creation, "Five Minutes of Fame," a loose San Francisco flavored adaptation of "Lightning Talks."
Chris Anderson | Andrea Long
Corporate Evil: the Legal Way to Commit Fraud and Murder or How I Learned to Stop Worrying and Love CorruptionSynopsis
Corporations rob and murder around the world and use lawyers
and accountants to hide their obscene profits and escape liability for
their crimes. This one hour talk will teach you the basics of fraud
and liability and how corporations and other bad players launder
money, hide assets and avoid responsibility. The talk will also cover
how to use these same tools to make the world a better or at least
more interesting place for everyone.
Chris is a founder and Board Member of Hive13, a hackerspace in
Cincinnati, Ohio. He is also a veteran of the DotCom boom and bust.
Chris has watched one corporation crash and burn and helped another
hatch and take flight. Andrea holds an Associate Degree in Finance
and a Bachelors Degree in Criminology. Through her research in White
Collar Crime she has seen the reality of Greed and its damaging
results in the world around us. Today she is a Staff Accountant
within a durable medical equipment .com company. She has been in the
Accounting and Finance world for over 10 years.
James Arlen | Chris Clymer | Tom Eston | Brandon Knight | Matthew Neely
Social Engineering Business Into Your SecuritySynopsis
Funding security toys^Wproducts used to be easy. Getting
the business to understand why security costs keep changing is HARD.
Many of the real problems in information security are not about
technical prowess with packet dumps or disassemblers, they're about
the fact that most security people don't know a debit from a credit
and couldn't budget their way out of a wet paper bag. In this talk
the five of us will show how social engineering can be applied to get
your security program fully funded without resorting to FUD tactics
and screaming matches. We'll cover all this and more with a little
shouting, a lot of scolding, and some live demonstrations. (See what I
Tom Eston is best known for his frequent encounters
with the undead and his penchant for fine haberdashery. Chris Clymer's
post-disco hit: "Don't Stop Achieving My Love" won 3 Grammy Awards.
Matthew Neely is patient zero in the information security de-panting
revolution. Brandon Knight is finally trying to reduce his carbon
footprint through the use of smaller non-carbon shoes. James Arlen is
with the band.
I'll Take "Myrcurial" for $100Synopsis
In this exciting and fast paced "speed rant",
you'll be dragged from one seemingly unrelated topic to another as
together we try to make sense of the world around us. It's time to set
aside the "inner monologue" in favor of some frank discussion from the
perspective of Infosec geek, hacker, social activist, author, speaker
and parent. Topics include: Visualization In Security, Business
Terminology, Infosec Career Planning, Activism And Risk Taking,
Presentation Skills, Hacker Mythos In 2011, Revenge Of The Nerds And
History, Coloring Outside The Lines, and Why You Should Read Books.
Assuming that there are no computer incidents during the talk,
there'll even be time for a public "Ask Anything"
James Arlen, sometimes known as Myrcurial, is a
security consultant usually found in tall buildings wearing a suit,
founder of the Think|Haus hackerspace, contributing analyst for
Securosis, columnist at Liquidmatrix Security Digest, Infosec geek,
hacker, social activist, author, speaker, and parent. He's been at
this security game for more than 15 years and loves blinky lights and
Keeping secrets for iOS developersSynopsis
iOS applications frequently miss the mark on securing data whether the user's or the application's itself. Are you using SSL for talking to a remote API but embedding the credentials for the service cleartext in your application bundle? Securing user data behind a strong password but storing it in the open on the device's filesystem? Charging for premium content already delivered with your app and expecting code signing to protect it? Did you know data you store in the Caches directory to avoid backups can be browsed using a free tool even without jailbreaking? Learn some tips and gotchas to keeping secrets with the iOS SDK at this session geared for the iOS developer but potentially useful to any mobile developer.
iOS developer for 2 years and lifetime geek who has been waiting for the current generation iOS and Android devices since the Newton MessagePad. I enjoy the usual mix of technology, music and photography, know exactly where my towel is and still miss CFN.
JP Bourget | Rob Fuller
Deep Magic 101: The Wizard's First RuleSynopsis
Rob and JP will be providing a 2 part user experience. Part I will be a mix of lecture and hands on to provide a foundational set of skills for Penetration Testing. Participants will be provided with the baseline knowledge to start gathering information and identifying vulnerabilities in target networks. Part II will be a hands on lab experience which participants will have the opportunity to realize specific goals in a vulnerable environment.You will be sent home with a vulnerable Virtual Machine to continue to explore this topic. Participants will be required to sign an agreement stating they won't attack any other part of the conference other than the network they are assigned to attack. You will learn some hands on methods for identifying and performing exploitation in our lab network. The goal of this exercise is to provide a foundational set of networking, knowledge and ideas which you can continue to expand upon in the future. We will be spending about 20 minutes on each part of the below outline. We will then have a "hands on" lab period and be available afterwards to help you realize the goals we set for you during the lecture time.
