Monique Jeanne Morrow (she/her)
Zürich, Schweiz
10.395 Follower:innen
500+ Kontakte
Info
With over 25 years of experience as a global technology leader, Monique Morrow has…
Artikel von Monique Jeanne Morrow (she/her)
-
Speak For Yourself: How AI Can Steal Your Voice (and How to Prevent It)
Speak For Yourself: How AI Can Steal Your Voice (and How to Prevent It)
Von Monique Jeanne Morrow (she/her)
-
Who is Responsible for Gen AI? The Matter of Accountability
Who is Responsible for Gen AI? The Matter of Accountability
Von Monique Jeanne Morrow (she/her)
-
Artificial Intelligence & Ethics: Addressing the Weaponization of AI
Artificial Intelligence & Ethics: Addressing the Weaponization of AI
Von Monique Jeanne Morrow (she/her)
Aktivitäten
-
Having been with Girls in Tech almost since its inception, I have always believed deeply in our mission to empower and inspire women in the tech…
Having been with Girls in Tech almost since its inception, I have always believed deeply in our mission to empower and inspire women in the tech…
Beliebt bei Monique Jeanne Morrow (she/her)
-
In many ways, AI technology has the potential to make people's lives better, but for that to possible, there needs to be a sense of trust. For…
In many ways, AI technology has the potential to make people's lives better, but for that to possible, there needs to be a sense of trust. For…
Geteilt von Monique Jeanne Morrow (she/her)
-
Another great #vbtransform filled with inspiring conversations, meaningful connections/reconnections, and invaluable insights! Congratulations…
Another great #vbtransform filled with inspiring conversations, meaningful connections/reconnections, and invaluable insights! Congratulations…
Beliebt bei Monique Jeanne Morrow (she/her)
Berufserfahrung
Ausbildung
-
University of Nicosia
–
University of Nicosia
The University of Nicosia is the #1 university in the world for Blockchain Education. -
–
-
–
City University-Seattle Zurich, Switzerland Program
-
–
-
–
Graduate Certificate in Information Systems, focus on Decision Support Systems
-
–
Activities and Societies: Phi Eta Sigma; Phi Kappa Phi
Includes transfer of previous work from University of Hawaii-Manoa, 1975-1979 including one year abroad at the University of Paris- Sorbonne in 1979
-
–
Diplome d’Etudes Superieures de la Civilisation Francaise, L’Universite de Paris- Sorbonne, Paris, France, 1979.
Bescheinigungen und Zertifikate
-
The Complete Cybersecurity Course Volume 2 Network Security
StationX
Ausgestellt:Zertifikats-ID: 2-1489481502 -
IT Infrastructure and Emerging Trends
University of Minnesota - Carlson School of Management
Ausgestellt:Zertifikats-ID: Verify at coursera. org/verify/D 68RW 598FR7U -
International Token Standardization Association (ITSA) Present Member (The Humanized Internet)
ITSA - International Token Standardization Association
Ausgestellt: -
-
-
-
-
-
-
IBM Blockchain Platform Board of Advisors - 2019
IBM
Ausgestellt:Zertifikats-ID: https://www.youracclaim.com/badges/27f400a7-cd5c-4836-97b4-d8a5fd0ad4eb/linked_i -
Decentralized Identity Foundation (Associate Member) Present (The Humanized Internet)
Decentralized Identity Foundation
Ausgestellt: -
-
-
-
-
-
-
-
-
-
Ehrenamt
-
Co-Chair
IEEE Standards Association
–Heute 3 Jahre 9 Monate
Science and Technology
Area of focus is Ethics in Extended Reality as organizations rally around the "metaverse." Ethics will be a key factor in the discussion and in creating standards in this space.
-
Distributed Ledger Technology Chair
GSMA
– 1 Jahr 4 Monate
Science and Technology
Monique served as Chair for this working group that consists of mobile carriers and solution providers that are focused to create standards for Distributed Ledger Technology .
Veröffentlichungen
-
Telco Tokenization and Stablecoin Development an Industry Opportunity
IEEE
2022 IEEE 1st Global Emerging Technology Blockchain Forum: Blockchain&Beyond (iGETblockchain) 7-11 Nov 2022.
Andere Autor:innenVeröffentlichung anzeigen -
Blockchain and the Tokenization of the Individual: Societal Implications
Future Internet MDPI Journal
We are living in a world where the very systems upon which trust is based are being challenged by new and exciting paradigm shifts. Centralization whether in the form of governments, financial institutions, enterprises and organizations is simply being challenged because of the lack of trust associated with data governance often experienced in the form of data breaches or simply a monetization of our data without our permission and/or incentives to participate in this emerging decentralization…
We are living in a world where the very systems upon which trust is based are being challenged by new and exciting paradigm shifts. Centralization whether in the form of governments, financial institutions, enterprises and organizations is simply being challenged because of the lack of trust associated with data governance often experienced in the form of data breaches or simply a monetization of our data without our permission and/or incentives to participate in this emerging decentralization of structures. We see this trust deficit challenging the very institutions we have depended on including but not limited to financial institutions, private enterprises or government bodies. A new “social contract” is required as we continuously evolve into more decentralized and self-governing (or semi self-governing) entities. We will see more development in digital sovereignty with the caveat that a governance model will need to be defined. This position paper will present evidence that supports the premise that blockchain and individual tokenization could provide a new social contract.
Andere Autor:innenVeröffentlichung anzeigen -
Internet of Women, Accelerating Culture Change
River Publishers
"Female scientists, technologists, engineers, and mathematicians worldwide are making historic contributions to their fields. The modern workforce is closer to gender-equal than it has ever been, and many efforts are in place to support further progress. The Internet of Women provides an exciting look at personal narratives and case studies of female leaders and cultural shifts around the globe that illustrate this promising trend."
Andere Autor:innenVeröffentlichung anzeigen -
Perspectives on New Work
Sitra
Compendium of viewpoints on definition of work in the future.
"THIS BOOK IS THE PRODUCT of multiple inputs, several
streams of experiences, ideas, comments and guidance
that took place both face-to-face and on social media.
The movement of thought was open for comments and
contributions all the time. It is said that when you work on
a demanding topic for several months you tend to lose a
lot of perspective. You’re just too close to what you study.
This lack of…Compendium of viewpoints on definition of work in the future.
"THIS BOOK IS THE PRODUCT of multiple inputs, several
streams of experiences, ideas, comments and guidance
that took place both face-to-face and on social media.
The movement of thought was open for comments and
contributions all the time. It is said that when you work on
a demanding topic for several months you tend to lose a
lot of perspective. You’re just too close to what you study.
