Alumni

Friday, July 13, 2018 9:30 am - 3:15 pm EDT (GMT -04:00)

Open House - Harnessing Quantum Technologies

Waterloo is Canada’s "Quantum Valley" — epicentre of the next revolution in computation and communication.  Meet the researchers leading quantum-based hardware and software development for fault-tolerant computing, secure key encryption and distribution, and quantum-enhanced metrology applications at the Quantum Technologies Open House.  Engage our academic staff and student researchers in discussions of R&D and technical problems facing your company.

Thursday, June 21, 2018 12:00 am - Friday, June 22, 2018 12:00 am EDT (GMT -04:00)

Resource Recovery Partnership Conference 2018

The Waterloo Institute for Sustainable Energy and the Canadian Plastics Industry Association are pleased to offer complimentary academic registration to faculty and students for this 2-day event.

This conference is intended to bring together international experts, policy makers, researchers, innovators and entrepreneurs to explore how the advancements in resource recovery technologies and the pursuit of a sustainable economy are changing the way we interact with our world.

Hany AzizOntario’s largest R&D centre in Electrical and Computer Engineering (ECE) is opening its doors on May 8 to interested participants from industry working in the areas of flexible electronics, displays and sensing technologies *G2N, CAPDS, and

Richard FrayneSpeaker: Richard Frayne, PhD

Hopewell Professor of Brain Imaging, Radiology and Clinical Neuroscience, Hotchkiss Brain Institute, University of Calgary, and Scientific Director, Seaman Family MR Research Centre, Foothills Medical Centre, Alberta Health Services

The Honourable Kirsty Duncan, Minister of Science, announced the Strategic Partnership Grants today. They help bring together expertise from academia, Canadian-based companies and government organizations, and international institutes to collaborate on innovative research with commercialization potential.

Read the full story.

Defending against memory buffer overflow attacks is a daunting proposition for computer software developers.

Failing to carefully specify appropriate inputs opens the door for hackers to insert malicious code by overwhelming a system’s memory space with unanticipated inputs.

But how do you plan for every possible type of input a hacker could use? You turn to Vijay Ganesh.

Read the full story.