Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
121-150 of 326
121-150 of 326
Filter
Matt Brooks
Senior Technical Product Marketing Manager at Citrix
active directory, analytics, android (operating system), application software, bring your own device, business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer network, computer virus, data center, deep packet inspection, digital subscriber line, dmz (computing), domain name system, dropbox (service), dynamic host configuration protocol, educational technology, end user, enterprise, exchange activesync, facebook, facetime, firewall (computing), g suite, general data protection regulation, google play, internet, internet security, ios, load balancing (computing), malware, microsoft store (digital), mobile app, mobility, msn, multiprotocol label switching, netscaler, networking, office 365, onedrive, phishing, powershell, provisioning (telecommunications), proxy server, qr code, real-time computing, routing, saml 2.0, sd-wan, security assertion markup language, security token, server (computing), sharepoint, single sign-on, slack (software), software , stateful firewall, streaming media, technology, transmission control protocol, url redirection, user datagram protocol, video on demand, virtual private network, virtualization, voice over ip, web application, web browser, windows 10, windows update, world wide web
Mayank Singh
Technical Marketing Architect at Citrix
active directory, bandwidth (computing), business, cisco systems, citrix cloud, citrix synergy 2019, citrix systems, citrix workspace, cloud, collaboration, computer network, data center, data compression, database, desktop virtualization, enterprise, firewall (computing), graphics, hypervisor, icon (computing), internet, internet forum, jpeg, lenovo, meltdown (security vulnerability), microsoft azure, microsoft powerpoint, microsoft store (digital), microsoft surface, microsoft windows, mobile app, mobility, multiprotocol label switching, networking, office 365, onedrive, operating system, retail, sas (software), server (computing), skylake (microarchitecture), software , spectre (security vulnerability), subscription business model, system, technology, transmission control protocol, universal windows platform apps, usability, user datagram protocol, virtual reality headset, virtualization, web application, web page, windows 10, windows server 2012, workspace, world wide web, youtube
Roberto Moreno
Senior Corporate Account Manager at Citrix
amazon echo, authenticator, business, chromebook, citrix synergy 2019, cloud, collaboration, computer network, directx, enterprise, fido alliance, g suite, graphics processing unit, independent computing architecture, lag, linux, microsoft azure, mobility, multimedia, networking, nvidia, opengl, page orientation, security token, software , technology, throughput, transmission control protocol, trusted platform module, virtualization, webrtc, windows 10, windows installer, yubikey
Miguel Contreras
Senior Product Manager at Citrix
amazon echo, authenticator, business, chromebook, citrix synergy 2019, cloud, collaboration, computer network, directx, enterprise, fido alliance, g suite, graphics processing unit, independent computing architecture, lag, linux, microsoft azure, mobility, multimedia, networking, nvidia, opengl, page orientation, security token, software , technology, throughput, transmission control protocol, trusted platform module, virtualization, webrtc, windows 10, windows installer, yubikey
Aravind Namasivayam
Senior Program Manager at Microsoft
amazon echo, authenticator, business, chromebook, citrix synergy 2019, cloud, collaboration, computer network, directx, enterprise, fido alliance, g suite, graphics processing unit, independent computing architecture, lag, linux, microsoft azure, mobility, multimedia, networking, nvidia, opengl, page orientation, security token, software , technology, throughput, transmission control protocol, trusted platform module, virtualization, webrtc, windows 10, windows installer, yubikey
Fernando Klurfan
Principal Product Manager at Citrix
amazon echo, authenticator, barcode, business, chromebook, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, computer file, computer network, directx, end user, enterprise, fido alliance, file explorer, finder (software), g suite, graphics processing unit, independent computing architecture, ios, ios 10, lag, linux, macos, microsoft azure, microsoft excel, microsoft exchange server, microsoft outlook, mobility, multi-factor authentication, multimedia, netscaler, networking, nvidia, office 365, opengl, page orientation, password, pdf, peer-to-peer, security token, sharefile, single sign-on, software , technology, throughput, transmission control protocol, trusted platform module, virtualization, web browser, webrtc, windows 10, windows installer, workspace, world wide web, yubikey
Mark Howell
Senior Product Manager at Citrix
amazon echo, authenticator, business, chromebook, citrix synergy 2019, cloud, collaboration, computer network, directx, enterprise, fido alliance, g suite, graphics processing unit, independent computing architecture, lag, linux, microsoft azure, mobility, multimedia, networking, nvidia, opengl, page orientation, security token, software , technology, throughput, transmission control protocol, trusted platform module, virtualization, webrtc, windows 10, windows installer, yubikey
Rick Dehlinger
Principal Solutions Architect at Citrix Systems, Inc.