This lack of perspective takes typically one of two forms:
you may think something is obvious when it really isn’t. It
may be obvious to you because you have been thinking
about the issue for a long time. But it might not be so obvious
to someone else. Hal Varian suggests that the other
possibility is that after spending a lot of time on a substantial
topic you may think something is complicated, while it
is quite obvious to someone else. This is why the book follows
the logic of my exploration being enriched, complemented
and commented by many of the very best experts
on the topic of the book: the emerging new world of work." -
Intercloud: Solving Interoperability and Communication in a Cloud of Clouds
Cisco Press
Now, four leading experts thoroughly introduce these powerful new technologies. Writing for CTOs, IT/network managers, security architects, product managers, application owners, service architects, and consultants, they explain both underlying Intercloud concepts and practical use cases.
Sharing deep architectural insight, the authors focus on key technical enablers, from virtualization to autonomic management and advanced protocols. They also address the business challenges service…Now, four leading experts thoroughly introduce these powerful new technologies. Writing for CTOs, IT/network managers, security architects, product managers, application owners, service architects, and consultants, they explain both underlying Intercloud concepts and practical use cases.
Sharing deep architectural insight, the authors focus on key technical enablers, from virtualization to autonomic management and advanced protocols. They also address the business challenges service providers will face in federated Intercloud relationships. Illuminating the Intercloud with cutting-edge customer examples, they also describe a phased pathway towards coherent deployment. You’ll discover how the Intercloud can improve agility, portability, cost, and speed–and how to start transforming its potential into reality.Andere Autor:innenVeröffentlichung anzeigen -
Disrupting Unemployment
Ewing Marion Kauffman Foundation
The sinister notion that machines will someday kill all jobs has been around for at least 200 years. Yes, machines can replace people at work or change the work that is needed, and they always have. At the same time, the labor force participation in the world has remained quite stable for many generations, and on the whole, the middle class has been growing worldwide. Innovation can both kill and create work.
Andere Autor:innen -
-
Innovation, Technology and Youth; Harnessing Lessons Learned for Strengthening Youth Participation in using Technology for Sustainable Development
United Nations (UN-Habitat)
UN-Habitat call to action to support our global youth and women!
Andere Autor:innenVeröffentlichung anzeigen -
Journal of Ict Standardization 2-1; Special Issue on Cloud Security and Standardization
River Publishers
As Editor for this special edition that included several authors.
The industry has been experiencing the deployment of cloud computing models varying from Private Cloud, Hybrid Cloud to an evolution of InterCloud. There are cloud security implications for each model; and within InterCloud a notion of federation may be implied. How do we define cloud bursting and cloud brokering functions and the security requirements therein? What are the use cases? What is the impact of cloud and…As Editor for this special edition that included several authors.
The industry has been experiencing the deployment of cloud computing models varying from Private Cloud, Hybrid Cloud to an evolution of InterCloud. There are cloud security implications for each model; and within InterCloud a notion of federation may be implied. How do we define cloud bursting and cloud brokering functions and the security requirements therein? What are the use cases? What is the impact of cloud and virtualization on mobile networks and its services? What is the status of standards activities related to cloud security and these scenarios? Authors were invited to submit papers, on these topics for the special issue. -
"Internet of Things: Architectural Framework for eHealth Security"
Journal of ICT Standardization, River Publishers
Abstract: The Internet of Things (IoT) holds big promises for Health Care, especially in Proactive Personal eHealth. To fulfil the promises major challenges must be overcome, particularly regarding privacy and security. This paper explores these issues, discusses use case scenarios, and advances a secure architecture framework. We close the paper with a discussion of the state of various standard organizations, in the conviction of the critical role they will play in making eHealth…
Abstract: The Internet of Things (IoT) holds big promises for Health Care, especially in Proactive Personal eHealth. To fulfil the promises major challenges must be overcome, particularly regarding privacy and security. This paper explores these issues, discusses use case scenarios, and advances a secure architecture framework. We close the paper with a discussion of the state of various standard organizations, in the conviction of the critical role they will play in making eHealth bloom.
Keywords: IoT, IoE, M2M, eHealth Security, Standards.Andere Autor:innenVeröffentlichung anzeigen -
A Cloud Based - Architecture for Cost-Efficient Applications and Services Provisioning in Wireless Sensor Networks
Wireless and Mobile Networking Conference 2013
More and more wireless sensor networks (WSNs) are being deployed. However, provisioning WSN applications and services in a cost efficient manner remains an uphill task. In the current state of affairs, WSN applications and services make little re-use of third party modules due to the lack of appropriate discovery mechanisms. Furthermore, they are bundled with the WSNs in which they are provisioned and this precludes the use of the same WSN by other applications and services. Novel…
More and more wireless sensor networks (WSNs) are being deployed. However, provisioning WSN applications and services in a cost efficient manner remains an uphill task. In the current state of affairs, WSN applications and services make little re-use of third party modules due to the lack of appropriate discovery mechanisms. Furthermore, they are bundled with the WSNs in which they are provisioned and this precludes the use of the same WSN by other applications and services. Novel approaches are indeed required. Cloud computing is an emerging paradigm with three key aspects (Software as a Service – SaaS, Platform as a Service – PaaS, and Infrastructure as a Service – IaaS) and several inherent benefits (e.g. efficient use of resources, easy introduction of new applications and services). It can potentially aid in tackling the cost efficiency issue in WSN applications and services provisioning. Unfortunately, this area has not yet received much attention in the research community. This position paper pinpoints the challenges, reviews the state-of-the-art, sketches a new architecture and proposes a research agenda.
