{"id":1512,"date":"2016-09-16T13:00:26","date_gmt":"2016-09-16T12:00:26","guid":{"rendered":"http:\/\/eden-study.org\/?page_id=1512"},"modified":"2017-05-19T17:05:52","modified_gmt":"2017-05-19T16:05:52","slug":"keynotes","status":"publish","type":"page","link":"https:\/\/eden-study.org\/?page_id=1512","title":{"rendered":"Keynotes &#038; Lectures"},"content":{"rendered":"<p>[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_text_separator title=\u201dInvited & Public Lectures\u201d i_icon_fontawesome=\u201dfa fa-microphone\u201d i_color=\u201dblack\u201d title_align=\u201dseparator_align_left\u201d align=\u201dalign_right\u201d add_icon=\u201dtrue\u201d el_class=\u201dh1\u2033][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner]<ul class=\"timeline \">\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2016<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">The Singularity Controversy<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/LondonFuturists-logo321x2001.png\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        \u2018<strong><a href=\"http:\/\/www.meetup.com\/London-Futurists\/events\/229850927\/\">The Singularity Controversy: Three Years Later<\/a><\/strong>\u2019<\/p>\n<p>London Futurists Meetup, London, UK<\/p>\n<p><iframe loading=\"lazy\" class=\"img-medium img-responsive\" src=\"https:\/\/www.youtube.com\/embed\/G74Z-0fON9o?\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe>\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li>\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2015<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">The Ontology of Computer Programs<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/ias.png\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        \u2018<strong><a href=\"https:\/\/www.researchgate.net\/publication\/284663779_The_Ontology_of_Computer_Programs\">The Ontology of Computer Programs<\/a><\/strong>\u2019<\/p>\n<p>Computability group, Institute for Advanced Studies, Hebrew University of Jerusalem<\/p>\n<p>\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li>\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2015<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">The Disruptive Potential of Artificial Intelligence<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/ias.png\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        \u2018<a href=\"https:\/\/www.researchgate.net\/publication\/284663508_The_Imminent_The_Im-possible_and_the_Irreversible_The_Disruptive_Potential_of_Artificial_Intelligence\"><strong>The Imminent, The (Im-)possible, and the Irreversible: The Disruptive Potential of Artificial Intelligence<\/strong><\/a>\u2019<\/p>\n<p>Computability group, Institute for Advanced Studies, Hebrew University of Jerusalem<\/p>\n<p>\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li>\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2013<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">Singularity Hypotheses<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/LondonFuturists-logo321x2001.png\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        <strong><a href=\"http:\/\/www.meetup.com\/London-Futurists\/events\/110562132\/\">Singularity Hypotheses: A Scientific and Philosophical Assessment<\/a><\/strong><\/p>\n<p>Public lecture & book launch<\/p>\n<p>London Futurists, Birkbeck College, London<\/p>\n<p>\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li>\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2012<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">Software Engineering in the 21st Century<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/irit.jpg\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        Department of Computer Science, University of Toulouse (<a href=\"https:\/\/drive.google.com\/file\/d\/0BwK0OPe_m9QNaXE0MlAyZzFpMFE\/view?usp=sharing\">PDF<\/a>)\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li>\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2012<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">Codecharts: Specification and Verification of Software Design<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/1280px-UniOfManchesterLogo.svg1_-1024x432.png\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        Department of Computer Science, University of Manchester\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li>\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2011<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">Scientific Notions of \u2018Technological Singularity\u2019<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/Humanity_logo1.png\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        Humanity Plus London (UKH+)<br \/>\n<iframe loading=\"lazy\" class=\"img-medium img-responsive\" src=\"https:\/\/www.youtube.com\/embed\/8uEl3TxyhPs\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li>\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2005<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">Israel 2005: A freethinker\u2019s perspective<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/cfi-e1470941241578.png\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        