Presentation Videos

Tech at the Gap 2023: Decoding Intelligence

Thank you to Audio Video Group for providing videos of all of our amazing sessions this year! Want more? See our 2022 presentations.

General Session: Theresa Payton

Summary: We have the power to choose our adventure with AI. In this talk we will cover the transformative and innovative energy that AI provides. Payton will show how from the basketball court of the NBA to debugging code and more, AI has the power to change how we work and live. However, AI in the wrong hands could be used to weaponize devices and data to accelerate crimes. Payton will also address how to harness AI and make it your digital assistant that safeguards your safety and security.

General Session: Todd Marks

Summary: Join us for an illuminating keynote presentation, “AI in Action,” where we explore how Artificial Intelligence (AI) is revolutionizing a diverse range of industries. Uncover the ways AI is driving transformation in IT, Healthcare, Education, Utilities, Manufacturing, Cybersecurity, Retail, Hospitality, and Government sectors, by boosting operational efficiency, automating tasks, increasing revenue, reducing costs, and enhancing decision-making. Dive into real-world examples and case studies showcasing the multifaceted advantages of AI, and gain profound insights into how AI is shaping a more innovative and sustainable future for these vital sectors. Don’t miss out on this opportunity to witness AI’s profound influence in action and its potential to bring about positive change across industries.

General Session: Michael Rogers

Summary: Cognitive computing—such as the astonishing ChatGPT—is the latest and most potent expression of artificial intelligence. Software and robots can now learn from experience and then reason and act upon information–often coming up with insights that humans might not reach. Because they are “cloud-based”, these powerful thinking tools will be accessible even to small organizations and individuals. The result will be new efficiencies and surprising new intelligent services that will change the very nature of work and challenge us to identify what skills are uniquely human.

Breakout Session: Frank Koehl

Summary: The cybersecurity industry is over optimized for incident response, reacting to malicious events after-the-fact. Current technologies produce alerts after a breach has occurred, facilitating clean-up, remediation, and other follow-on activities. A plethora of security standards and compliance frameworks exacerbate the problem, demanding a variety of well-intentioned but often futile busywork policies.

This presentation will briefly discuss how we got here, and provide definitive guidance on how to restore and maintain focus on practical defense. Implementation of these strategies will empower cybersecurity and other tech employees, increasing job satisfaction and lowering burnout. 

Breakout Session: David Gilkey

Summary: Many IT teams are under pressure to deliver new and differentiating digital products faster than ever. To address this demand, companies like Western Union, Humana, and Key Bank have begun to use low-code development platforms to transform and accelerate their software delivery and expand the value of their cloud investments. In this talk, learn how you can use these products as well. Building enterprise-grade applications on a high-performance, low-code platform can help you tackle some of your biggest business challenges—from agility to security and scale. It’s time to (finally) unlock the development and delivery of software for your unique business.

Breakout Session: Hadrian Zbarcea

Summary: In the recent year, Generative Artificial Intelligence has risen to prominence, captivating global attention with its versatility across various applications. But with these advancements, there comes the less discussed matter of safety and potential for misuse. Hadrian will address such often-overlooked challenges, explore some solutions and introduce the World Wide Web Consortium’s Solid standard. Additionally, Hadrian will share research insights on the application of Large Language Models in a Solid context.

Breakout Session: Ken Buckler

Summary: Many organizations have leveraged cyber threat intelligence (CTI), a powerful tool, for over two decades. With tools dedicated to processing and distributing CTI, it has become much more affordable and accessible in recent years. Combined with CTI sharing partnerships and information sharing and analysis centers (ISACs), CTI is now more accessible than ever, even for small businesses that were previously financially restricted from accessing this important cybersecurity tool. However, this sharing and accessibility present new challenges that result in increased CTI data, which must be analyzed for relevance and processed within the organization. It also presents challenges of integrating CTI data with cybersecurity tools, such as SIEM, XDR, or network and endpoint protection.

Breakout Session: Chuck Danner

Summary: Microservices have quickly become a popular architectural pattern, especially on the cloud, but what are microservices, when should you consider using them, and what are some best practices and potential pitfalls? In this presentation, we will discuss why the microservice pattern has become so popular and when to consider using it. We will cover techniques and tools for utilizing microservices when starting new systems or when modernizing existing systems. Additionally, we will explore how microservices fit in with agile development methodologies, CI/CD, and containerization. The presentation concludes with a live demonstration to show how microservices can be developed, deployed, and operated in a cloud environment.

Breakout Session: Dan Fiscus

Summary: Berkeley Springs Instruments (BSI) designs and installs ultrasonic sensors for monitoring and protecting the mechanical integrity of our infrastructure. Our sensors are installed permanently or deployed on robotic systems. Our online monitoring sensor network provides accurate and timely information to help manage operational risk. Clients include oil and gas companies and major corporations in multiple industries. Ultrasonic Testing uses high-frequency sound waves transmitted into one side of a target material like a steel pipeline. Reflected sound waves from our sensors produce precise measurements of material thickness. This talk describes innovative strategies that integrate ultrasound and machine learning technologies. The discussion includes large databases of complex acoustic signals from over 30,000 sensors installed across North America. Machine learning tools tap into our AI libraries identifying patterns and developing risk profiles. AI strategies presented are relevant and useful for those working with remote monitoring, industrial processes, the internet of things (IoT), and similar fields. Topics include training data augmentation using simulation and lab data, feature engineering, and looking inside the “black box” of neural networks.