About
An accomplished executive with over two decades of experience in Emerging Businesses…
Activity
-
🟡🟣 #RaylsLive | Diving into Rayls' Latest and Upcoming Versions On Thursday, April 10 at 2 pm UKT, join our core contributor and Parfin’s co-CTO,…
🟡🟣 #RaylsLive | Diving into Rayls' Latest and Upcoming Versions On Thursday, April 10 at 2 pm UKT, join our core contributor and Parfin’s co-CTO,…
Liked by Dr. Jacob Mendel
-
🚨 3 Years at Parfin: Countless Wins and a Bright Future Ahead EN I’m celebrating 3 amazing years at Parfin! A huge thank you to our incredible…
🚨 3 Years at Parfin: Countless Wins and a Bright Future Ahead EN I’m celebrating 3 amazing years at Parfin! A huge thank you to our incredible…
Liked by Dr. Jacob Mendel
-
I am deeply honored and grateful that State Street helped me share my hope, opportunity, and perseverance story. I hope my story and words help…
I am deeply honored and grateful that State Street helped me share my hope, opportunity, and perseverance story. I hope my story and words help…
Liked by Dr. Jacob Mendel
Experience
Education
Publications
-
The 5th HLS & CYBER International Conference & Exhibition will be held between November 12-15, 2018, in Tel Aviv, Israel.
Showcasing Israel’s unique security and cyber defense capabilities, this biennial event draws the attendance of hundreds of Israeli companies and thousands of security experts.
-
A Global Challenge - An Israeli Response
National Cyber Directorate
The Israeli cyber-ecosystem, which stands at the forefront of technology, offers a range of cutting-edge cyber-security solutions for countries, companies and organizations in dealing with cyber threats and cyber-crime.
-
Executive Cyber Forum - AI for Security
TAU
The Executive Cyber Forum was founded 6 years ago, and holds sessions quarterly. It brings together representatives from various fields: academia, multinational industry, military executives, governments and national cyber bureaus as well as startups and venture capital funds.
These sessions allow in-depth discussions on important cyber issues, creating a great opportunity for new collaborations and strengthening existing partnerships. The topic of the following session is AI for Security. -
Smart & Safe City - How to improve our cities while keeping our privacy
Haifa
The 6th China-Israel
Hi-Tech Investment Summit
Haifa 2017 - ISRAEL -
The Challenges of Smart Cities Security and Privacy with Blockchain
RedHat Leaders Circle event
Patents
-
SYSTEM AND METHOD FOR FACT VERIFICATION USING BLOCKCHAIN AND MACHINE LEARNING TECHNOLOGIES
Issued US 20230379180
A method for performing fact verification includes receiving a document for verification; identifying and extracting, on the computer network, at least two named entities from the document for verification and associated information as metadata; identifying, off-chain, identifiers of relevant documents corresponding to each of the at least two named entities, the relevant documents being authenticated documents including one or more of the at least two named entities; identifying a…
A method for performing fact verification includes receiving a document for verification; identifying and extracting, on the computer network, at least two named entities from the document for verification and associated information as metadata; identifying, off-chain, identifiers of relevant documents corresponding to each of the at least two named entities, the relevant documents being authenticated documents including one or more of the at least two named entities; identifying a predetermined number of relevant documents among the identified relevant documents based on a number of the at least two named entities present and a number of occurrences for each of the named entities; and determining whether the document to be verified is supported by the predetermined number of relevant documents.
