Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-17 of 17
1-17 of 17
Filter
Jennifer Reed
Strategic Solution Director / Principal Consultant at Viktor Davis
aircraft pilot, amazon web services, architect, automation, banyan vines, bit, category 5 cable, cisco systems, cloud computing, devops, engineer, ethernet, experience, internet, internet protocol suite, knowledge, network switch, router (computing), silicon valley, space, subnetwork, teradata, token ring, troubleshooting, understanding
Toby Foss
Dir Of Network Cloud Operations at Informatica
aircraft pilot, amazon web services, architect, automation, banyan vines, bit, category 5 cable, cisco systems, cloud computing, devops, engineer, ethernet, experience, internet, internet protocol suite, knowledge, network switch, router (computing), silicon valley, space, subnetwork, teradata, token ring, troubleshooting, understanding
Stacy Lanier
Sr. Manager, DevOps Service Management and Network Services at Teradata
aircraft pilot, amazon web services, architect, automation, banyan vines, bit, category 5 cable, cisco systems, cloud computing, devops, engineer, ethernet, experience, internet, internet protocol suite, knowledge, network switch, router (computing), silicon valley, space, subnetwork, teradata, token ring, troubleshooting, understanding
George Buckman
Senior Network Architect at Gainwell Technologies
automation, cambrian explosion, cloud computing, data center, decision-making, definition, design, devops, ecosystem, education, factory, goal, google, interoperability, lawyer, methodology, nature, orchestration, risk, science, security, silicon valley, understanding, use case, weed
Derrick Monahan
Director of Business Development, Strategic Initiatives at Aviatrix
automation, cambrian explosion, cloud computing, data center, decision-making, definition, design, devops, ecosystem, education, factory, goal, google, interoperability, lawyer, methodology, nature, orchestration, risk, science, security, silicon valley, understanding, use case, weed
Justin Brodley
SVP of Cloud and Support at Cheetah Digital
amazon (company), api, application software, automation, cloud computing, communication protocol, computer network, data center, data in use, design, encryption, google, infrastructure as code, internet, internet protocol, interoperability, kubernetes , language, machine learning, microservices, mind, reality, terraforming, transmission control protocol, transport layer security
Justin Smith
Principal Engineer, Network Architect at Conviva
amazon (company), api, application software, automation, cloud computing, communication protocol, computer network, data center, data in use, design, encryption, google, infrastructure as code, internet, internet protocol, interoperability, kubernetes , language, machine learning, microservices, mind, reality, terraforming, transmission control protocol, transport layer security
Amit Utreja
Sr Principal Engineer at Coupa Software
amazon (company), api, application software, automation, cloud computing, communication protocol, computer network, data center, data in use, design, encryption, google, infrastructure as code, internet, internet protocol, interoperability, kubernetes , language, machine learning, microservices, mind, reality, terraforming, transmission control protocol, transport layer security
Bobby Willoughby
Network Global Architect at Aegon
analytics, api, automation, brand, chief information officer, cloud computing, competitive advantage, conversation, cryptography , customer, data center, encryption, future, gateway (telecommunications), infrastructure as code, insurance, interoperability, knowledge base, microsoft azure, mining, open world, protocol stack, thought, truth, wireless ad hoc network
Luis Castillo
Sr. Designer at Little Diversified Architectural Consulting
analytics, api, automation, brand, chief information officer, cloud computing, competitive advantage, conversation, cryptography , customer, data center, encryption, future, gateway (telecommunications), infrastructure as code, insurance, interoperability, knowledge base, microsoft azure, mining, open world, protocol stack, thought, truth, wireless ad hoc network
David Shinnick
VP Principal Systems Architect at FactSet
analytics, api, automation, brand, chief information officer, cloud computing, competitive advantage, conversation, cryptography , customer, data center, encryption, future, gateway (telecommunications), infrastructure as code, insurance, interoperability, knowledge base, microsoft azure, mining, open world, protocol stack, thought, truth, wireless ad hoc network
Steve Mullaney
President & CEO at Aviatrix
aircraft pilot, amazon (company), amazon web services, analytics, andy jassy, api, application software, architect, attention, automation, banyan vines, bit, brand, business, cambrian explosion, category 5 cable, chief information officer, cisco systems, citrix systems, client–server model, cloud computing, communication protocol, competitive advantage, computer network, conversation, cryptography , customer, data center, data in use, dave vellante, decision-making, definition, design, devops, ecosystem, education, encryption, engineer, entrepreneurship, ethernet, experience, factory, financial technology, future, gateway (telecommunications), global catastrophic risk, goal, google, hewlett-packard, ibm, infrastructure, infrastructure as code, innovation, insurance, internet, internet protocol, internet protocol suite, interoperability, john furrier, juniper networks, knowledge, knowledge base, kubernetes , language, lawyer, machine learning, methodology, microservices, microsoft azure, mind, mining, multiprotocol label switching, nature, network switch, open world, oracle corporation, orchestration, outsourcing, pain, price, protocol stack, reality, rights, risk, router (computing), science, screw, security, server (computing), silicon valley, siliconangle, siliconangle inc, siliconangle media inc, space, startup company, streaming media, subnetwork, systems theory, teradata, terraforming, thecube, thought, token ring, transmission control protocol, transport layer security, troubleshooting, truth, understanding, unicellular organism, use case, vmware, weed, wikibon, wireless ad hoc network
