Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-30 of 75
1-30 of 75
Filter
Brandon Evans
Senior Security Engineer - Developer Training at Zoom
altmetrics, amazon dynamodb, amazon elastic compute cloud, amazon s3, amazon web services, api, backup, cloud computing, command-line interface, computer network, encryption, file transfer protocol, infrastructure as code, internet, metadata, microsoft, microsoft azure, mobile app, node.js, npm (software), proxy server, subnetwork, threats among, web service
Mohamed Chaabane
PhD Student at Colorado State University
camera, cartesian coordinate system, codec, colorado state university, data, data compression, geo-localization, geometry, image, immigration, impedance matching, light, matrix (mathematics), metal, monocular, perception, rgb color model, sbar, subnetwork, sugar, tractor, traffic light, uber, urine, video, weather
Nir Schachter
Product Manager at Redis Labs
amazon web services, cisco systems, cloud computing, command-line interface, computer data storage, data center, database, devops, flash memory, high availability, icloud, internet, load balancing (computing), microsoft azure, persistence (computer science), programmer, random-access memory, redis, redis enterprise cloud, redis labs, replication (computing), server (computing), software , subnetwork, template (c++), tool
Shoham Chakraborty
Student at Singapore University of Technology and Design
computer file, domain name, domain name registrar, domain name system, firewall (computing), flask (web framework), google search, html, internet protocol, ip address, ipv4, load balancing (computing), macintosh, microsoft windows, network socket, nginx, personal computer, proxy server, public-key cryptography, secure shell protocol, subnetwork, transport layer security, web application, web server, world wide web
Jennifer Reed
Strategic Solution Director / Principal Consultant at Viktor Davis
aircraft pilot, amazon web services, architect, automation, banyan vines, bit, category 5 cable, cisco systems, cloud computing, devops, engineer, ethernet, experience, internet, internet protocol suite, knowledge, network switch, router (computing), silicon valley, space, subnetwork, teradata, token ring, troubleshooting, understanding
Toby Foss
Dir Of Network Cloud Operations at Informatica
aircraft pilot, amazon web services, architect, automation, banyan vines, bit, category 5 cable, cisco systems, cloud computing, devops, engineer, ethernet, experience, internet, internet protocol suite, knowledge, network switch, router (computing), silicon valley, space, subnetwork, teradata, token ring, troubleshooting, understanding
Stacy Lanier
Sr. Manager, DevOps Service Management and Network Services at Teradata
aircraft pilot, amazon web services, architect, automation, banyan vines, bit, category 5 cable, cisco systems, cloud computing, devops, engineer, ethernet, experience, internet, internet protocol suite, knowledge, network switch, router (computing), silicon valley, space, subnetwork, teradata, token ring, troubleshooting, understanding
Steve Mullaney
President & CEO at Aviatrix
aircraft pilot, amazon (company), amazon web services, analytics, andy jassy, api, application software, architect, attention, automation, banyan vines, bit, brand, business, cambrian explosion, category 5 cable, chief information officer, cisco systems, citrix systems, client–server model, cloud computing, communication protocol, competitive advantage, computer network, conversation, cryptography , customer, data center, data in use, dave vellante, decision-making, definition, design, devops, ecosystem, education, encryption, engineer, entrepreneurship, ethernet, experience, factory, financial technology, future, gateway (telecommunications), global catastrophic risk, goal, google, hewlett-packard, ibm, infrastructure, infrastructure as code, innovation, insurance, internet, internet protocol, internet protocol suite, interoperability, john furrier, juniper networks, knowledge, knowledge base, kubernetes , language, lawyer, machine learning, methodology, microservices, microsoft azure, mind, mining, multiprotocol label switching, nature, network switch, open world, oracle corporation, orchestration, outsourcing, pain, price, protocol stack, reality, rights, risk, router (computing), science, screw, security, server (computing), silicon valley, siliconangle, siliconangle inc, siliconangle media inc, space, startup company, streaming media, subnetwork, systems theory, teradata, terraforming, thecube, thought, token ring, transmission control protocol, transport layer security, troubleshooting, truth, understanding, unicellular organism, use case, vmware, weed, wikibon, wireless ad hoc network
John Furrier
Cofounder & CEO at SiliconANGLE Media
