Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-27 of 27
1-27 of 27
Filter
Anders Brownworth
Principal Architect at Federal Reserve Bank of Boston
bitcoin, blockchain, cash, central bank, credit card, cryptocurrency, digital currency, federal reserve, federal reserve note, fee, financial inclusion, gossip protocol, money, payment, paypal, peer-to-peer, proof of work, protocol stack, republic wireless, spamming, system, throughput, von neumann architecture, wechat, zero-knowledge proof
Jennifer Reed
Strategic Solution Director / Principal Consultant at Viktor Davis
aircraft pilot, amazon web services, architect, automation, banyan vines, bit, category 5 cable, cisco systems, cloud computing, devops, engineer, ethernet, experience, internet, internet protocol suite, knowledge, network switch, router (computing), silicon valley, space, subnetwork, teradata, token ring, troubleshooting, understanding
Toby Foss
Dir Of Network Cloud Operations at Informatica
aircraft pilot, amazon web services, architect, automation, banyan vines, bit, category 5 cable, cisco systems, cloud computing, devops, engineer, ethernet, experience, internet, internet protocol suite, knowledge, network switch, router (computing), silicon valley, space, subnetwork, teradata, token ring, troubleshooting, understanding
Stacy Lanier
Sr. Manager, DevOps Service Management and Network Services at Teradata
aircraft pilot, amazon web services, architect, automation, banyan vines, bit, category 5 cable, cisco systems, cloud computing, devops, engineer, ethernet, experience, internet, internet protocol suite, knowledge, network switch, router (computing), silicon valley, space, subnetwork, teradata, token ring, troubleshooting, understanding
George Buckman
Senior Network Architect at Gainwell Technologies
automation, cambrian explosion, cloud computing, data center, decision-making, definition, design, devops, ecosystem, education, factory, goal, google, interoperability, lawyer, methodology, nature, orchestration, risk, science, security, silicon valley, understanding, use case, weed
Derrick Monahan
Director of Business Development, Strategic Initiatives at Aviatrix
automation, cambrian explosion, cloud computing, data center, decision-making, definition, design, devops, ecosystem, education, factory, goal, google, interoperability, lawyer, methodology, nature, orchestration, risk, science, security, silicon valley, understanding, use case, weed
Justin Brodley
SVP of Cloud and Support at Cheetah Digital
amazon (company), api, application software, automation, cloud computing, communication protocol, computer network, data center, data in use, design, encryption, google, infrastructure as code, internet, internet protocol, interoperability, kubernetes , language, machine learning, microservices, mind, reality, terraforming, transmission control protocol, transport layer security
Amit Utreja
Sr Principal Engineer at Coupa Software
amazon (company), api, application software, automation, cloud computing, communication protocol, computer network, data center, data in use, design, encryption, google, infrastructure as code, internet, internet protocol, interoperability, kubernetes , language, machine learning, microservices, mind, reality, terraforming, transmission control protocol, transport layer security
Bobby Willoughby
Network Global Architect at Aegon
analytics, api, automation, brand, chief information officer, cloud computing, competitive advantage, conversation, cryptography , customer, data center, encryption, future, gateway (telecommunications), infrastructure as code, insurance, interoperability, knowledge base, microsoft azure, mining, open world, protocol stack, thought, truth, wireless ad hoc network
Luis Castillo
Sr. Designer at Little Diversified Architectural Consulting
analytics, api, automation, brand, chief information officer, cloud computing, competitive advantage, conversation, cryptography , customer, data center, encryption, future, gateway (telecommunications), infrastructure as code, insurance, interoperability, knowledge base, microsoft azure, mining, open world, protocol stack, thought, truth, wireless ad hoc network
David Shinnick
VP Principal Systems Architect at FactSet
analytics, api, automation, brand, chief information officer, cloud computing, competitive advantage, conversation, cryptography , customer, data center, encryption, future, gateway (telecommunications), infrastructure as code, insurance, interoperability, knowledge base, microsoft azure, mining, open world, protocol stack, thought, truth, wireless ad hoc network
