Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
211-240 of 326
211-240 of 326
Filter
James Kettle
Head of Research at PortSwigger Web Security
accounting, adobe flash, application programming interface, bhusa, black hat, black hat 2018, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, blessing, bug bounty program, cache (computing), census, cloudflare, complex system, complexity, computer network, computer security, con, conference speakers, content delivery network, cross-site scripting, cyber security, dc27, deception, def, def con 2019, def con 27, defcon, determinism, dns spoofing, domain name system, drupal, end user, evidence, explosion, facebook, ghost, google search, hacker, hacker community, hacker conference, hackers, hacking conference, hostname, hotspot (wi-fi), html, http cookie, https, hypertext transfer protocol, ice, information, internationalization and localization, internet, internet explorer, intersex, ip address, javascript, kanye west, knowledge, language, malware, microsoft edge, moana (2016 film), music, ocean, open-source software, password, payday loan, perception, pinterest, proxy server, query string, quest, reddit, research, resource, safari (web browser), same-origin policy, security conference, security conference 2019, server (computing), simple plan, siri, sms, smuggling, software bug, synchronization, tax, text messaging, thai language, translation, transmission control protocol, understanding, url, url redirection, user agent, voicemail, web browser, web cache, webcast, website, world wide web
Trevor Vaughan
VP Engineering at Onyx Point, Inc.
api, command-line interface, communication protocol, computer file, computer network, cut, copy, and paste, environment variable, firewall (computing), hash function, linux, memory, microsoft windows, namespace, puppet (company), ruby (programming language), screw, sms, snapshot (computer storage), software bug, subroutine, transmission control protocol, truth, unit testing, virtual machine, virtualbox
William Morgan
CEO at Buoyant, Inc.
abstraction, argument, behavior, belief, berkeley packet filter, central processing unit, cloud computing, cloud native computing foundation, codebase, communication protocol, complexity, computer programming, computing, configuration management, consensus decision-making, control plane, database, debate, encryption, github, goal, grafana, hypertext transfer protocol, infrastructure, innovation, invisibility, javascript, kubernetes , language, library (computing), load balancing (computing), logic, loose coupling, microservices, microsoft, mind, netfilter, open source, patch (computing), peer-to-peer, proxy server, psychological resilience, race (human categorization), reason, reddit, reliability engineering, return on investment, routing, scalability, security, self, server (computing), service-oriented architecture, software , software performance testing, spamming, system, technological change, telemetry, transmission control protocol, transport layer security, truth, twitter, usability, value proposition, web browser, world wide web
Jayant Kolhe
Director of Engineering at Google
application programming interface, business logic, c++, class (computer programming), client–server model, cloud computing, communication protocol, cross-platform software, hash function, hypertext transfer protocol, internet, java (programming language), load balancing (computing), metadata, method (computer programming), microsoft onenote, microsoft windows, network socket, object (computer science), proxy server, representational state transfer, server (computing), streaming media, subroutine, transmission control protocol
Eric Anderson
Staff Engineer at Google
application programming interface, business logic, c++, class (computer programming), client–server model, cloud computing, communication protocol, cross-platform software, hash function, hypertext transfer protocol, internet, java (programming language), load balancing (computing), metadata, method (computer programming), microsoft onenote, microsoft windows, network socket, object (computer science), proxy server, representational state transfer, server (computing), streaming media, subroutine, transmission control protocol
Nathan Sweet
Senior Software Engineer at DigitalOcean
berkeley packet filter, central processing unit, communication protocol, david boggs, device driver, direct memory access, express data path, internet protocol, ipsec, iptables, ipv6, kubernetes , latency (engineering), load balancing (computing), netfilter, network interface controller, network socket, peripheral component interconnect, port (computer networking), proxy server, routing, synchronous optical networking, throughput, transmission control protocol, user datagram protocol
Deepa Kalani
Networking & Security at VMware
ad blocking, blacklist (computing), communication protocol, computer network, database, devops, dns over https, domain name, domain name system, https, hypertext transfer protocol, internet, ip address, kubernetes , name server, privacy, prometheus (software), proxy server, statistics, telemetry, transmission control protocol, transport layer security, user datagram protocol, whitelisting
Venil Noronha
Member of Technical Staff, NSX Service Mesh at VMware