active directory, amazon elastic compute cloud, amazon relational database service, amazon web services, android (operating system), automation, autoscaling, backup, business, chrome os, chromebook, citrix cloud, citrix synergy 2019, citrix systems, citrix virtual apps, cloud, cloud computing, collaboration, command-line interface, computer file, computer network, desktop virtualization, digital transformation, enterprise, feeling, g suite, google, google chrome, graphics processing unit, infrastructure as code, innovation, legacy system, linux, microsoft, microsoft sql server, microsoft windows, mobile app, mobility, netscaler, network address translation, networking, nvidia, operating system, pain, patch (computing), powershell, provisioning (telecommunications), proxy server, reverse engineering, routing, scalability, secure shell, server message block, software , software-defined networking, technology, transmission control protocol, transport layer security, tunneling protocol, use case, virtualization, vmware, web browser, workstation, world wide web
Christiaan Brinkhoff
Global Black Belt - Sr. Technical Specialist, Windows Virtual Desktop at Microsoft
application programming interface, business, citrix synergy 2019, citrix systems, cloud, collaboration, computer file, desktop virtualization, enterprise, framebuffer, graphics processing unit, microsoft, microsoft excel, microsoft windows, mobility, networking, nvidia, office 365, operating system, ray tracing (graphics), snapchat, software , solid-state drive, streaming media, technology, transmission control protocol, user datagram protocol, videotelephony, virtual machine, virtualization, windows 10, windows 7, windows 8, windows vista
Thomas Poppelgaard
Independent Consultant / Technology Evangelist at Poppelgaard.com
application programming interface, business, citrix synergy 2019, citrix systems, cloud, collaboration, computer file, desktop virtualization, enterprise, framebuffer, graphics processing unit, microsoft, microsoft excel, microsoft windows, mobility, networking, nvidia, office 365, operating system, ray tracing (graphics), snapchat, software , solid-state drive, streaming media, technology, transmission control protocol, user datagram protocol, videotelephony, virtual machine, virtualization, windows 10, windows 7, windows 8, windows vista
Thomas Berger
Senior Manager - Technical Marketing & Competitive Intelligence at Citrix
android (operating system), bandwidth (computing), business, citrix synergy 2019, citrix systems, cloud, cloud computing, collaboration, competitive intelligence, computer file, computer network, data compression, database, email, enterprise, firefox, firewall (computing), graphics, happiness, icon (computing), incentive, internet, internet forum, ios, jpeg, machine learning, meltdown (security vulnerability), microsoft powerpoint, mobile app, mobility, multiprotocol label switching, networking, operating system, password, roku, siri, skylake (microarchitecture), slack (software), software , spectre (security vulnerability), system, tablet computer, technology, time, transmission control protocol, usability, user datagram protocol, virtualization, web browser, web page, wechat, whatsapp, windows 10, windows server 2012, workspace, world wide web, youtube
Sam Weeks
Customer Engineer
access control, analytics, application programming interface, application software, biologist, cloud computing, customer experience, data analysis, deep learning, design, encryption, giza pyramid complex, google, javascript, learning, machine learning, mongodb, object storage, open-source software, pyramid, software framework, transmission control protocol, understanding, use case, wi-fi
Shaghayegh Mardani
Student at UCLA
app store (ios), application software, cascading style sheets, computer network, conference, dynamic web page, email, html, ibm notes, javascript, library (computing), mobile web, open access, page layout, patch (computing), program analysis, program optimization, rendering (computer graphics), screenshot, server (computing), technology, transmission control protocol, transport layer security, usenix, web browser, web page, web server, web template system, world wide web
Sam Kumar
PhD Student in Computer Science at UC Berkeley
amazon elastic compute cloud, anonymity, blockchain, booting, central processing unit, client (computing), communication protocol, computer data storage, computer file, computer network, computer performance, conference, cryptography , email, embedded system, encryption, end-to-end encryption, gateway (telecommunications), hypertext transfer protocol, internet, internet access, internet of things, internet protocol, latency (engineering), linkedin, metadata, network congestion, open access, packet loss, privacy, proof of work, protocol stack, proxy server, public-key cryptography, random-access memory, read-only memory, recycling, router (computing), scheduling (computing), server (computing), server-side, smartphone, technology, throughput, time, tor (anonymity network), transmission control protocol, usenix, user datagram protocol, wi-fi, wireless access point, world wide web
