Events Add an event Speakers Talks Collections
 

Talks

Sort by
Newest
Trending
1-30 of 212
1-30 of 212
Filter

Serverless Full-Stack Kickstart with Davide Mauri

09/29/2021
Views 1.5 K
0
api, central processing unit, compiler, database, github, hacker, json, programmer, relational database, research, sql, twitter, vue.js, web application, web framework, application software, concurrency (computer science), condom, cut, copy, and paste, dashboard (business), login, representational state transfer, serverless computing, subroutine
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Eric Migicovsky - How to Talk to Users

01/20/2020
Views 342.98 K
0
computer, computer science, conversation, gesture, hacker, interview, mobile app, motivation, privacy, question, reason, science, startup company, startup school, time, y combinator, yc, computer file, consumer electronics show, credit card, dropbox (service), office space, pebble (watch), product/market fit, prototype, the french laundry
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Kevin Hale - How to Evaluate Startup Ideas

01/20/2020
Views 612.56 K
0
cost, email, experiment, hacker, hypothesis, motivation, reason, reddit, software , startup company, startup school, twitter, venture capital, y combinator, yc, belief, explanation, homelessness, insight, miracle, monopoly, network effect, paul graham (programmer), pricing, shit, understanding, yahoo!
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Art+Code for Impact

11/05/2021
Views 32
0
computer, concept, entertainment, geographic information system, hacker, motivation, narrative, social media, typography, african americans, agrarian society, domain-specific language, invention, microsoft powerpoint, palette (computing), vector graphics, visualization (graphics), geometric primitive, tableau vivant, juneteenth, color line (racism), la amistad, lynching of sam hose, plessy v. ferguson, the souls of black folk

Velocity or Governance: Why not both? - Fatih Degirmenci, EricssonSpeakers: Fatih Degirmenci

06/24/2021
Views 14
0
automation, facebook, gas, hacker, health, health care, innovation, interoperability, mobile app, money, news, security, smartphone, software development, speed, typing, youtube, bank, emergency, general data protection regulation, police, regulatory compliance, telecommunication, text messaging, troubleshooting
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Kubernetes Security Jumpstart | Mofi Rachman | Conf42: Cloud Native

04/29/2021
Views 93
0
asynchronous, automation, data lakes, database, distributed database, email, fintech, graalvm, hacker, hdfs, health check, internet, java (programming language), kotlin, kubernetes , linux, microservice, public cloud, quarkus, research, serverless, software , telemetry, access control, cgroups, denial-of-service attack, file system, go (programming language), lock picking, need for speed, password, quality of service, role-based access control, scheduling (computing), software bug, superuser, transport layer security, web beacon, world wide web, zero-day (computing), flagger , app migration, caching patterns, cloud sidecar, clusters gitops, fluentd save, flux2 multi-cloud, galls law, gatekeeper, gating service, graviton2, iam reliability, infrastructure drift, jumpstart, kubernetes cloud, multi-cloud magic, opa, open liberty, pipelines ci/cd, poilcy-as-code
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Locking Down the Security of IAM | Josh Stella | Conf42: Cloud Native

04/29/2021
Views 96
0
amazon web services, api, asynchronous, automation, best practice, cloud computing, data center, data lakes, database, distributed database, fintech, graalvm, hacker, hdfs, health check, identity management, kotlin, microservice, operating system, public cloud, quarkus, serverless, social media, telemetry, twitter, active directory, amazon elastic compute cloud, authorization, cgroups, cloud computing security, data exfiltration, function (mathematics), health insurance portability and accountability act, need for speed, security hacker, social engineering (security), use case, vulnerability (computing), world wide web, attribute-based access control, flagger , app migration, caching patterns, cloud sidecar, clusters gitops, fluentd save, flux2 multi-cloud, galls law, gatekeeper, gating service, graviton2, iam reliability, infrastructure drift, jumpstart, kubernetes cloud, multi-cloud magic, opa, open liberty, pipelines ci/cd, poilcy-as-code
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Brian Bouchard, Alacrinet Consulting Services | IBM Think 2021

05/11/2021
Views 177
0
business, cloud computing, computer security, dave vellante, federal reserve, hacker, ibm, interoperability, john furrier, leadership, red hat, research, reseller, siliconangle, siliconangle inc, siliconangle media inc, tax, technology, thecube, wikibon, cyberattack, economy of the united states, firefighter, ibm cloud computing, insight, market (economics), open innovation, open standard, penetration test, vulnerability (computing), future-proof, fireproofing
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

TiE: Pandemic Impact on Fundraising | SFF 2020

12/10/2020
Views 62
0
big data, bitcoin, blockchain, digital health, disease, genetics, hacker, health, health care, internet, investor, surveillance, tax, therapy, tim draper, venture capital, covid-19 pandemic, crowdfunding, efficacy, food and drug administration, medical diagnosis, medical record, patient, physician
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Death to CIA! Long live DIE! How the DIE Triad Helps Us Achieve Resiliency

