Psychology’s Role in Brand Marketing
Learn about the relationship between products and marketing and how strong branding elicits positive feelings that consumers associate with certain goods or services.
Good marketing is essential for business success, regardless of the industry, product or service. Getting the basics down is an essential first step on your marketing journey.
Ensuring Market Adoption
Successful products address customer pain points and meet their most pressing needs. But how do you identify those concerns? That's where the ACCORD Framework comes in.
Breaking Down Customer Segmentation
Customer segmentation involves a lot more than just breaking down your target audience by age or purchase power. Find out how consumer profiles can inform successful marketing strategies.
Bugs in Crypto Implementations
Professor Dan Boneh | May 29, 2018
How can you be sure that your messages are safe and secure? Realize the vulnerabilities in WEP and iMessage.
Lessons from Mirai and the Current State of IoT Security
Professor Zakir Durumeric | June 5, 2018
Who was responsible for the Mirai Bonet? What were their motives? Study the evolution of this major attack and its impact on IoT Security.
Beyond Cryptocurrency: Blockchain for the Real World
David Mazières | June 12, 2018
Look past powerhouses like Bitcoin and Ethereum to the fundamentals of blockchain technology and its value to real world applications.
Bulletproofs: Short Proofs for Confidential Transactions and More
Benedikt Bunz | June 18, 2018
While cryptocurrency transactions are difficult to compromise, they have significant downfalls. Learn to keep crypto transactions private with an optimistic solution.
Doubly-efficient zkSNARKs Without Trusted Setup
Riad Wahby | June 26, 2018
zkSNARKs: Zero-Knowledge Succinct Non-Interactive Argument of Knowledge. What are they, and what is their relationship to cryptocurrency?
A Guardian Agent for Secure Delegation
Dima Kogan | July 2, 2018
Is Secure Shell (SSH) protocol truly secure? Discover the vulnerabilities in today’s SSH protocols and how a new guardian agent can provide secure delegation.
Rocket: Securing the Web at Compile-time
Sergio Benitez | July 10, 2018
Learn why companies such as NPM, System76 and Mozilla have implemented Rocket (for Rust) in production.
Protecting Patient Privacy in Genomic Analysis
David Wu | July 17, 2018
Analyzing collective patient data is crucial to diagnosing diseases, but privacy is a major concern. Learn how modern cryptographic tools can be leveraged for genome privacy.