ad blocking, blacklist (computing), communication protocol, computer network, database, devops, dns over https, domain name, domain name system, https, hypertext transfer protocol, internet, ip address, kubernetes , name server, privacy, prometheus (software), proxy server, statistics, telemetry, transmission control protocol, transport layer security, user datagram protocol, whitelisting
Ivan Sim
Software Engineer at Buoyant
audit, certificate authority, cloud native computing foundation, control plane, digital signature, environment variable, fuel injection, handshaking, hypertext transfer protocol, kubernetes , linux foundation, load balancing (computing), logic, multiprotocol label switching, namespace, parameter, penetration test, plug-in (computing), proxy server, public key certificate, public-key cryptography, regulatory compliance, siri, transmission control protocol, transport layer security
Ted Ross
Senior Principal Software Engineer at Red Hat
anycast, central processing unit, certificate authority, client (computing), client–server model, cloud computing, communication protocol, computer, computer hardware, computer network, computer performance, computer programming, computing, device driver, eclipse foundation, edge computing, edge device security, embedded system, internet, internet of things, internet protocol suite, ip address, kubernetes , link-state routing protocol, load balancing (computing), microservices, network address translation, open shortest path first, open-source hardware, operating system, pic microcontrollers, private network, processor design, router (computing), routing, server (computing), software , software-defined networking, subnetwork, transmission control protocol, transport layer security, tunneling protocol, virtual private network, wi-fi
Rita Zhang
Principal Software Engineer at Microsoft
android (operating system), api, application software, audit, autonomy, cache (computing), certificate authority, cloud computing, cloud native computing foundation, codebase, control plane, control theory, conversation, data model, design, digital signature, education, environment variable, error, fuel injection, github, handshaking, hypertext transfer protocol, infrastructure, interface (computing), internet, json, kubernetes , language, law, library, linux foundation, load balancing (computing), logic, mathematical optimization, meat, memory, microsoft, microsoft azure, motivation, multiprotocol label switching, namespace, odyssey, open source, open-source software, open-source-software movement, parameter, patch (computing), penetration test, pinterest, plug-in (computing), proxy server, public key certificate, public-key cryptography, regulatory compliance, scalability, server (computing), siri, software , software framework, stop online piracy act, template (c++), transmission control protocol, transport layer security, twitter, use case, webhook, youtube
Rafal Kowalski
Cloud Solution Architect at Grape Up
adobe inc., bugatti chiron, cloud computing, communication protocol, continuous delivery, custom software, digital twin, engine control unit, information, internet, internet of things, jenkins (software), knowledge, kubernetes , network socket, proxy server, runtime system, science, software , streaming media, system, transmission control protocol, twitter, websocket
Micah Hausler
Sr Systems Development Engineer at Amazon
amazon (company), amazon elastic compute cloud, amazon web services, android (operating system), application software, attention, automated teller machine, bit, computer file, consensus (computer science), database, group policy, high availability, hypertext transfer protocol, identifier, internet, kubernetes , linux, load balancing (computing), patch (computing), proxy server, scalability, server (computing), transmission control protocol, virtualization
Janna Hilferty
Senior DevOps Engineer at TriNet, Inc
anonymous (group), botnet, cloudflare, computer network, conference, denial-of-service attack, dns root zone, dns spoofing, domain name system, http cookie, internet of things, memcached, mirai (malware), network socket, open access, osi model, password, spoofing attack, ssh (secure shell), technology, transmission control protocol, transport layer, transport layer security, universal plug and play, usenix, user datagram protocol, wi-fi, world wide web
Laurent Bernaille
CTO Cloud Native Services at Datadog
airbag, alexa internet, antenna (radio), api, apple inc., application software, blood, blue box, booting, border gateway protocol, census, client (computing), cloud computing, conference, covid-19 pandemic, database, datadog, debugging, denial-of-service attack, dinner, domain name, domain name system, facebook, gmail, google play, hypertext transfer protocol, ip address, kubernetes , life-cycle assessment, load balancing (computing), metadata, microservices, motivation, open access, product lifecycle, property, proxy server, public key infrastructure, public-key cryptography, reality, reason, representational state transfer, research, restaurant, scheduling (computing), server (computing), session initiation protocol, single sign-on, sink, technology, telephone, time, tradition, transmission control protocol, troubleshooting, twitter, use case, usenix, user (computing), user datagram protocol, wechat, weed, wikipedia, wood, youtube
Gabbi Fisher
Systems Engineer at Cloudflare, Inc.