-
SYSTEMS AND METHODS FOR MIXED PRECISION MACHINE LEARNING WITH FULLY HOMOMORPHIC ENCRYPTION
Issued US 20230126672
Systems and methods for mixed precision machine learning with fully homomorphic encryption are disclosed. A method may include receiving data in a mixed precision format from a program or an application executed by the client electronic device; converting the data from the mixed precision format to an integer format; encrypting the data in the integer format using a fully homomorphic data encryption scheme; communicating the encrypted data in the integer format to a host electronic device…
Systems and methods for mixed precision machine learning with fully homomorphic encryption are disclosed. A method may include receiving data in a mixed precision format from a program or an application executed by the client electronic device; converting the data from the mixed precision format to an integer format; encrypting the data in the integer format using a fully homomorphic data encryption scheme; communicating the encrypted data in the integer format to a host electronic device, wherein the host electronic device is configured to process the encrypted data in the integer format and provide an encrypted result in the integer format to the client electronic device; decrypting the encrypted result in the integer format using the fully homomorphic data encryption scheme; converting the decrypted result in the integer format to the mixed precision format; and outputting the result in the mixed precision format to the program or the application.
-
SYSTEMS AND METHODS FOR COMBINING GRAPH EMBEDDING AND RANDOM FOREST CLASSIFICATION FOR IMPROVING CLASSIFICATION OF DISTRIBUTED LEDGER ACTIVITIES
Issued US 20220398233
Amethod for combining an embedding of a graph having a plurality of nodes and edge connections and classifications of distributed ledger-based activities may include: receiving information for historical distributed ledger-based activities comprsi nidonedna onet a plus lot atenieh unknown; applying sampling to sample labels and associ- ated features; training a first classifier based on the plurality of historical distributed ledger-based activities, hte node information, and the sample labels;…
Amethod for combining an embedding of a graph having a plurality of nodes and edge connections and classifications of distributed ledger-based activities may include: receiving information for historical distributed ledger-based activities comprsi nidonedna onet a plus lot atenieh unknown; applying sampling to sample labels and associ- ated features; training a first classifier based on the plurality of historical distributed ledger-based activities, hte node information, and the sample labels; receiving a current distributed ledger-based activity from the distributed ledger network; predicting a classification for the current distrib- uted ledger-based activity using the first classifier; extracting features from hte current distributed ledger-based activity; enriching the extracted features based on one or more neighbors of the nodes involved in the current distributed ledger-based activity; reclassifying the current distributed ledger-based activity using a second classifier; and output- ting an alert based on the prediction.
-
SYSTEMS AND METHODS FOR STREAMING CLASSIFICATION OF DISTRIBUTED LEDGER-BASED ACTIVITIES
Issued US 20220398264
Systems and methods for streaming classification of distrib- uted ledger-based activities are disclosed. In one embodi- ment, a method for streaming classification of distributed
ledger-based activities may include: receiving, at a detection
computer program executed by a server and from a distrib- uted ledger network, information for a plurality of transac- tions; receiving, from a database and at the detection com- puter program, node information that identifies a plurality…Systems and methods for streaming classification of distrib- uted ledger-based activities are disclosed. In one embodi- ment, a method for streaming classification of distributed
ledger-based activities may include: receiving, at a detection
computer program executed by a server and from a distrib- uted ledger network, information for a plurality of transac- tions; receiving, from a database and at the detection com- puter program, node information that identifies a plurality of
computer program, exponential time sampling to sample labels and associated features; training, by the detection computer program, a classifier; receiving, by the detection computer program, a streaming transaction from the distrib- uted ledger network; predicting, by the detection computer program, a classification for the streaming transaction using the trained classifier; and outputting, by the detection com- puter program, an alert based on the prediction. -
SYSTEMS AND METHODS FOR MANAGEMENT OF FINANCIAL TRANSACTIONSASSOCIATED WITH A FUNDING AGREEMENT
Issued US 11514513
Amethod for management of financial transactions associ- ated with a funding agreement may include: receiving, at the award information management system and from an award-
ing organization, details for a funding award comprising an identification of an award recipient, an award amount, and a
