Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
91-120 of 375
91-120 of 375
Filter
Maggie Love
Founder at SheFi
adoption, anarchism, art, blockchain, blockchain technology, census, cloud computing, computing, cryptocurrency, decentralization, decentralized finance, defi, defi blockchain for women, defi conference day, defi conference day 2, defi education, defi education for women, defi shefi, defi summit, defi summit 2021, defi technology, defi women, demography, economic inequality, education, end user, entrepreneurship, finance, financial literacy, gender, gender pay gap, generation z, innovation, instagram, internet, internet protocol suite, invention, leadership, literacy, maggie love, market maker, money, music industry, non-fungible token, public-key cryptography, reality, reputation, shefi, social media, society for worldwide interbank financial telecommunication, startup company, telegram (software), tik tok (song), twitter, uniswap, united states census bureau, web 2.0, what is defi, what is shefi, workforce, zoom (software)
Ralf Gerteis
Co-Founder at Scaleswap
anarchism, art, blockchain, cloud computing, computing, cryptocurrency, decentralized finance, end user, entrepreneurship, generation z, innovation, instagram, internet, internet protocol suite, invention, leadership, market maker, music industry, public-key cryptography, reality, reputation, social media, society for worldwide interbank financial telecommunication, startup company, tik tok (song)
Ranica Arrowsmith
Technology Editor, Accounting Today at Arizent
anarchism, art, blockchain, cloud computing, computing, cryptocurrency, decentralized finance, end user, entrepreneurship, generation z, innovation, instagram, internet, internet protocol suite, invention, leadership, market maker, music industry, public-key cryptography, reality, reputation, social media, society for worldwide interbank financial telecommunication, startup company, tik tok (song)
Shoham Chakraborty
Student at Singapore University of Technology and Design
computer file, domain name, domain name registrar, domain name system, firewall (computing), flask (web framework), google search, html, internet protocol, ip address, ipv4, load balancing (computing), macintosh, microsoft windows, network socket, nginx, personal computer, proxy server, public-key cryptography, secure shell protocol, subnetwork, transport layer security, web application, web server, world wide web
Clarence Liu
Chief Technology Officer at Tacen
android (operating system), apple id, apple inc., biometrics, bitcoin, blockchain, cash, cloud computing, commodity futures trading commission, computer, credential, decentralization, decentralized exchange, derivative (finance), education, email, entrepreneurship, facebook, financial transaction, futures contract, google, google account, hash function, instagram, insurance, interest, interest rate, internet, internet forum, ios, iris recognition, messaging apps, microsoft, mobile app, money, money laundering, money market, multi-factor authentication, peer-to-peer, privacy, property, public key infrastructure, public-key cryptography, smart contract, web browser, world wide web
Vikas Singh
BloqueLabs at Founder & CEO
arbitrage, art, attention, bank, behavior, bitcoin, blockchain, collateral (finance), collective intelligence, commodity, communication protocol, crowdsourcing, cryptocurrency, desert, disability, employment, energy, entrepreneurship, ethereum, ethics, fee, finance, fixed deposit, foreign exchange market, future, google play, honda, inflation, information, intelligence, interest, interest rate, ios, iphone 12, layoff, loan, machine to machine, market (economics), market liquidity, matrix (mathematics), mining, mobile app, money, music, network effect, nothing, paypal, pointer (computer programming), pollution, public-key cryptography, question, rape, reason, reputation, reputation system, skill, stack (abstract data type), startup company, supply chain, temperature, text messaging, thermodynamic equilibrium, thermodynamics, unemployment, water, working time, youtube
Ashish Mehta
Director at Genese Incubation Management Private Limited
adoption, amazon (company), application software, asset, authentication, bank, belief, bitcoin, blockchain, bretton woods system, central bank, computer security, computing, concept, cryptocurrency, cryptography , currency, customer, decentralization, depository trust & clearing corporation, digital signature, dubai, ecosystem, facebook, federal reserve, fiat money, finance, floating exchange rate, food delivery, identity management, infrastructure, initial coin offering, insurance, internet, interoperability, investment, investor, key size, library, lol, macroeconomics, microsoft, milton friedman, money, motivation, msn, natural law, perception, platform ecosystem, playstation (console), price, privacy, provenance, public-key cryptography, regulatory compliance, science, software , startup company, supply chain, technology, traceability, twitter, use case, war
