c3d2-web/www/datenspuren/2016/fahrplan/speakers.json

1 line
14 KiB
JSON

{"schedule_speakers":{"version":"0.6","speakers":[{"id":4025,"image":"/system/people/avatars/000/004/025/large/GO.jpg?1377854699","full_public_name":"ALH","public_name":"ALH","abstract":"","description":"","links":[],"events":[{"id":7784,"guid":"1a0a6a8a-90e7-4bbe-b103-9df88c1dd271","title":"Rumble","logo":null,"type":"lecture"}]},{"id":6618,"image":"/system/people/avatars/000/006/618/large/ansi2.jpg?1472232470","full_public_name":"Ansgar (Ansi) Schmidt","public_name":"Ansgar (Ansi) Schmidt","abstract":"","description":"","links":[],"events":[{"id":7790,"guid":"d57050ca-b0b3-4d32-9fa4-5ba2e475dc4b","title":"Mexican Strawberry","logo":null,"type":"lecture"}]},{"id":6691,"image":"/system/people/avatars/000/006/691/large/md.png?1473017630","full_public_name":"Axel Huebl","public_name":"Axel Huebl","abstract":"Axel is a computational physicist and PhD student. He enjoys modelling the complex world around him via formulas and algorithms, preferably when those are only solvable via high performance computing.","description":"Year long open-source advocate, project maintainer and programmer with a weird fetish for restoring old, unmaintained, broken FOSS software at night time. Admittedly loves many-core architectures and queuing well-picked jobs into TOP10 supercomputers.\r\n\r\nLast but not least: opinions expressed are my own and do not necessarily represent the views of my employer/company/university/lab/thirdy-party-funding-source/fellow-physicists/neighbour. Random example: \"Why the $?*% is there still Fortran in HPC?!\"","links":[{"url":"https://github.com/ax3l","title":"GitHub"},{"url":"https://keybase.io/ax3l","title":"keybase.io"}],"events":[{"id":7839,"guid":"dd3cbbf6-b5de-4efe-9704-16e4a01ff5b5","title":"The Supercomputer in Front of You","logo":null,"type":"lecture"}]},{"id":6626,"image":"/system/people/avatars/000/006/626/large/3mtVLuqY.png?1472483775","full_public_name":"Bündnis Privatsphäre Leipzig","public_name":"Bündnis Privatsphäre Leipzig","abstract":"Das Bündnis Privatsphäre Leipzig ist eine überparteiliche Bürgerinitiative mit dem Ziel, Überwachung, Rechtsstaatlichkeit \u0026 Demokratie zu thematisieren.","description":"","links":[{"url":"https://privatsphaere-leipzig.org/","title":"Homepage"}],"events":[{"id":7795,"guid":"f3975e63-9760-479a-8765-a678f188581d","title":"Vernetzes Utopia","logo":"/system/events/logos/000/007/795/large/3mtVLuqY.png?1472483918","type":"lecture"}]},{"id":1696,"image":null,"full_public_name":"Daniel Gultsch","public_name":"Daniel Gultsch","abstract":"","description":"","links":[],"events":[{"id":7783,"guid":"d9b6af5a-3215-4dc7-8fc5-071c5f6f568e","title":"Beenden wir den Krieg der Instant Messenger","logo":"/system/events/logos/000/007/783/large/2000px-XMPP_logo.svg.png?1472039044","type":"lecture"}]},{"id":4758,"image":null,"full_public_name":"Emploi","public_name":"Emploi","abstract":"Aktivist für Freifunk u.v.a.S.m.","description":"","links":[],"events":[{"id":7786,"guid":"358de089-dfce-420b-96a4-3523d0b1c303","title":"Freifunk Stand","logo":"/system/events/logos/000/007/786/large/Freifunk_Logo_GRo.png?1471941652","type":"other"}]},{"id":6677,"image":"/system/people/avatars/000/006/677/large/IMG_6684_klein.JPG?1472973368","full_public_name":"Felix Just","public_name":"Felix Just","abstract":"@xHain_hackspace-Betreiber, Kommunalpolitiker, Papa, Technikbegeisterter, Feminist, leidenschaftlicher aber anspruchsvoller Cafétrinker, Optimist","description":"","links":[{"url":"twitter.com/Samwise007","title":"Twitter"},{"url":"http://x-hain.de","title":"xHain