Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-30 of 91
1-30 of 91
Filter
David Wu
Founder at TAUCOIN.io
2021, attention, bitcoin, blockchain, communication, communication protocol, computing, consensus (computer science), contract, crypto, cryptocurrency, david wu, decentralization, denial-of-service attack, ethereum, fee, information, keynote, live, london, metadata, misinformation, perishable proof of transactions - new consensus for day to day dapps - david wu (taucoin.io), prison, public-key cryptography, randomness, reason, recycling, snapchat, taucoin.io, technology, telephone, telephone number, token2049, user datagram protocol
Nir Chako
Security Research Team Leader at CyberArk
amazon echo, border gateway protocol, broadcast domain, communication protocol, computer network, dns spoofing, domain name system, file transfer protocol, handshaking, internet protocol, ip address, kubernetes , load balancing (computing), mac address, man-in-the-middle attack, name server, network packet, network plumbing, overlay network, ping (networking utility), routing, routing table, spoofing attack, transmission control protocol, user datagram protocol, virtual extensible lan
David A. Smith
CEO at Croquet Corporation
3d computer graphics, alan kay, application software, augmented reality, augmented world expo, awe conference, awe conference 2020, awe expo, awe expo 2020, awe online 2020, awe usa 2020, client-side, client–server model, communication protocol, computer mouse, conversation, internet, internet protocol, internet protocol suite, language, macintosh, microsoft windows, mind, parc (company), personal computer, server (computing), serverless computing, simulation, steve jobs, technology, user datagram protocol, virtual reality
Boris Lublinsky
Software architect at Lightbend
apache kafka, application software, client (computing), client-side, cloud computing, collaborative filtering, command-line interface, communication protocol, computer, computer data storage, computer network, computer simulation, computing, conducting, database, database schema, hypertext transfer protocol, hypervisor, kubernetes , load balancing (computing), machine learning, medication, message passing, microservices, mobile app, multiplexing, music, network socket, operating system, orchestra, peer-to-peer, physician, pipeline (computing), port (computer networking), programming language, project jupyter, race (human categorization), reactive, reliability (computer networking), routing, streaming media, summit, symptom, system, training, transmission control protocol, user datagram protocol, virtual machine
Oleg Dokuka
Technical Oversight Committee Member at Reactive Foundation
academy awards, apache kafka, api, apple inc., beer, bitcoin, blues, camera, chicago, client (computing), client-side, cochlea, communication protocol, computer, computer network, computing, covid-19 pandemic, cryptocurrency, database, database schema, doughnut, emoji, eye, fuel, honey, hypertext transfer protocol, ice, internet, kesha, kitchen, kubernetes , load balancing (computing), los angeles, menu, message passing, microservices, microsoft, mirror, mobile app, motel, movie theater, multiplexing, music, navigation, nbc, network socket, ocean, peer-to-peer, pipeline (computing), port (computer networking), programming language, property, reactive, reliability (computer networking), robot, rochester, new york, rocket, routing, russia, ship, spain, streaming media, summit, sushi, technology, text messaging, the price is right (american game show), toy story, transmission control protocol, tucson, arizona, united states, user datagram protocol
Sebastiano Miano
PhD Student at Politecnico Di Toronto
application software, berkeley packet filter, boxing, cloud computing, compiler, computer, computer network, data, data center, forwarding information base, information, innovation, internet protocol, internet protocol suite, iptables, linux, linux kernel, machine, microsoft, open-source software, pdf, software , system, transmission control protocol, user datagram protocol, wordstar
Caleb Kow
Founder at Sign.net
belief, blockchain, computer network, contract, crypto, cryptocurrency, data center, economics, facebook, file system, interface (computing), internet, internet protocol, intrusion detection system, latency (engineering), library, linux, node (networking), operating system, packet loss, snapchat, staking, supermajority, twitter, user datagram protocol, virtualbox, web server, wi-fi
Celine Heng
Politics & Technology student at Technical University of Munich
belief, blockchain, computer network, contract, crypto, cryptocurrency, data center, economics, facebook, file system, interface (computing), internet, internet protocol, intrusion detection system, latency (engineering), library, linux, node (networking), operating system, packet loss, snapchat, staking, supermajority, twitter, user datagram protocol, virtualbox, web server, wi-fi