#thecube, 19-inch rack, 2021, 3d computer graphics, 5g, @thecube, abstraction, abstraction (computer science), accenture, accessibility, addiction, advanced micro devices, advertising, aerospace, agile software development, air traffic control, aircraft pilot, algorithm, alibaba group, amazon, amazon (company), amazon alexa, amazon dynamodb, amazon elastic compute cloud, amazon web services, analysis, analytics, andy jassy, ansible, ansiblefest 2020, apache hadoop, api, app store (ios), apple inc., apple tv, apple watch, application software, architect, architecture, assembly line, attention, augmented reality, automated teller machine, automation, autonomous robot, aws, aws summit digital 2020, aws summit online 2020, backup, bank, banner, banyan vines, base station, behavior, bell, best practice, bias, big data, bill gates, bit, bitcoin, blackboard inc., body language, boston, brand, brand loyalty, bsd licenses, business, business model, california, california institute of technology, call centre, cambrian explosion, capacity planning, capital (economics), capital market, capital one, car, carbon black (company), caregiver, cash, cash transfer, category 5 cable, cellular network, central processing unit, change your mind (steven universe), charles de gaulle, chief executive officer, chief information officer, child abuse, child and family services, chris foster, cisco systems, citrix systems, civility, client (computing), client–server model, cloud, cloud computing, cloud native computing foundation, cloud storage, cloud- microservices architecture, cloudera, clustered file system, cold chain, communication protocol, community, competitive advantage, compliance (psychology), computer, computer architecture, computer data storage, computer hardware, computer network, computer programming, computer science, computer security, computer vision, computing, consumer privacy, consumerization of information technology, containerization, continuous delivery, contract, control theory, conversation, coronavirus disease 2019, covid-19 pandemic, covid-19 pandemic in the united states, covid-19 vaccine, creativity, credit card, crime, critical thinking, cryptography , culture, customer, customer experience, customer relationship management, customer service, data, data center, data governance, data in use, data lake, data quality, data security, data warehouse, database, database design, dave brown, dave vellante, david brown, dean grey, debit card, debt, debugging, decision-making, deep learning, definition, dell, dell emc, design, desktop computer, desktop virtualization, devops, digital transformation, dimension, distance education, distributed computing, distributed workforce, dividend, docker (software), dog food, donald trump, downtime, dream, dropbox (service), dunkin' donuts, dvd, ecological resilience, economy, ecosystem, edge computing, education, elasticsearch, electric battery, electronic benefit transfer, email, emergence, employment, encryption, end user, energy, engineer, engineering, enterprise software, entrepreneurship, ethernet, evolution, experience, expert, extract, transform, load, facebook, factory, fee, file system, financial industry regulatory authority, financial technology, firmware, food, force, franklin d. roosevelt, future, gateway (telecommunications), generation, generation z, gigabit ethernet, github, global catastrophic risk, goal, google, governance, graph database, graphics processing unit, grocery store, hashtag, headphones, headset (audio), health care, help desk, herain oberoi, hewlett packard enterprise, hewlett-packard, hillary clinton, history, human, humour, hybrid (biology), ibm, ibm z, ieee 1394, immersion (virtual reality), information, information technology, infrastructure, infrastructure as code, initial public offering, innovation, instagram, insurance, integrated circuit, intel, intelligence, interest, internet, internet of things, internet protocol, internet protocol suite, interoperability, interview, invention, inventory, investment, jeff frick, jimmy chen, john furrier, juniper networks, keynote, keynote analysis day 1, keynote analysis day 2, knowledge, knowledge base, kubernetes , language, laptop, latency (engineering), lawn, lawyer, leadership, learning, letter box, leverage (finance), license, life-cycle assessment, linkedin, linux, linux foundation, load balancing (computing), logos, los angeles unified school district, lumber, mac mini, macbook, machine learning, macintosh, macos, mainframe computer, mana, management, manufacturing, mark lohmeyer, market (economics), marketplace, mass media, mathematical optimization, mathematics, mergers and acquisitions, metadata, metal, methodology, microservices, microsoft, microsoft azure, microsoft excel, microsoft sql server, microsoft windows, microstrategy, mind, mindset, mining, mobile app, mobile banking, mobile phone, money, monopoly, moore's law, motivation, multiprotocol label switching, music, nature, negotiation, netflix, network switch, neural network, new york city, news, nigger, nike, inc., nitrous