decor image

Mês: Outubro 2015

GHC15: Cloud Security Presentations

Security in Cloud Based Integration SolutionsSindhu Gangadharan, Vice President, SAPHow do you secure your data in the cloud?Secure information, secure interaction and secure identity. How are control and access mechanisms used to protect these systems…

Read more

GHC15 Presenting Yourself with Credibility

Presented by: Christina TanWhen I normally think of presenting myself with credibility, I think of how others think of me. I’m in the first year of my life in “the real world” and have been thrown into situations with clients tha…

Read more

GHC15: Security from the Boardroom

What to Protect When You Can’t Protect Everything?Kelly Kitsch, Advisory Director of PwCUnlimited funds don’t come, unless you have a massive breach – and we’d all rather it not get to that.Threats are complex and ever changing, we have to be able to a…

Read more

Infrastructure & Optimization for Data Sci Presentations @ GHC15

Optimization and Big Data: An Application from Car Rental Pricing -Ezgi C. Eren,Scientist II OF Pros, Inc. Relation between optimization and big data The speaker started out with an important point that Big data comes with its own challenges and it comes with its own problems. Big data is useful only when we manage to […]

Read more

Blogging at GHC15: (Another Perspective) Diversify Your Hiring Pipeline: A How-to Guide

So, how do we diversity the pipeline?The speakers of the GHC15 session talk start with an anecdote about being approached by a company who wanted to remove names from resumes to remove bias.  When they analyzed the company’s job pipeline to look f…

Read more

GHC15: (Another Perspective) Diversify Your Hiring Pipeline: A How-to Guide

So, how do we diversity the pipeline?The speakers of the GHC15 session talk start with an anecdote about being approached by a company who wanted to remove names from resumes to remove bias.  When they analyzed the company’s job pipeline to look f…

Read more

“Write Once,Run Anywhere” The Mobile Developer Pipedream – Paola Castro -Notes

With the increased need to provide apps for numerous platforms namely, Android, iOS and the web, maintaining and scaling mobile applications is one of the greatest challenges for mobile developers. In this session Paola spoke on the technologies that allow for … Continue reading

Read more

GHC15: Authorized But Anonymous: Taking Charge of Your Personal Data

Anna Lysyanskaya, Brown University got her PhD under Ron Rivest at MIT, and has received many awards.  She allows people to prove themselves without exposing themselves.Online, not much thinking required :-)I log in – therefore I am… …

Read more

Blogging GHC15: Solving the Equation: The Variables for Women’s Success in Computing

This is the first year that GHC has a dedicated Organizational Transformation track. If you’re like me, a used-to-be-new-still-kind-of-new industry professional, these talks may sound intriguing.  Now that I’ve had my feet planted in my role, I’ve…

Read more

GHC15: Solving the Equation: The Variables for Women’s Success in Computing

This is the first year that GHC has a dedicated Organizational Transformation track. If you’re like me, a used-to-be-new-still-kind-of-new industry professional, these talks may sound intriguing.  Now that I’ve had my feet planted in my role, I’ve…

Read more
Skip to content