<node id="55483">
  <nid>55483</nid>
  <type>event</type>
  <uid>
    <user id="27154"><![CDATA[27154]]></user>
  </uid>
  <created>1272281478</created>
  <changed>1475891481</changed>
  <title><![CDATA[Google Technical Talk]]></title>
  <body><![CDATA[<p>The presentation will discuss in detail the real-world implications for 64-bit security, and dispel some myths about its security implications. Also, we will cover in depth the evolutionary changes in operating systems when moving to 64-bit, as well as the practical implications of these changes, and their increased relevance today.</p><p>Real World Implications of 64-bit Computing for Security:</p><ul><li>Architectural changes introduced by 64-bit computing.</li><li>64-bit computing today, and the state of security, and the relevance of security for attackers.</li><li>Myths about 64-bit computing and security.</li><li>Programming models: LLP64 vs LP64 - who picked the right one? Microsoft or Unix?</li><li>Security benefits of 64-bit architectures.</li><li>Insecurity introduced by 64-bit architectures - undirected change drives insecurity.</li></ul>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Information Security: Neel Mehta]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2010-04-26T13:00:00-04:00]]></value>
      <value2><![CDATA[2010-04-26T14:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p>Meredith Goodman</p><p><a href="mailto:mgoodman@cc.gatech.edu">mgoodman@cc.gatech.edu</a></p>]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1791</tid>
        <value><![CDATA[Student sponsored]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>3165</tid>
        <value><![CDATA[google]]></value>
      </item>
          <item>
        <tid>2678</tid>
        <value><![CDATA[information security]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
