Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
271-300 of 331
271-300 of 331
Filter
Arko Dasgupta
Software Engineer at Docker Inc.
active directory, class (computer programming), cloud computing, computer network, database, device driver, device file, file format, file system, http cookie, https, hypertext transfer protocol, internet, kubernetes , linux distribution, load balancing (computing), microservices, object (computer science), open source, provisioning (telecommunications), proxy server, server (computing), software testing, transmission control protocol, transport layer security, world wide web
Jean Rouge
Senior Software Engineer at Docker Inc.
32-bit computing, active directory, api, array data structure, bit, breakfast, class (computer programming), cloud computing, computer data storage, computer network, containerization, cream, database, device driver, device file, disk partitioning, disk storage, english language, eye, file format, file system, food, function (mathematics), garbage collection (computer science), guid partition table, hash function, hash table, http cookie, https, hypertext transfer protocol, interface (computing), internet, kubernetes , language, linked list, linux, linux distribution, load balancing (computing), lymphatic system, master boot record, microservices, microsoft notepad, microsoft windows, mirantis, money, nancy drew, node (networking), nothing, object (computer science), open source, php, plug-in (computing), pointer (computer programming), powershell, provisioning (telecommunications), proxy server, python (programming language), reason, ruby (programming language), safari (web browser), server (computing), server message block, socrates, software testing, space, ssh (secure shell), switzerland, transmission control protocol, transport layer security, volume, windows service, world wide web
Haim Helman
Co-Founder at Octarine
behavior, belief, berkeley packet filter, cloud computing, computing, configuration management, innovation, invisibility, kubernetes , microservices, mind, netfilter, open source, patch (computing), peer-to-peer, proxy server, race (human categorization), reliability engineering, return on investment, routing, software performance testing, system, technological change, transmission control protocol, twitter, value proposition
Spike Curtis
Senior Software Engineer at Tigera, Inc.
behavior, belief, berkeley packet filter, cloud computing, computing, configuration management, innovation, invisibility, kubernetes , microservices, mind, netfilter, open source, patch (computing), peer-to-peer, proxy server, race (human categorization), reliability engineering, return on investment, routing, software performance testing, system, technological change, transmission control protocol, twitter, value proposition
Manish Chugtu
Cloud Infrastructure and Microservices at Avi Networks
behavior, belief, berkeley packet filter, cloud computing, computing, configuration management, innovation, invisibility, kubernetes , microservices, mind, netfilter, open source, patch (computing), peer-to-peer, proxy server, race (human categorization), reliability engineering, return on investment, routing, software performance testing, system, technological change, transmission control protocol, twitter, value proposition
Akihiro Suda
Software Engineer at NTT
actuator, android (operating system), api, apple inc., black belt, computer data storage, computer file, computer hardware, computing, containers, corporation, covid-19 pandemic, docker, environment variable, fedora (operating system), file system, insurance, internet, japan, library, lightweight directory access protocol, marcus junius brutus, microsoft windows, network file system, network information service, open source, open-source software, password, pinterest, playstation 4, port (computer networking), research, sake, saudi arabia, siri, software , ssh (secure shell), superuser, systemd, tax, transmission control protocol, user (computing), user datagram protocol, vehicle insurance, vulnerability (computing), waze
Lee Calcote
Head of Technology Strategy at SolarWinds
abstraction, api, automation, behavior, belief, berkeley packet filter, best practice, big data, business model, cloud computing, command-line interface, community, compiler, computer network, computing, configuration management, containers, contributor license agreement, control plane, conversation, css , devops, docker, education, evaluation, firmware, governance, html, innovation, insurance, intellectual property, interface (computing), interoperability, invisibility, java (programming language), java virtual machine, javascript, kubernetes , landscape, learning, linux, linux foundation, machine learning, mailing list, mashup (web application hybrid), microservices, mind, modular programming, netfilter, network performance, open source, open-source model, open-source software, open-source-software movement, organization, patch (computing), peer-to-peer, pointer (computer programming), porting, proprietary software, proxy server, race (human categorization), reason, reliability engineering, return on investment, risk aversion, routing, rust (programming language), sharepoint, software , software as a service, software development, software performance testing, software-defined networking, specification (technical standard), stack machine, system, system call, technological change, terminal server, trademark, traffic flow, transmission control protocol, twitter, understanding, use case, value proposition, web application, webassembly, world wide web