John Furrier
Cofounder & CEO at SiliconANGLE Media
#thecube, 19-inch rack, 2021, 3d computer graphics, 5g, @thecube, abstraction, abstraction (computer science), accenture, accessibility, addiction, advanced micro devices, advertising, aerospace, agile software development, air traffic control, aircraft pilot, algorithm, alibaba group, amazon, amazon (company), amazon alexa, amazon dynamodb, amazon elastic compute cloud, amazon web services, analysis, analytics, andy jassy, ansible, ansiblefest 2020, apache hadoop, api, app store (ios), apple inc., apple tv, apple watch, application software, architect, architecture, assembly line, attention, augmented reality, automated teller machine, automation, autonomous robot, aws, aws summit digital 2020, aws summit online 2020, backup, bank, banner, banyan vines, base station, behavior, bell, best practice, bias, big data, bill gates, bit, bitcoin, blackboard inc., body language, boston, brand, brand loyalty, bsd licenses, business, business model, california, california institute of technology, call centre, cambrian explosion, capacity planning, capital (economics), capital market, capital one, car, carbon black (company), caregiver, cash, cash transfer, category 5 cable, cellular network, central processing unit, change your mind (steven universe), charles de gaulle, chief executive officer, chief information officer, child abuse, child and family services, chris foster, cisco systems, citrix systems, civility, client (computing), client–server model, cloud, cloud computing, cloud native computing foundation, cloud storage, cloud- microservices architecture, cloudera, clustered file system, cold chain, communication protocol, community, competitive advantage, compliance (psychology), computer, computer architecture, computer data storage, computer hardware, computer network, computer programming, computer science, computer security, computer vision, computing, consumer privacy, consumerization of information technology, containerization, continuous delivery, contract, control theory, conversation, coronavirus disease 2019, covid-19 pandemic, covid-19 pandemic in the united states, covid-19 vaccine, creativity, credit card, crime, critical thinking, cryptography , culture, customer, customer experience, customer relationship management, customer service, data, data center, data governance, data in use, data lake, data quality, data security, data warehouse, database, database design, dave brown, dave vellante, david brown, dean grey, debit card, debt, debugging, decision-making, deep learning, definition, dell, dell emc, design, desktop computer, desktop virtualization, devops, digital transformation, dimension, distance education, distributed computing, distributed workforce, dividend, docker (software), dog food, donald trump, downtime, dream, dropbox (service), dunkin' donuts, dvd, ecological resilience, economy, ecosystem, edge computing, education, elasticsearch, electric battery, electronic benefit transfer, email, emergence, employment, encryption, end user, energy, engineer, engineering, enterprise software, entrepreneurship, ethernet, evolution, experience, expert, extract, transform, load, facebook, factory, fee, file system, financial industry regulatory authority, financial technology, firmware, food, force, franklin d. roosevelt, future, gateway (telecommunications), generation, generation z, gigabit ethernet, github, global catastrophic risk, goal, google, governance, graph database, graphics processing unit, grocery store, hashtag, headphones, headset (audio), health care, help desk, herain oberoi, hewlett packard enterprise, hewlett-packard, hillary clinton, history, human, humour, hybrid (biology), ibm, ibm z, ieee 1394, immersion (virtual reality), information, information technology, infrastructure, infrastructure as code, initial public offering, innovation, instagram, insurance, integrated circuit, intel, intelligence, interest, internet, internet of things, internet protocol, internet protocol suite, interoperability, interview, invention, inventory, investment, jeff frick, jimmy chen, john furrier, juniper networks, keynote, keynote analysis day 1, keynote analysis day 2, knowledge, knowledge base, kubernetes , language, laptop, latency (engineering), lawn, lawyer, leadership, learning, letter box, leverage (finance), license, life-cycle assessment, linkedin, linux, linux foundation, load balancing (computing), logos, los angeles unified school district, lumber, mac mini, macbook, machine learning, macintosh, macos, mainframe computer, mana, management, manufacturing, mark lohmeyer, market (economics), marketplace, mass media, mathematical optimization, mathematics, mergers and acquisitions, metadata, metal, methodology, microservices, microsoft, microsoft azure, microsoft excel, microsoft sql server, microsoft windows, microstrategy, mind, mindset, mining, mobile app, mobile banking, mobile phone, money, monopoly, moore's law, motivation, multiprotocol label switching, music, nature, negotiation, netflix, network switch, neural network, new york city, news, nigger, nike, inc., nitrous