Events Add an event Speakers Talks Collections
 

Talks

Sort by
Newest
Trending
1-30 of 1285
Filter

Evgeniy Vlasov | AI computing power in Edge Industry use cases

11/17/2020
Views 50
0
automation, car, central processing unit, cloud computing, computer, computer hardware, computing, data center, feedback, robot, self-driving car, smartphone, software , tensorflow, warehouse, computer performance, digital twin, huawei, invention, server (computing), smartwatch, streaming media, timer
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Florin Manaila | How AI and Deep Learning could effort the Climate Change

11/17/2020
Views 106
0
climate change, deep learning, emerging technologies, ibm, infrastructure, resource, scalability, binary file, byte, consumption (economics), data compression, floating-point arithmetic, gigabyte, kilowatt-hour, server (computing), supercomputer, high bandwidth memory, electric energy consumption
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

99% of Worker-Master Communication in Distributed Optimization Is Not Needed

08/06/2020
Views 49
0
algorithm, communication, computer, data, data center, machine, paper, space, starbucks, estimator, gradient, knife, newspaper, pharmacist, scorpion, server (computing), tablet computer, the simpsons, variance, relativism, fraction, referendum, spar (aeronautics), tyrannosaurus
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Serverless Architecture Security Patterns for Securing the Unseen

05/20/2021
Views 65
0
authentication, cloud computing, edge computing, facebook, identity management, internet, internet of things, justice, product lifecycle, robot, search engine, amazon dynamodb, authorization, command-line interface, computer network, data validation, end user, firewall (computing), function (mathematics), kernel (operating system), server (computing), serverless computing, single sign-on, social norm, transport layer security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

How I Hacked Your Website and You Didn’t Even Know

05/20/2021
Views 67
0
google chrome, internet, internet security, javascript, malware, operating system, web analytics, web application, website, alexa internet, content security policy, credit card fraud, data exfiltration, exploit (computer security), html5, hypertext transfer protocol, internet privacy, personal computer, proxy server, server (computing), vulnerability (computing), web browser, world wide web, solarwinds
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Cybersecurity Controls: It Isn't Just Technical Controls That Need Testing

05/20/2021
Views 68
0
computer security, database, disease, email, memory, mining, privacy, risk, simulation, water, access control, civilization, credit card, password, patch (computing), security hacker, server (computing), the abyss, time zone, uncertainty, user (computing), virtual private network, vulnerability (computing), white hat (computer security), database security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Modern Identity Hacking: Have Hackers Really Adjusted to Constant Remote?

05/20/2021
Views 69
0
authentication, biometrics, cloud computing, data breach, data security, encryption, internet, powershell, authorization, computer file, computer network, dmz (computing), laptop, multi-factor authentication, outlook.com, password, physical security, server (computing), telecommuting, url redirection, web browser, world wide web, help desk, iris recognition, modern identity hacking
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

MITRE ATT&CK® as a Framework for Cloud Threat Investigation

05/20/2021
Views 78
0
best practice, cloud computing, community, computer security, computing, internet, interoperability, interview, operating system, outsourcing, research, retail, risk, spotify, system, virtualization, cloud computing security, computer network, penetration test, server (computing), system on a chip, thread (computing), threat model, storage area network
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

The Road to End-to-End Encryption

05/20/2021
Views 78
0
cryptography , github, alice and bob, client (computing), cryptographic hash function, email address, end-to-end encryption, key (cryptography), laptop, martin hellman, server (computing), telephone, videotelephony, whitfield diffie, zoom (software)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Windows Kernel Patch Protection - Achilles Heel: PatchGuard

05/19/2021
Views 174
0
central processing unit, computer hardware, windows 10, array data structure, blue screen of death, breakpoint, core dump, graphical user interface, instruction set architecture, kernel (operating system), parameter (computer programming), subroutine, thread (computing), windows xp, register-transfer level, x86 debug register, achilles heel
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

How to Ruin your SOC in 5 Easy Steps

05/17/2021
Views 57
0
automation, big data, data center, encryption, intelligence, memory, mentorship, news, risk, software as a service, threat intelligence, computer network, data model, glasses, rsa conference, server (computing), working memory, threat intelligence platform, on-premises software, security information and event management
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Don’t Worry, Be API: Addressing AppSec’s Newest Challenge