Steve Mullaney
President & CEO at Aviatrix
aircraft pilot, amazon (company), amazon web services, analytics, andy jassy, api, application software, architect, attention, automation, banyan vines, bit, brand, business, cambrian explosion, category 5 cable, chief information officer, cisco systems, citrix systems, client–server model, cloud computing, communication protocol, competitive advantage, computer network, conversation, cryptography , customer, data center, data in use, dave vellante, decision-making, definition, design, devops, ecosystem, education, encryption, engineer, entrepreneurship, ethernet, experience, factory, financial technology, future, gateway (telecommunications), global catastrophic risk, goal, google, hewlett-packard, ibm, infrastructure, infrastructure as code, innovation, insurance, internet, internet protocol, internet protocol suite, interoperability, john furrier, juniper networks, knowledge, knowledge base, kubernetes , language, lawyer, machine learning, methodology, microservices, microsoft azure, mind, mining, multiprotocol label switching, nature, network switch, open world, oracle corporation, orchestration, outsourcing, pain, price, protocol stack, reality, rights, risk, router (computing), science, screw, security, server (computing), silicon valley, siliconangle, siliconangle inc, siliconangle media inc, space, startup company, streaming media, subnetwork, systems theory, teradata, terraforming, thecube, thought, token ring, transmission control protocol, transport layer security, troubleshooting, truth, understanding, unicellular organism, use case, vmware, weed, wikibon, wireless ad hoc network
John Furrier
Cofounder & CEO at SiliconANGLE Media
#thecube, 19-inch rack, 2021, 3d computer graphics, 5g, @thecube, abstraction, abstraction (computer science), accenture, accessibility, addiction, advanced micro devices, advertising, aerospace, agile software development, air traffic control, aircraft pilot, algorithm, alibaba group, amazon, amazon (company), amazon alexa, amazon dynamodb, amazon elastic compute cloud, amazon web services, analysis, analytics, andy jassy, ansible, ansiblefest 2020, apache hadoop, api, app store (ios), apple inc., apple tv, apple watch, application software, architect, architecture, assembly line, attention, augmented reality, automated teller machine, automation, autonomous robot, aws, aws summit digital 2020, aws summit online 2020, backup, bank, banner, banyan vines, base station, behavior, bell, best practice, bias, big data, bill gates, bit, bitcoin, blackboard inc., body language, boston, brand, brand loyalty, bsd licenses, business, business model, california, california institute of technology, call centre, cambrian explosion, capacity planning, capital (economics), capital market, capital one, car, carbon black (company), caregiver, cash, cash transfer, category 5 cable, cellular network, central processing unit, change your mind (steven universe), charles de gaulle, chief executive officer, chief information officer, child abuse, child and family services, chris foster, cisco systems, citrix systems, civility, client (computing), client–server model, cloud, cloud computing, cloud native computing foundation, cloud storage, cloud- microservices architecture, cloudera, clustered file system, cold chain, communication protocol, community, competitive advantage, compliance (psychology), computer, computer architecture, computer data storage, computer hardware, computer network, computer programming, computer science, computer security, computer vision, computing, consumer privacy, consumerization of information technology, containerization, continuous delivery, contract, control theory, conversation, coronavirus disease 2019, covid-19 pandemic, covid-19 pandemic in the united states, covid-19 vaccine, creativity, credit card, crime, critical thinking, cryptography , culture, customer, customer experience, customer relationship management, customer service, data, data center, data governance, data in use, data lake, data quality, data security, data warehouse, database, database design, dave brown, dave vellante, david brown, dean grey, debit card, debt, debugging, decision-making, deep learning, definition, dell, dell emc, design, desktop computer, desktop virtualization, devops, digital transformation, dimension, distance education, distributed computing, distributed workforce, dividend, docker (software), dog food, donald trump, downtime, dream, dropbox (service), dunkin' donuts, dvd, ecological resilience, economy, ecosystem, edge