Christopher Canel
Computer Science PhD Student at Carnegie Mellon University
bandwidth (computing), bit rate, black box, circuit switching, computer network, conference, data center, emulator, fuse (electrical), information, latency (engineering), multiplexing, network congestion, network planning and design, network scheduler, open access, open-source software, packet switching, racial segregation in the united states, reason, switch, tablet computer, tax, tcp congestion control, technology, time, transmission control protocol, usenix, wireless
Volker Lendecke
co-founder at SerNet
application programming interface, array data structure, cache (computing), cache coherence, clock, communication protocol, computer file, computer multitasking, conference, database, file system, global positioning system, library, metadata, microsoft windows, network file system, network socket, ntfs, open access, posix, process management (computing), server message block, shared memory, technology, transmission control protocol, unix, unix domain socket, unix time, usenix
Jeremy Allison
Storage & Open Source Engineer at Google
apache http server, cloud computing, computer file, conference, file server, file system, freebsd, internet, linux, microsoft, microsoft windows, ntfs, open access, password, personal computer, remote procedure call, scalability, server message block, smart card, software , system call, technology, thread (computing), transmission control protocol, usenix, virtual file system, web browser, world wide web
Yifei Yuan
Student at Carnegie Mellon University
accessibility, background check, behavior, complexity, computer, conference, datapoint, design, firewall (computing), flower, formal verification, information, internet, mobile phone, network address translation, news, open access, privacy, property, proxy server, reason, research, satisfiability modulo theories, siri, sympathy, technology, transmission control protocol, usenix, youtube
YoungGyoun Moon
Graduate Student at KAIST
application software, attention, central processing unit, computer hardware, computer network, computing, conference, design, facebook, handshaking, hewlett-packard, load balancing (computing), memory, network congestion, open access, pipeline (computing), reciprocity (social and political philosophy), server (computing), simple mail transfer protocol, tablet computer, tcp congestion control, technology, throughput, traffic light, transmission (mechanics), transmission control protocol, understanding, usenix, von neumann architecture
Brent Stephens
Environmental Engineering at Illinois Institute of Technology
border gateway protocol, central processing unit, computer data storage, computer network, conference, flash memory, internet privacy, latency (engineering), load balancing (computing), moore's law, network congestion, network interface controller, nvm express, open access, operating system, pci express, personal computer, pipeline (computing), proxy server, random-access memory, side-channel attack, simple network management protocol, software , technology, timing attack, transmission control protocol, usenix, whatsapp
Raluca Ada Popa
Assistant Professor at UC Berkeley
border gateway protocol, central processing unit, computer data storage, computer network, conference, flash memory, internet privacy, latency (engineering), load balancing (computing), moore's law, network congestion, network interface controller, nvm express, open access, operating system, pci express, personal computer, pipeline (computing), proxy server, random-access memory, side-channel attack, simple network management protocol, software , technology, timing attack, transmission control protocol, usenix, whatsapp
Amy Ousterhout
Postdoctoral Researcher at UC Berkeley Electrical Engineering & Computer Sciences (EECS)
border gateway protocol, central processing unit, computer data storage, computer network, conference, flash memory, internet privacy, latency (engineering), load balancing (computing), moore's law, network congestion, network interface controller, nvm express, open access, operating system, pci express, personal computer, pipeline (computing), proxy server, random-access memory, side-channel attack, simple network management protocol, software , technology, timing attack, transmission control protocol, usenix, whatsapp
Behnaz Arzani
Senior Researcher at Microsoft
accuracy and precision, attention, bias, border gateway protocol, central processing unit, cloud computing, communication protocol, computer data storage, computer network, conference, data center, denial-of-service attack, domain name system, flash memory, general data protection regulation, information, internet, internet privacy, internet protocol, ipv6, latency (engineering), load balancing (computing), machine learning, moore's law, netflix, network congestion, network interface controller, nvm express, open access, operating system, password, pci express, personal computer, pipeline (computing), privacy, proxy server, random-access memory, sampling (statistics), scalability, sensitivity and specificity, server (computing), side-channel attack, simple network management protocol, software , system, technology, time, timing attack, transmission control protocol, type i and type ii errors, usenix, whatsapp
