Shay Gueron, Associate Professor of Mathematics, University of Haifa, Israel, and Raluca Ada Popa, Assistant Professor of Computer Science, UC Berkeley
Moderator: John Graham-Cumming, CTO, Cloudflare
Photo by Cloudflare Staff
Raluca is also a Co-Director of the RISELab at UC Berkeley as well as Co-Founder and CTO of a cybersecurity startup called PreVeil. She developed practical systems that protect data confidentiality by computing over encrypted data as well as designed new encryption schemes that underlie these systems.
Shay was previously a Senior Principal Engineer, serving as Intel’s Senior Cryptographer and is now senior principal at AWS, and an expert in post-quantum, security, and algorithms.
JGC: Tell us about what you actually do.
RP: Computing on encrypted data is not just theoretical; it’s also exciting because you can keep data encrypted in the cloud. It covers hacking attacks while still enabling the functionality of the system. This is exciting because we can cover so many hacking attacks in one shot.
SG: I’m working on making new algorithms; also on making solutions for quantum computers that are increasingly strong.
SG: I’ve been working on cryptography: making it faster, recently I’ve been thinking about solutions for what will happen when we Continue reading
Willie Tejada, Chief Developer Advocate, IBM and Anthony Goldbloom, CEO, Kaggle
Moderator: Jen Taylor, Head of Product, Cloudflare
Photo by Cloudflare Staff
JT: Our focus today is really what does AI mean for everyday life. I’m hearing a lot about AI. What is your assessment about where we are and how it is making a difference?
WT: we’re in an unprecedented, interesting era. From a consumer perspective, negative connotation.
It’s an interesting era we are in; these technologies are going to do a tremendous amount in terms of consumers selecting what they buy, Helping patient-centric care.
Combination of data set & availability of resources is fueling AI.
You might hear 90% of the world’s data has been created in the past two years. AI will help us deal with that kind of information overload.
The big difference with programming systems is that AI knows how to understand, reason, learn, interact.
AG: There is a set of techniques through which we can more accurately predict fraud, insurance plans, credit scoring.
This is a jump in the past 15 years.
5 years ago, the ability to do very exciting things with unstructured data, i.e. automating radiology. Then digital networks Continue reading
The system will support customizable signature sets for more than 7,000 applications.
Hurricanes Irma and Harvey highlight the need for DR planning to ensure business continuity.
Current LTE-based 4G networks described as a rock band.
Avril Haines, Former Deputy National Security Advisor, Obama Administration
Moderator: Doug Kramer, General Counsel, Cloudflare
Photo by Cloudflare Staff
Avril began her career on the National Security Council, and went on to become the first female deputy at the CIA.
DK: How will cyber will play a role in military operations?
AH: We look at it from the perspective of “asymmetric threats”; state actors (those who have high-value assets that they can hold at risk with no threat to them). The US is more technologically advanced and relies on cyber more and more; we are as a consequence more vulnerable to cyber threats. Asymmetric threats thus hold at risk those things that are most important to us.
In the cyber realm we can’t quite define what constitutes a use of force, and saying so can be used against us. So this is an area that is crucial to continue working in; in many respects the US has the most to lose from using a framework that doesn’t work.
“The private sector is utterly critical in creating a framework that is going to work.”
We want to have widely-accepted norms and rules so that we can ask other countries Continue reading
Companies need automation because they won't be able to hire enough people to do things manually.
The post Worth Reading: Planning for cloud’s limitations appeared first on rule 11 reader.
Enterprise IT pros should consider these factors before a cloud migration.