Eric Yip
Senior Product Development Executive at Tezos Southeast Asia
belief, blockchain, computer network, contract, crypto, cryptocurrency, data center, economics, facebook, file system, interface (computing), internet, internet protocol, intrusion detection system, latency (engineering), library, linux, node (networking), operating system, packet loss, snapchat, staking, supermajority, twitter, user datagram protocol, virtualbox, web server, wi-fi
Evan Shapiro
Media Universe Cartographer at ESHAP
amazon web services, blockchain, computer network, crypto, cryptocurrency, end user, facebook, firewall (computing), formal verification, internet, internet protocol, ip address, javascript, operating system, privacy, randomness, software , software bug, ssh (secure shell), staking, transmission control protocol, twitter, usability, user datagram protocol, world wide web, youtube, zero-knowledge proof
Brandon Kase
Protocol Engineer at O(1) Labs
advertising, amazon web services, arithmetic, arithmetic circuit complexity, backup, bad faith, bit, bitcoin, blockchain, blockchain security, cloud computing, cloud security, coda, communication protocol, computer, computer network, consensus (computer science), crypto, cryptocurrency, database, decentralization, dollar sign, drawing, elliptic curve digital signature algorithm, end user, eos.io, ethereum, facebook, fee, firewall (computing), formal verification, icloud, information, internet, internet protocol, investment, ip address, javascript, key management, knowledge, market (economics), mind, mobile app, mobile device, mobile phone, open-source software, operating system, price, privacy, proof of stake, proof of work, property, public-key cryptography, question, randomness, reason, regulatory compliance, risk, secure multi-party computation, server (computing), software , software bug, spamming, ssh (secure shell), staking, startup company, tax, tezos, transmission control protocol, twitter, usability, user datagram protocol, world wide web, youtube, zero-knowledge proof, zksnarks
Ben Seri
VP of Research at Armis
antenna (radio), category 5 cable, category 6 cable, computer network, crosstalk, electrical cable, internet control message protocol for ipv6, ip address, ipv4, ipv6, kernel (operating system), mac address, proxy server, radio, router (computing), routing, routing table, spectrum, transmitter, twisted pair, user datagram protocol, wi-fi, wireless, wireless access point, xnu
Gregory Vishnepolsky
Security Researcher at Armis
antenna (radio), category 5 cable, category 6 cable, computer network, crosstalk, electrical cable, internet control message protocol for ipv6, ip address, ipv4, ipv6, kernel (operating system), mac address, proxy server, radio, router (computing), routing, routing table, spectrum, transmitter, twisted pair, user datagram protocol, wi-fi, wireless, wireless access point, xnu
Hong Hua Chin
Principal Solution Architect at Red Hat
application server, chaos engineering, cloud, cloud computing, computer network, control plane, fossasia, internet, internet protocol, internet protocol suite, ip address, kubernetes , load balancing (computing), meat, mesh networking, microservices, mobile app, multitenancy, nginx, open source, open-source-software movement, openshift, opentechsummit, proxy server, red hat, singapore, transmission control protocol, use case, user datagram protocol
Brett Sheffield
Founder at Librecast
border gateway protocol, computer network, decentralisation, domain name system, fossasia, internet group management protocol, internet protocol, ip address, ip multicast, ipv4, ipv6, ipv6 address, key exchange, librecast, load balancing (computing), multicast, multicast routing, netflix, online chat, open source, opentechsummit, privacy, reliability (computer networking), rfc, router (computing), session initiation protocol, singapore, streaming media, telnet, transmission control protocol, transport layer security, user datagram protocol, websocket, world wide web
Waqas Dhillon
Technical Product Manager - Machine Learning at Vertica
agility, ai, analytics, big data, cloud, communication protocol, computer performance, computing, data transformation, database, datawarehouse, dave vellante, email, enterprise, hypertext transfer protocol, john furrier, machine learning, microsoft excel, ml, on-prem, parallel computing, prediction, principal component analysis, property, relational database, sampling (statistics), scalability, scale, siliconangle, siliconangle inc, siliconangle media inc, simple mail transfer protocol, statistics, table (database), thecube, transmission control protocol, user datagram protocol, vertica, web conferencing, wikibon, xml
Brad Duncan
Threat Intelligence Analyst at Palo Alto Networks Unit 42
