Because we are a random universe, a cluster of improbabilities all brought together by some one-in-a-million brain fart in an ever-expanding universe, why shouldn’t your Thursday Nerd Nite experience reflect that dynamic? Except of course for the brain fart bit. Those are expressly not allowed where fine foods and alcohol are served. It’s a health code violation.
Nerd Nite 20 brings together three speakers on disparate topics ranging from Thelonius Monk to social engineering to Chinese television with beer the only connective tissue we could come up with. And what’s wrong with that? We’d like to know cause here we go again.
September 25th, 7pm
128 East Roosevelt
Presentations. Beer. Fellowship with other Phoenix nerds.
Be there and be square.
Thelonious and Me
by Michael A.L. Broyles
How can we describe our relationship with recorded music? How has the development of music-recording technologies affected the way we view and interpret our lives, our world, and our connection with others? Why am I asking these questions in the first place? In this talk, Michael tells the story of his relationship with the music of jazz pianist Thelonious Monk (1917-1982) and explores the impact music recording technology has had on humanity since. Included are discussions of the symbolism of hat-wearing, jazz tattoos, mental illness, dancing, African American religions, and Sufism…along with video of the master-pianist at work.
Michael A.L. Broyles spent the decade between his 13th and and 23rd year desperately searching for fame as a pianist. This search brought him paid-for trips around the globe and experiences and heartbreaks worth more than gold, but, alas, no fame. The following years were far too epic to fit into this short biography. Now, he studies American religions at Arizona State University while teaching, aka subjecting undergraduate students to his random musings and keen wit.
———————Presentation #2 ———————–
“My Life in the Meat Hacking Industry: Social Engineering and Hacking People
by Shawn “Doe”
As an information security professional our number one security hole is people. The people that have been granted legitimate access to our systems are the easiest way for a hacker to strike. Social engineering is known by many other names: Human hacking, layer 8 exploits, cons, user manipulation and hacking the meatware. What is social engineering? What do you as a user need to look for to protect yourself? What are some techniques used by social engineers? How do you prevent yourself from becoming a PEBKAC with an ID-10-T error?
Shawn “Doe” *cough cough* has worked in the technology world for over 20 years. Much of his time was spent with telecommunications companies and working in security. Information security has always been more of an interest for Shawn than a job. It started with an 8088 and a BBS in the 90s. (huh?) He spent much of the early part of the century running around the world setting up new and interesting networks in foreign lands. Now he works for a large telecommunications company mitigating attacks.
“Romance of the Three Kingdoms”
by Kevin Flanagan
Kevin Flanagan is a writer, performance artist and musician who currently works as a mindless drone for a local cult. He was selected as one of the New Times “100 Artists” in 2012; They haven’t contacted him since. His expertise on the “Romance of the Three Kingdoms” comes from having actually read the “Romance of the Three Kingdoms,” as well as playing a bunch of video games based on it. He is currently watching a Chinese television show called “Three Kingdoms” which he thinks is pretty good.