condition on the use of the award; notifying an award drawdown management system of the award details; iden- tifying a plurality of participating financial institutions to the award recipient;…Amethod for management of financial transactions associ- ated with a funding agreement may include: receiving, at the award information management system and from an award-
ing organization, details for a funding award comprising an identification of an award recipient, an award amount, and a
condition on the use of the award; notifying an award drawdown management system of the award details; iden- tifying a plurality of participating financial institutions to the award recipient; receiving a registration of an account at one
of the financial institutions for receiving drawdown funds; communicating an amount of the payment to the fund reporting and analysis system; receiving transaction details from the financial institution having the award recipient's registered account; and providing reports of all transactions in the registered account and any and all optional card accounts with detailed analysis of part transaction, current balances and predictions of future drawdown requests. -
Systems and methods for graphical programming and deployment of distributed ledger applications
Issued US 20220066746
Systems and methods for Unified Modeling Language application development on distributed ledgers are disclosed. In one embodiment, a method for graphical programming and deployment of distributed ledger applications may include: (1) receiving, at a coding engine executed by a computer processor, a graphical program for a distributed ledger application comprising a process and a plurality of deployment parameters; (2) retrieving, by the coding engine and from a deployment data database…
Systems and methods for Unified Modeling Language application development on distributed ledgers are disclosed. In one embodiment, a method for graphical programming and deployment of distributed ledger applications may include: (1) receiving, at a coding engine executed by a computer processor, a graphical program for a distributed ledger application comprising a process and a plurality of deployment parameters; (2) retrieving, by the coding engine and from a deployment data database, deployment data for the plurality of deployment parameters; (3) generating, by the coding engine, the distributed ledger application based on the graphical program and the deployment data; and (4) deploying, by the coding engine, the distributed ledger application to a deployment environment.
Other inventors -
SYSTEMS AND METHODS FOR MANAGEMENT OF FINANCIAL TRANSACTIONS ASSOCIATED WITH A FUNDING AGREEMENT
Issued US 2021-0374844 A1
A method for management of financial transactions associated with a funding agreement may include: receiving, at the award information management system and from an awarding organization, details for a funding award comprising an identification of an award recipient, an award amount, and a condition on the use of the award; notifying an award drawdown management system of the award details; identifying a plurality of participating financial institutions to the award recipient; receiving a…
A method for management of financial transactions associated with a funding agreement may include: receiving, at the award information management system and from an awarding organization, details for a funding award comprising an identification of an award recipient, an award amount, and a condition on the use of the award; notifying an award drawdown management system of the award details; identifying a plurality of participating financial institutions to the award recipient; receiving a registration of an account at one of the financial institutions for receiving drawdown funds; communicating an amount of the payment to the fund reporting and analysis system; receiving transaction details from the financial institution having the award recipient's registered account; and providing reports of all transactions in the registered account and any and all optional card accounts with detailed analysis of part transaction, current balances and predictions of future drawdown requests.
-
Security Controlled Multi-Processor System
Issued US US 9,256,734
Embodiments of the present disclosure provide systems and methods for implementing a secure processing system having a first processor that is certified as a secure processor. The first processor only executes certified and/or secure code. An isolated second processor executes non-secure (e.g., non-certified) code within a sandbox. The boundaries of the sandbox are enforced (e.g., using a hardware boundary and/or encryption techniques) such that code executing within the sandbox cannot access…
Embodiments of the present disclosure provide systems and methods for implementing a secure processing system having a first processor that is certified as a secure processor. The first processor only executes certified and/or secure code. An isolated second processor executes non-secure (e.g., non-certified) code within a sandbox. The boundaries of the sandbox are enforced (e.g., using a hardware boundary and/or encryption techniques) such that code executing within the sandbox cannot access secure elements of the secure processing system located outside the sandbox. The first processor manages the memory space and the applications that are permitted to run on the second processor.