Andere Autor:innen -
-
Internet of Things
The Internet Protocol Journal
The Internet of Things
IPJ
Authors: David Lake, Monique Morrow, Ammar Rayes
Until a point in time around 2008 or 2009, there were more human beings in the world than devices connected to the Internet. That is no longer the case. In 2010, the global average of connected devices per person was 1.84. Taking only those people who use the Internet (around 2 billion in 2010), that figure becomes 6 devices per person. [1] Chip makers such as ARM have targeted developments of low-power CPUs…The Internet of Things
IPJ
Authors: David Lake, Monique Morrow, Ammar Rayes
Until a point in time around 2008 or 2009, there were more human beings in the world than devices connected to the Internet. That is no longer the case. In 2010, the global average of connected devices per person was 1.84. Taking only those people who use the Internet (around 2 billion in 2010), that figure becomes 6 devices per person. [1] Chip makers such as ARM have targeted developments of low-power CPUs and predicts up to 50 billion devices connected by 2020. [2] Today, most of these devices are entities that the user interacts directly with—PC or Mac, smartphone, tablet, etc. But what is changing is that other devices used every day to orchestrate and manage the world we live in are becoming connected entities in their own right. They consist not just of users interacting with the end devices—the source and treatment of the information garnered will now occur autonomously, potentially linking to other networks of similarly interconnected entities. Growing to an estimated 25 billion connected devices by 2015, the rapid explosion of devices on the Internet presents some new and interesting challenges
Andere Autor:innenVeröffentlichung anzeigen -
RCF 5994: Application of Ethernet Pseudowires to MPLS Transport
IETF
-
RFC 5920: Security Framework for MPLS and GMPLS Networks
IETF
-
RFC 5704: Uncoordinated Protocol Development
IETF
-
Rec. Y.1714: MPLS Management and OAM Framework
ITU-T
-
RFC 5085: Pseudowire Virtual Circuit Connectivity Verification (VCCV)
IETF
-
RFC 4377: Operations and Management (OAM) Requirements for Multi-Protocol Label Switched (MPLS) Networks
IETF
-
A Data Annotation Architecture for Semantic Applications in Virtualized Wireless Sensor Networks
14th IFIP/IEEE Symposium on Integrated Network and Service Management (IM 2015)
-
GMPLS : The Promise of the Next Generation Optical Control Plane
IEEE Communications
-
Inter-Provider Service Quality on the Internet
IEEE Communications
-
Interactions of Intelligent Route Control with TCP Congestion Control
Proceedings of IFIP Networking Conference, May 2007
-
IP/MPLS OAM: Challenges and Directions
China Communications
-
RFC 6310: Pseudowire (PW) Operations, Administration, and Maintenance (OAM) Message Mapping
IETF
This document specifies the mapping and notification of defect states between a pseudowire (PW) and the Attachment Circuits (ACs) of the end-to-end emulated service. It standardizes the behavior of Provider Edges (PEs) with respect to PW and AC defects. It addresses ATM, Frame Relay, Time Division Multiplexing (TDM), and Synchronous Optical Network / Synchronous Digital Hierarchy (SONET/SDH) PW services, carried over MPLS, MPLS/IP, and Layer 2 Tunneling Protocol version 3/IP (L2TPv3/IP) Packet…
This document specifies the mapping and notification of defect states between a pseudowire (PW) and the Attachment Circuits (ACs) of the end-to-end emulated service. It standardizes the behavior of Provider Edges (PEs) with respect to PW and AC defects. It addresses ATM, Frame Relay, Time Division Multiplexing (TDM), and Synchronous Optical Network / Synchronous Digital Hierarchy (SONET/SDH) PW services, carried over MPLS, MPLS/IP, and Layer 2 Tunneling Protocol version 3/IP (L2TPv3/IP) Packet Switched Networks (PSNs).
Andere Autor:innenVeröffentlichung anzeigen -
Seamless Cloud Abstraction, Model and Interfaces
ITU Kaleidoscope 2011
Patente
-
Method of securely transmitting a message via a telecommunications network
Ausgestellt am US 11477169
Abstract: A method of securely transmitting a message from a sending entity to a receiving entity via a network. A Processing String Engine is communicatively coupled to the sending and receiving entities. The sending entity requests the Processing String Engine to provide a network routing path for message transmission from the sending entity to the receiving entity and to provide a processing string for the message transmission. The Processing String Engine identifies a network path and…
Abstract: A method of securely transmitting a message from a sending entity to a receiving entity via a network. A Processing String Engine is communicatively coupled to the sending and receiving entities. The sending entity requests the Processing String Engine to provide a network routing path for message transmission from the sending entity to the receiving entity and to provide a processing string for the message transmission. The Processing String Engine identifies a network path and generates a processing string. The sending entity appends the processing string to the message and sends the message to the receiving entity. The message is unreadable while the processing string is appended thereto. Upon receipt of the message with the appended processing string, the receiving entity requests removal the processing string. Upon successful verification of the receiving entity, the processing string is removed, and the message is returned to the receiving entity.
Andere Erfinder:innen -
Method of Privatizing Mobile Communications Using Dynamic IMSI and MSISDN
Ausgestellt am US 11223957
A method of privatizing mobile communications using a dynamic International Mobile Subscriber Identity [IMSI] and Mobile Station International Subscriber Director Number [MSISDN]. A first privacy token having an associated IMSI and MSISDN is provided to a User Equipment [UE]. The first privacy token has a predefined validity period. The IMSI and MSISDN assigned to the privacy token are shared with a plurality of Mobile Network Operators [MNOs], while the International Mobile Equipment Identity…
A method of privatizing mobile communications using a dynamic International Mobile Subscriber Identity [IMSI] and Mobile Station International Subscriber Director Number [MSISDN]. A first privacy token having an associated IMSI and MSISDN is provided to a User Equipment [UE]. The first privacy token has a predefined validity period. The IMSI and MSISDN assigned to the privacy token are shared with a plurality of Mobile Network Operators [MNOs], while the International Mobile Equipment Identity [IMEI] of the UE remains concealed.
Andere Erfinder:innen -
Method of Verifying Telecommunications Messaging Traffic Based on Decentralized Identifiers
Ausgestellt am US 109654461
A method of verifying telecommunications messaging traffic between two entities and monetizing the verified traffic. A receiving entity receives a message from a sending entity. The message includes a hash value computed by the sending entity based on the content of the message. The hash value is encrypted using a private key of the sending entity. The receiving entity identifies, within a blockchain, a Decentralized Identifier [DID] associated with the sending entity, resolves the DID into a…
A method of verifying telecommunications messaging traffic between two entities and monetizing the verified traffic. A receiving entity receives a message from a sending entity. The message includes a hash value computed by the sending entity based on the content of the message. The hash value is encrypted using a private key of the sending entity. The receiving entity identifies, within a blockchain, a Decentralized Identifier [DID] associated with the sending entity, resolves the DID into a DID document and retrieves therefrom a public key associated with the sending entity.
Andere Erfinder:innen -
System and Method of Validating Internet of Things (IoT) Devices
Ausgestellt am US 10,826,684
A system and method for validating an Internet of Thing (IoT) device on an IoT network. The IoT device captures and stores the historical sensor values,along with corresponding timestamps in a local memory. A controller receives the historical sensor values and also receives a heartbeat token over a network that is different than the IoT network.