Rob is a Penetration Tester at Rapid7, He has worked for Applied Security as a Network Attack Operator, a Penetration Tester for the Department of Defense, a Senior Incident Response Analyst for the Department of State and multiple Information Security Positions in the United States Marine Corps. During his service in the United States Marine Corps he was a team lead for the Marine Corps' Incident Response Team and a Security Test Engineer for the Marine Corps' R&D section. He has extensive experience in full-scope penetration testing, Web application assessments, wireless security, incident response, and related development.
Rob's blog is at Room362.com and his twitter handle is mubix
Jean Paul (JP) Bourget:
BS IT, RIT 2005; MS Computer Security and Information Assurance, RIT 2008; CISSP; MCSE, CSSA. JP has six years experience in computer networking, system administration, and information security. During the day JP is responsible for Network and Security Management for a medium size global company based in the US. JP is also adjunct faculty at Rochester Institute of Technology where he teaches Networking and Security undergraduate classes. JP also performs pen testing and security audits for local companies in Rochester, NY. In his spare time, JP snowboards, rides motorcycles, mountain bikes and enjoys fixing up older homes. JP also contributes spare time to the Board of Neighborworks Rochester. You can find me on Twitter at http://www.twitter.com/punkrokk and his blog: http://syncurity.net.
Funnypots and Skiddy BaitingSynopsis
Ever wanted to screw with those that screw with you? Honeypots might be ok for research, but they don't allow you to have fun at an attacker's expense the same way funnypot and skiddy baiting does. In this talk I'll be covering techniques you can use to scar the psyche or to have fun at the expense of attackers or people invading your privacy. Some of the topics to be covered are:
- Fun with DNS and Loopback
- SWATing for Packets
- Lemonwipe your drive
- Robots.txt trolling
- And more…
Adrian Crenshaw has worked in the IT industry for the last thirteen years. He runs the information security website Irongeek.com, which specializes in videos and articles that illustrate how to use various pen-testing and security tools.
Weaponizing the Smartphone: Deploying the Perfect WMDSynopsis
The acceptance and integration of mobile phones, specifically smartphones, into our everyday life has allowed for these devices to penetrate deep into secure areas. The ability to have your phone along with you at any moment of the day feeds our needs for social media, email, business, and pleasure. This ability and access has allowed the use of smartphones to be bred into devices that rival other penetration testing hardware/software combinations.
I have developed and created an OS platform package that allows penetration testers and security professionals the ability to test both physical security and technical security without being constrained by computers, cords, or the image of suspicious behavior. The WMD platform package is based on Windows Mobile 6.5 Smartphones and is executed similar to a virtual machine. The WMD package is preloaded with many of the same applications and testing tools that are included with Backtrack 4, www.backtrack-linux.org, there is no affiliation between the two projects, only the similar desire to create a single source of the latest tools, applications, and techniques used by today's security professionals integrating today's latest technologies.
"Weaponizing The Smarphone: Deploying The Perfect WMD" will show the audience how to create a deployable package on a MicroSD card for use on the HTC Rhodium (AT&T Tilt2) or similar Windows Mobile 6.5 smartphone. Then using a test wireless AP, a windows server 2003 VM, and The loaded WMD Smartphone the audience will be presented with a live demonstration of some of the tools including NMap, Metasploit, and The Social Engineering Toolkit to exploit the Windows Server 2003 VM and gain administrative access.
The fundamental security flaw of accepting technology to perform only for what is was "made" for without the expectation of manipulation presented by "Weaponizing The Smartphone: Deploying The Perfect WMD" will help security professionals protect their environments while stimulating "out-of-the-box" thinking.
Infosec specialist whose qualifications include an indepth understanding of security principals and practices; C|EH, MCSE+Security designations; and detailed knowledge of security tools, technologies and development. Seven years of security experience in the creation and deployment of solutions protecting networks, systems and information assets for diverse companies and organizations, with over 10 years overall in the industry.
jonCates | Jake Elliott | Tamas Kamenczy
Artgames LAN PartySynopsis
Like any medium that has achieved a critical popular mass, strange and
intoxicating activity in video games is happening at the margins,
between the cracks and out in the shed. These are the games that make
us question "is this really a game?" and "who would do this?" and
"why?"… From zero-button games like Cory Arcangel's "Super Mario
Clouds" to existentialist platformers like Cactus'
"Psychosomnium," we'll share, discuss, play and ultimately throw down
tournament style to establish artgamer supremacy in the first ever
Artgames LAN Party, a titanic clash of sensitivities & aesthetics sure
to shake loose the stars from our crude, pixelated skybox.