oxide engine, node (networking), nothing, nvidia, office 365, onboarding, online and offline, online banking, open innovation, open source, open world, open-source software, open-source-software movement, openshift, openstack, operating model, operating system, optum, oracle corporation, oracle database, orchestration, organization, outsourcing, overdrive (mechanics), package manager, pain, partnership, patch (computing), permissive software license, personal data, personal trainer, physics, physics engine, pixar, plastic, platform as a service, postgresql, prayer, prediction, predictive analytics, predictive maintenance, pressure, price, pricing, privacy, procurement, productivity, program optimization, programmer, project jupyter, propel, protocol stack, proton, provenance, psychology, punishment, quality of life, quantum algorithm, quantum computing, rackspace technology, radar, radio, rapid transit, raspberry pi, real-time computing, real-time data, real-time performance, reality, reason, recommender system, red hat, red hat summit, reddit, redis, redis labs, redshift, regulatory compliance, reinforcement, reinforcement learning, reliability engineering, rendering (computer graphics), reputation, research, retail, rhsummit, rights, risk, robot, robotics, router (computing), runtime system, sales, sales process engineering, salesforce, san francisco, sanjay poonen, scalability, scat singing, science, screw, secret superstar, security, self-service, selfie, semantics, sensor, server (computing), serverless computing, sewing, share repurchase, silicon valley, siliconangle, siliconangle inc, siliconangle media inc, simulation, skylab, skylab apps, slack (software), smart tv, snowflake, social media, social norm, social stigma, software , software as a service, software framework, software release life cycle, solar power, space, specification (technical standard), spectrum, speech recognition, splunk, sql, standardization, startup company, statistics, stock market, streaming media, stu miniman, studio, subnetwork, supercomputer, supplemental nutrition assistance program, supply chain, surveillance, synergy, system, systems theory, t-shirt, tablet computer, take-out, tattoo, taxonomy (biology), tc energy, technology, telco cloud, telecommunication, telecommuting, telehealth, telemetry, television, tensorflow, teradata, terraforming, tesla, inc., thecube, theory, thought, thoughts and prayers, thread (computing), throughput, thunderbolt (interface), token ring, tool, tornado, touchscreen, transmission control protocol, transparency (behavior), transport layer security, troubleshooting, truth, twilio, twitter, understanding, unemployment, unicellular organism, united states, unity (game engine), university, unstructured data, use case, value proposition, venmo, verizon communications, vibe (magazine), video on demand, videotelephony, virtual private network, virtual reality, virtual reality headset, virtualization, visualization (graphics), vmware, vmworld, vmworld 2020, vmworld 2020 analysis two, vmworld 2020 keynote analysis, vulnerability (computing), warehouse, water, waterfall model, watson (computer), wearable technology, web application, web browser, web service, weed, white-label product, wi-fi, wide area network, wikibon, wikipedia, wireless ad hoc network, women in the workforce, workload, world wide web, writer, youtube, zoom (software), zoom video communications
Jim Mlodgenski
Principal Engineer at Amazon Web Services
backup, bit, case sensitivity, central processing unit, command-line interface, computer data storage, computer file, database, database schema, dual table, exception handling, information retrieval, ip address, java (programming language), javascript, json, letter case, macro (computer science), parameter (computer programming), postgresql, scheme (programming language), software bug, software performance testing, subnetwork, subroutine
Aarthi Raju
Solutions Architecture Leader | Principal Architect at Amazon Web Services (AWS)
2020, amazon, amazon dynamodb, amazon elastic compute cloud, amazon vpc, amazon web services, aws, aws direct connect, aws events, aws summit online, border gateway protocol, cloud computing, compute & networking, computer network, database, gateway (telecommunications), internet, internet protocol, ip address, ipsec, ipv4, ipv6, ipv6 address, level 200, link aggregation, load balancing (computing), may 13, private network, router (computing), routing, subnetwork, transmission control protocol, united states, virtual private cloud, virtual private network, world wide web
Gordon Platt
Senior Database Administrator at Mastercard
argument, computer hardware, currency, data migration, database, database schema, directv, edb, enterprisedb, ip address, java (programming language), mastercard, menu, microsoft sql server, money, online and offline, oracle database, postgres, postgresql, replication (computing), reputation, snapchat, sql, subnetwork, subroutine, trigger (firearms), wall street
