2018 AutoTech Symposium


Waterloo is Canada’s "Quantum Valley" — epicentre of the next revolution in computation and communication. Meet the researchers leading quantum-based hardware and software development for fault-tolerant computing, secure key encryption and distribution, and quantum-enhanced metrology applications at the Quantum Technologies Open House. Engage our academic staff and student researchers in discussions of R&D and technical problems facing your company.
The Waterloo Institute for Sustainable Energy and the Canadian Plastics Industry Association are pleased to offer complimentary academic registration to faculty and students for this 2-day event.
This conference is intended to bring together international experts, policy makers, researchers, innovators and entrepreneurs to explore how the advancements in resource recovery technologies and the pursuit of a sustainable economy are changing the way we interact with our world.
Speaker: Richard Frayne, PhD
Hopewell Professor of Brain Imaging, Radiology and Clinical Neuroscience, Hotchkiss Brain Institute, University of Calgary, and Scientific Director, Seaman Family MR Research Centre, Foothills Medical Centre, Alberta Health Services
The Honourable Kirsty Duncan, Minister of Science, announced the Strategic Partnership Grants today. They help bring together expertise from academia, Canadian-based companies and government organizations, and international institutes to collaborate on innovative research with commercialization potential.
Read the full story.
Low-cost antennas may one day bring Internet connectivity to billions of people in developing countries
Research at the University of Waterloo that has the potential to affordably connect billions of new users to the Internet via intelligent antennas will receive $6.1 million in joint funding from C-COM Satellite Systems Inc. (C-COM) and the federal government.
Defending against memory buffer overflow attacks is a daunting proposition for computer software developers.
Failing to carefully specify appropriate inputs opens the door for hackers to insert malicious code by overwhelming a system’s memory space with unanticipated inputs.
But how do you plan for every possible type of input a hacker could use? You turn to Vijay Ganesh.
Read the full story.