Other inventors -
-
Secure Active Networks
Issued US 9258287
A secure active network includes a plurality of secure elements which communicate with one another to share and log information such as identification, location, and user activity associated with each secure element. Secure elements exchange data with one another, and log data received. The periodicity of communication between secure elements, encryption of the information, and the operating frequency in which the information is transmitted and received may be changed if communication is lost…
A secure active network includes a plurality of secure elements which communicate with one another to share and log information such as identification, location, and user activity associated with each secure element. Secure elements exchange data with one another, and log data received. The periodicity of communication between secure elements, encryption of the information, and the operating frequency in which the information is transmitted and received may be changed if communication is lost between any of the secure elements or if a determination is made that a secure element has traveled outside a predetermined zone. The integrity of the secure network may be verified at any time by comparing the logged information to a reference network.
Other inventors -
Secure Processing Sub-System That is Hardware Isolated From A Peripheral Processing Sub-System
Issued US 9224013
Other inventors -
-
Input/Output GateKeeping
Issued US 9202070
Disclosed are various embodiments providing a portable wireless communication device that includes a secure element configured to route a set of input/output (I/O) channels to host processing circuitry of a mobile communication device. The secure element includes an application executable by the secure element, the application being configured to obtain a policy via an I/O channel of the set of I/O channels. The application is further configured to prevent the host processing circuitry from…
Disclosed are various embodiments providing a portable wireless communication device that includes a secure element configured to route a set of input/output (I/O) channels to host processing circuitry of a mobile communication device. The secure element includes an application executable by the secure element, the application being configured to obtain a policy via an I/O channel of the set of I/O channels. The application is further configured to prevent the host processing circuitry from accessing data corresponding to at least a portion of the set of I/O channels according to the policy.
Other inventors -
Secure Delivery of Processing Code
Issued US US 9165163
An apparatus may comprise a secure portion of a chip and an external memory device. The secure portion of the chip may be configured to receive an encryption key, and the memory device may be configured to receive an encrypted processing code. The secure portion of the chip may be configured to verify the encrypted processing code by decrypting the encrypted processing code using the encryption key. A non-secure portion of the chip may be configured to write the encrypted processing code on the…
An apparatus may comprise a secure portion of a chip and an external memory device. The secure portion of the chip may be configured to receive an encryption key, and the memory device may be configured to receive an encrypted processing code. The secure portion of the chip may be configured to verify the encrypted processing code by decrypting the encrypted processing code using the encryption key. A non-secure portion of the chip may be configured to write the encrypted processing code on the memory device while the memory device is coupled to the chip. The encryption key may be associated with an identifier of the chip.
Other inventors -
-
Method and System for Authentication of Device Using Hardware DNA
Issued US US 9,069,946 B2
Methods and systems for authentication of a device are disclosed. An exemplary method includes transmitting an energy towards the device including a material, monitoring a response of the device to the transmitted energy, generating a signature of the device based on the response of the device to the transmitted energy, comparing the device signature to an enrolled signature for the device, and indicating that authentication of the device is successful when the generated signature matches the…
Methods and systems for authentication of a device are disclosed. An exemplary method includes transmitting an energy towards the device including a material, monitoring a response of the device to the transmitted energy, generating a signature of the device based on the response of the device to the transmitted energy, comparing the device signature to an enrolled signature for the device, and indicating that authentication of the device is successful when the generated signature matches the enrolled signature. An exemplary system includes a transmitter configured to transmit an energy towards the device, a receiver configured to monitor a response of the device, and a processor configured to generate a signature of the device based on the response of the device, compare the device signature to an enrolled signature for the device, and indicate that authentication of the device is successful when the generated signature matches the enrolled signature.
Other inventors -
System for monitoring an operation of a device
Issued US US 9027124 B2
A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by…
A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by comparing the authorized time interval for the checkpoint state table node and the operation time tracked by the time counter, as well as the authorized application path for the checkpoint state table node and the operation path tracked by the program counter. A security action is performed when the tracked operation time is not within the authorized time interval, or when the tracked operation path does not match the authorized application path.
