About
Articles by Hadley
-
The Tokenization of Things and Building the Unimaginable
The Tokenization of Things and Building the Unimaginable
By Hadley Stern
Activity
-
We’re excited to announce our partnership with Algoz, a leading quantitative digital asset technology firm, to deliver a safer and more efficient…
We’re excited to announce our partnership with Algoz, a leading quantitative digital asset technology firm, to deliver a safer and more efficient…
Liked by Hadley Stern
-
Had a fantastic 6th PMC this year. https://lnkd.in/eZXmnpZ
Had a fantastic 6th PMC this year. https://lnkd.in/eZXmnpZ
Liked by Hadley Stern
-
Robinhood has announced the appointment of David Schwed as its new Chief Information Security Officer (CISO). 🌐🔒 David Schwed, who most recently…
Robinhood has announced the appointment of David Schwed as its new Chief Information Security Officer (CISO). 🌐🔒 David Schwed, who most recently…
Liked by Hadley Stern
Experience & Education
Volunteer Experience
-
Volunteer Teacher
Citizen Schools
- Present 11 years 8 months
Children
Co-taught a Citizen's School Class on Mobile App Development
-
Volunteer
CARING CANINES THERAPY DOGS INC
- 1 year 4 months
Social Services
With our wonderful Beagle, Marge, volunteer at seniors homes and other facilities to provide comfort to patients and residents.
Patents
-
Alert notification based on field of view
Issued 10133931
Techniques for collecting and presenting information using a wearable device involve receiving criteria information data that specifies one or more criteria for providing information to a user of a wearable device; receiving information indicative of a field of view of the user of the wearable device; detecting that an object in the field of view is associated with one or more attributes that satisfy the user-specified criteria; responsive to detection, executing a rule associated with one or…
Techniques for collecting and presenting information using a wearable device involve receiving criteria information data that specifies one or more criteria for providing information to a user of a wearable device; receiving information indicative of a field of view of the user of the wearable device; detecting that an object in the field of view is associated with one or more attributes that satisfy the user-specified criteria; responsive to detection, executing a rule associated with one or more attributes that satisfy the user-specified criteria; and based on execution of the rule, causing an informational depiction to be presented via a display of the wearable device that visually eliminates or enhances the detected object in the field of view of the user.
-
Authentication using a video signature
Issued US 8941741
Methods and apparatuses, including computer program products, are described for authentication using a video signature. A computing device receives a request to access a secure resource, and the request includes a first video segment comprising a plurality of visual and audio elements. The computing device analyzes one or more of the plurality of visual and audio elements in the first video segment to determine a value associated with each of the one or more analyzed elements. The computing…
Methods and apparatuses, including computer program products, are described for authentication using a video signature. A computing device receives a request to access a secure resource, and the request includes a first video segment comprising a plurality of visual and audio elements. The computing device analyzes one or more of the plurality of visual and audio elements in the first video segment to determine a value associated with each of the one or more analyzed elements. The computing device calculates a total score for the first video segment based upon the value associated with each of the one or more analyzed elements. The computing device compares the total score for the first video segment to a score associated with a second video segment associated with the computing device. The computing device determines whether access to the secure resource is permitted based upon the comparison step.
Other inventors -
Secure video conferencing to conduct financial transactions
Issued US 8943568
Methods and apparatuses, including computer program products, are described for secure video conferencing to conduct financial transactions. A server computing device receives a request to establish a video conference from a first client device associated with a user of the first client device. The server computing device authenticates the first client device using credential information. The server computing device establishes a video conference between the first client device and a second…
Methods and apparatuses, including computer program products, are described for secure video conferencing to conduct financial transactions. A server computing device receives a request to establish a video conference from a first client device associated with a user of the first client device. The server computing device authenticates the first client device using credential information. The server computing device establishes a video conference between the first client device and a second client device associated with a customer representative of a financial institution. The server computing device transmits video images associated with one or more cameras coupled to the first client device to the second client device, the video images comprising a view of the user and an area surrounding the user. The server computing device determines whether any persons other than the user are present in the area surrounding the user.
Other inventors -
Methods and systems for expedited trading account funding
Issued US 20140379544
A computer-implemented method is provided for opening an expedited account for a user. The method includes receiving a request from the user to make a trade associated with at least one financial instrument, in the absence of an account being opened for the user. The method includes determining a plurality of factors in response to the request, the plurality of factors including 1) a credit worthiness score of the user; 2) a source of capital identified by the user to cover the trade; and 3) a…
A computer-implemented method is provided for opening an expedited account for a user. The method includes receiving a request from the user to make a trade associated with at least one financial instrument, in the absence of an account being opened for the user. The method includes determining a plurality of factors in response to the request, the plurality of factors including 1) a credit worthiness score of the user; 2) a source of capital identified by the user to cover the trade; and 3) a type of the at least one financial instrument associated with the trade. The method also includes opening the expedited account for the user with limited trading privileges, in which an amount of fund for trading is advanced to the user based on the plurality of factors. The method further includes allowing the user to make a trade up to the amount of fund advanced.