activex, adobe flash, bios, botnet, computer network, cryptocurrency, domain name system, email, email spam, handshaking, hypertext transfer protocol, internet, internet explorer, linux distribution, malware, microsoft powerpoint, port (computer networking), public key certificate, security onion, security onion solutions, server message block, transmission control protocol, transport layer security, trojan horse (computing), user datagram protocol, wireshark, world wide web
Graig Wright
Chief Scientist at nChain
advertising, aibcsummit, bernie madoff, bitcoin, bitcoin cash, bitcoin network, bitcoin sv, bitcoinsv, blackmail, blockchain, bounty (reward), bribery, bsv, btc, capitalism, child, child pornography, coingeek, coingeek london, coingeek london conference, communication protocol, computer, computer network, conference, contract, corruption, craig wright, craig wright satoshi, craigwright, credit card, crime, crypto, cryptocurrency, currency, cypherpunk, decentralization, developers, digital currency, digital signature, distributed computing, double-spending, ecology, electronic lock, email, encryption, eos.io, ethereum, evidence, explanation, exponential growth, facebook, fee, fentanyl, fiat money, financial transaction, fintech, fintect, fireside chat, firewall (computing), fraud, gateway (telecommunications), hacker, hbgary, heroin, hope, hyundai motor company, information, initial coin offering, internet, internet of things, internet protocol, internetwork packet exchange, investment, ip address, jimmy nguyen, julian assange, jurisdiction, kidnapping, law, liberty reserve, life imprisonment, london, malware, man-in-the-middle attack, message, micropayment, mining, monero, money, multiplayer video game, nakamoto, network packet, novell, online and offline, osi model, payment, paypal, peer-to-peer, pornography, price, privacy, proof of work, public key infrastructure, punishment, realsatoshi, reason, satoshi, satoshi nakamoto, security hacker, sentence (law), seoul, server (computing), silk road (marketplace), sms, south korea, statute of frauds, stock exchange, subsidy, taekwondo, technology, time, transmission control protocol, transport layer, u.s. securities and exchange commission, uk, ukraine, user datagram protocol, visa inc., web of trust, wikileaks, world of warcraft, world wide web
Casey Deccio
Assistant Professor of Computer Science at Brigham Young University
authentication, categorization, dns over https, domain name, domain name system, domain name system security extensions, handshaking, http cookie, https, hypertext transfer protocol, ipv4, ipv6, javascript, let's encrypt, load balancing (computing), port (computer networking), post (http), public key certificate, root name server, transmission control protocol, transport layer security, tunneling protocol, url, user datagram protocol, whatsapp
Bruce McDougall
Consulting Systems Engineer at Cisco Systems
cisco systems, cloud computing, communication protocol, computer network, encapsulation (networking), end-to-end principle, firewall (computing), forwarding plane, function (mathematics), internet protocol, ipv4, ipv6, ipv6 address, ipv6 packet, latency (engineering), localhost, loopback, multiprotocol label switching, network packet, open-source software, resource reservation protocol, router (computing), routing, user datagram protocol, virtual private network
Austin Hounsel
Computer Science Ph.D. Student at Mozilla
amazon elastic compute cloud, android (operating system), apple inc., application software, bufferbloat, cellular network, cloudflare, communication protocol, dns over https, domain name system, dynamic host configuration protocol, end user, goal, google, https, median, opensignal, packet loss, quad9, simulation, tcp congestion control, transmission control protocol, transport layer security, user datagram protocol
Matthew Wood
Senior Data Scientist and Machine Learning Engineer at Facebook
automation, border gateway protocol, c++, cascading style sheets, communication protocol, computer network, facebook, facebook platform, go (programming language), hackathon, internet, internet control message protocol, internet protocol, javascript, machine, machine learning, osi model, printed circuit board, reachability, resource reservation protocol, router (computing), traceroute, traffic shaping, transmission control protocol, user datagram protocol
Andrew Gray
Principal Engineer 3 at Charter Communications
border gateway protocol, computer network, dhcpv6, dns over https, domain name system, domain name system security extensions, dynamic host configuration protocol, home network, https, hypertext transfer protocol, idea, internet control message protocol, ip address, ipv6, maximum transmission unit, multiprotocol label switching, open shortest path first, overlay network, request for comments, router (computing), simple network management protocol, transmission control protocol, transport layer security, user datagram protocol, world wide web
Job Snijders
Internet Routing Architecture at NTT Ltd.
