c3d2-web/content/static/datenspuren/2015/fahrplan/speakers.json

1 line
13 KiB
JSON

{"schedule_speakers":{"version":"v1.0","speakers":[{"id":3013,"image":"/system/people/avatars/000/003/013/medium/3307.png?1360200892","full_public_name":"_john","abstract":"C3D2 Hacker von Hard- und Software","description":"","links":[],"events":[{"id":7081,"guid":"6733848c-84b1-4aa2-af57-820cbc5687e7","title":"Einführung in SDR","logo":null,"type":"lecture"}]},{"id":5812,"image":"/system/people/avatars/000/005/812/medium/twts_400x400.jpg?1443612544","full_public_name":"ajuvo","abstract":"writer, downshifter, grey beard advisor, satisfied mind\r\nc-base member, podcaster, congress angel\r\nstartup facilitator, money and economics nerd\r\nMBA, scholar, scientist; secretary at dersender.org","description":"trying to make sense of things since the 1960ies.","links":[{"url":"damals-tm-podcast.de","title":"Damals (TM) Podcast"}],"events":[{"id":7084,"guid":"aeb963e9-e8ae-4888-8483-2063f4adaf3a","title":"Die verängstigte Macht","logo":null,"type":"lecture"}]},{"id":5735,"image":null,"full_public_name":"anna","abstract":"","description":"","links":[],"events":[{"id":7029,"guid":"50dc64ca-a648-486b-8b1d-a779e9d1bb51","title":"1,5 Jahre NSA-Untersuchungsausschuss: Rück- und Ausblick","logo":null,"type":"lecture"}]},{"id":5783,"image":null,"full_public_name":"Christopher Georgi","abstract":"Ich habe Lehramt in den Fächern Deutsch und Geschichte an der TU Dresden studiert und interessiere mich für Perl-Programmierung und die Problematik des \"sprachlichen Fingerabdrucks\". Daher habe ich meine Masterarbeit zum Themengebiet der Autorschaftsattribution verfasst und eine Methode genauer untersucht.","description":"","links":[],"events":[{"id":7066,"guid":"a1bec7b9-5485-4306-84f6-fd1a05dd18ec","title":"Buchstaben-n-Gramme in der Autorenattribution","logo":null,"type":"lecture"}]},{"id":4765,"image":null,"full_public_name":"datenkollektiv.net","abstract":"","description":"","links":[{"url":"https://www.datenkollektiv.net","title":"datenkollektiv.net"}],"events":[{"id":7071,"guid":"eb6379cd-4855-4cc3-918e-0282b6974a9c","title":"Nach der E-Mail","logo":null,"type":"workshop"},{"id":7072,"guid":"73429be3-35f7-41c9-a4dd-bb07a42ae8ea","title":"Gnupg in der Praxis","logo":null,"type":"workshop"}]},{"id":3963,"image":null,"full_public_name":"dvalar","abstract":"Pentester since 2001","description":"","links":[],"events":[{"id":7068,"guid":"fe8bd875-17b5-47d3-b4b0-62ddc2883ea9","title":"Märchenstunde IT-Security","logo":null,"type":"lecture"}]},{"id":5709,"image":null,"full_public_name":"Frank Brennecke","abstract":"Frank Brennecke is an expert in positioning systems and applications. He is also an expert for the upcoming eCall safety service in Europe. ","description":"Frank Brennecke founded his first company while studying Electrical Engineering at the University of Karlsruhe. During this time he also gained his first experience in training and mentoring student groups. Following his studies, he started his career in 1992 at CAS Software AG where he was initially responsible for the development of software products and for the management of several major projects. Later he was developing from a leadership position the personality development system of CAS. At the same time he worked additionally as associate professor at the Berufsakademie Karlsruhe.