berkeley sockets, communication protocol, computer network, content delivery network, datagram, domain name system, email box, golang, gophercon, internet, internet protocol, ip address, ipv4, ipv6, kernel (operating system), library (computing), load balancing (computing), localhost, multiplexing, network packet, network socket, operating system, port (computer networking), programming, proxy server, streaming media, transmission control protocol, user datagram protocol
Brendan Gregg
Netflix
32-bit computing, 3d xpoint, 64-bit computing, abstract syntax tree, analogy, application proxies, backup, berkeley packet filter, c++, central processing unit, clang, compiler, computer data storage, computer hardware, computer network, conference, context switch, cpu cache, ddr4 sdram, debugging, device drivers, disassembler, domain name system, dvd, ebpf, extended bpf, field-programmable gate array, firewall (computing), flash memory, geforce, gigabyte, graphics processing unit, hard disk drive, hash function, high bandwidth memory, hyper-threading, hypervisor, input/output, instruction set architecture, integrated circuit, intel, intermediate representation, internet, internet protocol, internet traffic, ios, kernel (operating system), laptop, library (computing), linux, llvm, machine code, memory, multi-level cell, netflix, network congestion, network performance, networking, non-uniform memory access, open access, openstack, operating system, packet loss, page cache, patch (computing), pdf, performance, performant, personal computer, printer (computing), printf format string, profiling (computer programming), random-access memory, regular expression, runtimes, secure , security policies, shell script, software , stack (abstract data type), string (computer science), tcpdump, technologies, technology, transmission control protocol, tsmc, usenix, windows 10, x86
Jamie Gaskins
Masters of Arts in Christian Apologetics at Trident Technical College
asynchronous i/o, cache (computing), cache replacement policies, computer programming, database, database transaction, definition, email, handshaking, http cookie, hypertext transfer protocol, json, linearizability, machine-readable data, microservices, postgresql, protocol buffers, publish–subscribe pattern, representational state transfer, serialization, service-oriented architecture, transmission control protocol, transport layer security, web analytics
Mohit Suley
Microsoft
analytics, behavioral analytics, computer, conference, conversation, customer satisfaction, domain name system, eating your own dog food, emotion, experiment, feeling, hypothesis, internet, joke, lynx (web browser), mind, open access, reality, reddit, subscription business model, system, tax, technology, time, transmission control protocol, understanding, universe, usability, usenix
Christopher Sexton
VP Engineering at Radius Networks
application software, cable television, client (computing), computing, google chrome, http cookie, hypertext transfer protocol, internet, internet of things, javascript, method (computer programming), microsoft windows, network socket, plain text, publish–subscribe pattern, redis, server (computing), transmission control protocol, twitter, web browser, web server, websocket, weight, world wide web
Jean-Frederic Clere Clere
Manager, Software Engineering at Red Hat
acmev2 , amazon (company), amazon web services, apache http server, apache tomcat, application software, bit, bluetooth, cache (computing), central processing unit, chocolate, client (computing), client certificates, communication protocol, computer, copying, credit card, data compression, definition, domain name system, dynamic host configuration protocol, earthquake, email, encrypt , english language, flour, google chrome, http cookie, https, hypertext transfer protocol, ice, information, internet, internet protocol suite, ip address, it, java (programming language), kubernetes , laptop, mod_md , muscle, network packet, new york city, nginx, ocsp , open-source software, openssl, prometheus, property, proxy server, rapid transit, reason, reverse proxy, server (computing), server certificate, showtime (film), simulation, siri, social security (united states), software , tax, the beatles, toronto, transmission control protocol, troubleshooting, truth, twitter, under the dome (tv series), unit testing, vehicle, web browser, youtube