Jake Elliott, Tamas Kemenczy and jonCates are artists from Chicago who
create and teach Art Games and Indie Games. Together they have created
Art Games which have been exhibited internationally in Art contexts.
Individually and together they have and are developing Indie Games
that are widely reviewed and played. They have also participated in
the last several Notacon events as the "critical artware" demo crew.
Jake Elliott: http://dai5ychain.net
Tamas Kemenczy: http://singlemaltmana.net
Critical Glitch Artware: http://criticalartware.net
Tom Eston | Kevin Johnson
Social Zombies Gone Wild: Totally Exposed and UncensoredSynopsis
Social networks have jumped onto the geolocation bandwagon with location-based tweets, status updates, check-ins, mayorships, and more. This doesn't take into account EXIF, QR codes, and advancements in HTML 5 geo implementations, which are being built into these location-based services. This is often implemented and enabled without the user even knowing it. In fact, geolocation is one of the hottest technologies being used in everything from web browsers to mobile devices. As social networks throw our location coordinates around like candy, its only natural that bad things will happen and abuse will become more popular. This presentation will cover how social networks and other websites are currently using location-based services, what they plan on doing with it, and a discussion on the current privacy and security issues. We will also discuss the latest geolocation hacking techniques and will release custom code that can abuse all of the features being discussed.
Tom Eston is a Senior Security Consultant for SecureState. Tom focuses his research on the security of social media. Tom is also the founder of SocialMediaSecurity.com and co-host of the Security Justice and Social Media Security podcasts. Kevin Johnson is a security researcher with Secure Ideas. He has many years of experience performing security services for Fortune 100 companies, and leads a large number of open source security projects including BASE and SamuraiWTF. Kevin is also an instructor for SANS.
Preventing Viruses from STDs to .EXEsSynopsis
In the 80's, viruses were something you worried about catching in a nightclub. Today, computer viruses are on the top of the list. In movies, we see how "viruses" spread across the world, devastating every network they touch. It's easy to see the analogy between biological viruses and computer viruses, so lets take that a step further and see if the methods used to prevent biological viruses can be applied to the technology realm. In this talk, we'll be exploring deeply into a study on the success of Evidence-Based Intervention for HIV Prevention. We'll create a group education session that expands upon the familiar analogy of risky sexual behavior to affect a reduction of the risky behavior of Internet users.
During her day job, dewzi talks frequently about Security in the Software Development Lifecycle. For Notacon 8, she gets to remember her previous life in the Public Health field where she participated in literature reviews for behavioral health studies on HIV/AIDS. Bridging the gap between the technology sphere and the people sphere is her passion, focusing on empowering users.
propane and electronsSynopsis
things that are kind of cool: fire. building things that shoot fire. electronics. making your own circuit boards.
this talk will be on the emerging field in the crossover area between industrial art and mixed-media interactive sculpture (read: GIANT FLAMETHROWERS OH MY GOD), covering the technical aspects of both fire art (how to build flame effects, what the difference is between a "flame effect" and a "flamethrower") and control systems (designing custom PCBs).
seth used to be a lot more respectable, now he makes giant flamethrowers for fun, it's pretty cool, you should try it sometime
Strategic Penetration Testing - Changing the way we hackSynopsis
Penetration testing is something that we've all been through and understand. We have a certain level we expect from our penetration tests and testers but as we begin to look at what penetration tests symbolize and give us, they are fundamentally flawed and lacking. The Information Security field in general is relatively new in lifespan and as a maturity model we have to grow. Penetration tests should focus on understanding the business, understanding the organization, and impacting what hurts the organization the most, their bottom line. This talk will focus on strategically attacking an organization and how a penetration test should really be done and what it needs to be used for. We'll of course be showing some exploitation techniques and the latest and greatest sexy hacker moves.
David Kennedy (ReL1K) is a security ninja that likes to write code, break things. David had the privilege in speaking at some of the nations largest conferences on a number of occasions including BlackHat, Defcon and Shmoocon. David is the creator of the Social-Engineer Toolkit (SET) and Fast-Track. David is a developer on the Back|Track Linux security distribution and a developer on the exploitdb community and has released a number of Metasploit modules and exploits.