Gregg Kidd
CEO at GlobaliD
ach network, adoption, advertising, american express, android (operating system), apple pay, authentication, bailout, bank, bitcoin, blockchain, business model, cash, central bank, coinbase, credit, credit card, cryptocurrency, currency, de beers, debit card, digital currency, diversification (finance), economy, facebook, fake news, finance, financial crisis of 2007–2008, global investment trends, global investor, global marketplace, google pay, income, industry leaders, inflation, internet, internet celebrity, investment, investor, lightning network, market (economics), market liquidity, monetization, money, netflix, non-fungible token, office of the comptroller of the currency, payment, paypal, privacy, public-key cryptography, ripple (payment protocol), speculation, stablecoin, staples inc., startup company, text messaging, trade, trends, twitter, u.s. securities and exchange commission, united states congress, united states dollar, use case, valuation (finance), visa inc., warren buffett, wechat
Christopher Lee
Chief Marketing Officer at Fabrx Blockchain
advertising, andreessen horowitz, anonymity, art, authentication, bank, bitcoin, blockchain, blog, bond (finance), brand, business model, central bank, coffee, coin, coinbase, conversation, covid-19 pandemic, cryptocurrency, de beers, decentralization, decentralized finance, digital currency, disability, economy of china, education, engagement, entrepreneurship, environment, envy, ethereum, expert, facebook, fake news, federal reserve, fidelity investments, finance, financial technology, fintech, fiscal policy, fixed income, global investment trends, hedge fund, husband, income, inflation, inflation targeting, innovation, instagram, institutional investor, insurance, intelligence, interest, interest rate, internet, internet celebrity, investment, investments, investor, literacy, macroeconomics, managment, market (economics), mind, monetary policy, monetization, money, movements , movie theater, msci, netflix, news, nft, nftnyc, nfts, non-fungible token, ownership, pension, price–earnings ratio, privacy, public-key cryptography, qr code, question, real interest rate, reason, recession, regulatory compliance, research, retirement, ripple (payment protocol), risk, science, social networking service, sony, spamming, standard chinese, startup company, supply chain, target corporation, tax, trends, twitter, u.s. securities and exchange commission, ubs, united states congress, valuation (finance), value proposition, venture capital, warren buffett, washington metropolitan area, wealth management, wechat, wife
Kevin Townsend
Senior Embedded Engineer at Linaro
arm architecture, booting, bootloader, cloud computing, computer data storage, computer security, cryptographic hash function, cryptography , database, elliptic curve digital signature algorithm, embedded system, encryption, firmware, internet of things, microcontroller, mobile app, product lifecycle, provisioning (telecommunications), public-key cryptography, qemu, representational state transfer, software , thought, transport layer security, unified extensible firmware interface
Gary Sugita
Director at Infineon
64-bit computing, access control, android (operating system), authentication, booting, bootloader, certificate authority, cloud computing, command-line interface, computer network, drag and drop, encryption, file system, gateway (telecommunications), handshaking, internet of things, machine to machine, patch (computing), product lifecycle, provisioning (telecommunications), public key certificate, public-key cryptography, unified extensible firmware interface, wi-fi
Maclain Lobdell
Technical Account Manager at Arm
64-bit computing, access control, android (operating system), authentication, booting, bootloader, certificate authority, cloud computing, command-line interface, computer network, drag and drop, encryption, file system, gateway (telecommunications), handshaking, internet of things, machine to machine, patch (computing), product lifecycle, provisioning (telecommunications), public key certificate, public-key cryptography, unified extensible firmware interface, wi-fi
Mohit Kedia
Senior Product Manager at Arm