\r\nIn 2000 he took on the role of managing director of the newly founded MAP\u0026GUIDE GmbH, a spin-of from several departments of CAS Software AG and PTV AG. The areas under his responsibility were software development, product management and human resource development. The company staff grew within the time of his responsibility from 25 to 130 employees, while the company itself was very successful within the route planning and consumer navigation industry. The growth was mainly focused on Western Europe, later Europe as whole and finally in the Far-East and Asian markets.\r\n\r\nIn 2008 he started working as Account Manager for Industry and R\u0026D projects at OECON Products \u0026 GmbH, a company specialized on location and positioning systems. Since 2011, his main topic is the introduction and implementation of the upcoming eCall safety service in Europe.\r\n\r\nFrank is certified MBTI® Trainer focused on applying the instrument mainly for executive coaching for individuals at management positions, where he can make use of his experiences from staff and business management to offer targeted consulting and mentoring in the corporate management area. \r\n\r\nFrank's personal topics are history and politics. He operates a blog \"53cent.de\" dealing with internet democracy and electronics. ","links":[],"events":[{"id":6988,"guid":"2f310e0b-0c95-415b-a016-0d2a526cea25","title":"eCall - Lebensretter oder Datenwanze im Auto?","logo":null,"type":"lecture"}]},{"id":4168,"image":"/system/people/avatars/000/004/168/medium/josch_logo.png?1385248665","full_public_name":"josch","abstract":"Sprachwissenschaftler an der TU Dresden. Bloggt über linguistische Methoden des politisch motivierten Internetmonitorings. CCC-Mitglied. C3D2.","description":"Linguist at TU Dresden. Blogging about surveillance through language.\r\n\"Your worst enemy, he reflected, was your nervous system. At any moment the tension inside you was liable to translate itself into some visible symptom.\" (Orwell, 1984, Book 1, 6 )","links":[{"url":"http://security-informatics.de","title":"Blog"},{"url":"http://www.scharloth.com","title":"Website"}],"events":[{"id":7083,"guid":"619c0d60-3839-4082-b497-01eb3206fb2e","title":"Die Grenzen des Geheimen","logo":null,"type":"podium"}]},{"id":3806,"image":"/system/people/avatars/000/003/806/medium/zyx013.jpg?1395752105","full_public_name":"kusanowsky","abstract":"Soziologe","description":"soziologische Beobachtungen des Internets","links":[{"url":"http://www.differentia.wordpress.com","title":"Differentia"}],"events":[{"id":7000,"guid":"b3692b9a-e9bc-439f-aa7c-eff69d0fafdb","title":"Wir kochen Hagebuttenmarmelade","logo":null,"type":"lecture"}]},{"id":3549,"image":"/system/people/avatars/000/003/549/medium/3797.jpg?1360201033","full_public_name":"linusneumannDS","abstract":"Zusammen mit Tim Pritlove macht Linus den wöchentlichen Podcast Logbuch:Netzpolitik und schreibt mit Markus Beckedahl und vielen anderen regelmäßig bei netzpolitik.org.\r\nEr ist Inhaber größtenteils stiller Mitgliedschaften im CCCB der Digitalen Gesellschaft.\r\nBeruflich setzt er sich mit IT-Security auseinander.","description":"... podcastet zusammen mit Tim Pritlove im wöchentlichen Logbuch:Netzpolitik und bloggt bei netzpolitik.org.