Zachary Butcher
Founding Engineer at Tetrate
behavior, belief, berkeley packet filter, black belt, cloud computing, communication protocol, computer network, computing, configuration management, domain name, domain name system, firewall (computing), gateway (telecommunications), https, hypertext transfer protocol, innovation, internet protocol, invisibility, ip address, kubernetes , lag, load balancing (computing), microservices, mind, netfilter, network socket, open source, out-of-band data, patch (computing), peer-to-peer, proxy server, public key certificate, public key infrastructure, race (human categorization), reliability engineering, return on investment, routing, server (computing), software performance testing, subnetwork, system, technological change, transmission control protocol, transport layer security, twitter, value proposition, x.509
Gianluca Arbezzano
SRE at InfluxDB
android (operating system), api, computer network, dynamic host configuration protocol, entry point, internet, java (programming language), javascript, kubernetes , lamp (software bundle), library (computing), linux, localhost, mongodb, network socket, nginx, open source, python (programming language), reliability engineering, representational state transfer, server (computing), software framework, sql, test-driven development, transmission control protocol, unix
Gregg Donovan
Staff Software Engineer at Etsy
apache, apache lucene, apache solr, api, big data, chaos engineering, communication protocol, computer network, convention, cpu cache, data, enterprise search, etsy, garbage collection (computer science), graphics processing unit, hypertext transfer protocol, internet protocol, java (programming language), latency (engineering), load balancing (computing), lucene/solr, lucid works, lucidworks, mixing console, network packet, open source, parallel computing, remote procedure call, revolution, scala (programming language), search, shard (database architecture), software , solr, solr lucene, system call, text search, tf–idf, transmission control protocol, twitter, wireshark
Radu Gheorghe
Software Engineer at Sematext Group
apache, apache kafka, apache solr, application programming interface, application software, big data, central processing unit, communication protocol, computer, computer data storage, computer file, computer hardware, ecommerce search, enterprise search, file system, flash memory, garbage collection (computer science), hard disk drive, home directory, hypervisor, java virtual machine, kernel (operating system), latency (engineering), lucene, lucid works, lucidworks, macos, memory, microsoft windows, mind, mount (computing), network socket, operating system, os-level virtualization, parsing, pipeline (computing), pointer (computer programming), port forwarding, raid, real-time computing, revolution, scripting language, search, search application, search platform, software release life cycle, solid-state drive, solr, syslog, thread (computing), transmission control protocol, unix filesystem, use case, user datagram protocol, virtual machine, virtualization, windows 8, xml
Rafał Kuć
Software Engineer at Sematext Group
apache, apache kafka, apache solr, application programming interface, application software, big data, central processing unit, communication protocol, computer, computer data storage, computer file, computer hardware, ecommerce search, enterprise search, file system, flash memory, garbage collection (computer science), hard disk drive, home directory, hypervisor, java virtual machine, kernel (operating system), latency (engineering), lucene, lucid works, lucidworks, macos, memory, microsoft windows, mind, mount (computing), network socket, operating system, os-level virtualization, parsing, pipeline (computing), pointer (computer programming), port forwarding, raid, real-time computing, revolution, scripting language, search, search application, search platform, software release life cycle, solid-state drive, solr, syslog, thread (computing), transmission control protocol, unix filesystem, use case, user datagram protocol, virtual machine, virtualization, windows 8, xml
Martin Gausby
Senior Elixir Developer at Erlang Solutions Ltd.
