Driving IT 2017 giver den 3. november et unikt indblik i it-verdenens konstante ændringer. og du kommer hjem med konkret og brugbar viden om IT og udvikling. Tilmeld dig nu.

Webinarer 2016

Webinar: Driving IT var igen i 2016 et stort tilløbsstykke. Havde du ikke mulighed for at deltage, eller vil du gerne gense oplæggene, har vi samlet webinarerne på denne side.
16. dec. 2016 Af: Driving IT

400 mennesker deltog på Driving IT for at høre, hvad der vil ændre vores IT-verden nu og i fremtiden.

Nu kan du se mange af indslagene fra konferencen, som ligger inden for temaerne tool, privacy & security, tech/start up og cool.

Companies should include themselves in the threat model when designing protocols
Companies should include themselves in the threat model when designing protocols

As the recent Apple/FBI confrontation makes clear, companies should assume they can be coerced into becoming part of the threat model for their customers. It is possible to create security archit ...

Se video
Dynamic Encryption - Why and What?
Dynamic Encryption - Why and What?

State-controlled cyber espionage becomes more frequent and more sophisticated and is seen as one of the biggest threats to the western world. We will show some recent examples of attacks on mobile ...

Se video
EU-dataforordningen – hvad er formålet og hvad skal du gøre?
EU-dataforordningen – hvad er formålet og hvad skal du gøre?

Birgitte Kofod Olsen er partner i Carve Consulting og jurist med en PhD i persondatabeskyttelse og biometri. Hun har arbejdet med privatlivs- og databeskyttelse i forhold til ny teknologi i mere e ...

Se video
A Wrong (but lucrative) Career Move
A Wrong (but lucrative) Career Move

Tag med på en rejse til den mørke side af internettet og få indsigt i hackernes muligheder.

Se video
Testing and Analysing Privacy in Mobile Applications
Testing and Analysing Privacy in Mobile Applications

We will present how we scientifically tested several mobile applications using various strategies such as network captures, man-in-the-middle attacks, or decompilations to analyse their behaviours ...

Se video
Cyber Security Lessons: The US election
Cyber Security Lessons: The US election

Both Trump and Clinton have expressed concerns about that the US election might be rigged or at least influenced by foreign interests. In my talk I will provide a closer look behind the curtain, ...

Se video
Where are we headed?
Where are we headed?

Our movement is increasingly captured by technology. I will give an introduction to the national licence plate reading system, ANPG, and try to answer: Can we travel without leaving digital traces?

Se video
Yachts, Horses & Privacy
Yachts, Horses & Privacy

Are you rich enough to afford privacy ? Is anybody ?

Se video
Jamming in VRUnicorns
Jamming in VRUnicorns

Horatiu will talk about the history and process behind my game jamming team/company VRUnicorns, and why jamming (a.k.a. rapid prototyping) can be the core of a successful startup. I may or may not ...

Se video
Deep learning - a revolution in data analysis?
Deep learning - a revolution in data analysis?

Statistical artificial intelligence powered by deep learning and fast computing devices are pushing boundaries these years. Some cases stories and what could be next.

Se video
The future of presentations - a story of conversational presenting
The future of presentations - a story of conversational presenting

Spencer will share a new (and welcome) emerging trend in the world of business presentations that early adopters are having great success with.

Se video
Lesson Learned - How to Build a Tech Startup?
Lesson Learned - How to Build a Tech Startup?

In this talk Camilla will take you through the lessons learned when starting up a business. Camilla has also initiated Women in Tech, which she will also touch upon in her talk.

Se video
Unity: The Technology behind Pokémon GO
Unity: The Technology behind Pokémon GO

We'll take a look into the Unity Game Engine, the technology powering Pokémon Go, Kerbal Space Program, Crossy Road, and hundreds of other titles.  This will be a very technical look into how we b ...

Se video
Prototyping Hardware While Disrupting The Real World
Prototyping Hardware While Disrupting The Real World

Google and SpaceX use prototyping to disrupt current practices, and it’s not because they are huge companies, it’s because they believe in disruptive, iterative design thinking. This talk explores ...

Se video
Fighting abuse at ISP level and not going mad…
Fighting abuse at ISP level and not going mad…

Abuse, in all different flavors, is on the net. ISP play a central role in that game. They provide the means to let it happen and also to prevent it. In my presentation I will talk about the obsta ...

Se video
Abuse management - preemptive actions, networking, tools
Abuse management - preemptive actions, networking, tools

Abuse management needs to move away from being reactive. Preemptive monitoring and trending can stop bad things from happening.

Se video
Protecting against tomorrow's adversaries - Post-Quantum Cryptography
Protecting against tomorrow's adversaries - Post-Quantum Cryptography

Quantum Computers could endanger almost all cryptosystems that are in use today. While it's unclear if large scale Quantum Computers will ever be built, some researchers see them happening within ...

Se video
Companions and Consiglieres: Expanded roles for Machines
Companions and Consiglieres: Expanded roles for Machines

In this talk technology philosopher Nell Watson will explore how machine intelligence can be deployed as a method of understanding human beings, to catalogue their values and perspectives, and att ...

Se video
luk
close