computing, education, elasticsearch, electric battery, electronic benefit transfer, email, emergence, employment, encryption, end user, energy, engineer, engineering, enterprise software, entrepreneurship, ethernet, evolution, experience, expert, extract, transform, load, facebook, factory, fee, file system, financial industry regulatory authority, financial technology, firmware, food, force, franklin d. roosevelt, future, gateway (telecommunications), generation, generation z, gigabit ethernet, github, global catastrophic risk, goal, google, governance, graph database, graphics processing unit, grocery store, hashtag, headphones, headset (audio), health care, help desk, herain oberoi, hewlett packard enterprise, hewlett-packard, hillary clinton, history, human, humour, hybrid (biology), ibm, ibm z, ieee 1394, immersion (virtual reality), information, information technology, infrastructure, infrastructure as code, initial public offering, innovation, instagram, insurance, integrated circuit, intel, intelligence, interest, internet, internet of things, internet protocol, internet protocol suite, interoperability, interview, invention, inventory, investment, jeff frick, jimmy chen, john furrier, juniper networks, keynote, keynote analysis day 1, keynote analysis day 2, knowledge, knowledge base, kubernetes , language, laptop, latency (engineering), lawn, lawyer, leadership, learning, letter box, leverage (finance), license, life-cycle assessment, linkedin, linux, linux foundation, load balancing (computing), logos, los angeles unified school district, lumber, mac mini, macbook, machine learning, macintosh, macos, mainframe computer, mana, management, manufacturing, mark lohmeyer, market (economics), marketplace, mass media, mathematical optimization, mathematics, mergers and acquisitions, metadata, metal, methodology, microservices, microsoft, microsoft azure, microsoft excel, microsoft sql server, microsoft windows, microstrategy, mind, mindset, mining, mobile app, mobile banking, mobile phone, money, monopoly, moore's law, motivation, multiprotocol label switching, music, nature, negotiation, netflix, network switch, neural network, new york city, news, nigger, nike, inc., nitrous oxide engine, node (networking), nothing, nvidia, office 365, onboarding, online and offline, online banking, open innovation, open source, open world, open-source software, open-source-software movement, openshift, openstack, operating model, operating system, optum, oracle corporation, oracle database, orchestration, organization, outsourcing, overdrive (mechanics), package manager, pain, partnership, patch (computing), permissive software license, personal data, personal trainer, physics, physics engine, pixar, plastic, platform as a service, postgresql, prayer, prediction, predictive analytics, predictive maintenance, pressure, price, pricing, privacy, procurement, productivity, program optimization, programmer, project jupyter, propel, protocol stack, proton, provenance, psychology, punishment, quality of life, quantum algorithm, quantum computing, rackspace technology, radar, radio, rapid transit, raspberry pi, real-time computing, real-time data, real-time performance, reality, reason, recommender system, red hat, red hat summit, reddit, redis, redis labs, redshift, regulatory compliance, reinforcement, reinforcement learning, reliability engineering, rendering (computer graphics), reputation, research, retail, rhsummit, rights, risk, robot, robotics, router (computing), runtime system, sales, sales process engineering, salesforce, san francisco, sanjay poonen, scalability, scat singing, science, screw, secret superstar, security, self-service, selfie, semantics, sensor, server (computing), serverless computing, sewing, share repurchase, silicon valley, siliconangle, siliconangle inc, siliconangle media inc, simulation, skylab, skylab apps, slack (software), smart tv, snowflake, social media, social norm, social stigma, software , software as a service, software framework, software release life cycle, solar power, space, specification (technical standard), spectrum, speech recognition, splunk, sql, standardization, startup company, statistics, stock market, streaming media, stu miniman, studio, subnetwork, supercomputer, supplemental nutrition assistance program, supply chain, surveillance, synergy, system, systems theory, t-shirt, tablet computer, take-out, tattoo, taxonomy (biology), tc energy, technology, telco cloud, telecommunication, telecommuting, telehealth, telemetry, television, tensorflow, teradata, terraforming, tesla, inc., thecube, theory, thought, thoughts