bit, bit numbering, byte, communication protocol, computer file, computer network, data model, email spam, file system, hexadecimal, internet protocol, ip address, json, megabyte, message passing, mqtt, network packet, network socket, pattern matching, ping (networking utility), port (computer networking), publish–subscribe pattern, server (computing), string (computer science), transmission control protocol
Jeff Smith
Software engineer at Enbala
amplitude, analog-to-digital converter, automatic dependent surveillance – broadcast, aviation transponder interrogation modes, bit, blog, boolean data type, callback (computer programming), carl sagan, certainty, contig, debugging, degrees of freedom (statistics), design, digital signal processing, directory (computing), finite-state machine, flightaware, hexadecimal, hypertext transfer protocol, internet, intuition, message passing, metaphor, mind, modal logic, nothing, oklahoma city thunder, padding (cryptography), parameter (computer programming), parity bit, pattern matching, phase (waves), radio, rapping, reason, record (computer science), rights, sampling (signal processing), secondary surveillance radar, server (computing), signal, software-defined radio, subroutine, transmission control protocol, transponder (aeronautics), wake turbulence, world wide web
Gary Rennie
Director at VoiceLayer
application programming interface, avatar (computing), base64, binary file, bit, cascading style sheets, client-side, comma-separated values, communication protocol, computer file, exception handling, file system, gif, handshaking, html, hypertext transfer protocol, identifier, internet, javascript, jpeg, json, load balancing (computing), multiplexing, named parameter, network socket, online and offline, operating system, push technology, reserved word, screenshot, self-signed certificate, serialization, server (computing), siri, string (computer science), transmission control protocol, transport layer security, utf-8, web server, website, websocket, world wide web, xmlhttprequest
Michelle Munson
CEO and Founder at Eluvio
aspera, backup, bandwidth (computing), ceo, cic, cloud, cloud computing, cloud innovation conference, computer file, computer network, data at rest, desktop environment, dropbox (service), etc, file transfer, internet, internet privacy, ip multicast, latency (engineering), m&e, media, michelle munson, microsoft onedrive, multicast, multitenancy, nab, object storage, packet loss, reliability (computer networking), routing, saas, saas platform, transmission control protocol, udp, upload, virtualization, vnab, web browser, workspace, world wide web
Julien Lenoir
Security evaluation engineer at Airbus
apple inc., communication protocol, computer data storage, computer network, email, encryption, firewall (computing), flash memory, formal verification, information security, internet, internet protocol, ip address, linux, operating system, reason, reverse engineering, risk management, ssh (secure shell), system, transmission control protocol, transport layer security, truth, usb flash drive, whatsapp
Benoit Camredon
Recherche en sécurité at Airbus
apple inc., communication protocol, computer data storage, computer network, email, encryption, firewall (computing), flash memory, formal verification, information security, internet, internet protocol, ip address, linux, operating system, reason, reverse engineering, risk management, ssh (secure shell), system, transmission control protocol, transport layer security, truth, usb flash drive, whatsapp
Maxwell Bland
Researcher at University of California San Diego
algorithm, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, blood sugar level, cache (computing), carbohydrate, central processing unit, cloud computing, code, complication (medicine), computer, computer network, computer security, coprocessor, cpu cache, data center, diabetes, diabetic ketoacidosis, disease, emergency department, field-programmable gate array, gopro, hardware acceleration, health level 7, hypervisor, information system, instruction pipelining, insulin, interface (computing), internet protocol, ketoacidosis, ketone bodies, knowledge, medical prescription, memory, multitenancy, netflix, network congestion, patient safety, quality of service, security, simulation, software as a service, software framework, spain, starvation, stroke, system, system on a chip, transmission control protocol, virtual lan, virtual machine, zip code
Jeffrey Tully
Resident Anesthesiologist at UC Davis Medical Center
black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, blood sugar level, carbohydrate, complication (medicine), computer network, computer security, diabetes, diabetic ketoacidosis, disease, emergency department, health level 7, information system, insulin, interface (computing), internet protocol, ketoacidosis, ketone bodies, medical prescription, network congestion, patient safety, simulation, starvation, stroke, transmission control protocol, virtual lan
Christian Dameff
Doctor, Hacker, Researcher at UC San Diego