Center For Inquiry, SUNY Buffalo, NY\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li><\/ul>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_text_separator title=\u201dKeynotes\u201d i_icon_fontawesome=\u201dfa fa-microphone\u201d i_color=\u201dblack\u201d title_align=\u201dseparator_align_left\u201d align=\u201dalign_right\u201d add_icon=\u201dtrue\u201d el_class=\u201dh1\u2033][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner]<ul class=\"timeline \">\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2013<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">Cyberpatterns Workshop<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/Cyberpatterns2013Cover1-724x1024.jpg\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        <strong>Security Pattern Assurance through Round-Trip Engineering<\/strong><\/p>\n<div class=\"p\"><em><a href=\"http:\/\/tech.brookes.ac.uk\/CyberPatterns2013\/\">2nd International Workshop on Cyberpatterns<\/a>: Unifying Design Patterns with Security, Attack and Forensic Patterns<\/em>. Oxford Brooks<\/div>\n<p>\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li>\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2013<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">Developers Conference \u2014 DevCon1<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/usx.gif\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        <strong>Software Engineering of the 21st Century<\/strong><\/p>\n<div class=\"p\"><em>Developers Conference\u2014DevCon1<\/em>, University of Essex<\/div>\n<p>\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li>\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2006<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">Society of Machines and Mentality<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/apa_logo_detail1.png\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        <strong>Problems in Software Ontology<\/strong><\/p>\n<div class=\"p\">American Philosophers Association \u2014 APA, Eastern Division<\/div>\n<p>\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li>\n\t\t\t<li class=\"\">\n\t\t\t\t<div class=\"date\">2005<\/div>\n\t\t\t\t<div class=\"circle\"><\/div>\n\t\t\t\t<div class=\"data\"><div class=\"subject\">European Centre for Ontological Research<\/div><div class=\"text row\">\n\t\t    <div class=\"col-md-2\">\n\t\t        <img decoding=\"async\" alt=\"image\" class=\"thumbnail img-responsive\" src=\"https:\/\/eden-study.org\/wp-content\/uploads\/2016\/08\/ecorlogoleft1.jpg\">\n\t\t    <\/div>\n\t\t    <div class=\"col-md-10\">\n\t\t        <strong>Towards an Ontology of Software<\/strong><\/p>\n<div class=\"p\">Inaugural meeting, European Centre for Ontological Research\u2014ECOR<\/div>\n<p>\n\t\t    <\/div><\/div><\/div>\n\t\t\t<\/li><\/ul>[\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_text_separator title=\u201dColloquia\u201d i_icon_fontawesome=\u201dfa fa-microphone\u201d i_color=\u201dblack\u201d title_align=\u201dseparator_align_left\u201d align=\u201dalign_right\u201d add_icon=\u201dtrue\u201d el_class=\u201dh1\u2033][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_media_grid element_width=\u201d2\u2033 gap=\u201d15\u2033 item=\u201dmasonryMedia_Default\u201d initial_loading_animation=\u201dfadeInUp\u201d grid_id=\u201dvc_gid:1495210160807-91d4ff87-c320-1\u2033 include=\u201d455,477,481,468,476,560,328,528,486,454,331,561,467,483,558,484,482,146,202,487,488,1582\u2033 css=\u201d.vc_custom_1474305044944{background-color: #ffffff !important;}\u201d][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_text_separator title=\u201dInvited &#038; Public Lectures\u201d i_icon_fontawesome=\u201dfa fa-microphone\u201d i_color=\u201dblack\u201d title_align=\u201dseparator_align_left\u201d align=\u201dalign_right\u201d add_icon=\u201dtrue\u201d el_class=\u201dh1\u2033][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_text_separator title=\u201dKeynotes\u201d i_icon_fontawesome=\u201dfa fa-microphone\u201d i_color=\u201dblack\u201d title_align=\u201dseparator_align_left\u201d align=\u201dalign_right\u201d add_icon=\u201dtrue\u201d el_class=\u201dh1\u2033][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_text_separator [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1512","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/eden-study.org\/index.php?rest_route=\/wp\/v2\/pages\/1512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eden-study.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/eden-study.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/eden-study.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eden-study.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1512"}],"version-history":[{"count":5,"href":"https:\/\/eden-study.org\/index.php?rest_route=\/wp\/v2\/pages\/1512\/revisions"}],"predecessor-version":[{"id":2218,"href":"https:\/\/eden-study.org\/index.php?rest_route=\/wp\/v2\/pages\/1512\/revisions\/2218"}],"wp:attachment":[{"href":"https:\/\/eden-study.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}