hack+makespace"}],"events":[{"id":7829,"guid":"16d2170d-140d-4551-9119-328f12f60668","title":"Wie gründe ich einen Hackspace?","logo":"/system/events/logos/000/007/829/large/xHain_logo3_rev2.png?1472973580","type":"lecture"}]},{"id":6608,"image":"/system/people/avatars/000/006/608/large/Gr._PIQUE.jpg?1473414732","full_public_name":"Gr. PIQUE","public_name":"Gr. PIQUE","abstract":"ARTIST","description":"","links":[],"events":[{"id":7780,"guid":"33a6f6ce-acb9-4994-8555-24544d455273","title":"POET, ARE YOU REALLY THERE?","logo":"/system/events/logos/000/007/780/large/Filmstill_-_Gr_PIQUE.jpg?1471696400","type":"film"}]},{"id":6573,"image":"/system/people/avatars/000/006/573/large/isabel.jpg?1469092267","full_public_name":"Isabel Drost-Fromm","public_name":"Isabel Drost-Fromm","abstract":"Isabel Drost-Fromm is (board) member of the Apache Software Foundation, co-founder of Apache Mahout and mentored several incubating projects. Interested in all things search and text mining with a decent machine learning background she is working for Elasticsearch as Software developer. True to the nature of people living in Berlin she loves having friends fly in for a brief visit - as a result she co-founded and is still one of the creative heads behind Berlin Buzzwords, a tech conference on all things search, scale and storage. Beyond and above all that Isabel is mom of a little geekling since April 2014.","description":"","links":[{"url":"http://blog.isabel-drost-fromm.de","title":"Private blog"}],"events":[{"id":7743,"guid":"a2b6f791-85e5-4aac-9c9b-deca09d5f801","title":"Open source is just about the source, isn't it?","logo":null,"type":"lecture"},{"id":7745,"guid":"96de15c5-a017-4fb6-a3a0-09cdf8addd09","title":"Make your tests fail","logo":null,"type":"lecture"}]},{"id":6696,"image":null,"full_public_name":"Julia Meyer","public_name":"Julia Meyer","abstract":"Literatur- und Kulturwissenschaftlerin\r\nFachreferentin Germanistik an der SLUB Dresden\r\nGeschäftsstelle Landesdigitalisierungprogramm Sachsen","description":"","links":[],"events":[{"id":7846,"guid":"f29ea583-a2df-438d-8de2-9ad5157b6c83","title":"SLUB schwer vernetzt","logo":"/system/events/logos/000/007/846/large/Logo-SLUB_Gesch%C3%A4ftsbrief.jpg?1473076761","type":"workshop"}]},{"id":6585,"image":null,"full_public_name":"Kolossos","public_name":"Kolossos","abstract":"Langjährig Mitwirkender an OpenStreetMap und Wikipedia. \r\nBeruf: Testingenieur. ","description":"","links":[],"events":[{"id":7761,"guid":"2cf17a2b-cfc5-4782-a1eb-91656d073b04","title":"Datenspuren der Energiewende","logo":null,"type":"lecture"}]},{"id":6596,"image":null,"full_public_name":"LK","public_name":"LK","abstract":"Referent beim Sächsischen Datenschutzbeauftragten","description":"","links":[],"events":[{"id":7773,"guid":"7760f7e8-bc7b-4194-a61b-15c50007198a","title":"Das Standard-Datenschutzmodell","logo":"/system/events/logos/000/007/773/large/Logo.JPG?1470988250","type":"lecture"},{"id":7774,"guid":"30e19326-230c-42ca-b2f6-18c9450a500b","title":"Workshop: Ein datensparsamer Browser für alle? Sinnvoll?","logo":null,"type":"workshop"}]},{"id":4616,"image":null,"full_public_name":"Martin Christian","public_name":"Martin Christian","abstract":"Herr Christian hat einen langjährigen Hintergrund in der (Hardware nahen) Software Entwicklung. Seit einigen Jahren auch im Bereich IT-Sicherheit.","description":"","links":[],"events":[{"id":7872,"guid":"5aacb1d3-6507-468b-997e-f09919f8bd5f","title":"Eröffnung","logo":null,"type":"lecture"}]},{"id":4239,"image":"/system/people/avatars/000/004/239/large/guyfalkes-400px.png?1439033316","full_public_name":"Michael Schloh von Bennewitz","public_name":"Michael Schloh von Bennewitz","abstract":"\u003cp\u003eMichael is a computer scientist sharing embedded computing ideas, teaching connected device workshops, and putting his skills and current research of mobile technology to use in experiments with other CCC enthusiasts.