sather-gate-events-header.jpg

Dean's Lectures

Upcoming Events

Hany Farid
Sep 5, 2017, 3:40 pm to 5:00 pm
Online platforms today are being used in deplorably diverse ways. How can technology companies allow the free flow of ideas while reining in abuses?
Josh Lauer
Oct 11, 2017, 4:10 pm to 5:30 pm
The untold history of our modern credit scoring system and how it emerged from a 19th-century surveillance infrastructure with huge archives of personal information.

Previous Events

Tarleton Gillespie
Apr 19, 2017, 4:10 pm to 5:30 pm
How should social media police inappropriate speech and anti-social behavior?
fb-f-logo_blue_1024.png
Apr 12, 2017, 4:10 pm to 5:30 pm
Insight from data science director Danny Ferrante and user research manager Umer Farooq.
Nithya Sambasivan
Apr 12, 2017, 4:10 pm to 5:30 pm
As technology finds new users in developing countries, alternative interactions emerge that challenge our design assumptions. Nithya Sambasivan presents her research on designing for human collectives in developing countries, with examples from her prior work in India.
Sauvik Das
Apr 5, 2017, 4:10 pm to 5:30 pm
In the era of pervasive, connected smart things, cybersecurity depends on the complex social consequences of our security behaviors.
Wendy Ju
Mar 15, 2017, 4:10 pm to 5:30 pm
The advent of autonomous vehicles is exciting and alarming. Their success will depend on the driver-vehicle interaction.
post-and-trauma.jpg
Feb 15, 2017, 4:10 pm to 5:30 pm
How can online social media communities support and empower victims of sexual violence?
Satish Ramachandran
Jan 18, 2017, 4:10 pm to 5:30 pm
Satish Ramachandran is the global head of design at Nutanix, where he applies design to reimagine enterprise computing.
Ryan Freitas
Nov 16, 2016, 4:10 pm to 5:30 pm
Ryan Freitas is the director of product design for news feeds at Facebook.
Sandeep Bhadra
Oct 5, 2016, 4:10 pm to 5:30 pm
Sandeep Bhadra is a venture capitalist at Menlo Ventures. His talk will describe what venture capital firms look for in potential investment candidates, and ‘long-term greedy’ strategies for founders when raising capital
Jeff Jonas
Sep 14, 2016, 4:10 pm to 5:30 pm
Jeff Jonas is an acclaimed data scientist who thrives on solving some of the world’s most complex business challenges.
gender-inclusive-internet-3.png
Apr 27, 2016, 4:10 pm to 5:30 pm
From Gamergate to revenge porn, cyberharassment and abuse disproportionately target women — often with devastating consequences. Join this expert panel to discuss how we can make a meaningful contribution to a gender-equal internet.
 Christian Marc Schmidt
Mar 30, 2016, 4:10 pm to 5:30 pm
Christian Marc Schmidt is principal and founder of Schema, a creative design and technology studio focused on the intersection of interaction design and data visualization.
Andreas Constantinou
Mar 9, 2016, 4:10 pm to 5:30 pm
Digital companies from Amazon to Xiaomi are launching products that break industry boundaries. Andreas Constantinou of VisionMobile explains how.
nicole-wong-greg-nelson_0.png
Feb 24, 2016, 4:10 pm to 5:30 pm
An inside perspective from two former members of President Obama’s White House team about how tech policy and presidential priorities intersect.
Rebecca MacKinnon
Feb 17, 2016, 4:10 pm to 5:30 pm
Rebecca MacKinnon is a leading advocate for Internet users’ rights to online freedom of expression and privacy around the world.
Katie Shilton
Oct 14, 2015, 4:10 pm to 5:30 pm
Katie Shilton is an assistant professor at the University of Maryland whose research explores ethics in mobile application development.
Jeremy Birnholz
Sep 16, 2015, 4:10 pm to 5:30 pm
How do GPS & location-sensitive mobile apps affect anonymous online interactions?
Gert Lanckriet
Apr 8, 2015, 4:10 pm to 5:30 pm
With millions of songs available through the Internet, recommendation algorithms are a must. Dr. Gert Lanckriet discusses the state of the art in automated music analysis and the potential for context-aware recommendations.
Cynthia Dwork
Feb 4, 2015, 4:10 pm to 5:30 pm
“Your data will only be used in aggregated form.” — what does this statement mean, and why is it so often included in privacy policies? And does this practice actually protect your privacy?

Pages