Andere Erfinder:innen -
System and Method for General Data Protection Regulation (GDPR) Compliant Hashing in Blockchain Ledgers
Ausgestellt am US 10,812,455
The invention relates to computer architectures ad methods that automatically comply with data security regulations using immutable audit ledgers, such as blockchains. In particular the invention provides a computer system that effectively complies with data processing regulations, including but not limited to, the European Union's General Protection Data Regulation (GDPR)
Andere Erfinder:innen -
-
Method of Using Blockchain Ledger and Zero Knowledge Proof For Tokenized Communications
Ausgestellt am US US10652184B1
A Tokenized Communication Service Provider (TCSP) for providing secure messaging between a consumer and a message sender without exposing the consumer communication preferences and Personally Identifiable Information (PII) to the message sender. TCSP issues a communication token to be used for the communication between the consumer and the message sender. Consumer authorization is recorded in a blockchain ledger and a Zero Knowledge Proof mechanism is used to establish that the TCSP possesses…
A Tokenized Communication Service Provider (TCSP) for providing secure messaging between a consumer and a message sender without exposing the consumer communication preferences and Personally Identifiable Information (PII) to the message sender. TCSP issues a communication token to be used for the communication between the consumer and the message sender. Consumer authorization is recorded in a blockchain ledger and a Zero Knowledge Proof mechanism is used to establish that the TCSP possesses the consumer contact information and authorization. The consumer authorization is revocable by the consumer, and the revocation is recorded in the blockchain ledger.
Andere Erfinder:innenPatent anzeigen -
Cloud Framework for Multi-Cloud Extension
Ausgestellt am US 10305726
A representation of network resources and relationships among network resources is established. The network resources include network resources of a tenant and network resources of a plurality of clouds. The multi-cloud extension extends to network resources of the tenant and the plurality of clouds, and is isolated from the resources of other tenants.
Andere Erfinder:innen -
Deep Learning Bias Detection in Text
Ausgestellt am US 102824414B2
In one embodiment, a method includes obtaining a text from a user, applying the text to a deep learning neural network to generate a plurality of bias coordinates defining a point in an embedded space and in response to determining that at least one of the plurality of bias coordinates exceeds a threshold, providing an indication of bias to the user.
Andere Erfinder:innen -
System and method for management of network-based services
Ausgestellt am US 9,450,836
In one embodiment, a system includes an interface configured to receive a first request sent from a first customer for a first service provided by a first service provider, the first request being of a first type. The system also includes at least one processor configured to determine a first set of configuration parameters from a first policy associated with the first service provider in response to receiving the first request. The at least one processor also causes a node associated with the…
In one embodiment, a system includes an interface configured to receive a first request sent from a first customer for a first service provided by a first service provider, the first request being of a first type. The system also includes at least one processor configured to determine a first set of configuration parameters from a first policy associated with the first service provider in response to receiving the first request. The at least one processor also causes a node associated with the first service provider to provide the first service in response to receiving the first request using the first set of configuration parameters.
Andere Erfinder:innen -
System and method for transporting digital radio signal streams in a small cell network environment
Ausgestellt am US 9413860
A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio…
A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio signal stream can be received using a Common Public Radio Interface, and the radio signal stream may include sub-streams transported through segmented channels over the backhaul link.
Andere Erfinder:innen -
System and method for routing using path identifiers was
Ausgestellt am US 9,253,089
This invention introduces the concept of a Service Path Identity (SPID) that identifies a set of resources within the datacenter that are authorized to communicate with each other. The hosts on the Service Path are members of a virtual private network. A Service Path Protocol (SPP) is then used by the endpoints, switches, and routers that have been identified as on the Service Path (through separate means) to discover, bind, and release associations to the Service Path.
Andere Erfinder:innen -
System and Method for Transporting Digital Baseband Streams in a Network Environment
Ausgestellt am US 8,964,641
A method is provided in one example embodiment that includes receiving a radio signal stream and segmenting the radio signal stream into segments (e.g., blocks of data, pieces of information, bits of data, etc.). The segments may be packetized and transported in packets over a pseudowire in a packet-switched network.
Andere Erfinder:innen -
System and method for routing using path identifiers
Ausgestellt am US 8,937,953
In one embodiment, a computer-implemented method includes receiving a request for a service. In response to receiving the request, a server providing the service is discovered. The method includes determining whether a user associated with the request has permission to access the service. The method also includes, in response to determining that the user associated with the request has permission to access the service, routing the request to the service.
Andere Erfinder:innen -
System and method for transporting digital radio signal streams in a small cell network environment
Ausgestellt am US US Patent # 8,824,478
A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio…
A method is provided in one example embodiment that includes receiving a radio signal stream, segmenting the radio signal stream based on a control word in the radio signal stream, mapping the segmented radio signal stream to a service class, transporting the segmented radio signal stream in packets through channels over a backhaul link, and maintaining the order of the radio signal stream over the backhaul link. In more particular embodiments, the backhaul link may use a DOCSIS link, the radio signal stream can be received using a Common Public Radio Interface, and the radio signal stream may include sub-streams transported through segmented channels over the backhaul link
Andere Erfinder:innen -
Image-based point-of-sale mobile settlement system
Ausgestellt am US 8,459,545
Methods and systems for facilitating image-based payment transactions through the exchange of encoded images between devices connected to a communication network. The encoded images represent different parts of a contract and may be tiled to form a unique image-based mosaic that includes information to complete and validate a payment transaction.
Andere Erfinder:innen -
Collecting network performance data from multiple autonomous systems
Ausgestellt am US 8,265,074
An apparatus, comprising:
first Border Gateway Protocol (BGP) logic comprising BGP route table data;
a first network interface that is configured to communicatively couple to a first autonomous system;
data collection logic encoded in one or more non-transitory computer-readable storage media for execution and when executed operable to perform:
discovering an address prefix of a data collector that is communicatively coupled to second BGP logic of a router within a second autonomous…An apparatus, comprising:
first Border Gateway Protocol (BGP) logic comprising BGP route table data;
a first network interface that is configured to communicatively couple to a first autonomous system;
data collection logic encoded in one or more non-transitory computer-readable storage media for execution and when executed operable to perform:
discovering an address prefix of a data collector that is communicatively coupled to second BGP logic of a router within a second autonomous system that is coupled to the first autonomous system directly or indirectly through one or more networks or internetworks, wherein the second autonomous system is independent of the first autonomous system;
based on the address prefix,
determining a path through the first autonomous system, the one or more networks or internetworks, and the second autonomous system to the data collector based on the BGP route table;
requesting the data collector to provide one or more data values relating to performance of network elements of the second autonomous system;
receiving and storing the one or more data values;
wherein the data collection logic further comprises logic which when executed causes retrieving one or more performance data values from each of one or more local border routers within the first autonomous system.Andere Erfinder:innen -
-
System and Methods for identifying Network Path Performance
Ausgestellt am US 8,160,055
A pseudowire verification framework gathers and maintains status of individual pseudowires by aggregating the state of the individual node hops defining the pseudowire. The framework provides complete assessment of a network by gathering status feedback from network nodes (forwarding entities) that are inaccessible directly from a requesting node by employing an intermediate forwarding entity as a proxy for inquiring on behalf of the requesting node. Therefore, status regarding inaccessible…
A pseudowire verification framework gathers and maintains status of individual pseudowires by aggregating the state of the individual node hops defining the pseudowire. The framework provides complete assessment of a network by gathering status feedback from network nodes (forwarding entities) that are inaccessible directly from a requesting node by employing an intermediate forwarding entity as a proxy for inquiring on behalf of the requesting node. Therefore, status regarding inaccessible pseudowires is obtainable indirectly from nodes able to “see” the particular pseudowire. Configurations further assess multihop pseudowires including a plurality of network segments; in which each segment defines a pseudowire hop including forwarding entities along the pseudowire path. In this manner, pseudowire health and status is gathered and interrogated for nodes (forwarding) entities unable to directly query the subject pseudowire via intermediate forwarding entities.