Other inventors -
-
Methods and Systems for Secured Authentication of Applications on a Network
Issued US US20140325594
A secured communication network can include a server including an authentication backend, the authentication backend configured to communicate With an authentication front end of a communication device. A server applet can be associated With the authentication backend. The server applet can authenticate an access right associated With the communication device and establish a security level for the communication With the communication device based on information received from the authentication…
A secured communication network can include a server including an authentication backend, the authentication backend configured to communicate With an authentication front end of a communication device. A server applet can be associated With the authentication backend. The server applet can authenticate an access right associated With the communication device and establish a security level for the communication With the communication device based on information received from the authentication front end
Other inventors -
System and Method for Location-Based Authentication
Issued EU 13004282.3 - 1505
Other inventors -
-
Secure data transfer using random ordering and random block sizing
Issued US EP2584732
Encrypted information is conventionally broken into blocks which are transmitted sequentially. Because the order and the size of such blocks can be easily determined, an eavesdropper can gain valuable information regarding the content of the communication. More specifically, if known types of information exist within a block, the encryption key may be determined allowing the content of other encrypted blocks to be obtained. Embodiments of a system, method and computer program product described…
Encrypted information is conventionally broken into blocks which are transmitted sequentially. Because the order and the size of such blocks can be easily determined, an eavesdropper can gain valuable information regarding the content of the communication. More specifically, if known types of information exist within a block, the encryption key may be determined allowing the content of other encrypted blocks to be obtained. Embodiments of a system, method and computer program product described herein can overcome this deficiency by securely transferring information through random ordering and random block sizing. An original data set to be transferred is divided into a plurality of blocks, where at least two blocks have different sizes. Each of the blocks is encrypted. The encrypted blocks are inserted in a sequence of data transfer slots. The blocks are then selected for transfer in random order by selecting a slot to transfer based on a generated random number. Additional security is achieved by utilizing multiple channels for the transfer and transferring to multiple destinations.
-
Integrity Checking System
Issued US US20130061328
Other inventors -
-
Secure Electronic Element Network
Issued US US20130060934
Other inventors -
-
Secure Data Transfer Using Random Ordering and Random Block Sizing
Issued US US20130094650
Encrypted information is conventionally broken into blocks which are transmitted sequentially. Because the order and the size of such blocks can be easily determined, an eavesdropper can gain valuable information regarding the content of the communication. More specifically, if known types of information exist within a block, the encryption key may be determined allowing the content of other encrypted blocks to be obtained. Embodiments of a system, method and computer program product described…
Encrypted information is conventionally broken into blocks which are transmitted sequentially. Because the order and the size of such blocks can be easily determined, an eavesdropper can gain valuable information regarding the content of the communication. More specifically, if known types of information exist within a block, the encryption key may be determined allowing the content of other encrypted blocks to be obtained. Embodiments of a system, method and computer program product described herein can overcome this deficiency by securely transferring information through random ordering and random block sizing. An original data set to be transferred is divided into a plurality of blocks, where at least two blocks have different sizes. The blocks are encrypted and inserted into a sequence of data transfer slots. The blocks are then selected for transfer in random order by selecting a slot to transfer based on a generated random number
-
System For Securely Performing A Transaction
Issued US US 20130061290 A1
Other inventors -
-
System Utilizing a Secure Element
Issued US US20130145429 A1
An electronic device includes a receiver configured to receive, from an entity, a request to perform a function. The electronic device also includes a secure element to verify the request to perform the function. The secure element includes hardware programmed with instructions to verify that a security of the secure element has not been breached. The secure element also includes software including instructions to determine an access right for the entity requesting performance of the function…
An electronic device includes a receiver configured to receive, from an entity, a request to perform a function. The electronic device also includes a secure element to verify the request to perform the function. The secure element includes hardware programmed with instructions to verify that a security of the secure element has not been breached. The secure element also includes software including instructions to determine an access right for the entity requesting performance of the function, and to perform the function when the hardware verifies that the security of the secure element has not been breached and the access right indicates that the entity is authorized to request performance of the secure function.