and prayers, thread (computing), throughput, thunderbolt (interface), token ring, tool, tornado, touchscreen, transmission control protocol, transparency (behavior), transport layer security, troubleshooting, truth, twilio, twitter, understanding, unemployment, unicellular organism, united states, unity (game engine), university, unstructured data, use case, value proposition, venmo, verizon communications, vibe (magazine), video on demand, videotelephony, virtual private network, virtual reality, virtual reality headset, virtualization, visualization (graphics), vmware, vmworld, vmworld 2020, vmworld 2020 analysis two, vmworld 2020 keynote analysis, vulnerability (computing), warehouse, water, waterfall model, watson (computer), wearable technology, web application, web browser, web service, weed, white-label product, wi-fi, wide area network, wikibon, wikipedia, wireless ad hoc network, women in the workforce, workload, world wide web, writer, youtube, zoom (software), zoom video communications
Simon Richard
Network Analyst at Gartner
aircraft pilot, amazon web services, attention, cisco systems, citrix systems, client–server model, cloud computing, data center, definition, devops, global catastrophic risk, google, infrastructure, internet, interoperability, juniper networks, pain, rights, router (computing), screw, server (computing), silicon valley, streaming media, unicellular organism, vmware
Chris Becker
Blockchain technologies lead at Investec Bank
bank, banknote, blockchain, central bank, communication protocol, computer network, currency, database, decimalisation, ethernet, gold, governance, internet, internet protocol suite, money, over-the-top media service, pound sterling, protocol stack, shilling, south african rand, spotify, streaming media, video on demand, wi-fi
Bill Demirkapi
Independent Security Researcher
antivirus software, api, audit, blue screen of death, command-line interface, computer network, computer security, con, conference speakers, cross-site scripting, cryptographic hash function, cyber security, cyberwarfare, database, dc27, def, def con 2019, def con 27, defcon, device driver, google chrome, hacker, hacker community, hacker conference, hackers, hacking conference, hash function, health data, http cookie, kernel (operating system), library, malware, malwarebytes, metadata, network socket, online copyright infringement liability limitation act, operating system, parsing, password, patch (computing), personal data, pipeline (unix), protection ring, protocol stack, rootkit, security conference, security conference 2019, simple api for xml, social media, software bug, sql injection, standard streams, subroutine, superuser, terms of service, thread (computing), twitter, unified extensible firmware interface, windows registry, wireshark, world wide web, xml, zero-day (computing)
Leslie Daigle
Global Technical Officer at Global Cyber Alliance
attention, cloud computing, commercial software, computer, computer science, debugging, docker (software), expert, fee, free software, internet, internet of things, macintosh, mission critical, open-source software, pandora (console), patch (computing), personal computer, pointer (computer programming), protocol stack, software , software development, stack (abstract data type), subscription business model, vendor lock-in
Sam Kumar
PhD Student in Computer Science at UC Berkeley
amazon elastic compute cloud, anonymity, blockchain, booting, central processing unit, client (computing), communication protocol, computer data storage, computer file, computer network, computer performance, conference, cryptography , email, embedded system, encryption, end-to-end encryption, gateway (telecommunications), hypertext transfer protocol, internet, internet access, internet of things, internet protocol, latency (engineering), linkedin, metadata, network congestion, open access, packet loss, privacy, proof of work, protocol stack, proxy server, public-key cryptography, random-access memory, read-only memory, recycling, router (computing), scheduling (computing), server (computing), server-side, smartphone, technology, throughput, time, tor (anonymity network), transmission control protocol, usenix, user datagram protocol, wi-fi, wireless access point, world wide web
Chang Lou
Student at Johns Hopkins University
accuracy and precision, computer program, conference, dog, experience, food, future, gear, gear train, gif, hubble space telescope, information, laser, logic, open access, protocol stack, religion, siri, software , stack (abstract data type), technology, timer, tractor, tree, troubleshooting, truth, usenix, virus, washing machine