Ghostnomadjr | Jeff "ghostnomad" Kirsch
One Bad CookieSynopsis
Many of us have had a long road into technology, and sometimes we forget what got us interested in the first place. Looking to future generations can not only help us remember what made us interested, it can help rekindle the passion that started it all. I can remember how excited I was when I got my first game console. I was amazed at even the most basic graphics. My children likely got their fondness for gaming from me, but my oldest son found that special spark from a game as well. It started with one simple question, because of one bad cookie. "Why can't the game remember my name each time I click play again?" From that simple question my son would look with a critical eye at how he could improve the games he played. Then he found another interest, blogging. Not only did he like to write stories, he enjoyed playing with the look and feel of the blog templates. This father/son discussion will focus on what we each have learned about bringing up future technologist, and how to keep the passion burning.
GhostnomadJr is a typical (hahaha) fourth grader who enjoys spending time with his dad writing games, playing games, and telling stories in his own way. As a black belt in Tae Kwon Do, he understands the need for discipline and also helping others through compassion and leadership. This has translated into a fearless approach to understanding how technology works and making it work the way he wants it to.
Ghostnomad is a husband and a father who is passionate about technology. He doesn't push his kids into technology, but helps guide them in exploring the digital world. With four kids in the house he always needs to stay ahead of the curve not only teaching his kids how to be safe online, but of the new technologies and threats the digital world brings. To this end he has taken to writing Haiku about technology in hopes of finding simplicity in complexity.
Jeff "ghostnomad" Kirsch
Educating Security Means a New ApproachSynopsis
In a traditional educational environment we are taught in a linear, binary fashion. We are presented with a topic, drilled on the topic, tested on the topic, and pass or fail on the topic. Regardless of the outcome, we move on to build upon each part of the foundation we are given. As time has gone on we discovered not everyone learns the same way or at the same pace, so we identified the road blocks we faced and were given assistance in our areas of weakness. Yet after we leave school and enter the workforce we often fall back into the binary type of education/awareness where we pass or fail and remediation is granted after we fail too many times. There are new approaches in place today in the education system that can benefit the way we address security education/awareness programs and ultimately make our organizations stronger. In this discussion we will focus on topics like Response to Intervention and the three tier model, progress monitoring, and making security not seem so hard for general users.
After 14 years as both an internal/external auditor, I decided to "see the light" and got into the field of information security. Most of my time in audit was spent reviewing IT systems in both the private and public sector. Being a father of four young children helps me keep things simple, while being married to a School Neuropsychologist helps me understand the way people think and learn. Mixing that all together, I try to bring a different perspective by associating real life events to the challenges in information security at my blog ghostnomad.com while I try to simplify the complexities of Technology through the simplicity of Haiku at it-haik.com.
Laser Cutters: Not Only For Use On Your Remaining EyeSynopsis
Laser cutters are handy for crafting and sound like they come from the future even though they're older than your mom. They're also less expensive than you think. A half-hour presentation on buying equipment you don't know how to find or afford, drawing techniques, useful software and hand-tools for rapid prototyping all sorts of models using a 60-watt laser engraver. Talk focuses on sourcing and use of industrial equipment in attaining a high overall finish for craft projects, even if you lack dexterity and have challenges drawing. Several slides will provide unconventional uses of conventional equipment. Half-hour talk followed by fifteen minutes for project discussion and Q/A.
Alex holds a B.A.hon in Cultural Studies Critical Theory and Fine Art, and is a co-founder of the Site 3 coLaboratory in Toronto. She is best known for deceptively casual technical drafting and logo design. Alex wanted a laser from the time she was six, and has discovered since acquisition that private use of industrial equipment is the entire point of the future.
Collecting Underpants To Win Your NetworkSynopsis
1: Collect Packets, 2: ???, 3: Win! These demos and presentation will help you learn to passively profile a network through a new Metasploit module by gathering broadcast traffic, processing it, and looking at how the bad guys will use it to own your network. Without sending a packet, many networks divulge significant information about the assets that are attached. These broadcast packets can be used to identify hosts, OS's, and other hardware that is attached. This presentation will show all skill levels how to easily gather and use the information gathered, how to protect your underpants, and talk about how to extend the framework for new protocols.
Ryan Linn is an Information Security Engineer who has a passion for making security knowledge accessible. In addition to being a columnist with the Ethical Hacker Network, Ryan has contributed to open source tools including Metasploit and the Browser Exploitation Framework (BeEF).
SSL Wars - The Dark Side of SSLSynopsis
The Rebel Alliance uses SSL to encrypt their transmissions so that the empire does not
find the location of their secret base. In order to defeat the Rebel Alliances Darth Vader has studied
SSL extensively to learn how it can be bypassed to listen to rebel transmissions. By taking advantage
of SSL weaknesses, Vader hopes to stay one step ahead of the "rebel scum". In this presentation,
Vader will address the significance of the protection mechanisms SSL provides, best practices for SSL
implementation and various vulnerabilities associated with SSL. Vader will show video demonstrations
of tools which can be used to attack SSL such as "SSL Strip", and "SSL Sniff". The audience will walk away
with a better understanding of what SSL is and some of the ways it has been compromised.