\u003c/p\u003e","description":"\u003cp\u003eMichael Schloh von Bennewitz is a computer scientist specializing in network software, mobile computing, and client server design. Responsible for development of network software and maintanance of packages in community MeeGo and Tizen software repositories, Michael actively nourishes the Opensource development ecosystem.\u003c/p\u003e\r\n\r\n\u003cp\u003eFluent in four languages, he speaks at technical events every year. He has lectured for companies and at events by groups including Cable \u0026 Wireless, Nokia, the Linux Foundation, Opensource Treffen, and Mobile World Congress. Michael's speaking style is humerous, using gestures and good eye contact. He walks about the room and writes presentations in SVG or HTML5.\u003c/p\u003e\r\n\r\n\u003cp\u003eAdditional information is found at \u003ca href='http://michael.schloh.com/'\u003emichael.schloh.com\u003c/a\u003e\u003c/p\u003e","links":[{"url":"http://michael.schloh.com/","title":"Homepage"},{"url":"http://scm.europalab.com/","title":"Source Repository"}],"events":[{"id":7856,"guid":"c7d5e7f6-2da0-4c1a-bb72-fbaa4019b8eb","title":"Embedded network development","logo":"/system/events/logos/000/007/856/large/europalabsquare.png?1476716964","type":"workshop"}]},{"id":6631,"image":null,"full_public_name":"Rudolf","public_name":"Rudolf","abstract":"","description":"","links":[],"events":[{"id":7810,"guid":"f686a55d-3ef9-4fff-ac67-fc2841f050f1","title":"Capture the flag","logo":null,"type":"other"}]},{"id":5735,"image":null,"full_public_name":"anna","public_name":"anna","abstract":"Schreibt bei netzpolitik.org zu Datenschutz, Überwachung und allem möglichen, was die Öffentlichkeit nicht wissen soll, aber sollte.","description":"","links":[{"url":"https://netzpolitik.org/author/anna/","title":"anna bei netzpolitik.org"}],"events":[{"id":7797,"guid":"21141199-d313-4a9f-83b0-e81089a07fee","title":"Geheimdienste außer Kontrolle","logo":null,"type":"lecture"}]},{"id":5711,"image":"/system/people/avatars/000/005/711/large/ace_of_spades_tattoo.jpg?1435316931","full_public_name":"eri!","public_name":"eri!","abstract":"","description":"","links":[],"events":[{"id":7782,"guid":"3dfbe555-2bbf-471e-9d6f-24fb7990030f","title":"Lightning Talks","logo":"/system/events/logos/000/007/782/large/LightningTalks.png?1471725564","type":"lightning_talk"}]},{"id":3926,"image":"/system/people/avatars/000/003/926/large/frab_icon.png?1410553053","full_public_name":"herr_flupke","public_name":"herr_flupke","abstract":"herr flupke erklärt Maschinen die Menschen und Menschen die Maschinen. Er beschäftigt sich mit Infrastruktur, Privatsphäre, Sicherheit und Ethik.","description":"avatar by \u003ca href=\"https://secure.flickr.com/photos/maltman23/9054184157/in/set-72157634148693133\"\u003emaltman23\u003c/a\u003e, \u003ca href=\"https://creativecommons.org/licenses/by-sa/2.0/\"\u003ecreative commons: by-sa 2.0\u003c/a\u003e","links":[],"events":[{"id":7781,"guid":"40db7b74-c47b-4318-9c23-7f2bff199b85","title":"the smart city - we put a chip in it","logo":null,"type":"lecture"},{"id":7802,"guid":"569ba505-bb6b-4058-9f1a-874a18a797c1","title":"einmal Internet mit Zwiebeln bitte","logo":null,"type":"workshop"},{"id":7803,"guid":"412fa749-23a1-4c8c-be09-74df288b3b4b","title":"Kein Bock auf Herzbluten, Pudel und Ertrinken","logo":null,"type":"workshop"}]},{"id":4168,"image":"/system/people/avatars/000/004/168/large/josch_logo.png?1385248665","full_public_name":"josch","public_name":"josch","abstract":"Sprachwissenschaftler an der TU Dresden. Bloggt über linguistische Methoden des politisch motivierten Internetmonitorings. CCC-Mitglied. C3D2.","description":"Linguist at TU Dresden. Blogging about surveillance through language.