Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
361-369 of 369
361-369 of 369
Filter
Amy Hodler
Analytics Program Manager at Neo4j
abstraction, analytics, apache spark, artificial neural network, breadth-first search, cache (computing), centrality, comma-separated values, computational phylogenetics, computer security, conceptual model, consumer behaviour, curiosity, customer relationship management, data visualization , database, database transaction, deep learning, distance, fraud, google search, graph database, graphics processing unit, information, intelligence, knowledge base, machine learning, market analysis, matrix (mathematics), metadata, pagerank, random forest, relational database, relational model, scalar (mathematics), sql, supply chain, system, table (database), table (information), tensor, tree (data structure), understanding, use case, vector space, vertex (graph theory), world wide web
David Allen
Solutions Architect at Neo4j
abstraction, analytics, apache spark, breadth-first search, cache (computing), comma-separated values, computer security, conceptual model, consumer behaviour, curiosity, data visualization , database, database transaction, graph database, information, relational database, relational model, sql, system, table (database), table (information), use case, vertex (graph theory), world wide web
Sean Kanuck
Director of Cyber at Space and Future Conflict, IISS
analytics, authentication, biometrics, blacklist (computing), computer security, critical infrastructure protection, cryptography , database, database transaction, facial recognition system, fingerprint, general data protection regulation, gmail, information privacy, information security, internet of things, mastercard, password, personal identification number, point of sale, privacy, security token, smart card, usb flash drive
Debra Farber
Executive Consultant & U.S. Chief Privacy Officer at Cranium
analytics, authentication, biometrics, blacklist (computing), computer security, critical infrastructure protection, cryptography , database, database transaction, facial recognition system, fingerprint, general data protection regulation, gmail, information privacy, information security, internet of things, mastercard, password, personal identification number, point of sale, privacy, security token, smart card, usb flash drive
Chris Merz
VP, Security and Decision Products – Enterprise Security Solutions at MasterCard
analytics, authentication, biometrics, blacklist (computing), computer security, critical infrastructure protection, cryptography , database, database transaction, facial recognition system, fingerprint, general data protection regulation, gmail, information privacy, information security, internet of things, mastercard, password, personal identification number, point of sale, privacy, security token, smart card, usb flash drive
Will Summerlin
Founder at Pinn
analytics, authentication, biometrics, blacklist (computing), computer security, critical infrastructure protection, cryptography , database, database transaction, facial recognition system, fingerprint, general data protection regulation, gmail, information privacy, information security, internet of things, mastercard, password, personal identification number, point of sale, privacy, security token, smart card, usb flash drive
Tomasz Kapela
Software Engineer at Intel
algorithm, application software, c++, central processing unit, database transaction, device file, exception handling, file system, flash memory, garbage collection (computer science), implementation, library (computing), memory controller, ntfs, operating system, pointer (computer programming), random-access memory, reference counting, software , subroutine, synchronization (computer science), template (c++), typedef, windows installer, write amplification
Bob Steagall
C++ Principal Software Engineer at GliaCell Technologies
allocator (c++), array data structure, binary tree, c++, c++11, class (computer programming), constructor (object-oriented programming), database, database engine, database transaction, inheritance (object-oriented programming), linked list, lock (computer science), method (computer programming), parameter (computer programming), pointer (computer programming), standard template library, subroutine, template (c++), template metaprogramming, thread (computing), tree (data structure), typedef, unified modeling language, virtual function
Fedor Pikus
Chief Scientist at Mentor Graphics - Siemens business
array data structure, assignment (computer science), bitwise operation, c++, central processing unit, communication protocol, compare-and-swap, competition, cpu cache, critical section, data structure alignment, database transaction, exclusive or, garbage collection (computer science), hash function, information, instruction set architecture, kernel (operating system), linearizability, linux kernel, lock (computer science), memory barrier, method (computer programming), mutual exclusion, news, operator overloading, pointer (computer programming), race condition, read-copy-update, read-only memory, reference counting, scope (computer science), server (computing), simulation, software bug, spinlock, subroutine, temperature, template (c++), thread (computing), undefined behavior, x86
1 2 3 4 5 6 7 8 9 10 11 12 13
361-369 of 369