This presentation will be given by the Dark Lord of the Sith himself (Darth Vader). Darth Vader was
once one of the most powerful Jedis in the galaxy (Anakin Sywalker). Disillusioned by the ways of the
Jedi young Anakin chose to follow the Dark Side of the force and was given the name Darth Vader by his
mentor, Darth Sidious. This misunderstood ambitious Sith is currently the empire's right hand man and
one day he hopes to rule the galaxy with his son. The role of Darth Vader will be played by Gary McCully.
Gary McCully is a Security Consultant on the Profiling team at SecureState, a Cleveland, Ohio based
security consulting company. At SecureState Gary performs vulnerability assessments, war dialing,
firewall reviews, penetration tests, physical penetration tests and web application security reviews.
His research interests include the discovery and exploitation of buffer overflows, lock picking, and SSL
We Are All Game-Makers: An Everyman's Approach to Game DevelopmentSynopsis
Most kids of my generation have dreamed of breaking into game development. Many have toiled only to give up at the monotony that true code mastery demands. Others have mastered specific technical aspects of game-making only to find that they are unprepared in other ways. Game-making as an art form requires a multidisciplinary approach, precisely why commerical houses use large teams to develop their projects. There are a number of free or cheap game makers on the market perfect for individuals looking to make a game of their own for themselves, their friends and family, or even as an indy game maker. This talk will briefly introduce some of them and their various features and also discuss alternative ways to make your indy game project stand out from the rest.
Page McKay is a bohemian nerd who has been an award-winning playwright and poet, magazine editor, and studio musician. These days she works a day job in healthcare while busying herself with game-making projects and plans to launch an indy game studio in the next year.
Pen Testing - Moving from Art to ScienceSynopsis
Pen Testing has evolved greatly over the years, but it is still more an art than a science. Tests performed by different professionals often yield wildly varied results. Even the same person or team repeating the same test can end up with different outcomes. This may cause a mess, and limits the value which can be derived from a Pen Test. To move our field forward we need to be able to produce measurable and consistent results. This talk will cover the art of Pen Testing and suggest a line we can draw to move this art form into the 21st century as a science.
Matt Neely is the Profiling Team Manager at SecureState where he leads a team that performs traditional and physical penetration tests, web application security reviews and wireless security assessments. Matt is a host on the Security Justice podcast, and spends his free time wearing kilts, hacking all things wireless and collecting pens.
Nicolle "rogueclown" Neulist
The Free Software Studio: Open-Source Tools for Musical Exploration and CompositionSynopsis
Are you curious about making music on your computer, but not sure where to start? Have you already started to explore the world of computer music, but you're curious about expanding your suite of creative tools? Do you want to do all of this without breaking the bank? No matter whether you run Linux, Windows, or Mac OS X, there is a full range of free and open source musical composition tools available to help you explore and expand your musical ideas. This talk is your guided tour of the kinds of software available, specific programs and frameworks to try out, and how to get it all working together to make beautiful music, for whatever your definition of beautiful.
nicolle neulist, otherwise known as rogueclown, has been interested in music her entire life, and has been playing with computers in various capacities since she was three. She has been singing since she was a child…and has made many attempts at playing instruments, although her lack of finger dexterity made that a rather difficult (and ultimately cacophonous) proposition. However, a few years ago, she finally discovered the power of computers as a musical composition platform, and since then, they have been her primary instrument for exploring and realizing her musical ideas.
Shane Newton aka Nimbus | Michael L. Palumbo aka Nexus
Open Source Intelligence: The Legal Do's and Don'ts of Digital ProfilingSynopsis
Privacy online has become a increasingly hard to maintain with such things like social networking sites, forum archiving and blog sites. These site entities which seem to work against online privacy has also become a gold mine for both elements within the criminal world, as well as within the Human Resource departments of many corporations. From those who dabble in the intelligence community, to the simple home ground private eye. Open Source Intelligence has become a invaluable Resource. In this talk we will discuss just who is looking at your online accounts and what kind of information they can use against you. We will cover several privacy issues which have rose from such sites of Facebook.com and Myspace.com.
Nexus has a Associates Degree in Computer Networking and is currently working toward his degree in Computer Forensics. Nexus has been a OSINT Enthusiast since 2006 and has given previous talks on Digital Profiling. Nexus is also one of the Co-Founder and active administrator of OhioHackers.com and is a avid member of the Youngstown 2600 as well as the Cleveland 2600.