\r\n... ist stilles Mitglied der Digitalen Gesellschaft e.V und des CCC.","links":[],"events":[{"id":7124,"guid":"d4b2f5e6-417f-454c-981e-df75465d956d","title":"Keynote","logo":null,"type":"lecture"}]},{"id":4616,"image":null,"full_public_name":"Martin Christian","abstract":"Herr Christian hat einen langjährigen Hintergrund in der (Hardware nahen) Software Entwicklung. Seit einigen Jahren auch im Bereich IT-Sicherheit.","description":"","links":[],"events":[{"id":7125,"guid":"219a3289-d990-43be-9e35-5fb0322aca0b","title":"Eröffnung","logo":null,"type":"lecture"}]},{"id":5815,"image":null,"full_public_name":"Mat","abstract":"Graduate slacker who should probably be working in a coffee shop.","description":"I definitely write words and sentences better than code. But I'm curious. \r\n\r\nSubverting a system of mass surveillance means subverting a much larger system of economic processes. Which is pretty hard although not impossible. \r\n\r\n\u003ch3\u003eStuff\u003c/h3\u003e\r\n\u003ca href=\"https://voicerepublic.com/talks/big-data-and-pre-crime-science-non-fiction\"\u003ere:publica talk\u003c/a\u003e and \u003ca href=\"https://re-publica.de/session/big-data-and-pre-crime-science-non-fiction\"\u003ethe blurb\u003c/a\u003e\u003cbr\u003e\r\n\u003ca href=\"https://twitter.com/mtsyrr\"\u003eTwitter\u003c/a\u003e\u003cbr\u003e\r\n\u003ca href=\"http://mtsyr.tumblr.com/\"\u003eAn old blog\u003c/a\u003e\r\n","links":[],"events":[{"id":7088,"guid":"f3633525-7973-4c58-83ea-e06a8562bed5","title":"Can we stop being liberals now?","logo":null,"type":"lecture"}]},{"id":5807,"image":null,"full_public_name":"Mic92","abstract":"Opensource hacker","description":"","links":[],"events":[{"id":7078,"guid":"8aa72806-9129-4494-ba1c-5ddc3fd5504b","title":"Webscraping Workshop","logo":null,"type":"workshop"}]},{"id":5818,"image":null,"full_public_name":"Pascal Brückner","abstract":"Wissenschaftlicher Mitarbeiter\r\nLehrstuhl für Datenschutz und Datensicherheit\r\nTU Dresden","description":"","links":[],"events":[{"id":7094,"guid":"e3ca5a6f-e9f0-4bd2-8cc6-8ddebfb4b761","title":"HoneySens","logo":null,"type":"lecture"}]},{"id":4771,"image":"/system/people/avatars/000/004/771/medium/Me.jpg?1441099983","full_public_name":"Paul","abstract":"Ingenieur, Data Scientist, Mapmaker und Skeptiker","description":"","links":[{"url":"http://cbcity.de","title":"Blog"}],"events":[{"id":7085,"guid":"0fd9f541-1698-4e24-a7e4-ab7195d21a05","title":"Rise of the Machines: Sie beginnen zu lernen.","logo":"/system/events/logos/000/007/085/medium/plot_mean_shift_0011.png?1441133418","type":"lecture"}]},{"id":5777,"image":null,"full_public_name":"pilpul","abstract":"","description":"","links":[],"events":[{"id":7060,"guid":"f05636d5-db57-472e-9277-47e6890a5b20","title":"Predictive Policing","logo":null,"type":"lecture"}]},{"id":4689,"image":null,"full_public_name":"polygon","abstract":"","description":"","links":[],"events":[{"id":7081,"guid":"6733848c-84b1-4aa2-af57-820cbc5687e7","title":"Einführung in SDR","logo":null,"type":"lecture"}]},{"id":5759,"image":null,"full_public_name":"Rabbit@Net","abstract":"","description":"","links":[],"events":[{"id":7047,"guid":"abef1838-6353-4013-bb99-6c23630742e2","title":"Fenster einschlagen für Dummys","logo":null,"type":"lecture"}]},{"id":5782,"image":null,"full_public_name":"reinhard","abstract":"Voluntarily working for CAcert Inc.\r\nworking in highly skilled IT environments since 1985\r\ninterested in protection of privacy, confidentiality of electronic messaging, security in IT environments as a process","description":"","links":[{"url":"https://wiki.cacert.org/ReinhardMutz","title":"Homepage at CAcert"}],"events":[{"id":7067,"guid":"7c933d1d-6a52-48ac-9417-601e529bcddc","title":"Smartcards","logo":null,"type":"lecture"}]},{"id":5814,"image":null,"full_public_name":"Robert Bonča","abstract":"51 Jahre alter, (Ex?