Wednesday, January 16, 2019
Details Event Plan : 6h30 - 7h00 : Effective Networking - Pizza and Beer 7h00 - 7h30 : "Discovering Artificial Intelligence as the next trillion-dollar technology" by Jonas E Nwuke Business Development Manager @ IBM Watson 7h30 - 7h40 : Q&A 7h40 - 8h20...
Details Announcement: For this event, we are collaborating with ARNY -Augmented-Reality-New-York. http://www.meetup.com/ARNY-Augmented-Reality-New-York/events/191693862/ Q&A: Submit your questions on Twitter @nyc_nbt Event Plan : 6:30 - 6:45 : Effective Networking 6:45 - 6:50 : Introduction by Marc Raphael 6:50 - 7:20 : Augmented Reality and Education by Adam Newman...
Details Event Plan: 6:30-7:00 PM : Effective Networking - Beer and other beverages. 7:00 PM : Host Presentation 7:00-7:30 PM : Tone Vays as Keynote Speaker - Bitcoin as a Speculative Financial Asset 7:30-7:40 PM : Q&A 7:40-7:50 PM : Robert Allen - CEO @ COINCUBE 7:50-8:00...
Details Announcement: For this event, we are collaborating with IoT NY http://www.meetup.com/IoT-NY/events/221804581/ Event Plan : 6:30 - 7:00 : Effective Networking - Pizza and Beer 7:00 - 7:15 : Welcome - Linda Presentation 7:15 - 7:45 : Arthur Tu @ Elemental Path (http://www.elementalpath.com/) 7:45 - 7:55 :...
Human beings generally try their best to change their life. It doesn't matter if it’s to improve their health or to “hack” their life. This state of hacking is called biohacking. To understand what is biohacking, we need to...
"Hardware is Hard, but it’s a lot easier than it’s ever been ” -This is probably the only word of hope left for most tech companies and Start-Ups in the 21st century ! Dealing with hardware is something most...
Details Event Plan: 6:30-7:00 PM : Effective Networking - Pizza and Beer 7:00 PM : Host Presentation : Dino De Cespedes 7:00-7:30 PM :Keynote by Keith Trippie 1) Workforce: Cyber Security’s Riskiest Domain 2) Future Business Model of IT and Cyber 7:30-7:40 PM : Q&A 7:40-7:50 PM...
“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” ― Stephane Nappo Hacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as...
Five Phases of Hacking There are mainly 5 phases in hacking. A hacker does not necessarily need to follow these 5 steps in a sequential manner, but it’s a stepwise process and when followed yields a better result. Reconnaissance ...
Invincibility lies in the defense, the possibility of victory in the attack. -Sun Tzu (The Art of War)   A cyber  attack is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or...