Nimbus is a co-founder and administrator of OhioHackers.com as well as a founding member of the Nemesis Research Team. Over the past two years Nimbus has worked closely with Nexus on OSINT projects and information gathering and is currently working toward his degree in computer science.
Tabletop Game Design 101: Idea to RealitySynopsis
We all have our favorite types of games, be they RPG, table top, card, war, or miniature. Have you ever finished playing your favorite game and thought to yourself "That was fun, but I could have made this game and made it so much better."? Have you ever had an idea that you thought would make a great game but you've have no idea what it would take to make that game a reality? Mike is here to show you how to make that happen. Hanging out your own shingle in the gaming industry is easier than ever and there are countless resources available for those that want to successfully share their games with the world. A one hour presentation covering concepts of game design, current industry trends & examples, production techniques, and theories of running a successful game company in the modern market.
Mike is a master model maker, game designer, and part owner of both Armorcast LLC and Burning River Games. He pursued his undergraduate education at CWRU in the Weatherhead School of Management specializing in management IT and accounting. Having been a lifelong gaming and model building enthusiast he joined the gaming industry in 2007 when Armorcast was moved from California to Ohio. His professional education combined with years of experience and technical knowhow has given him a unique perspective on the hobby gaming industry when it comes to creating a quality product and successfully bringing it to market.
Hacking the Workplace: How to Make the Most with the LeastSynopsis
Until someone figures how to hack their way to Free Living (and no,
squatting at the parents does not count), we've all got bills to pay.
And to pay bills, you need money. And to get money, you need a job.
And a job means work... or does it? I've spent most of my educational
and working career working hard to avoid work. Yet I've never been
fired (well... except that one time), and I've managed to build a
whole lot more bridges than I've burned. Not only that, I've made more
money at each job than the last... and I've even been given raises.
What's my secret? Just the right of planning, persistence,
psychology... and perhaps a dash of psychopathy. In this talk, you'll
learn how to: look like you're a hard working, ambitious, model
employee; work like a lazy, under-zealous sloth; create and deliver
believable excuses; sneak hobby and playtime; fill all those long
hours; befriend the boss's boss; master performance reviews; and jump
ship before getting thrown overboard. Why climb the corporate ladder
when you can just take the elevator?
Alex Papadimoulis is the founder and editor of The Daily WTF, a
leading how-not to guide for developing software. Residing in Berea,
Ohio, he is a software engineer at Inedo and uses his 10+ years of IT
experience to help software development organizations utilize best
practices in their products through BuildMaster, a next-generation ALM
Art of AkiraSynopsis
Believe it or not, there was a time when animation was done without the use of computers. Strange, I know. And in a time of artwork reuse, cost-cutting and grist-for-the-mill animation production, one man - Katsuhiro Otomo - challenged the rules of both animation and film, despite having zero experience in either field. He started Akira knowing only one thing: how he wanted it done. And he changed the world forever.
No animation has ever matched the level of detail and craftsmanship of Akira. In this presentation, Joe Peacock, owner of the world's largest private collection of original Akira production art and cels, will show you how things were done back when doing things right meant doing them the hard way.
Joe has brought selections from his collection to share with Notacon to show those true do-it-yourselfers how doing things the hard way paid off.
Drew Curtis | Joe Peacock
You'll Get Over It: How NOT to Redesign FarkSynopsis
In 2007, Fark.com launched a redesign which, by all accounts, drastically modernized and improved much, if not all, of the site's usability and functionality. And it was universally hated, for reasons not all that unique to Fark. A cautionary tale about redesigning any website, but especially one with a huge community of established internet users -- and how we won't make the same mistake again.
Jon Peer | Jon Peer
Geocaching is a high-tech game of hide & seek wherein those that hide provide coordinates and
then those that find sign the log and trade swag. There are over 1.3 million caches present in the world
and over 5 million active users on the Geocaching.com website. Using either a GPS or Smart Phone, you
have the ability to download caches and set out for a day of fun and likely frustration in trying to find an
assortment of caches ranging in size. From no bigger than a fingernail to a full size ammocan and can be
made from just about anything with others looking like fence posts or even rocks to blend in with their
surroundings but they have one thing in common, a log book.
Jon holds a Master's degree in Information Technology and Business Administration from Kettering
University in Flint, MI. He currently works supporting the Service Management application at Anthelio
Healthcare Solutions and droning along writing Crystal Reports that no one is ever going to use.