border gateway protocol, communication protocol, community, complex system, computer keyboard, computer network, data, debugging, dhcpv6, dns over https, domain name system, domain name system security extensions, dynamic host configuration protocol, elevator, home network, https, hypertext transfer protocol, idea, internet, internet control message protocol, internet protocol, ip address, ipv6, maximum transmission unit, multiprotocol label switching, open shortest path first, overlay network, peering, property, public key infrastructure, reality, reason, request for comments, router (computing), routing, routing table, school shooting, simple network management protocol, stalking, tax, time, traceroute, transmission control protocol, transport layer security, understanding, user datagram protocol, world wide web
Ignas Bagdonas
Network engineer at Equinix
border gateway protocol, computer network, dhcpv6, dns over https, domain name system, domain name system security extensions, dynamic host configuration protocol, home network, https, hypertext transfer protocol, idea, internet control message protocol, ip address, ipv6, maximum transmission unit, multiprotocol label switching, open shortest path first, overlay network, request for comments, router (computing), simple network management protocol, transmission control protocol, transport layer security, user datagram protocol, world wide web
Alissa Cooper
Fellow at Cisco
border gateway protocol, computer network, dhcpv6, dns over https, domain name system, domain name system security extensions, dynamic host configuration protocol, home network, https, hypertext transfer protocol, idea, internet control message protocol, ip address, ipv6, maximum transmission unit, multiprotocol label switching, open shortest path first, overlay network, request for comments, router (computing), simple network management protocol, transmission control protocol, transport layer security, user datagram protocol, world wide web
Petr Spacek
Project Manager at CZ.NIC, z.s.p.o.
benchmarking, book of genesis, cache (computing), client (computing), communication protocol, data, domain name system, easter, gif, god, information, internet, library, microsoft powerpoint, money, motivation, muscle, name server, pdf, plant, program optimization, sender policy framework, software , user datagram protocol, video
Ron Bonica
Distinguished Engineer at Juniper Networks
16-bit, 32-bit, border gateway protocol, communication protocol, computer network, dhcpv6, dns over https, domain name system, domain name system security extensions, dynamic host configuration protocol, firewall (computing), forwarding information base, home network, https, hypertext transfer protocol, idea, instruction set architecture, internet control message protocol, internet protocol, interoperability, ip address, ipsec, ipv6, ipv6 address, ipv6 packet, maximum transmission unit, multiprotocol label switching, network packet, open shortest path first, overlay network, ping (networking utility), request for comments, resource reservation protocol, router (computing), routing, simple network management protocol, source routing, traceroute, transmission control protocol, transport layer security, user datagram protocol, virtual private network, world wide web
Damian Menscher
Security Reliability Engineer at Google
botnet, computer network, database, denial-of-service attack, domain name system, handshaking, incentive, internet, internet privacy, internet protocol, mind, mirai (malware), moore's law, netflow, network time protocol, password, physics, privacy, router (computing), routing, server (computing), spoofing attack, telecommunication, transmission control protocol, user datagram protocol
Eddy Winstead
Senior Sales Engineer at Internet Systems Consortium
attention, bee, communication protocol, community, domain name system, ecosystem, email, extension mechanisms for dns, feedback, firewall (computing), flag, flag of the united states, food, internet, ipv6, nothing, san francisco, server (computing), software bug, tool, transmission control protocol, twitter, user datagram protocol, weed, workaround
1 2 3 4
1-30 of 91