Andere Erfinder:innen -
Projekte
-
Towards Cloud Architectures for Cost Efficient Applications and Services Provisioning in IP Wireless Sensor Networks
CISCO RFP project to demonstrate the application and service provisioning in wireless sensor networks using cloud-based architectures. The project focuses on IaaS, PaaS and SaaS aspects and involves validation through several demos.
I'm working on the IaaS aspect of the project to allow efficient utilization of sensor networks using virtualization.Andere Mitarbeiter:innen
Auszeichnungen/Preise
-
Top 100 Influencers in Identity
One World Identity
https://oneworldidentity.com/influential-people-2019/
-
Top 50 Women in Tech
Forbes
https://www.forbes.com/top-tech-women/#533f1e024df0
-
Top 100 Digital Shapers 2018 Switzerland
digitalSwitzerland
https://digitalswitzerland.com/2018/09/28/here-are-switzerlands-100-digital-shapers/
-
Business World Magazine On Line Ethics and Security
Business World Magazine
https://www.prnewswire.com/news-releases/the-humanized-internet-wins-business-worldwide-magazine-award-for-its-outstanding-commitment-to-online-ethics-and-security-682766481.html
-
PR News Non-Profit Communicator of the Year Finalist
PR News
http://www.prnewsonline.com/nonprofit-awards-2018
-
Global Citizen Award
Henley & Partners
Monique Morrow, humanitarian, technological pioneer, and co-founder of The Humanized Internet, was today awarded the prestigious Global Citizen Award® by leading international citizenship and residence advisory firm Henley & Partners.
-
10 Women In Networking/Communications That You Should Know
N2Women
Networking Networking Women (N2 Women) is a discipline-specific community for researchers in the communications and networking research fields. The main goal of N2 Women is to foster connections among the under-represented women in computer networking and related research fields. N2 Women allows women to connect with other women who share the same research interests, who attend the same conferences, who face the same career hurdles, and who experience the same…
Networking Networking Women (N2 Women) is a discipline-specific community for researchers in the communications and networking research fields. The main goal of N2 Women is to foster connections among the under-represented women in computer networking and related research fields. N2 Women allows women to connect with other women who share the same research interests, who attend the same conferences, who face the same career hurdles, and who experience the same obstacles.
http://n2women.comsoc.org/10-women-in-networkingcommunications-that-you-should-know/2016-10-women-in-networkingcommunications-that-you-should-know/ -
Social Media Champion of the Year - 2016
Business Worldwide Magazine
http://www.prnewswire.co.uk/news-releases/leading-technological-evangelist-at-cisco-picks-up-two-global-business-awards-606487646.html
-
Visionary of the Year 2016 - Technology, Social Change and Ethics
Business Worldwide Magazine
http://www.prnewswire.co.uk/news-releases/leading-technological-evangelist-at-cisco-picks-up-two-global-business-awards-606487646.html
-
Top Women in Cloud Innovations
Cloud Now
CloudNOW is a non-profit consortium of the leading women in cloud computing, providing a
forum for networking, knowledge sharing, mentoring, and economic growth. CloudNOW offers
members the opportunity to creatively approach the technological challenges of cloud today,
working in partnership with the tech industry, and cloud thought leaders.
To learn more, visit cloud-now.org. -
AI Magazine Social Media Presence of the Year 2016
AI Magazine
Honored as AI Magazine's Social Media Presence of the Year 2016 https://issuu.com/aiglobalmedia/docs/ai_magazine_october_2016/38
-
First Women in Standardization Expert Group (WISE)
Women in Standardization Expert Group
ITU organized its first Women in Standardization Expert Group (WISE) event at the World Telecommunication Standardization Assembly (WTSA-16), on 30 October 2016 in Yasmine Hammamet, Tunisia. The event consisted of a workshop on practical skills for successful negotiations, as part of ITU-T's commitment to promoting equality for men and women delegates attending its meetings and conferences, followed by a panel discussion highlighting the experiences of leading women from the ICT and…
ITU organized its first Women in Standardization Expert Group (WISE) event at the World Telecommunication Standardization Assembly (WTSA-16), on 30 October 2016 in Yasmine Hammamet, Tunisia. The event consisted of a workshop on practical skills for successful negotiations, as part of ITU-T's commitment to promoting equality for men and women delegates attending its meetings and conferences, followed by a panel discussion highlighting the experiences of leading women from the ICT and standardization fields.
-
Leading UK CIOS - Who Happen To Be Female
CIO FROM IDG
CIO UK compiles a list of some of the leading CIOs in the UK - and further afield
The 2016 edition of the CIO 100 was more diverse than previous editions with women making up 16% of its members, a small increase on the most recent global figures of 9% reported by Harvey Nash and the 12% reported by Gartner. CIO UK takes a look at some of the women working in technology leadership and driving change across a number of different sectors. -
Participated at The Women in Leadership Forum
Women in Leadership Forum
Ajman University had the pleasure to host Ms. Monique Morrow on campus, the chief Technology Officer with CISCO was in town to participate in “Women in Leadership Economic” forum in Dubai.
https://www.ajman.ac.ae/en/news/2016/women-in-leadership-icon-visits-ajman-university.html -
Speaker At the 18th Global Women in Leadership Conference in Dubai
the 18th Global Women in Leadership Conference
Monique Morrow, speaking on the second day of the 18th Global Women in Leadership Economic Forum in Dubai, Monique Jeanne Morrow, chief technology officer of new frontiers development and engineering at Cisco Systems, noted that women must look at the role of technology in all that is happening today.