09/16/2020
Views 117
0
api, application security, authentication, cloud computing, cybersecurity, database, design, html, information, infosec, knowledge, reason, research, rsa, rsac, rsaconference, security, software , technology, web application, access control, application software, client (computing), communication protocol, computer network, denial-of-service attack, interface (computing), server (computing), single-page application, user (computing), web browser, world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Protecting Businesses from Breaches: Simple Lessons Still Unlearned

09/16/2020
Views 122
0
amazon web services, equifax, sharepoint, web application, bug bounty program, national security agency, security alarm, shared resource, software versioning, wannacry ransomware attack, web application firewall
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

PKI Well Revised: Common Mistakes Which Lead to Huge Compromise of Identity

09/16/2020
Views 135
0
api, authentication, code signing, computer security, cybersecurity, email, information, infosec, rsa, rsac, rsaconference, security, whatsapp, windows 10, application software, certificate authority, client (computing), digital signature, hypertext transfer protocol, kodi (software), microsoft windows, password, personal identification number, public key certificate, public key infrastructure, public-key cryptography, remote desktop services, server (computing), user (computing), world wide web, domain controller (windows)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Inside the Mind of a Hacker: How a Light Bulb Almost Stopped Christmas

09/15/2020
Views 323
0
phishing, bring your own device, industrial internet of things, intrusion detection system, network security, personal computer, piracy, user (computing), world wide web
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Authentication and Beyond Using FIDO and Push Notifications

09/15/2020
Views 416
0
authentication, cryptography , cybersecurity, ebay, education, email, information, infosec, mind, privacy, risk, rsa, rsac, rsaconference, security, technology, usability, application software, computer file, file server, microsoft windows, multi-factor authentication, online chat, password, passwordless authentication, push technology, server (computing), symbol, technical support, the shining (film), theory, authentication protocol
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Cyberespionage: Targeted Attacks Abusing Third-Party Cloud Services

09/15/2020
Views 408
0
internet of things, android (operating system), bios, book, collaboration tool, distributed workforce, file sharing, mobile phone, motorola droid, screenshot, server (computing), telegram (software), telegraphy, underscore
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Vikas Ratna and James Leach | Cisco Future Cloud 2021

06/01/2021
Views 515
0
brand, cisco, cloud computing, computing, customer experience, data-intensive computing, design, kubernetes , music, netapp, networking, smartphone, technology, application software, complexity, computer cooling, converged infrastructure, disruptive innovation, existence, global positioning system, operating model, radar, server (computing), truth, satellite navigation device, internet solutions , networking technologies, cisco technology, cisco future cloud 2021, futurecloud, unified computing systems, convergedinfrastructure, hybridcloud, intersight, xseries
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Bringing Data Manipulation from KNIME into TIBCO Spotfire

04/07/2020
Views 594
0
api, database, html, interactivity, javascript, knime, mobile app, software testing, spotify, user interface, website, wechat, application software, function (mathematics), library (computing), menu (computing), parameter (computer programming), principal component analysis, python (programming language), server (computing), software framework, visualization (graphics), web browser, web portal, world wide web, default (computer science), tibco, knime analytics platform, knime summit, data manipulation, knime virtual summit, spotfire
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

What’s New and Cooking in KNIME Server

04/01/2020
Views 363
0
api, computer hardware, facebook, programmer, software , apache tomcat, autoscaling, lightweight directory access protocol, login, microsoft windows, online and offline, password, prepaid mobile phone, representational state transfer, server (computing), single sign-on, upload, user (computing)
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Create and Productionize Data Science Solutions

04/01/2020
Views 480
0
authentication, java (programming language), open-source software, software , version control, computer file, lightweight directory access protocol, microsoft excel, microsoft sql server, oracle corporation, scripting language, text mining, web portal
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"Let REST Do Rest: Deep Dive In GraphQL With Django" by: Nisarg Shah