05/20/2021
Views 1.85 K
0
amazon web services, cia, cloud computing, computer security, computing, database, facebook, hacker, icloud, information security, malware, mobile app, privacy, social media, twitter, apple inc., blog, cloud computing security, immutable object, network topology, random graph, veterinarian, secrecy, robust statistics, secure shell protocol
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

RSAC 2021 Keynote: The Coming AI Hackers

05/19/2021
Views 2.1 K
0
algorithm, creativity, crime, evolution, governance, hacker, intelligence, mind, robot, simulation, social media, software , system, alphago, explainable artificial intelligence, file system, patch (computing), security hacker, technological singularity, thought, understanding, vulnerability (computing), alphago versus lee sedol, ai hackers, phrases from the hitchhiker's guide to the galaxy
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

RSAC 2021 Keynote: Securing Today’s Unbound Enterprise

05/20/2021
Views 434
0
api, architecture, cloud computing, computer security, data center, digital transformation, email, hacker, learning, machine learning, malware, microsoft, ransomware, system, attack surface, blacklist (computing), business-to-business, cyberwarfare, data exfiltration, software framework, telecommuting, vulnerability (computing), whitelisting, forcepoint
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

RSAC 2021 Keynote: Cybersecurity as a National Imperative

05/17/2021
Views 3.54 K
0
authentication, computer security, computing, credit, cybersecurity, encryption, hacker, information, infrastructure, innovation, internet, machine learning, money laundering, national security, quantum computing, ransomware, risk, cyberattack, cybercrime, information system, market (economics), patch (computing), proactive cyber defence, research and development, seat belt, vulnerability (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Two Weeks with a Russian Ransomware Cell

09/15/2020
Views 1.04 K
0
botnet, cold war, cybersecurity, database, email, europe, hacker, information, infosec, privacy, property, ransomware, rsa, rsac, rsaconference, security, tax, twitter, antivirus software, discord (software), eastern orthodox church, password, police, propaganda, whitelisting, world war ii, quotation mark, catholic (term), cyberwarfare by russia, heresy
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Show Me the Crypto | Day 1: CNAS 2021 National Security Conference

06/08/2021
Views 156
0
bitcoin, blockchain, computer security, crypto, cryptocurrency, economics, globalization, hacker, money, money laundering, national security, phishing, ransomware, central bank, competition (economics), cybercrime, digital currency, financial transaction, foreign exchange market, global financial system, lazarus group, nuclear proliferation, nuclear weapon, privacy and blockchain, society for worldwide interbank financial telecommunication, cryptocurrency wallet
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Future of AI Fall 2020 - Using AI in Cyber Defense

10/20/2020
Views 44
0
authentication, automation, cloud computing, hacker, internet, machine learning, malware, mathematics, reverse engineering, security, software , access control, application software, chaos theory, computer network, cyberattack, cyberwarfare, firewall (computing), gateway (telecommunications), password, security hacker, telecommuting, vulnerability (computing), butterfly effect
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Kevin Owocki ( CEO, Gitcoin) | unblock2021 by Octaloop

03/09/2021
Views 61
0
bitcoin, blockchain, cash, cryptocurrency, decentralization, ethereum, hacker, internet, mathematics, mind, open-source software, privacy, routing, scalability, zillow, clickbait, communication protocol, crowdfunding, hackathon, initial coin offering, security hacker, traceroute, public good (economics), free-rider problem, excludability
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Presentation of Assante Scholars - SANS ICS Security Summit 2021

05/04/2021
Views 169
0
budget, computer hardware, computer security, cyber security, future, hacker, hero, ics, johns hopkins university, mathematics, reason, reverse engineering, science, software , curriculum, emmy award, lawyer, master's degree, password, rsa conference, scada, test (assessment), understanding, university of california, berkeley, reconnaissance, applied mathematics, ics certification, industrial control systems, industrial security, nerc, nerc certification, nerc cip, sans ics, sans institute, sansics, national merit scholarship program, united states academic decathlon
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Live Virtual 2020 - How workplace napping can boost performance, wellbeing & employer branding

09/15/2020
Views 13
0
brand, culture, disability, hacker, health, knowledge, leadership, mindfulness, nothing, science, sleep, air conditioning, aromatherapy, attention, eureka effect, evidence, hour, lisa simpson, mood (psychology), nap, perspiration, qr code, scientific method, stress (biology), power nap
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

MIT Bitcoin Expo 2020 - Welcome!