Ara Pulido
Developer Relations at Datadog
access control, analytics, api, app migration, asynchronous, automation, border gateway protocol, cache (computing), caching patterns, causality, cgroups, chinese martial arts, cloud computing, cloud sidecar, clusters gitops, communication protocol, computer network, concept, containers, data, data lakes, decision-making, distributed computing, distributed database, docker, domain name system, english language, fintech, flagger , fluentd save, flux2 multi-cloud, galls law, gatekeeper, gating service, github, graalvm, graviton2, hdfs, health check, iam reliability, infrastructure drift, interface (computing), internet protocol, jumpstart, kotlin, kubernetes , kubernetes cloud, language, library, load balancing (computing), microservice, multi-cloud magic, name server, need for speed, news, opa, open liberty, open source, open-source software, pain, parameter, pipelines ci/cd, poilcy-as-code, police, public cloud, quarkus, rapid transit, reason, role-based access control, routing, routing table, serverless, software design pattern, software-defined networking, space, subnetwork, tax, telemetry, temperature, template (c++), time, twitter, uber, verb
Dave Scott
Member of Technical Staff at Docker, Inc
adobe flash, application software, architecture of windows nt, computer file, computer network, containers, database, desktop environment, docker, file system, firewall (computing), ip address, kernel (operating system), microsoft windows, network socket, password, server (computing), server message block, shared memory, shell (computing), software , software bug, subnetwork, virtual machine, web browser, windows 10, world wide web
Charl van der Walt
Head Of Security Research at Orange Cyberdefense
captive portal, computer network, dhcpv6, domain name system, dynamic host configuration protocol, end user, hypertext transfer protocol, internet, ip address, ipv6, javascript, mobile browser, name server, node (networking), operating system, private network, router (computing), split tunneling, subnetwork, transport layer security, tunneling protocol, virtual private network, web browser, wi-fi, world wide web
Wicus Ross
Senior Researcher at Orange Cyberdefense
captive portal, computer network, dhcpv6, domain name system, dynamic host configuration protocol, end user, hypertext transfer protocol, internet, ip address, ipv6, javascript, mobile browser, name server, node (networking), operating system, private network, router (computing), split tunneling, subnetwork, transport layer security, tunneling protocol, virtual private network, web browser, wi-fi, world wide web
David Cordes
Manager Product Engineering at ESRI
amazon elastic compute cloud, amazon web services, arcgis, backup, bts, computer network, dmz (computing), esri, esri events, example, firewall (computing), gateway (telecommunications), geographic information system, gis, gps, htc, html, http , https, hypertext transfer protocol, internet, load balancing (computing), microsoft windows, microsoft word, network address translation, operating system, remote desktop services, server (computing), software release life cycle, subnetwork, transport layer security, usability, web browser, web portal, wi-fi, windows, world wide web, браузер, всемирная паутина, ейск, мтс (компания), нью-йорк, пенза, пикачу, россия-1, снюс, солнце, союз советских социалистических республик, томск, черепашки-ниндзя
Kanika Kumar
Senior Product Engineer at ESRI
amazon elastic compute cloud, amazon web services, analytics, android (operating system), arcgis, autoscaling, backup, best practice, cache (computing), cloud computing, command-line interface, computer network, database, dmz (computing), domain name system, esri, esri events, firewall (computing), gateway (telecommunications), geographic information system, gis, hypertext transfer protocol, image hosting service, internet, json, linux, load balancing (computing), login, microsoft sql server, microsoft windows, network address translation, operating system, patch (computing), postgresql, remote desktop services, server (computing), software , software release life cycle, subnetwork, transport layer security, usability, web browser, web portal, world wide web
Ivan Ma
Principal Sales Consultant at Oracle
application software, architect, automation, backup, business logic, central processing unit, china, cluster deployment, command-line interface, computer, computer file, computer hardware, computer mouse, computer network, data performance, database, database transaction, education, email, encryption, feeling, file system, firefox, flow control (data), foss, fossasia, free and open source, google, hong kong, influenza, innodb, innodb cluster, input/output, java database connectivity, jdbc driver, lamp (software bundle), law, linux, love, memory, metadata, microsoft, microsoft windows, mysql, mysql database, mysql troubleshooting, news, nothing, ntfs, online and offline, open source, open tech, opentechsummit, oracle corporation, password, performance analysis, personal computer, php, problem solving, proxy server, reason, recursion, replication (computing), router (computing), server (computing), shenzhen, skype, snapshot (computer storage), software , solid-state drive, sql, subnetwork, sun microsystems, trout, universally unique identifier, user (computing)