-) Punk, Lebenskünstler, IT-Spezialist und Organisationsanarchist - politisch seit \"Stoppt-Strauss\", Antiatom und dem Protest gegen die Volkszählung 1987 aktiv. ","description":"","links":[],"events":[{"id":7087,"guid":"308b58d7-9b90-4afa-a044-b7fb025a2cd9","title":"Mikrocontrollerbasiertes, mobiles Device zur sicheren Verschlüsselung von Textnachrichten","logo":null,"type":"lecture"}]},{"id":5822,"image":null,"full_public_name":"Sirkka Freigang","abstract":"Sirkka Freigang ist Doktorandin an der TU-Dresden am Fachbereich Bildungstechnologie (Institut für Berufspädagogik der Fakultät für Erziehungswissenschaften). Ziel der Dissertation ist es, das \"Internet der Dinge\" auf den Bildungskontext anzuwenden. ","description":"Sirkka Freigang ist Stipendiatin des sächsischen Landesstipendiums und arbeitet parallel für das Institut für Informatik der AutoUni (ein Unternehmen im Volkswagen Konzern). Dort koordiniert sie eine Arbeitsgruppe zum Themenfeld \"Future Workplace\". \r\n\r\nTitel der Dissertation: Gestaltung intelligenter \u0026 hybrider Lern- und Arbeitsräume durch Anwendung des „Internet der Dinge“ auf Lehr- und Lernprozesse - Entwicklung eines pädagogisch fundierten (Raum-) Konzeptes auf Grundlage eines interdisziplinären Diskurses.\r\n\r\nDas interdisziplinäre Promotionsvorhaben ist an der Schnittstelle zwischen Pädagogik, Informationstechnik und Architektur angesiedelt und beschäftigt sich mit der Erforschung neuer Lernräume durch Anwendung des „Internet der Dinge“ auf formale und informelle Lernarrangements. Folgende Ziele hat die Studie: 1. Untersuchung aktueller Bedürfnisse von Lernenden (Wissensarbeitern) 2. Aufbauend auf den Bedürfnissen, werden Funktionalitäten und Möglichkeiten des „Internet der Dinge“ erforscht und dokumentiert, die einen positiven Effekt auf Lernprozesse haben. 3. Eine Ableitung von Handlungsempfehlungen zur Gestaltung intelligenter und hybrider Lernräume. ","links":[{"url":"https://sirkkafreigang.wordpress.com/","title":"BLOG: Sirkka Freigang über das Internet der Dinge \u0026 vernetzte Wissenswelten"}],"events":[{"id":7097,"guid":"d91ae12c-2f65-461b-8a49-3688fa763558","title":"Das Internet der Dinge im Bildungskontext","logo":"/system/events/logos/000/007/097/medium/Bild1.png?1441621340","type":"workshop"}]},{"id":5698,"image":null,"full_public_name":"Stephan Thamm","abstract":"","description":"","links":[],"events":[{"id":7010,"guid":"fc340e4c-172a-44fb-97de-4fe29e34600f","title":"WebRTC Security","logo":null,"type":"lecture"}]},{"id":5792,"image":null,"full_public_name":"t3sserakt","abstract":"Worried citizen, IT Consultant, Entrepreneur and in a former life theoretial physicist.","description":"","links":[],"events":[{"id":7069,"guid":"34ff5c71-6829-4415-8ab4-d94dfb9ac15c","title":"EDN - Echt Dezentrales Netzwerk","logo":null,"type":"lecture"}]},{"id":4652,"image":"/system/people/avatars/000/004/652/medium/passfotorescale.jpg?1404775139","full_public_name":"Tesla42","abstract":"","description":"","links":[{"url":"https://chaoschemnitz.de","title":"ChCh"}],"events":[{"id":7082,"guid":"07ac21a9-1b95-42f3-9154-e795e4ba29e2","title":"Sicherer Kontaktdatenaustausch mit Sm@rtRNS","logo":null,"type":"lecture"}]}]}}