Other inventorsSee patent
Projects
-
Blockchain Fundamentals
- Present
How it Works ? Key Players, Use Cases and Investment Trends
-
Blockchain The New Digital Age - CyberWeek 2019
- Present
The Blockchain Conference is one of highlights of Cyber Week, bringing together industry experts, academic leaders, entrepreneurs and visionaries in the field.
https://cyberweek.tau.ac.il/2019/Events/Blockchain%3A-The-New-Digital-Age
Blockchain solutions are playing an increasingly central role in transforming business operations across every vertical. Join us for an expert event focusing on a deep-dive look into ‘use-cases’, adaptation and regulation in the public and private…The Blockchain Conference is one of highlights of Cyber Week, bringing together industry experts, academic leaders, entrepreneurs and visionaries in the field.
https://cyberweek.tau.ac.il/2019/Events/Blockchain%3A-The-New-Digital-Age
Blockchain solutions are playing an increasingly central role in transforming business operations across every vertical. Join us for an expert event focusing on a deep-dive look into ‘use-cases’, adaptation and regulation in the public and private sphere. Learn more from companies deploying and shaking-up the blockchain world and meet the innovators who are using cutting-edge ideas to take blockchain technology to new heights.
Featuring industry experts, world-class academics and cutting-edge regulators, this is an event that you will not want to miss. -
Blockchain Collaboration between Frankfurt Blockchain Hub and The Hogeg Blockchain Research Institute set to begin
-
The Frankfurt Blockchain Hub and The Hogeg Blockchain Research Institute from the Tel Aviv University have signed a cooperation agreement to further support Academic research within the blockchain and cryptocurrency space.
Languages
-
English
Professional working proficiency
More activity by Dr. Jacob
-
🟣🟡 #DAS2025 | Rayls at Digital Asset Summit 2025 What an incredible experience at Digital Asset Summit 2025 in New York City! Over the past few…
🟣🟡 #DAS2025 | Rayls at Digital Asset Summit 2025 What an incredible experience at Digital Asset Summit 2025 in New York City! Over the past few…
Liked by Dr. Jacob Mendel
-
🟣🟡 #RaylsTalks | Inside the Event: DAS 🎙 Join us on 21st March at 2 pm UKT for an exclusive webinar, where our core contributors will break…
🟣🟡 #RaylsTalks | Inside the Event: DAS 🎙 Join us on 21st March at 2 pm UKT for an exclusive webinar, where our core contributors will break…
Liked by Dr. Jacob Mendel
-
Great event today in NY, the future of finance will be onchain. Very happy to see the market collaborating and moving to the right direction!…
Great event today in NY, the future of finance will be onchain. Very happy to see the market collaborating and moving to the right direction!…
Liked by Dr. Jacob Mendel
-
🌟 Exciting News! 🌟 I'm thrilled to announce that I'll be joining Romazzino, a Belmond Hotel as #GuestRelation & #Experience Intern in beautiful…
🌟 Exciting News! 🌟 I'm thrilled to announce that I'll be joining Romazzino, a Belmond Hotel as #GuestRelation & #Experience Intern in beautiful…
Liked by Dr. Jacob Mendel
-
Rayls' journey in Drex is only just beginning 🚀 Yesterday, we gathered with industry leaders to explore the evolution of Rayls within the Drex…
Rayls' journey in Drex is only just beginning 🚀 Yesterday, we gathered with industry leaders to explore the evolution of Rayls within the Drex…
Liked by Dr. Jacob Mendel
-