Robert Beverly
Program Director at National Science Foundation (NSF)
border gateway protocol, central processing unit, computer data storage, computer network, conference, flash memory, internet privacy, latency (engineering), load balancing (computing), moore's law, network congestion, network interface controller, nvm express, open access, operating system, pci express, personal computer, pipeline (computing), proxy server, random-access memory, side-channel attack, simple network management protocol, software , technology, timing attack, transmission control protocol, usenix, whatsapp
Prateesh Goyal
PhD candidate at Massachusetts Institute of Technology
amazon (company), bandwidth (computing), border gateway protocol, bottleneck (production), central processing unit, cisco systems, communication protocol, computer data storage, computer network, conference, evaluation, feedback, flash memory, internet, internet privacy, internet protocol, ip address, last mile, latency (engineering), letter box, load balancing (computing), moore's law, network congestion, network interface controller, network packet, nvm express, open access, operating system, pci express, personal computer, pipeline (computing), proxy server, random-access memory, router (computing), side-channel attack, simple network management protocol, software , technology, telephone, throughput, time, timing attack, trade-off, transmission control protocol, usenix, user datagram protocol, whatsapp, wi-fi, wireless network
Andy Bechtolsheim
Chief Development Officer, Co-Founder, and CEO at Arista Networks
central processing unit, clock rate, cloud computing, cloud storage, communication protocol, computer data storage, computer network, data center, database, demand, facebook, graphics processing unit, integrated circuit, intel, internet, internet protocol, internet protocol suite, moore's law, network interface controller, persistent memory, reliability engineering, scalability, small form-factor pluggable transceiver, snia, storage, storage networking industry association, trade-off, transmission control protocol, transport layer, usb flash drive
Houston Putman
Software Engineer at Bloomberg
activate19, apache hadoop, apache solr, automation, autoscaling, backup, bloomberg, cloud computing, computer data storage, data center, disc filing system, domain name system, file system, hostname, hypertext transfer protocol, information retrieval, internet, internet protocol, ip address, java virtual machine, kubernetes , load balancing (computing), microsoft azure, parallel computing, routing, search at scale, server (computing), solr developer, transmission control protocol, zip (file format)
Daniel Perez
Principal Threat Analyst, Advanced Practices at FireEye
advanced persistent threats, apt, apt attack, apt groups, apt41, brute-force attack, cisco security, communication protocol, computer network, computer virus, crowdstrike, cyber security, cyberattack, cybersecurity, cyberwarfare, data protection api, device driver, dynamic-link library, file system, fireeye, fireeye cyber defense summit, fireeye cyber security, fortinet, international mobile subscriber identity, kernel (operating system), malware, malware detection, mobile phone, palo alto networks, password, phishing, reverse engineering, rootkit, shellcode, sms, splunk, surveillance, svchost.exe, symantec, transmission control protocol, tunneling protocol, zero day exploit, zero-day
Raymond Leong
Principal Threat Analyst, Advanced Practices at FireEye
advanced persistent threats, apt, apt attack, apt groups, apt41, brute-force attack, cisco security, communication protocol, computer network, computer virus, crowdstrike, cyber security, cyberattack, cybersecurity, cyberwarfare, data protection api, device driver, dynamic-link library, file system, fireeye, fireeye cyber defense summit, fireeye cyber security, fortinet, international mobile subscriber identity, kernel (operating system), malware, malware detection, mobile phone, palo alto networks, password, phishing, reverse engineering, rootkit, shellcode, sms, splunk, surveillance, svchost.exe, symantec, transmission control protocol, tunneling protocol, zero day exploit, zero-day
Marko Vukolic
Research Staff Member at IBM
bandwidth (computing), bitcoin, blockchain, cache (computing), cloud computing, collision (computer science), communication protocol, computer network, consensus (computer science), cryptocurrency, hash function, hash table, latency (engineering), load balancing (computing), open-source software, open-source-software movement, program optimization, proof of stake, proof of work, proprietary software, scalability, snapchat, throughput, transmission control protocol, transport layer security
1 2 3 4 5 6 7 8 9 10 11
121-150 of 326