Computing Science Peter Achten.

Slides:



Advertisements
Similar presentations
Master track Computer security: studying at the Kerckhoffs Institute Lejla Batina Digital Security Group Institute for Computing and Information Sciences.
Advertisements

Computer Science –Invent the Future–
Eastern Mediterranean University Faculty of Engineering Wellcomes you to the Opening of the 5th Int. Conf. on Soft Computing, Computing with Words and.
Computer Jobs 2013 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
Engineering Design Process
Additional Materials1 Other Languages C and C++: Languages used by Systems Programmers. Heavy use by Computer Scientists. COBOL: An ancient Business oriented.
Computer Jobs 2014 Bob Nielson. Average Wage The average wages of all jobs in America >>>> $45,790 > $80,180.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
© UNT in partnership with TEA1 7 th Grade Career Exploration Module Career Focus: Computer Software Engineer.
Master Track in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
Master Programmes Computing Science & Information Sciences Perry Groot March 2015.
Dr. Karl Abrahamson, Department Chair Dr. Amy Shannon, Academic Advisor.
What is Information Systems (IS)? Information systems (IS) consist of networks of hardware and software, people, and telecommunications that organizations.
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
Perspectives on Cyberinfrastructure Daniel E. Atkins Professor, University of Michigan School of Information & Dept. of EECS October 2002.
Features from Google+ Lots of fields – very broadly important Ubiquitous – affects everybody Security and Privacy Recommender systems scarily accurate.
Introductions Your turn! Introduce yourself (give 4 points about your career to-date). Do you have previous experience of visiting a school/volunteering?
Blender Lesson 1. How to download blender to your computer. S:\Westlake\Students\sslade Download blender to the desktop. You will probably have to download.
A Pecha-Kucha presentation by Jarrad Reddick CCDC.
10th WATCH: Barriers to the Science of Security Tom Longstaff National Security Agency John Hopkins University THURSDAY March 15, Noon, Room 110 W ashington.
Computing Science & Information Sciences Erik Poll November 2015.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
INTRODUCTION TO COMPUTER ENGINEERING (ECE 001) Dr. Ahmed Bayoumi Dr. Shady Yehia Elmashad 1.
Careers in SciVis Guilford County SciVis V
Hudl Software to help Coaches and Athletes improve.
Master Specialisation in Computing Science Computer security Erik Poll Digital Security Group Institute for Computing and Information Sciences (ICIS)
Arts & Music Type : Image. Business Type : Image.
Arts & Music Type : Image. Business Type : Image.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
Computer Graphics Lecture 2. Computer graphics application 1- Graphics and chart :- Early application for graphics display simple data graphic, but today.
Computing Science & Information Sciences Erik Poll March 2016.
Contact Pathways Resource Center:
Welcome GE Igniting Minds!
Master Specialisation in Cyber security
Computing Science & Information Science Master programmes in
Master Specialisation in Cyber security
Introduction To Computer Engineering (ECE 001)
INF 103 MART Successful Learning/inf103mart.com
Project Selection Workshop
Master Information Sciences
General approach of composing and running ICT curricula in Estonia
Rocky K. C. Chang September 4, 2017
Recommendations for 2017 & May 2017
Master Information Sciences
Career JEOPARDY! Cluster: Information Technology
Lecturer: Dalia Mirghani
The road ahead This class is only the beginning.
Prof. Yrjö Neuvo Chairman of the Aalto DigimPlatform
Department of Computer Science Edo University Iyamho
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
An ICT role in key sectors of development of society.
SMART CITIES Fall Semester 2016, ETH Zürich Gerhard Schmitt
Guilford County SciVis V102.03
What is Web Browsers - What is Blogs-
Introduction To Computer Engineering (ECE 001)
Cambridge National Certificate in Information Technologies
سرطان الثدي Breast Cancer
Lecture 14 Put It All Together at Work
Cyber Security Research: Applied and Basic Combined*
Technology Vocabulary Part 1
12/30/2018 Entertainment 12/30/2018.
Alberto Zilio, AT&T Public Affairs – Europe
Enabling ML Based Research
Unit# 5: Internet and Worldwide Web
Near Future Teaching and Shaping Education Futures: Social media as communication and data collection Dr. Michael Gallagher Centre for Research in Digital.
Governmental Control of Network Activities CS 239 Advanced Topics in Computer Security Peter Reiher September 30, 2010.
Teaching Copyright.
Doctor of Professional Studies Orientation Revisited
4IR and Gaming: Opportunities and Challenges
Presentation transcript:

Computing Science Peter Achten

Computing science is everywhere … laatste plaatje is CGI (Computer Generated Image) van recente film Even in places where you might not notice it Computing Science

Computing science in 10 years? What can we do with the rapidly increasing possibilities of ICT? That will be up to your creativity! Computing Science

44 Trust in ICT Computing Science

Cyber Security @ RU 55 Security of software systems smart meters internet banking protecting medical data remote car keys Computing Science

Software & Data Science @ RU 66 Software & Data Science @ RU Software ‘learns’ software Creating smarter and better software Better programming with new languages and tools Use (big) data smarter and better ‘correct-by-construction’ Software ‘recommends’ topics to people Computer helps in diagnosis breast cancer Computing Science

Computing science is done by people 77 Computing science is done by people Computing Science

Broad field, with huge societal impact 88 Broad field, with huge societal impact Prof. Mireille Hildebrandt Smart Environments, Data Protection & the Rule of Law Computing Science

What can you do after graduating? National Cyber Security Centre is groep binnen NL overheid 99 What can you do after graduating? Martijn consultant with KPMG Petra scientific researcher Carmen innovation manager at VGZ Gerhard High Tech Crime Unit of police Arjan own company Tom Data Scientist BigData Republic Pieter National Cyber Security Centre Sander software design engineer at ASML Computing Science

10101010 More info? Google “youtube radboud informatica” for videos about alumni Lecture on Post Quantum Cryptography by dr. Peter Schwabe in HG00.304 at 12:45 Computing Science