\r\n\"Your worst enemy, he reflected, was your nervous system. At any moment the tension inside you was liable to translate itself into some visible symptom.\" (Orwell, 1984, Book 1, 6 )","links":[{"url":"http://security-informatics.de","title":"Blog"},{"url":"http://www.scharloth.com","title":"Website"}],"events":[{"id":7826,"guid":"7fce6519-ba9f-4a3a-905d-5a3621b8e807","title":"Grundwortschatz Deutsch in computerlinguistischer Perspektive","logo":null,"type":"lecture"},{"id":7878,"guid":"84e9ccad-5efe-49ac-b117-b382ae6fac1f","title":"Public Shaming: Online-Pranger oder Ermächtigung der Subalternen?","logo":null,"type":"podium"}]},{"id":6727,"image":null,"full_public_name":"michael.anz@dresden.de","public_name":"michael.anz@dresden.de","abstract":"","description":"","links":[],"events":[{"id":7862,"guid":"bce0437f-0cf3-4d3d-ba32-2f1d29cd2516","title":"Open Data Crunch (E)","logo":null,"type":"workshop"},{"id":7863,"guid":"36c64823-02d8-4039-9899-e760886efcd9","title":"Open Data Crunch (A)","logo":null,"type":"lecture"}]},{"id":6544,"image":null,"full_public_name":"nac","public_name":"nac","abstract":"nac ist ein (meist) lieber netter Mensch aus dem c3d2.","description":"","links":[],"events":[{"id":7848,"guid":"366b2903-0aec-4832-bec6-bde380e1a4cc","title":"Linux Presentation Day","logo":"/system/events/logos/000/007/848/large/logo.png?1473082068","type":"other"},{"id":7849,"guid":"d3a35192-8d13-45f6-b74c-cbaab44520f6","title":"Pädagogik \u0026 Technik","logo":null,"type":"workshop"},{"id":7850,"guid":"f97830db-1b51-420a-91f0-b713fa9571ec","title":"Linux-Presentation-Day","logo":"/system/events/logos/000/007/850/large/tux_klatsche-185x300.jpeg?1473082015","type":"workshop"}]},{"id":5782,"image":null,"full_public_name":"reinhard","public_name":"reinhard","abstract":"Voluntarily working for someCA\r\nworking in highly skilled IT environments since 1985\r\ninterested in protection of privacy, confidentiality of electronic messaging, security in IT environments as a process","description":"","links":[],"events":[{"id":7838,"guid":"2f2731f5-b471-4412-906d-1e08f7ed0ee1","title":"Aufbau einer internen Public Key Infrastructure (PKI)","logo":null,"type":"workshop"}]},{"id":6545,"image":null,"full_public_name":"schmittlauch","public_name":"schmittlauch","abstract":"","description":"","links":[],"events":[{"id":7724,"guid":"103a1861-bcee-4d74-b5dc-c75ae68f4069","title":"Obai Brause selbst mixen 1","logo":null,"type":"workshop"}]},{"id":6599,"image":null,"full_public_name":"t3sserakt","public_name":"t3sserakt","abstract":"","description":"","links":[],"events":[{"id":7775,"guid":"40f28d4c-6f37-4950-9ad9-0e8cef9dd769","title":"Secushare","logo":null,"type":"lecture"}]},{"id":6633,"image":null,"full_public_name":"wose","public_name":"wose","abstract":"","description":"","links":[],"events":[{"id":7840,"guid":"e6edf7c1-007f-477b-811f-8f24e70ded87","title":"\"Do we have an image enhancer that can bit map?\"","logo":null,"type":"lecture"}]},{"id":6593,"image":null,"full_public_name":"zzwonge","public_name":"zzwonge","abstract":"","description":"","links":[],"events":[{"id":7770,"guid":"58f449a1-7b3e-415e-9906-0a2f81859eaf","title":"roomYou","logo":"/system/events/logos/000/007/770/large/roomYou_logo.PNG?1470695012","type":"other"}]}]}}