Alexander Latzko
Program Committee Member at NANOG
anycast, aston martin db7, aston martin db9, border gateway protocol, communication protocol, dhcpv6, domain name system, dynamic host configuration protocol, internet control message protocol for ipv6, ip address, ip multicast, ipsec, ipv4, ipv6, ipv6 address, jumbo frame, mac address, medium access control, multicast, network address translation, open shortest path first, router (computing), routing, subnetwork, tunneling protocol
Andrew Wang
Principal Software Engineer at Comcast
anycast, berkeley packet filter, classless inter-domain routing, computer network, data center, domain name system, emulator, ethernet, gateway (telecommunications), handshaking, internet, internet protocol, ip address, ipv6, ipv6 packet, network socket, router (computing), routing, server (computing), simulation, subnetwork, time to live, transmission control protocol, wireless ad hoc network, world wide web
Marissa Schmidt
Senior Director of Product Management at Citrix
active directory, amazon web services, autoscaling, business, citrix synergy 2019, citrix systems, client (computing), cloud, cloud computing, collaboration, devops, domain name system, drawing, end user, enterprise, gateway (telecommunications), github, internet, kubernetes , load balancing (computing), microsoft, mobility, netscaler, networking, routing, scalability, server (computing), software , subnetwork, technology, throughput, transport layer security, twitter, use case, virtualization
Greg Dolan
Distinguished Sales Engineer at Citrix
active directory, amazon web services, autoscaling, business, citrix synergy 2019, citrix systems, client (computing), cloud, cloud computing, collaboration, devops, domain name system, drawing, end user, enterprise, gateway (telecommunications), github, internet, kubernetes , load balancing (computing), microsoft, mobility, netscaler, networking, routing, scalability, server (computing), software , subnetwork, technology, throughput, transport layer security, twitter, use case, virtualization
Airton Lastori
MySQL Product Manager at Oracle
analytics, application software, automation, backup, cloud computing, command-line interface, communication protocol, computer data storage, computer network, control plane, database, database schema, directory (computing), groundbreakers, json, oracle cloud, oracle developers, query optimization, random-access memory, server (computing), serverless computing, snapshot (computer storage), ssh (secure shell), subnetwork, upload, version control, virtual machine, world wide web
Nikhil Shampur
Development Lead at ESRI
active directory, amazon elastic compute cloud, ansible (software), api, arcgis, big data, business, cache (computing), certificate authority, client (computing), cloud computing, command-line interface, computer data storage, computer file, computer network, computer program, computer programming, database, desk, domain name system, esri, esri events, file system, geographic information system, gis, github, hypervisor, infrastructure as code, installation (computer programs), internet, ip address, library (computing), linux, load balancing (computing), microsoft visual studio, network topology, object storage, open-source model, operating system, password, patch (computing), postgresql, powershell, proxy server, remote desktop services, routing, scalability, server (computing), server message block, single sign-on, software , solid-state drive, source code, ssh (secure shell), subnetwork, user (computing), virtualization, web browser, web portal, windows server 2012, world wide web
Dave Burke
Software Engineer at Google
200 - intermediate, acorn archimedes, acorn computers, amazon dynamodb, amazon elastic compute cloud, amazon virtual private cloud, amazon web services, android, android (operating system), android dev summit '19, android dev summit 2019, android dev summit 2019 keynote, android dev summit keynote, android developers, android developers summit 2019, android devs, android devs 2019, android keynote, android pie, announcement, arm architecture, aws, aws cloud, aws re:inforce, aws re:inforce 2019, aws re:inforce 2019 sessions, aws security, bbc micro, chrome os, chromebook, cloud, cloud computing, cloud security, cloud security community, command-line interface, communication protocol, compliance, computer keyboard, computer network, data protection, dave burke, dave