Ryan Westrom
Head of Mobility Engagement - East Coast, City Solutions at Ford Motor Company
accuracy and precision, amazon (company), built environment, cargo, carpool, cycling infrastructure, electric bicycle, electric car, global positioning system, high-occupancy vehicle lane, innovation, intermodal passenger transport, justice, location-based service, machine learning, mobile app, mobile phone, nc department of transportation, ncdot, ncdot now, north carolina, north carolina department of transportation, protocol stack, public transport, second industrial revolution, speed, spreadsheet, transportation planning, visualization (graphics)
Casey Schaufler
Security Engineer at Intel
access control, access-control list, amanda palmer, android (operating system), audit, berkeley packet filter, bit, blog, calypso music, city block, computer data storage, computer network, crufts, domain name system, european troika, extended file attributes, file system, information, infrastructure, inode, internet control message protocol, internet protocol, internet protocol suite, intrusion detection system, ipsec, iptables, ipv4, ipv6, linux, linux security modules, mobile app, module (mathematics), mountain, network file system, network socket, parsing, patch (computing), property, protocol stack, samsung, security-enhanced linux, server (computing), session initiation protocol, space, string (computer science), switch, symbolic link, syndrome, system call, tizen, trail, tree, use case, user identifier
Sara Fecadu
Software Engineer at Nordstrom
adaptive bitrate streaming, application software, bandwidth (computing), bit rate, communication protocol, computer network, data compression, data link layer, digital audio, dynamic adaptive streaming over http, http live streaming, hypertext transfer protocol, ios, javascript, jsconf, jsconfus, jsconfus2019, network congestion, packet loss, protocol stack, streaming media, tcp congestion control, throughput, transcoding, transmission control protocol, transport layer, web browser, world wide web
Sneha Inguva
Software Engineer, CNS Networking at DigitalOcean
communication protocol, computer network, connection-oriented communication, data link layer, encapsulation (networking), ethernet, ethernet frame, firewall (computing), frame (networking), https, hypertext transfer protocol, internet protocol, internet protocol suite, ip address, ipv4, ipv6 packet, network packet, network socket, osi model, port (computer networking), port scanner, protocol stack, transport layer, user datagram protocol
Nate Klein
OCP Security Project Lead at Google Inc.
bios, booting, business process management, cloud computing, common criteria, computer hardware, cryptography , encryption, engineering workshop, firmware, key management, man-in-the-middle attack, microsemi, ocpsummit18, pci express, plaintext, principle of least privilege, protocol stack, reliability engineering, replay attack, security, software , system on a chip, theory, trusted platform module, virtual machine, vulnerability (computing)
Bryan Kelly
Principal Firmware Engineering Manager at Microsoft
bios, booting, business process management, cloud computing, common criteria, computer hardware, cryptography , encryption, engineering workshop, firmware, key management, man-in-the-middle attack, microsemi, ocpsummit18, pci express, plaintext, principle of least privilege, protocol stack, reliability engineering, replay attack, security, software , system on a chip, theory, trusted platform module, virtual machine, vulnerability (computing)
Jesus Sanchez-Palencia
Software Engineer at Intel
audio video bridging, communication protocol, computer network, computer programming, debugging, device driver, ethernet, file system, firewall (computing), hypervisor, interface (computing), internet, internet protocol, iptables, linux foundation, linux kernel, microphone, network interface controller, protocol stack, qt (software), scheduling (computing), sound recording and reproduction, synchronization, telephone, traffic shaping
Monica Quaintance
Head of Research & Networks at Kadena
algorithm, bitcoin, blockchain, brand, communication protocol, cryptographic hash function, dijkstra's algorithm, ethereum, exchange-traded fund, formal verification, futures contract, futures exchange, investor, language, mining, news, proof of work, protocol stack, recursion, shortest path problem, smart contract, space, technology, throughput, united states
1
1-27 of 27