03/26/2021
Views 80
0
api, communication, diabetes, economics, education, email, exception handling, information, social media, sql, startup company, android (operating system), client (computing), client–server model, communication protocol, database schema, django (web framework), evaluation, function (mathematics), hgtv, online and offline, python (programming language), server (computing), world wide web, six feet up, sixfeetup, ahmedabad
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"Deploying a Virtual Event Platform Using Fargate and Terraform" by: Calvin Hendryx-Parker

03/25/2021
Views 28
0
amazon web services, cloud computing, content delivery network, kubernetes , load testing, node.js, version control, websocket, amazon elastic compute cloud, autoscaling, command-line interface, deployment environment, hypertext transfer protocol, immutable object, key (cryptography), load balancing (computing), login, password, react (web framework), representational state transfer, server (computing), serverless computing, software bug, web browser
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"Serverless & Microservices Monitoring In An IoT World" by: Erez Berkner

03/23/2021
Views 37
0
amazon web services, api, central processing unit, cloud computing, computing, database, internet of things, memory, microservices, microsoft, scalability, sms, telemetry, twitter, whatsapp, amazon (company), amazon dynamodb, application software, gateway (telecommunications), medtronic, parameter (computer programming), server (computing), serverless computing, world wide web, six feet up, sixfeetup
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"Data Lakes and Streams with S3 and Lambda" by: Justin Garrison

03/23/2021
Views 73
0
amazon web services, big data, electron, physics, startup company, xml, computer network, directed acyclic graph, extract, transform, load, gateway (telecommunications), inventory, light, serverless computing, speed of light, faster-than-light
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"Ejector Seats and Escape Hatches: Designing Your API to Fail" by: Meredydd Luff

03/23/2021
Views 71
0
api, central processing unit, computer programming, css , database, html, javascript, operating system, postgresql, programming language, sql, web framework, application software, graphical user interface, hypertext transfer protocol, instruction set architecture, interpreter (computing), library (computing), machine code, minification (programming), object (computer science), representational state transfer, server (computing), web page, sqlalchemy, six feet up, sixfeetup
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

"Automating AWS with Python: The Easy Way To The Cloud" by David Sol

03/22/2021
Views 254
0
amazon web services, api, cloud computing, computing, cryptography , data center, infrastructure as code, memory, metadata, operating system, programming language, snapchat, amazon dynamodb, application software, bit, branch (computer science), command-line interface, computer file, digital signature, password, photograph, server (computing), user (computing), waiting staff, six feet up, sixfeetup
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

Go full-stack with Kotlin or Dart on Google Cloud | Session

05/19/2021
Views 5.94 K
0
full stack, full-stack, fullstack, google cloud, kotlin, microservices, docker (software), representational state transfer, back end development, backend development, dart multiplatform, eventarc, full stack dev, full stack developer, full stack development, full-stack kotlin, kotlin multiplatform
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

From security as opt-in to security by default | Session

05/19/2021
Views 1.77 K
0
api, central processing unit, chrome, developers, google, google i/o, google io, google maps, personal data, risk, web, website, youtube, arbitrary code execution, cross-site scripting, emoji, html element, hash function, microsoft windows, pop-up ad, proof of concept, same-origin policy, server (computing), spectre (security vulnerability), subdomain, text messaging, vulnerability (computing), web browser, world wide web, clickjacking, #googleio, google announcement, google conference, google developer conference, pr_pr: google i/o, type: conference talk (full production), purpose: educate, chrome developer, chrome development, chrome spectre updates, google spectre, spectre updates, updates to website security, website security
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free

5 tips for your PWA | Session

05/18/2021
Views 17.23 K
0
analytics, chrome, css , developers, google, google chrome, google i/o, google io, html, javascript, progressive web apps, twitter, web, web application, android (operating system), application software, button (computing), computer file, cut, copy, and paste, directory (computing), event (computing), http cookie, hypertext transfer protocol, icon (computing), microsoft windows, online and offline, progressive web application, server (computing), shortcut (computing), tab (interface), web browser, world wide web, #googleio, google announcement, google conference, google developer conference, pr_pr: google i/o, type: conference talk (full production), purpose: educate, chrome developer, chrome development, progressive web apps updates, pwa improvements, pwa tips, web app creation
Available
In cart
Free
Free
Free
Free
Free
Free
Free
Free
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 43