adderall, antidepressant, attention deficit hyperactivity disorder management, bipolar disorder, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, blood sugar level, bluetooth, carbohydrate, cardiac arrest, cardiology, cognitive behavioral therapy, complication (medicine), computer network, computer security, depression (mood), diabetes, diabetic ketoacidosis, diagnostic and statistical manual of mental disorders, disease, doctor–patient relationship, dsm-5, electronic health record, emergency department, food and drug administration, health informatics, health insurance portability and accountability act, health level 7, image scanner, information system, insulin, insulin pump, intensive care unit, interface (computing), internet of things, internet protocol, intravenous therapy, ketoacidosis, ketone bodies, lithium (medication), major depressive disorder, mania, medical prescription, medicine, mental disorder, mood disorder, mood stabilizer, national health service, network congestion, occupational burnout, patient safety, psychiatrist, psychiatry, psychologist, psychotherapy, radiology, ransomware, selective serotonin reuptake inhibitor, serotonin, serotonin–norepinephrine reuptake inhibitor, simulation, starvation, stroke, teleradiology, transmission control protocol, tricyclic antidepressant, virtual lan, vital signs
Alejo Murillo Moya
Red Team Lead EMEAR at Cisco
ajax (programming), api, bank, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, communication protocol, cryptography , database, facebook, firefox, forward secrecy, google chrome, hypertext transfer protocol, openssl, proxy server, public key certificate, public-key cryptography, risk, secrecy, server (computing), transmission control protocol, transport layer security, web application, web browser, web server, world wide web
Alfonso Garcia Alguacil
Senior Penetration Tester at Cisco
ajax (programming), api, bank, black hat, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, communication protocol, cryptography , database, facebook, firefox, forward secrecy, google chrome, hypertext transfer protocol, openssl, proxy server, public key certificate, public-key cryptography, risk, secrecy, server (computing), transmission control protocol, transport layer security, web application, web browser, web server, world wide web
Dominik Maier
PHD Student at TU Berlin
api, automation, binary file, brain, c++, communication protocol, experiment, file format, linux, microsoft, mind, open-source software, package manager, pipeline (unix), pointer (computer programming), reality, reason, software bug, software framework, software repository, specification (technical standard), test automation, transmission control protocol, unit testing, unix
Bhargava Shastry
Scientific Researcher at TU Berlin
api, automation, binary file, brain, c++, communication protocol, experiment, file format, linux, microsoft, mind, open-source software, package manager, pipeline (unix), pointer (computer programming), reality, reason, software bug, software framework, software repository, specification (technical standard), test automation, transmission control protocol, unit testing, unix
Vincent Ulitzsch
Graduate student at TU Berlin
api, automation, binary file, brain, c++, communication protocol, experiment, file format, linux, microsoft, mind, open-source software, package manager, pipeline (unix), pointer (computer programming), reality, reason, software bug, software framework, software repository, specification (technical standard), test automation, transmission control protocol, unit testing, unix
Hanno Böck
Freelance Journalist at Self-Employed
bit, brute-force attack, chosen-ciphertext attack, ciphertext, communication, correlation and dependence, cryptography , encryption, handshaking, internet, internet protocol, key (cryptography), known-plaintext attack, malleability (cryptography), modular arithmetic, multiplication, number, numerical digit, openssl, padding (cryptography), rsa (cryptosystem), server (computing), string (computer science), transmission control protocol, transport layer security
Craig Young
Principal Security Researcher at Tripwire VERT
bit, brute-force attack, chosen-ciphertext attack, ciphertext, communication, correlation and dependence, cryptography , encryption, handshaking, internet, internet protocol, key (cryptography), known-plaintext attack, malleability (cryptography), modular arithmetic, multiplication, number, numerical digit, openssl, padding (cryptography), rsa (cryptosystem), server (computing), string (computer science), transmission control protocol, transport layer security
Alejandro Hernandez
Senior Security Consultant at IOActive
android (operating system), bank, bhusa, black hat, black hat 2018, black hat 2018 briefings, black hat briefings, black hat briefings 2018, black hat usa, black hat usa 18, black hat usa 2018, blackhat, blackhatusa, blockchain, bloomberg l.p., computer, computer network, computer security, contract for difference, credit, credit card, database, dynamic-link library, economics, email, embedded system, finance, financial information exchange, https, hypertext transfer protocol, interactive brokers, investor, ios, ios jailbreaking, market data, memory leak, metatrader 4, mobile web, multi-factor authentication, open outcry, password, research, retail, robinhood (company), security (finance), security token, session (computer science), software , speculation, stock, stock exchange, stock market, telephone, transmission control protocol, transport layer security, website, windows 10, world wide web, xmlhttprequest
Alexandre Belloni
Embedded Linux and kernel Engineer at Bootlin
access control, android (operating system), communication protocol, computer, computer keyboard, database, ethernet, forwarding information base, internet group management protocol, linux, memory-mapped i/o, mobile phone, mtv, pci express, reason, siri, surgical suture, time management, tool, transmission control protocol, twitter, virtual lan, youtube
1 2 3 4 5 6 7 8 9 10 11 12
271-300 of 331