Tom Monk
Principal Engineer at Cisco
api, binary search algorithm, binary search tree, cloud computing, computer data storage, computer network, data analytics, database, database design, database index, disk partitioning, hypertext transfer protocol, lookup table, mongodb, operating system, paging, postgresql, replication (computing), router (computing), search tree, software bug, solid-state drive, throughput, transmission control protocol, tree (data structure), xfs
Cameron Javier
Software Engineer at Cisco
api, binary search algorithm, binary search tree, cloud computing, computer data storage, computer network, data analytics, database, database design, database index, disk partitioning, hypertext transfer protocol, lookup table, mongodb, operating system, paging, postgresql, replication (computing), router (computing), search tree, software bug, solid-state drive, throughput, transmission control protocol, tree (data structure), xfs
Gabriel Ng
Senior Software Engineer at Netflix
api, binary search algorithm, binary search tree, cloud computing, computer data storage, computer network, data analytics, database, database design, database index, disk partitioning, hypertext transfer protocol, lookup table, mongodb, operating system, paging, postgresql, replication (computing), router (computing), search tree, software bug, solid-state drive, throughput, transmission control protocol, tree (data structure), xfs
Jonathan Morin
VP of Product Management at OpenTable
abstraction, algorithm, amazon web services, border gateway protocol, cloud computing, computer network, data center, devops, firewall (computing), interoperability, kubernetes , load balancing (computing), machine learning, microservices, microsoft azure, namespace, news, open shortest path first, router (computing), routing, stall (fluid dynamics), transmission control protocol, virtual lan, virtual private network, vmware
Emerson Macedo
Director of Engineering at M4U
advanced message queuing protocol, android (operating system), communication protocol, database, database transaction, ebay, facebook, hypertext transfer protocol, interface (computing), jakarta messaging, json, library (computing), memory leak, point of sale, proxy server, python (programming language), rabbitmq, representational state transfer, server (computing), social networking service, template (c++), transmission control protocol, twitter, use case, xml
Wojtek Mach
Software developer at Plataformatec
bit, bit numbering, byte, communication protocol, computer network, data type, database, database schema, database transaction, function (mathematics), handshaking, interface (computing), library (computing), network packet, network socket, port (computer networking), printer (computing), reliability engineering, server (computing), specification (technical standard), sql, streaming media, string (computer science), temperature, transmission control protocol
Amit Shah
Kernel / Hypervisor Engineer at Amazon
api, auction, booting, command-line interface, complexity, design, determinism, dimension, ethernet, flash memory, heat, input–output memory management unit, internet, knowledge, memory, mind, nothing, odor, ownership, patch (computing), real-time clock, reason, time, transmission control protocol
David Woodhouse
Principal Kernel / Hypervisor Engineer at Amazon
api, auction, booting, command-line interface, complexity, design, determinism, dimension, ethernet, flash memory, heat, input–output memory management unit, internet, knowledge, memory, mind, nothing, odor, ownership, patch (computing), real-time clock, reason, time, transmission control protocol
Christoffer Jerkeby
Senior Security Consultant at F-Secure
black hat, black hat briefings, black hat usa, black hat usa 2019, bracket, code injection, computer network, computer programming, control flow, domain name system, exception handling, http cookie, image scanner, interpreter (computing), load balancing (computing), localhost, login, netcat, password, port scanner, programming language, scripting language, tcl, transmission control protocol, unit testing, user agent, web browser, world wide web
1 2 3 4 5 6 7 8 9 10 11
211-240 of 326