03/07/2020
Views 276
0
bitcoin, hacker, live streaming, technology, twitter, zcash, bit, campus, chair, coronavirus disease 2019, crypt, hackathon, hacker culture, hashtag, massachusetts institute of technology, streaming media
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Building decentralized solutions for digital privacy

02/29/2020
Views 37
0
blockchain, brand, censorship, cloud computing, computer security, ethereum, facebook, fintech, google, hacker, instagram, internet, social media, surveillance, twitter, whatsapp, great firewall, http cookie, internet privacy, mosaic (web browser), security hacker, tinder (app), virtual private network, world wide web, annuity, digital privacy, cryptocurrency 2020, cryptocarrency 2020, ethereum 2020 , blockhaine hackathon, eth 2020, ethlondonuk , fintech conference 2020, ethlondonuk 2020, ethereum event, crypto events 2020, blockchain news 2020, cryptocurrency solutions, decentralized solutions, dr. steven seven, eth development, ethereum development 2020, ethereum news 2020, steven waterhouse
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

IBW 2020 Day 6: Alternative Method to Cross Border Asset Transfer Using Crypto Assets

08/26/2020
Views 887
0
cryptocurrency, hacker, interest, investment, money laundering, price, stablecoin, wechat, credit card, digital currency, foreign exchange market, grocery store, hyperinflation, inflation, interest rate, libra (digital currency), monetary policy, remittance, security (finance), security hacker, swap (finance), transferwise, united states dollar, white hat (computer security)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

"Diving into 1inch: Dex Aggregator and Mooniswap" by Jessica Salomon | MoneyDance

10/01/2020
Views 200
0
algorithm, bitcoin, blockchain, crypto, cryptocurrency, decentralized finance, ethereum, finance, fintech, gas, hacker, innovation, internet, money, price, private equity, republic, revolution, sergey nazarov, simulation, smart contracts, solution, tax, tech, trade, trusttoken, twitter, venture capital, arbitrage, blog, hackathon, income, market (economics), market liquidity, search algorithm, swap (finance), torus, tree, white hat (computer security), avalanche, ftx, aave, stani kulechov, chiapas, web3, decentralized exchange, sam bankman-fried, ava labs, avax, craig russo, emin gun sirer, moneydance, olaf carlson wee, polychain capital, polyient games, status, kendrick nguyen, zhen yu, 1inch, amm, hal hyatt, mooniswap, salomon, trueusd
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Amanda Silver, Microsoft | DockerCon 2021

05/28/2021
Views 546
0
api, best practice, cloud computing, computer programming, computing, database, dave vellante, distributed computing, github, google chrome, hacker, infrastructure as code, john furrier, linux, machine learning, microservices, microsoft, node.js, operating system, siliconangle, siliconangle inc, siliconangle media inc, software , software development, thecube, wikibon, code refactoring, interpreter (computing), microsoft visual studio, runtime system, stack (abstract data type), vulnerability (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Crypto Fest 2020 - Emi Lorincz

10/30/2020
Views 57
0
blockchain, cryptocurrency, hacker, infrastructure, insurance, key management, pollution, risk, security, space, technology, twitter, web application, application software, beef, business logic, client (computing), equation, life insurance, logic, public-key cryptography, regulatory compliance, tree, wallet, web browser
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Wendy Moore, Trend Micro & Geva Solomonovich, Snyk | AWS re:Invent 2020

11/30/2020
Views 128
0
amazon web services, automation, cloud computing, conversation, dave vellante, devops, hacker, infrastructure, john furrier, marketplace, news, open-source software, procurement, programmer, ransomware, risk, security, siliconangle, siliconangle inc, siliconangle media inc, technology, thecube, trend micro, wikibon, attention, early access, http cookie, invisibility, ownership, reputation, rice, vulnerability (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free

Developing a Civic Hacker Community

04/27/2017
Views 3
0
democracy, design, education, future, geographic information system, hacker, history, innovation, leadership, mind, mural, reason, research, social capital, social media, adolescence, hacker culture, hope, laboratory, prototype, the wall street journal, wikipedia, civic technology, restorative justice, institute for the future

Showcase

04/27/2017
Views 0
0
big data, community, energy, future, hacker, information, knowledge, nothing, open-source software, reality, reason, social media, startup company, twitter, bus, civic engagement, hackathon, hackerspace, hashtag, mayor, oregon, sheep, thought, civic technology, community radio

2016 National Day of Civic Hacking Food & Security Challenge Winner

04/26/2017
Views 0
0
big data, computer security, conversation, employment, google maps, hacker, knowledge, management, mobile app, money, music, public health, reason, social media, startup company, team, brainstorming, duke university, food bank, hackathon, hashtag, security hacker, spreadsheet, code for america, civic technology

Storing & Safekeeping Your Crypto: Which Options Are Right For You? | LA Blockchain Summit

10/06/2020
Views 75
0
alon goren, austin davis, authentication, backup, bitcoin, blockchain, crypto, cryptocurrencies, cryptocurrency, decentralized finance, defi, economy, email, etoro, event, finance, google, hacker, hacking, icloud, money, operating system, phishing, privacy, risk, storage, summit, tim draper, vmware, windows 10, desktop environment, digital security, don't be evil, home computer, macintosh, microsoft windows, multi-factor authentication, online and offline, password, virtual machine, adam levy, draper goren holm, draper venture network, josef holm, la blockchain week, benjamin armaledger, blockchain beach, blockchain hack, cold storage, community electricity, crypto hack, ethereum metamask, frederic rough of coinsquad, hot storage, hot wallet, multis, thibaut sahaghian
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
Free
1 2 3 4 5 6 7 8
1-30 of 212