For more info: http://www.khaleejtimes.com/women-must-be-aware-of-tech-innovations -
Women of Influence
YWCA
The YWCA-NYC envisions a day when the diverse women of New York City, once seen as at risk or working poor, can sustain themselves and their families, and are empowered to define and attain their own unique goals and aspirations, contributing to strong communities, building a better New York for everyone.
-
Top 50 Most Inspiring Women in Technology - Europe
Inspiring Fifty
Press Release
TOP FIFTY MOST INSPIRATIONAL WOMEN IN EUROPEAN TECH REVEALED
The top fifty most inspirational women in European technology for 2016 are revealed today by Inspiring Fifty, highlighting leading women from across the sector – including influencers, entrepreneurs, business leaders, academics and policy makers.
In this year’s list 11 countries are represented: Belgium, France, Germany, Ireland, Italy, Netherlands, Norway, Spain, Sweden, Switzerland, and the…Press Release
TOP FIFTY MOST INSPIRATIONAL WOMEN IN EUROPEAN TECH REVEALED
The top fifty most inspirational women in European technology for 2016 are revealed today by Inspiring Fifty, highlighting leading women from across the sector – including influencers, entrepreneurs, business leaders, academics and policy makers.
In this year’s list 11 countries are represented: Belgium, France, Germany, Ireland, Italy, Netherlands, Norway, Spain, Sweden, Switzerland, and the UK. Once again, the UK leads other countries with 23 finalists, France follows with seven, the Netherlands with five, and Germany and Italy with three each.
They join last year’s formidable Inspiring Fifty: Europe who were celebrated during an event hosted by the UK Prime Minister’s office at 10 Downing Street in March 2015.
Today’s announcement follows a public nomination process during which hundreds of nominations were received. A prestigious panel of judges from Europe and the US then had the difficult task of selecting the final fifty.
“What a fantastic group of inspirational women. It was a tough selection process as we had hundreds of impressive nominations, but these fifty stood out for their experience and achievements, particularly over the past year. One thing they all have in common is a very obvious passion for the tech industry, which make them the perfect role models to inspire other women looking to build a career in the sector”, said Shari Yoder Doherty from Atomico. “I’m also delighted to announce we have secured a partnership with Inspiring Fifty to support their goals going forward”.
-
2015 Digital Woman of the Year Finalist-Europe
Digital Leadership Institute
http://adaawards.com/2015-eu-finalists/
-
Cisco Security Ninja Green Belt
Cisco
-
FDM Everywoman in Tech Finalist in Inspiration Category
FDM Everywoman
The British tech industry is thriving, predicted to be worth £221bn by 2016*. As a result it is estimated that by 2022 the UK will need at least 1.82 million new engineering, science and technology professionals**. Advances in technology have created a huge variety of fascinating new careers from mobile technology to energy requirements. Yet despite this, only one in 20 IT job applicants is female according to half of tech employers***. The reasons for this are varied, but unhelpful…
The British tech industry is thriving, predicted to be worth £221bn by 2016*. As a result it is estimated that by 2022 the UK will need at least 1.82 million new engineering, science and technology professionals**. Advances in technology have created a huge variety of fascinating new careers from mobile technology to energy requirements. Yet despite this, only one in 20 IT job applicants is female according to half of tech employers***. The reasons for this are varied, but unhelpful stereotypes and low take up of STEM subjects in schools are regularly cited as reasons why the industry lacks gender diversity.
The tech industry is crying out for fresh talent with nearly half of all technology firms seeking to hire more staff. Research shows that role models and opportunities to network are key to countering this talent deficit**** and the FDM everywoman in Technology Awards is the industry’s most influential programme that both celebrates and inspires.
-
Top WoM2M 2015
Connected World Magazine
The annual WoM2M is comprised of some of the most powerful women in the technology sector, representing many of the largest, most innovative companies in the world.
“I am very pleased to be able to honor the 2015 women of M2M,” says Peggy Smedley, editorial director, Connected World magazine. “Each year I am able to work with a great group of women and this year is no exception. The women we are recognizing this year lead with grace and equanimity and are surely risk takers as we all…The annual WoM2M is comprised of some of the most powerful women in the technology sector, representing many of the largest, most innovative companies in the world.
“I am very pleased to be able to honor the 2015 women of M2M,” says Peggy Smedley, editorial director, Connected World magazine. “Each year I am able to work with a great group of women and this year is no exception. The women we are recognizing this year lead with grace and equanimity and are surely risk takers as we all learned from General Price’s amazing presentation.”
The 2015 WoM2M have been chosen because they each bring a unique lens to their respective companies, helping push connected technologies forward to help their companies become better corporate citizens and technology leaders overall. -
Cisco Security Ninja White Belt Advanced
Cisco
Technical foundational certification for Cisco Secure Development Lifecycle.
-
GEM-TECHGlobal Achiever
UN Women and ITU
Tech Award for Gender Equality and Mainstreaming.
Monique Morrow, Cisco Systems
Monique Morrow is Chief Technology Officer (CTO) of Cisco's Services Group. She has over two decades of experience in IP internetworking. Monique has dedicated her life to the promotion of the engineering field to women. She advises: "No matter where you are in the world, follow your curiosity and your passion. Technology is so much fun! Take risks! Don't let anyone stop you!" At the 2013 ITU Girls in ICT Day,…Tech Award for Gender Equality and Mainstreaming.
Monique Morrow, Cisco Systems
Monique Morrow is Chief Technology Officer (CTO) of Cisco's Services Group. She has over two decades of experience in IP internetworking. Monique has dedicated her life to the promotion of the engineering field to women. She advises: "No matter where you are in the world, follow your curiosity and your passion. Technology is so much fun! Take risks! Don't let anyone stop you!" At the 2013 ITU Girls in ICT Day, Monique spoke on this issue in the European Parliament. Here she urged women to take ownership of their individual careers and write the script for their future.
-
Top 10 Influential IT Women in Europe
Think Progress
We take a look at ten women who are playing a crucial role in the European IT industry and may just be the role models a future generation of young females need to redress the gender balance. -
See more at: http://www.think-progress.com/nordic/en/business-insight/top-ten-influential-women-europe/#sthash.vmHxeZmA.dpuf
-
Clementina Saduwa Award
IEEE Region 8
Clementina Saduwa was a tireless and extremely effective volunteer student leader a few years back, when the IEEE Nigeria Section was being revived, and she went on to become the first ever IEEE Region 8 Women In Engineering (WIE) Coordinator. In January 2007, She was killed in a random act of violence and left behind her husband and young daughter. She was 29 years old.
