Category: Technology



The IBM Quantum Summit kicks off with a perspective from Darío Gil, IBM SVP and Director of Research on the journey of IBM Quantum. Darío reveals our biggest industry-defining announcements of the year and provides a glimpse into the remarkable future ahead. PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=kR0y5Ps-7Kw https://www.youtube.com/watch?v=kYAtt3CUN-Y



These are five skills that will boost your resume which you can learn in roughly two weeks. The skills are: SQL
– At least learn how to do basic CRUD operations
– Know a Clustered and Non-Clustered Index
– Know how to do a simple join. Jira
-Know how to create a sprint, create tickets and move the ticket through a process. Git
– Know how to pull from a repository, clone a repository and check back into a repository. AWS or Azure
– In one or the other, now how to spin up an instance, create a pipeline to that instance, and deploy to that instance. Docker
– Know how to deploy, stop and start a container
– If you are running Windows 10, you can use VirtualBox (www.virtualbox.com) to run Linux and Docker. PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=2dzHVL0XrBw&t=170s https://www.youtube.com/watch?v=ETJTHtaU1cA



Cryptography is tricky. Sure, everybody knows not to roll out their own crypto, but is it enough? Are the standard algorithms, libraries, and utilities always used the right way? This is of course a rhetorical question! Humans keep making mistakes that other humans can exploit, and Murphy’s law continues to prove true: “If there is a wrong way to do something, then someone will do it.” In this talk, not only will we discuss what can go wrong, but also how attackers could take advantage of that. Insufficient entropy? Static initialization vector? Key reuse in stream cipher? Lack of ciphertext integrity? We’ve heard these terms and may be familiar with them in theory, but let’s see actual examples of these and other crypto mistakes and corresponding exploits, and understand how they could lead to real life problems. Are you not on a red team and not interested in exploitation? Then this talk is for you too! Come and learn how to avoid common crypto mistakes in your code! PUBLICATION PERMISSIONS:
Original video was published with the Creative Commons Attribution license (reuse allowed). Link: https://www.youtube.com/watch?v=w2wbySL6T0I https://www.youtube.com/watch?v=eTHRv2uSc_Y