64-bit computing, access control, android (operating system), authentication, booting, bootloader, certificate authority, cloud computing, command-line interface, computer network, drag and drop, encryption, file system, gateway (telecommunications), handshaking, internet of things, machine to machine, patch (computing), product lifecycle, provisioning (telecommunications), public key certificate, public-key cryptography, unified extensible firmware interface, wi-fi
Richard Barry
Senior Principal Engineer at AWS
64-bit computing, aerospace engineering, amazon web services, api, application software, cartesian coordinate system, chart, communication protocol, computer hardware, computer multitasking, computer security, computing, design, encryption, hypertext transfer protocol, interface (computing), internet of things, internet protocol suite, library (computing), linux, memory, memory management, memory protection, microcontroller, microsoft windows, mqtt, operating system, outsourcing, over-the-air programming, patch (computing), porting, product lifecycle, psa certified, public-key cryptography, real-time operating system, risk, science, simulation, software , system, thread (computing), transmission control protocol, wi-fi, xbox one
Andy Lucas
Senior Vice President, Global Distribution Technology at Universal Pictures
broadcasting, cable television, competition law, conversation, copyright infringement, customer experience, digital media, digital rights management, disney+, education, faq, infrastructure, interface (computing), internet, internet protocol television, language, netflix, over-the-top media service, public-key cryptography, streaming media, television, the walt disney company, virtualization, vulnerability (computing)
Scott Kelly
Manager, Device Partner Security at Netflix
broadcasting, cable television, competition law, conversation, copyright infringement, customer experience, digital media, digital rights management, disney+, education, faq, infrastructure, interface (computing), internet, internet protocol television, language, netflix, over-the-top media service, public-key cryptography, streaming media, television, the walt disney company, virtualization, vulnerability (computing)
Mark Arana
Vice President, Distribution Technology at Disney Media & Entertainment Distribution
broadcasting, cable television, competition law, conversation, copyright infringement, customer experience, digital media, digital rights management, disney+, education, faq, infrastructure, interface (computing), internet, internet protocol television, language, netflix, over-the-top media service, public-key cryptography, streaming media, television, the walt disney company, virtualization, vulnerability (computing)
Dianne Marsh
Director of Device & Content Security at Netflix
architect, arm architecture, broadcasting, cable television, central processing unit, competition law, complexity, computer hardware, computer security, conversation, copyright infringement, customer experience, digital media, digital rights management, disney+, ecosystem, education, faq, infrastructure, interface (computing), internet, internet protocol television, language, mobile phone, multitenancy, netflix, over-the-top media service, public-key cryptography, roaming, security, set-top box, space, streaming media, supply chain, technological convergence, telephony, television, the avengers (2012 film), the walt disney company, understanding, use case, video on demand, virtualization, vulnerability (computing)
Lily Chen
mathematician and heads Cryptographic Technology Group in Computer Security Division at NIST
algorithm, authentication, communication protocol, computer security, computing, cryptographic, cryptographic agility, cryptographic hash function, cryptography , email, encryption, firmware, information system, international association for cryptologic research, internet, it, key encapsulation, mass media, nist , operating system, patch (computing), public-key cryptography, quantum computing, quantum cryptography, random number generation, sim card, software , transport layer
Jean-Pierre Thibault
Senior Security Engineer, at NewAE
algorithm, android (operating system), arm architecture, booting, bus (computing), cryptography , encryption, field-programmable gate array, fpga prototyping, glitch, instruction set architecture, key (cryptography), microcontroller, motivation, open-source software, password, power analysis, program optimization, public-key cryptography, side-channel attack, software , software bug, system on a chip, test (assessment), valuation (finance)
Colin O'Flynn
CEO at NewAE Technology