To honour her rule and work throughout the years, IEEE Women In Engineering and IEEE Region 8 have named the award for…Clementina Saduwa was a tireless and extremely effective volunteer student leader a few years back, when the IEEE Nigeria Section was being revived, and she went on to become the first ever IEEE Region 8 Women In Engineering (WIE) Coordinator. In January 2007, She was killed in a random act of violence and left behind her husband and young daughter. She was 29 years old.
To honour her rule and work throughout the years, IEEE Women In Engineering and IEEE Region 8 have named the award for the recognition of women engineer in Region 8 who, through their engineering and career achievements, has demonstrated noteworthy support for women in the profession and has established a benchmark of engineering excellence.
This years recipient holds the title of Chief Technology Officer (CTO) at Cisco Services, with a focus of developing strategic technology and business architectures for Cisco customers and partners. She has over twenty years of experience in the field of computer inter-networks, and a pristine record of innovations. She also has a brilliant history of urging women to take ownership of their careers and “writing their own script” for the future. On this subject she has presented to the European Parliament. She is passionate about advancing Girls in ICT and Women in Technology.
IEEE Region 8 happy to announce that the winner of the Clementina Saduwa Award for 2014 is Monique Jeanne Morrow from Switzerland! -
Cisco Technology Radar Gold Medalist and Hall of Fame
Cisco Strategy Technology Group
Gold Medalist and inducted into Cisco Technology Radar Hall of Fame
https://techradar.cisco.com/
Sprachen
-
English
Muttersprache oder zweisprachig
-
French
Muttersprache oder zweisprachig
-
German
Fließend
-
Mandarin
Grundkenntnisse
Organisationen
-
Crypto Valley Association
Individual Member
–Heute -
International Society Service Innovation Professionals
President Jan 2016
–Heutehttp://www.issip.org
-
utopiacities.org
Advisor
–Heute"Reimagining the Future of Slums" http://www.utopiacities.org
-
SheWorks!
Advisor
–HeuteSheWorks! is talent cloud combined with remote workforce management tools that helps companies to hire vetted professional women from the global talent pool and manage, coordinate, monitor, rate and pay their work transparently. https://www.facebook.com/SheWorksCloud/
-
Congressional App Challenge
Advisory Board
–HeuteThe Congressional App Challenge (CAC) is a competition aimed at encouraging U.S. high school students to learn how to code by creating their own applications. The Challenge is intended to highlight the value of computer science and STEM (Science, Technology, Engineering and Math) education and encourage students to engage in these fields. By encouraging and recognizing our nation’s young programming talent, Congress hopes to shine a light on the growing importance of these…
The Congressional App Challenge (CAC) is a competition aimed at encouraging U.S. high school students to learn how to code by creating their own applications. The Challenge is intended to highlight the value of computer science and STEM (Science, Technology, Engineering and Math) education and encourage students to engage in these fields. By encouraging and recognizing our nation’s young programming talent, Congress hopes to shine a light on the growing importance of these skills. Representatives Ed Royce (CA-39) and Seth Moulton (MA-06) are serving as congressional co-chairs of the 2016 Congressional App Challenge. The 2016 Congressional App Challenge will take place from July 18, 2016 through November 2, 2016, and is open to all U.S. high school students in participating districts. Challenge participants are invited, either as individuals or as teams 0f up to four, to create and submit their own software application (“app”) for mobile, tablet, or other computing devices on a platform of their choice. A panel of local computer science professionals and congressional representatives will judge the apps, and the winners in each district will have the honor of being recognized by their Congressional representative. The CAC is coordinated by the Congressional Internet Caucus and the non-governmental sponsor of the project, the Internet Education Foundation.
-
Shevirah
Advisor
–Heutehttp://www.esecurityplanet.com/mobile-security/shevirah-moving-forward-for-enterprise-mobile-pen-testing-video.html
-
Girls in Tech, Inc.
Board of Directors
–HeuteGirls in Tech is the largest global organization in the sector, creating awareness of the need to recognize women’s contributions to technology and promoting women working in the workforce. With over 47 active chapter and approximately 20,000 members, the organization provides Global Classroom courses, coding and design bootcamps, entrepreneurial and leadership programming, business pitch competitions, hackathons, networking events, conferences, and sponsors young girls in high school to…
Girls in Tech is the largest global organization in the sector, creating awareness of the need to recognize women’s contributions to technology and promoting women working in the workforce. With over 47 active chapter and approximately 20,000 members, the organization provides Global Classroom courses, coding and design bootcamps, entrepreneurial and leadership programming, business pitch competitions, hackathons, networking events, conferences, and sponsors young girls in high school to participate in STEM workshops.
-
Samaschool Advisory Board
Board of Directors
–Heutehttp://samaschool.org/about/advisory-board/ The internet and the rapid growth of the digital economy are creating unprecedented avenues for economic opportunity. But in order for the unemployed to take advantage of online work opportunities, they need to be lifted into the 21st century economy with new skills. Samaschool aims to bring opportunity to areas with high poverty and unemployment by training low-income people how to find and succeed in digital work. The curriculum teaches…
http://samaschool.org/about/advisory-board/ The internet and the rapid growth of the digital economy are creating unprecedented avenues for economic opportunity. But in order for the unemployed to take advantage of online work opportunities, they need to be lifted into the 21st century economy with new skills. Samaschool aims to bring opportunity to areas with high poverty and unemployment by training low-income people how to find and succeed in digital work. The curriculum teaches high-demand, market-aligned skills and provides the soft skills and digital literacy training required for success in today’s job market. Through the Samaschool model, low-income people can access a new economy and gain critical skills that will generate new sources of income and pathways out of poverty.