burke keynote, dave burke keynote at ads, default gateway, detective controls, emergency telephone number, enhanced 9-1-1, form factor (mobile phones), google, google logo, google play, governance, grayscale, hypertext transfer protocol, icon (computing), identity, incident response, information, infrastructure security, innovation, internet, internet protocol, intrusion detection system, ios, ip address, jetbrains, kotlin (programming language), laptop, learning conference, library (computing), load balancing (computing), machine learning, memory, memory management, metadata, microservices, microsoft, mobile app, mobile phone, model–view–controller, new in android 2019, operating system, pcap, personal computer, reason, research, risk, router (computing), security, security best practices, security pioneers, sep209, session, steph cuthbertson, subnetwork, tablet computer, transport layer security, twitter, video, virtual private network, wearable computer, web browser, web server, wi-fi, world wide web, youtube
Anoop Dawani
Principal Product Manager at Amazon Web Services
200 - intermediate, amazon dynamodb, amazon elastic compute cloud, amazon virtual private cloud, amazon web services, aws, aws cloud, aws re:inforce, aws re:inforce 2019, aws re:inforce 2019 sessions, aws security, cloud, cloud computing, cloud security, cloud security community, command-line interface, communication protocol, compliance, computer network, data protection, dave burke, default gateway, detective controls, governance, hypertext transfer protocol, identity, incident response, infrastructure security, internet, internet protocol, intrusion detection system, ip address, learning conference, load balancing (computing), microservices, pcap, personal computer, risk, router (computing), security, security best practices, security pioneers, sep209, session, subnetwork, transport layer security, virtual private network, web browser, web server, world wide web
Matt Lehwess
Principal Solutions Architec at Amazon Web Services
200 - intermediate, amazon dynamodb, amazon elastic compute cloud, amazon virtual private cloud, amazon web services, aws, aws cloud, aws re:inforce, aws re:inforce 2019, aws re:inforce 2019 sessions, aws security, cloud, cloud computing, cloud security, cloud security community, command-line interface, communication protocol, compliance, computer network, data protection, dave burke, default gateway, detective controls, governance, hypertext transfer protocol, identity, incident response, infrastructure security, internet, internet protocol, intrusion detection system, ip address, learning conference, load balancing (computing), microservices, pcap, personal computer, risk, router (computing), security, security best practices, security pioneers, sep209, session, subnetwork, transport layer security, virtual private network, web browser, web server, world wide web
William Bengtson
Cloud Security Tools and Operations at Netflix
amazon (company), amazon dynamodb, amazon elastic compute cloud, amazon web services, api, appsec, appseccali, autoscaling, best practice, blacklist (computing), cloud computing, command-line interface, computer network, database, email, employee benefits, engineering, firebreak, gateway (telecommunications), hypertext transfer protocol, identifier, identity management, internet, internet protocol, intrusion detection system, ip address, ipv6, java (programming language), learning, linux, machine learning, metadata, microservices, netflix, network address translation, newline, open-source software, owasp, pandora (console), php, pipeline (computing), pointer (computer programming), power user, principle of least privilege, proxy server, python (programming language), router (computing), security token, server (computing), session id, single sign-on, software , software bug, software development kit, subnetwork, transport layer security, twitter, virtual private cloud, virtual private network, vulnerability (computing), web application, world wide web
Mahdi Sajjadpour
ДолжностьWW Business Development Leader for AWS Service Catalog, AWS Control Tower at Amazon Web Services (AWS)
& compliance, 300 - advanced, active directory, air traffic control, amazon web services, audit, aws, aws cloud, aws re:inforce, aws re:inforce 2019, aws re:inforce 2019 sessions, aws security, bluetooth, business, chandar venkataraman, cloud, cloud computing, cloud security, cloud security community, compliance, data protection, detective controls, directory (computing), email, end user, expert, global positioning system, governance, grc313-r, identity, identity management, incident response, infrastructure security, ip address, learning conference, login, pricing, provisioning (telecommunications), regulatory compliance, risk, security, security best practices, service catalog, session, single sign-on, sms, subnetwork, tax, user (computing), web portal
1 2 3
1-30 of 75