Christina "Fabulous" Pei
Hacking the Classroom: How to Re-Make the Education SystemSynopsis
Public education in America consists generally of under-paid, over-worked teachers who are tasked with force-feeding students overwhelming amounts of information, perfectly regurgitated onto multiple-choice exams. State exams, for their part, are written by people who understand neither content nor students. Over the years, we have successfully created an education system that stifles creativity, stymies logical reasoning and stunts learning. This talk will be about hacking education as we hack anything else—breaking the existing system, fixing broken parts (tests, outdated formulas, teacher-centric classrooms), reconstructing the pieces conducive to learning (inquiry, manipulatives, the outdoors, the real world, use of tools), and finding an education that works for us, rather than against us. It will discuss multiple intelligences, why China always beats us in math (and it's not because Chinese parents are superior), who gets blamed for education, and other topics.
Christina "Fabulous" Pei is a Chicago-based educator who is actively hacking American education. She works with both students and teachers in several math education initiatives at the University of Chicago and its surrounding neighborhoods . She can also be found teaching kids how to pick locks at Maker Faires, promoting Tinkering School and Beam Camp, speaking and learning at hacker conferences, or building cool projects with high school students.
HDR and Panoramic PhotographySynopsis
Demonstrations on how create a workflow for creating HDR
images, panoramic images, and HDR panoramic images. Will discuss
open-source tools vs commercial tools. Also cover color profiles as
they apply to desktop, web, and print.
rltvty is really tall and has a big black couch.
Ed Quiggle, Jr.
The Bleeding Edge of NeurohackingSynopsis
I would like to give a talk on neurohacking and how it can
be done very cheap through open source DIY tech. Devices like EEGs,
Cranial Electrotherapy Stimulators, rTMS, sound and light/dream
machines, and transcranial pulsed ultrasound. Specifically I would
like to demonstrate how it is possible to turn a $50 toy into a
medical grade EEG sensors using an arduino, and how a Cranial
Electrotherapy Stimulator can be made for under $20 in parts.
Ed is interested in neuropharmacology, transcranial devices,
botany, medical devices, research chemicals. Currently the founder
and editor of the Neurohacker Quarterly
How I Finally Made My First VideogameSynopsis
This is a story about a boy who had a dream, who grew up and remembered the dream, and finally did something about it.
In 1981, the Atari 2600 inspired six year old me to become a videogame designer.
In 2010, I began to build, and in 2011 I expect to complete that very game… a game I designed when I was six.
Philosopher, poet, IT jack-of-all-trades, procrastinator extraordinaire, and as of 2010, indie game
Kaimen Searle | Justin Searle
The Ancient Sport of FalconrySynopsis
Come and experience a taste of the ancient art of falconry.
Explore the world of raptors, take in their lethal beauty, and hear of
the partnership that can be formed between man and beast. Learn the
process of identification, trapping, training, trusting, and hunting
with one of natures most efficient predators. Understand what is needed
to become a licensed falconer in your state and how you can begin your
own unforgettable journey in this time honored tradition.
Justin Searle is a Senior Security Analyst with InGuardians,
specializing in the penetration testing of web applications, networks,
and embedded devices, especially those pertaining to the Smart Grid.
Beyond computer security, Justin holds many interests and hobbies,
including his love for birds of prey and his experience in training them
to hunt. Kaimen Searle is his eight year old son and faithful sidekick.
Is Locksport a Sport?Synopsis
People learn to pick locks because it is deeply forbidden knowledge, like knowing about sex when you are in elementary school. The outside might read "I am interested in the technical aspects of physical security" but the inside says "I can steal your shit." Who cares if you have the keys to her heart if you can pick your way in, right? The essence of Locksport is that it is a hobby. Is it? Are we training a new generation of thieves? Or are we serving all of the platitudes that we all provide - reducing reliance on security by obscurity and whatnot. Let the Administrative Director of Locksport International give you his feedback, and we will see where we stand.
In 1992, Bill Sempf was working as a systems administrator for The Ohio State University under Sandy Wambold, and formalized his career-long association with internetworking. While working for one of the first ISPs in Columbus in 1995, he built the second major web-based shopping center, Americash Mall, using Cold Fusion and Oracle. Bill's focus started to turn to security around the turn of the century. Internet driven viruses were becoming the norm by this time, and applications were susceptible to attack like never before. In 2003, Bill wrote the security and Deployment chapters of the often-referenced Professional ASP.NET Web Services for Wrox, and began his career in pen testing and threat modeling with a web services analysis for the Ohio Department of Health. Currently, Bill is working as a security-minded software architect specializing in the Microsoft space. He has recently designed a global architecture for a telecommunications web portal, modeled threats for a global travel provider, and provided identity policy and governance for the State of Ohio. Additionally, he is actively publishing, with the C# 2010 All In One available now, and Programming Data (with Chris Sells) coming out next year.