-
Women in Technology International; Exec Women's Forum;Women's Society of Cyberjutsu
-
–Heute -
ITU Telecommunications Standards Advisory Group
Vice Chair
–Heutehttp://www.itu.int/net/ITU-T/lists/mgmt.aspx?Group=0&Period=14
-
JCA Cloud Computing
Chair
–Heutehttp://www.itu.int/en/ITU-T/jca/Cloud/Pages/default.aspx
-
Gilde Buy Out Partners AG now Rivean Capital
Advisor
–http://gilde.com/about-us/profile
-
FTTH Council Asia Pacific
Board of Directors
–http://www.ftthcouncilap.org/
-
Board of Directors for RFSpot
-
http://www.rfspot.com, http://www.cisco.com/web/solutions/trends/tech-radar/index.html
-
CodeChix Advisory Board
-
http://www.codechix.org/board-of-directors/
-
SHINE for Girls Advisory Board
-
http://www.shineforgirls.org/
Erhaltene Empfehlungen
23 Personen haben Monique Jeanne Morrow (she/her) empfohlen
Jetzt anmelden und ansehenWeitere Aktivitäten von Monique Jeanne Morrow (she/her)
-
Preparing for a quantum-resistant tomorrow ! Computing is the fundament of today’s finance! This is one reason why I, as a physicist, working on the…
Preparing for a quantum-resistant tomorrow ! Computing is the fundament of today’s finance! This is one reason why I, as a physicist, working on the…
Beliebt bei Monique Jeanne Morrow (she/her)
-
🚀 Reflecting on an Incredible Experience at the United Nations! 🌐 I recently had the privilege of attending the "OSPOs for Good 2024" at the…
🚀 Reflecting on an Incredible Experience at the United Nations! 🌐 I recently had the privilege of attending the "OSPOs for Good 2024" at the…
Beliebt bei Monique Jeanne Morrow (she/her)
-
As #AI grows and integrates into our systems, it provides #accessibility benefits on the business, personal, and community levels. 1. Business: Now…
As #AI grows and integrates into our systems, it provides #accessibility benefits on the business, personal, and community levels. 1. Business: Now…
Geteilt von Monique Jeanne Morrow (she/her)
-
((1) Takeaways from the #IEEE Terms and Conditions for Children’s Online Engagement Working Group: Our goal is to create standards prioritizing young…
((1) Takeaways from the #IEEE Terms and Conditions for Children’s Online Engagement Working Group: Our goal is to create standards prioritizing young…
Beliebt bei Monique Jeanne Morrow (she/her)
-
Grateful to be in such great company 🙏🏽
Grateful to be in such great company 🙏🏽
Beliebt bei Monique Jeanne Morrow (she/her)
-
So cool to be mentioned in this list - 2024 edition of "Women Know Cyber: 150 Fascinating Females Fighting Cybercrime" a new online directory…
So cool to be mentioned in this list - 2024 edition of "Women Know Cyber: 150 Fascinating Females Fighting Cybercrime" a new online directory…
Beliebt bei Monique Jeanne Morrow (she/her)
-
🌟 Visionary Announcement: Investors & Collectors 🌟 As we celebrate a decade of innovation in the Crypto Valley, we are excited to highlight the…
🌟 Visionary Announcement: Investors & Collectors 🌟 As we celebrate a decade of innovation in the Crypto Valley, we are excited to highlight the…
Beliebt bei Monique Jeanne Morrow (she/her)
-
🚀 Morning Deep Dive into Bitcoin Versions! 🚀 We UZH Blockchain Center spent the majority of our morning discussing the "legacy" and differences…
🚀 Morning Deep Dive into Bitcoin Versions! 🚀 We UZH Blockchain Center spent the majority of our morning discussing the "legacy" and differences…
Beliebt bei Monique Jeanne Morrow (she/her)
-
What a lovely way to end a hectic day . Rowing on beautiful Lake Zürich with Angela Saxby and trainer Detlef Kriemann from Berlin. @Rowing Club Zürich
What a lovely way to end a hectic day . Rowing on beautiful Lake Zürich with Angela Saxby and trainer Detlef Kriemann from Berlin. @Rowing Club Zürich
Geteilt von Monique Jeanne Morrow (she/her)
-
𝐓𝐡𝐞 𝐇𝐚𝐬𝐡𝐠𝐫𝐚𝐩𝐡 𝐀𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐢𝐨𝐧 𝐚𝐧𝐝 𝐃𝐞𝐥𝐨𝐢𝐭𝐭𝐞 𝐉𝐨𝐢𝐧 𝐅𝐨𝐫𝐜𝐞𝐬 𝐭𝐨 𝐑𝐞𝐯𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐢𝐳𝐞 𝐄𝐒𝐆 𝐈𝐦𝐩𝐚𝐜𝐭…
𝐓𝐡𝐞 𝐇𝐚𝐬𝐡𝐠𝐫𝐚𝐩𝐡 𝐀𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐢𝐨𝐧 𝐚𝐧𝐝 𝐃𝐞𝐥𝐨𝐢𝐭𝐭𝐞 𝐉𝐨𝐢𝐧 𝐅𝐨𝐫𝐜𝐞𝐬 𝐭𝐨 𝐑𝐞𝐯𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐢𝐳𝐞 𝐄𝐒𝐆 𝐈𝐦𝐩𝐚𝐜𝐭…
Beliebt bei Monique Jeanne Morrow (she/her)
-
Imagine playing your favorite online game but instead of triggering NPC scripts, you can have seemingly real conversations and interactions with all…
Imagine playing your favorite online game but instead of triggering NPC scripts, you can have seemingly real conversations and interactions with all…
Geteilt von Monique Jeanne Morrow (she/her)
-
🌟Meet the Tokinvest team 🌟 Each, week will introduce a member of the Tokinvest team to tell us a bit more about themselves. This week, our CSO and…
🌟Meet the Tokinvest team 🌟 Each, week will introduce a member of the Tokinvest team to tell us a bit more about themselves. This week, our CSO and…
Beliebt bei Monique Jeanne Morrow (she/her)
-
Thank you Okta and Kerry Ok for supporting our mission to increase the number of women technology leaders on both private and public boards! SAN…
Thank you Okta and Kerry Ok for supporting our mission to increase the number of women technology leaders on both private and public boards! SAN…
Beliebt bei Monique Jeanne Morrow (she/her)
-
𝐄𝐦𝐩𝐨𝐰𝐞𝐫𝐢𝐧𝐠 𝐅𝐮𝐭𝐮𝐫𝐞 𝐈𝐧𝐧𝐨𝐯𝐚𝐭𝐨𝐫𝐬: 𝐈𝐧𝐬𝐢𝐠𝐡𝐭𝐬 𝐟𝐫𝐨𝐦 𝐭𝐡𝐞 𝟓𝐭𝐡 𝐈𝐧𝐭𝐞𝐫𝐧𝐚𝐭𝐢𝐨𝐧𝐚𝐥 𝐁𝐥𝐨𝐜𝐤𝐜𝐡𝐚𝐢𝐧…
𝐄𝐦𝐩𝐨𝐰𝐞𝐫𝐢𝐧𝐠 𝐅𝐮𝐭𝐮𝐫𝐞 𝐈𝐧𝐧𝐨𝐯𝐚𝐭𝐨𝐫𝐬: 𝐈𝐧𝐬𝐢𝐠𝐡𝐭𝐬 𝐟𝐫𝐨𝐦 𝐭𝐡𝐞 𝟓𝐭𝐡 𝐈𝐧𝐭𝐞𝐫𝐧𝐚𝐭𝐢𝐨𝐧𝐚𝐥 𝐁𝐥𝐨𝐜𝐤𝐜𝐡𝐚𝐢𝐧…
Beliebt bei Monique Jeanne Morrow (she/her)