🟣🟡 #DAS2025 | Rayls at Digital Asset Summit 2025 Rayls is excited to announce that we will be participating in Digital Asset Summit 2025 (DAS)…
🟣🟡 #DAS2025 | Rayls at Digital Asset Summit 2025 Rayls is excited to announce that we will be participating in Digital Asset Summit 2025 (DAS)…
Liked by Dr. Jacob Mendel
-
🌎✈️ A Transformative Experience! Over the past few weeks, I had the incredible opportunity to complete a Management course at Ohio University, in…
🌎✈️ A Transformative Experience! Over the past few weeks, I had the incredible opportunity to complete a Management course at Ohio University, in…
Liked by Dr. Jacob Mendel
-
9(!) years at Cato Networks—and OMG, what a ride it has been! Cato moves at an incredible pace, and staying ahead has meant constantly pushing…
9(!) years at Cato Networks—and OMG, what a ride it has been! Cato moves at an incredible pace, and staying ahead has meant constantly pushing…
Liked by Dr. Jacob Mendel
-
𝐈'𝐯𝐞 𝐰𝐚𝐧𝐭𝐞𝐝 𝐭𝐨 𝐛𝐮𝐢𝐥𝐝 𝐭𝐡𝐢𝐬 𝐟𝐨𝐫 𝐲𝐞𝐚𝐫𝐬. While many so-called privacy projects fixated on NFTs and ignored real financial…
𝐈'𝐯𝐞 𝐰𝐚𝐧𝐭𝐞𝐝 𝐭𝐨 𝐛𝐮𝐢𝐥𝐝 𝐭𝐡𝐢𝐬 𝐟𝐨𝐫 𝐲𝐞𝐚𝐫𝐬. While many so-called privacy projects fixated on NFTs and ignored real financial…
Liked by Dr. Jacob Mendel
-
🚨 Cyber Week TLV 2025 - Call for Talks is Now Open! 🚨 Do you have groundbreaking cybersecurity research or an innovative idea to share? Cyber…
🚨 Cyber Week TLV 2025 - Call for Talks is Now Open! 🚨 Do you have groundbreaking cybersecurity research or an innovative idea to share? Cyber…
Liked by Dr. Jacob Mendel
-
Great welcome to Dr. Jacob Mendel as our co-CTO to Rayls. Great technologist with deep experience in security, chriptography and blockchain, aligned…
Great welcome to Dr. Jacob Mendel as our co-CTO to Rayls. Great technologist with deep experience in security, chriptography and blockchain, aligned…
Liked by Dr. Jacob Mendel
-
🟣🟡 #Contributor | We’re thrilled to announce that Dr. Jacob Mendel has joined Parfin as co-CTO (Parfin is the first core developer of Rayls)!…
🟣🟡 #Contributor | We’re thrilled to announce that Dr. Jacob Mendel has joined Parfin as co-CTO (Parfin is the first core developer of Rayls)!…
Liked by Dr. Jacob Mendel
-
#NovoCoCTORayls | Bem-vindo Dr. Jacob Mendel! A Parfin anuncia a chegada do Dr. Jacob Mendel como novo co-CTO da Rayls, o sistema blockchain EVM…
#NovoCoCTORayls | Bem-vindo Dr. Jacob Mendel! A Parfin anuncia a chegada do Dr. Jacob Mendel como novo co-CTO da Rayls, o sistema blockchain EVM…
Liked by Dr. Jacob Mendel
-
It was such a pleasure to speak last week with most of Israeli bank board members on why bank governance is different. Thank you Vicky and Joseph…
It was such a pleasure to speak last week with most of Israeli bank board members on why bank governance is different. Thank you Vicky and Joseph…
Liked by Dr. Jacob Mendel
-
We had the honor of delivering a lecture on open-source risks as part of the Foundations of Blockchain course at Tel Aviv University, led by Dr…
We had the honor of delivering a lecture on open-source risks as part of the Foundations of Blockchain course at Tel Aviv University, led by Dr…
Liked by Dr. Jacob Mendel
-
I had a fascinating conversation on the regulation of AI with the supervisor of the banks; the chairman of the Capital Market Authority, Insurance…
I had a fascinating conversation on the regulation of AI with the supervisor of the banks; the chairman of the Capital Market Authority, Insurance…
Liked by Dr. Jacob Mendel
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More