History of ScanimateSynopsis
David Sieg has managed to coax useful computer animation from some of the slowest computers in
the world. The oldest of them, a machine called Scanimate was built entirely of analog circuitry!
For almost a decade, if you saw computer animation on television, it probably was generated by one
of the eight Scanimates that were ever built. Sieg owns and maintains the only surviving Scanimate.
Interestingly enough, Scanimate can easily do things that can't be duplicated by today's digital
Sieg produced "The Dream Machine", a documentary about Scanimate, its history, the people and companies who used it, including many of the famous animations it produced.
He raises questions about how quickly we trash our older technology, and what we lose along the way.
And he makes the case for preserving and maintaining the few remaining machines that can playback
obsolete media formats before we lose our past forever.
More info at scanimate.com.
Ran camera, loaded tape, shot newsfilm, and repaired transmitters at WKPT-TV in high school.
Chief Engineer at the University of Mississippi Center for Media Services while graduating.
Chief Engineer at Image West in Hollywood, where they had 2 Scanimates.
Director of R&D at Omnibus, built facilities at Paramount Studios in Hollywood and in NYC.
Partner at International Graphics Consultants, Burbank CA
Owner of ZFx in Kingsport, Tennessee
Started first ISP in Eastern Tennessee
Moved to Asheville, NC, currently consulting with a variety of clients.
More info at davesieg.com
Being a Puppet Master: Automating Amazon EC2 with Puppet & FriendsSynopsis
The benefits of cloud-computing (specifically IaaS) can be quickly outweighed by the time and effort that it takes to manage the quickly scalable hosts your company may be putting into service. Puppet, an open-source configuration management software package, allows for a more efficient and logical way to help you deploy and manage your new cloud resources. Mark will explain his experiences with utilizing Puppet, MCollective, The Foreman, and other software which can make a system administrator's life a whole lot easier in the cloud. Specific focus will be given to utilizing Puppet within Amazon Web Services as it pertains to Linux EC2 instances and related services. Even if you aren't involved in cloud-computing, come see what your company could be doing within your existing non-cloud infrastructure to help make provisioning and management of servers more streamlined and easy to handle.
Mark Stanislav holds his Bachelor's in Networking and IT Administration and is currently pursuing his Master's in Network Security -- both from Eastern Michigan University. Mark works for a Linux-centric managed services provider near Detroit during the day and teaches Linux courses at EMU by night. His passions are information security, systems administration, cloud computing orchestration, and web programming. In his spare time, Mark runs the information security news aggregation web site uncompiled.com.
It's Vulnerable… Now What?: Three Diverse Tales of Woe and RemediationSynopsis
Very few people in IT have the distinction of being considered a "security researcher" by title alone. Despite that designation, many of us run across security vulnerabilities every day and sometimes just go "ah, someone should report that!" rather than taking the initiative to wear the security researcher hat and handle it ourselves. In this presentation I will cover three diverse situations of vulnerabilities that I ran across and how I went about getting them remediated. Situations include: a PII/PHI vulnerability in a SaaS application with 90,000 affected users; an open-source CMS SQL injection vulnerability (CVE-2010-4006); and a client's web site that was riddled with vulnerability from a contractor's poor programming practices. If you've wondered what you as a system administrator, web developer, or general IT enthusiast should do in these kinds of situations, come hear real stories and learn from my actions and related mistakes! Learn about requesting a CVE, contacting vendors, 0-day vs. vendor-friendly disclosure, and more. The presentation will feature code snippets/exploitation of each vulnerability and include screenshots (where allowed) of the situations.
Mark Stanislav holds his Bachelor's in Networking and IT Administration and is currently pursuing his Master's in Network Security — both from Eastern Michigan University. Mark works for a Linux-centric managed services provider near Detroit during the day and teaches Linux courses at EMU by night. His passions are information security, systems administration, cloud computing orchestration, and web programming. In his spare time, Mark runs the information security news aggregation web site uncompiled.com.
Game on! Building an online hacker playground.Synopsis
Have you ever wanted to go all ‘Grand Theft Auto' on a
network? To brazenly scan and sploit everything in your path? But
you're too nice to unleash your hacker fury on the neighbor's wifi?
There is an answer to this conundrum. Come help build an online
playground where people can meet to pwn and be pwned.
Charlie Vedaa, CCIE #7502, is a fork-and-spoon operator for the
federal government. He is the founder of PacketProtector.org, a
security distro for wireless routers.
RANDOM NOTACON SHOUTOUT:
Audio Visual rentals provided by Rentech Solutions
© 2011 FTS Conventures | web2011 -at- notacon dot org
fax: 216-221-1409 | Contact Us