oxide engine, node (networking), nothing, nvidia, office 365, onboarding, online and offline, online banking, open innovation, open source, open world, open-source software, open-source-software movement, openshift, openstack, operating model, operating system, optum, oracle corporation, oracle database, orchestration, organization, outsourcing, overdrive (mechanics), package manager, pain, partnership, patch (computing), permissive software license, personal data, personal trainer, physics, physics engine, pixar, plastic, platform as a service, postgresql, prayer, prediction, predictive analytics, predictive maintenance, pressure, price, pricing, privacy, procurement, productivity, program optimization, programmer, project jupyter, propel, protocol stack, proton, provenance, psychology, punishment, quality of life, quantum algorithm, quantum computing, rackspace technology, radar, radio, rapid transit, raspberry pi, real-time computing, real-time data, real-time performance, reality, reason, recommender system, red hat, red hat summit, reddit, redis, redis labs, redshift, regulatory compliance, reinforcement, reinforcement learning, reliability engineering, rendering (computer graphics), reputation, research, retail, rhsummit, rights, risk, robot, robotics, router (computing), runtime system, sales, sales process engineering, salesforce, san francisco, sanjay poonen, scalability, scat singing, science, screw, secret superstar, security, self-service, selfie, semantics, sensor, server (computing), serverless computing, sewing, share repurchase, silicon valley, siliconangle, siliconangle inc, siliconangle media inc, simulation, skylab, skylab apps, slack (software), smart tv, snowflake, social media, social norm, social stigma, software , software as a service, software framework, software release life cycle, solar power, space, specification (technical standard), spectrum, speech recognition, splunk, sql, standardization, startup company, statistics, stock market, streaming media, stu miniman, studio, subnetwork, supercomputer, supplemental nutrition assistance program, supply chain, surveillance, synergy, system, systems theory, t-shirt, tablet computer, take-out, tattoo, taxonomy (biology), tc energy, technology, telco cloud, telecommunication, telecommuting, telehealth, telemetry, television, tensorflow, teradata, terraforming, tesla, inc., thecube, theory, thought, thoughts and prayers, thread (computing), throughput, thunderbolt (interface), token ring, tool, tornado, touchscreen, transmission control protocol, transparency (behavior), transport layer security, troubleshooting, truth, twilio, twitter, understanding, unemployment, unicellular organism, united states, unity (game engine), university, unstructured data, use case, value proposition, venmo, verizon communications, vibe (magazine), video on demand, videotelephony, virtual private network, virtual reality, virtual reality headset, virtualization, visualization (graphics), vmware, vmworld, vmworld 2020, vmworld 2020 analysis two, vmworld 2020 keynote analysis, vulnerability (computing), warehouse, water, waterfall model, watson (computer), wearable technology, web application, web browser, web service, weed, white-label product, wi-fi, wide area network, wikibon, wikipedia, wireless ad hoc network, women in the workforce, workload, world wide web, writer, youtube, zoom (software), zoom video communications
Simon Richard
Network Analyst at Gartner
aircraft pilot, amazon web services, attention, cisco systems, citrix systems, client–server model, cloud computing, data center, definition, devops, global catastrophic risk, google, infrastructure, internet, interoperability, juniper networks, pain, rights, router (computing), screw, server (computing), silicon valley, streaming media, unicellular organism, vmware
Rich Gaston
Global Solutions Architect at Micro Focus
access control, advanced encryption standard, analytics, application programming interface, authentication, big data, business process, central processing unit, cloud computing, communication protocol, computer appliance, computer security, credit card, cryptography , data breach, data in use, data security, database, dave vellante, encryption, end user, extract, transform, load, facebook, facebook–cambridge analytica data scandal, general data protection regulation, hardware security module, information privacy, information sensitivity, internet of things, john furrier, key management, machine learning, personal data, regulatory compliance, scalability, siliconangle, siliconangle inc, siliconangle media inc, software as a service, tamper-evident technology, thecube, transport layer security, tunneling protocol, vertica, wikibon
Dan Middleton
Principal Engineer at Intel
abstraction, authentication, bitcoin, blockchain, bus (computing), cloud computing, computer hardware, cryptocurrency, cryptographic hash function, data at rest, data in use, digital signature, encryption, hyperledger, internet, operating system, plaintext, privacy, transparency (behavior), transport layer security, trusted computing, trusted execution environment, virtual private network, zero-day (computing)
Jim Zemlin
Executive Director at The Linux Foundation
abstraction (computer science), algorithm, cloud computing, computer network, data in use, devops, gnu general public license, hardware acceleration, information privacy, information sensitivity, internet, linux foundation, microservices, microsoft, open-source hardware, opendaylight project, openpower foundation, privacy, programmer, red hat, software , software guard extensions, software-defined networking, trusted execution environment
1
1-17 of 17