advanced encryption standard, algorithm, android (operating system), arm architecture, arm cortex-m, booting, bus (computing), compiler, computational complexity theory, computer data storage, computer program, cryptography , database, datasheet, encryption, field-programmable gate array, fpga prototyping, glitch, gnu compiler collection, instruction set architecture, key (cryptography), library (computing), machine learning, microcontroller, motivation, neural network, open-source software, password, plaintext, power analysis, program optimization, public-key cryptography, random-access memory, read-only memory, robot, side-channel attack, software , software bug, source code, statistics, system on a chip, test (assessment), twitter, valuation (finance)
Vin Yu
Product Manager at Microsoft
active directory, azure devops server, central processing unit, cloud computing, code, command-line interface, continuous integration, database, domain name system, email address, kubernetes , linux, linux distribution, microsoft azure, microsoft sql server, operating system, password, powershell, public key certificate, public-key cryptography, quantifier (logic), rsa (cryptosystem), server, sql, transport layer security, windows 8, world wide web
James Prestwich
Protocol Engineer at Celo
adoption, attention, bitcoin, blockchain, chemical compound, client (computing), collateral (finance), communication, communication protocol, concept, consensus (computer science), credit, cryptocurrency, cryptographic hash function, cryptographic primitive, cryptography , decentralization, design, economic bubble, entrepreneurship, escrow, ethereum, ethics, fee, finance, information, infrastructure, interactivity, interest, internet, interoperability, key exchange, litecoin, loan, magic (cryptography), magic (supernatural), market liquidity, metamask, money, mortgage loan, open standard, option (finance), out-of-band data, perception, proof of work, public-key cryptography, reason, redshift, remittance, risk, segwit, semantic web, server (computing), smart contract, software release life cycle, stablecoin, standard form contract, swap (finance), system, technology, understanding, use case, web browser, world wide web
Andrew Poelstra
Director of Research at Blockstream
2019, algorithm, andrew poelstra, android (operating system), attention, auction, backup, best, worst and average case, bit, bitcoin, bitcoin culture, bitcoin history, bitcoin journalism, bitcoin magazine, bitcoin network, bitcoin news, bitcoin price, bitcoin talk, bitcoiners, blockchain, blockstream, blood, cat, coindesk, communication protocol, compiler, conditional (computer programming), consensus, consensus (computer science), consensus 2019, contract, conversation, costco, cryptocurrency, cryptographic hash function, cryptography , currency, cypherpunk, database, decentralization, definition, digital currency, digital signature, digital signature algorithm, elliptic curve digital signature algorithm, elvis presley, escrow, ethereum, fee, flag, formula, future, google, harry potter (character), information, interest, internet relay chat, iran, key (cryptography), language, lightning network, logarithm, logic, lol, luck, machine, market (economics), market liquidity, mathematics, matter, metadata, mining, money, motivation, music, option (finance), peer-to-peer, podcast, price, privacy, property, public-key cryptography, random oracle, reason, recursion (computer science), reliability (computer networking), research, satoshi, scalability, share (finance), signature, smart contract, stacking sats, stock, stock market, string (computer science), swap (finance), tax, understanding, uniform distribution (continuous), use case, weight, zero-knowledge proof, zero-sum game
Tiago Teles
ДолжностьSecurity Business Developer / InfoSec Evangelist at ABN AMRO Bank N.V.
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Thyla van der Merwe
Managing Director at ETH Zürich
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Christiane Peters
ДолжностьEMEA Data Security Services Lead at IBM
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Dan Shumow
Software Development Engineer at Microsoft
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Nadia Heninger
Associate Professor at University of California San Diego
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
Gaven Watson
Director - Advanced Cryptography, Visa Research at Visa
#realworldcrypto, bloom filter, certificate revocation list, cloud computing, collision attack, cryptographic hash function, digital signature, elliptic curve digital signature algorithm, firefox, key management, kubernetes , load balancing (computing), md5, ocsp stapling, online certificate status protocol, padding (cryptography), payment card industry data security standard, post-quantum cryptography, public key certificate, public key infrastructure, public-key cryptography, rsa (cryptosystem), sha-1, sha-2, transport layer security, world wide web
1 2 3 4 5 6 7 8 9 10 11 12 13
91-120 of 375