Stream: Virtual Room 5
Time: 16:30 - 17:30
In this session, you will learn how NetMaster Network Management for TCP/IP efficiently leverages zERT data to help verify an application's regulatory compliance and the need for stronger security. Using zERT data may indicate if traffic from an application is cryptographically protected by focusing on key security attributes such as cryptographic protocols, algorithms, and keys.
Software developer working on NetMaster at Broadcom in Pittsburgh Pennsylvania. I enjoy front end development and anything network related. I work mainly on improving our product and building a new API and web view for our customers. In my spare time I'm an avid skier and golfer.
I've been working on the NetMaster team at Broadcom for almost two years, and in that time I've had the opportunity to learn from a wonderful team and contribute to a well-established, comprehensive network monitoring solution. Outside of work I enjoy reading, knitting, and spending time with my family.
Software developer working on NetMaster at Broadcom in Pittsburgh Pennsylvania. I enjoy front end development and anything network related. I work mainly on improving our product and building a new API and web view for our customers. In my spare time I'm an avid skier and golfer.
I've been working on the NetMaster team at Broadcom for almost two years, and in that time I've had the opportunity to learn from a wonderful team and contribute to a well-established, comprehensive network monitoring solution. Outside of work I enjoy reading, knitting, and spending time with my family.
Click here to give some Feedback so we can make it even better next year!