Other inventors -
Generating and Tracking Activity Patterns for Mobile Devices
Filed US 20110022312
Described are methods and apparatuses, including computer program products, for tracking patterns associated with mobile devices. The system includes a server computing device configured to receive location information from a mobile device associated with a user. The location information includes location information based on GPS information sent from the mobile device. One or more activity patterns associated with the user of the mobile device are generated by the server computing device. The…
Described are methods and apparatuses, including computer program products, for tracking patterns associated with mobile devices. The system includes a server computing device configured to receive location information from a mobile device associated with a user. The location information includes location information based on GPS information sent from the mobile device. One or more activity patterns associated with the user of the mobile device are generated by the server computing device. The generating includes tracking the location information over a period of time and determining one or more categories of repeated activity based on the tracking.
Other inventors -
Location-Based Address Determination and Real Estate Valuation
Filed US 20110022540
Described are methods and apparatuses, including computer program products, for location-based address determination and real estate valuation. Current location information from a mobile device is received by a server computing device. The location information includes global positioning data associated with the mobile device and photographic data associated with one or more photos taken by the mobile device and associated with the location. A street address based on the location information is…
Described are methods and apparatuses, including computer program products, for location-based address determination and real estate valuation. Current location information from a mobile device is received by a server computing device. The location information includes global positioning data associated with the mobile device and photographic data associated with one or more photos taken by the mobile device and associated with the location. A street address based on the location information is determined by the server computing device. The photographic data is processed in associated with the global positioning data, wherein the photographic data is used to determine the street address. Financial data associated with the street address is received.
Other inventors -
Inserting Personalized Information into Digital Content
Filed US 20110023063
Products for inserting personalized information into digital content. A request for digital video content is received by a computing device. The request includes authentication data associated with a user of a client device. Personalized data to be inserted into the requested video content is generated by the computing device. The personalized data and the requested video content are combined by the computing device. The combining includes replacing one or more frames of the requested video…
Products for inserting personalized information into digital content. A request for digital video content is received by a computing device. The request includes authentication data associated with a user of a client device. Personalized data to be inserted into the requested video content is generated by the computing device. The personalized data and the requested video content are combined by the computing device. The combining includes replacing one or more frames of the requested video content with the personalized data to generate personalized video content.
Other inventors -
Communication Session Transfer Between Devices
US 20130318249
Methods and apparatuses, including computer program products, are described for communication session transfer between a plurality of computing devices. A first computing device detects the presence of a second computing device in proximity to the first computing device, where the first computing device has established a first communication session with a remote computing device. The first computing device establishes a wireless connection to the second computing device. The first computing…
Methods and apparatuses, including computer program products, are described for communication session transfer between a plurality of computing devices. A first computing device detects the presence of a second computing device in proximity to the first computing device, where the first computing device has established a first communication session with a remote computing device. The first computing device establishes a wireless connection to the second computing device. The first computing device receives, from the second computing device, information associated with the first communication session. The first computing device establishes a second communication session with the remote computing device using the received information, where the second communication session is established with the same state as the first communication session.
-
Risk adjusted, multifactor authentication
US 8,584,219
A computer-implemented method comprising: receiving, from a device used by a user, a request to access a resource hosted by a computer system; identifying, by the computer system, a level of risk associated with the user requesting access to the resource; adjusting, by the computer system an authentication standard for access to the resource, adjusting based on the identified level of risk; determining values for authentication factors used in authenticating the user's access to the resource;…
A computer-implemented method comprising: receiving, from a device used by a user, a request to access a resource hosted by a computer system; identifying, by the computer system, a level of risk associated with the user requesting access to the resource; adjusting, by the computer system an authentication standard for access to the resource, adjusting based on the identified level of risk; determining values for authentication factors used in authenticating the user's access to the resource; applying weights to the values for the authentication factors; and determining, based on a comparison of the weighted values to the adjusted authentication standard, whether the user is authorized to access the resource.
Other inventors
Projects
-
Select Speeches & Presentations
-
• HUBweek / Federal Reserve Bank of Boston | “The Hype and Promise of Blockchain” – Boston, MA (2016)
• Consensus 2016 Conference | Blockchain Hackathon Judge – New York, NY (2016)
• InformationWeek IT Leadership Summit | “Emerging Technology in Financial Services”– New York, NY (2014)
• Innovation Models In Digital Banking & Financial Services Conference | “Wearable Computing Innovation in Financial Services” – Boston, MA (2013)
• ABA, Wealth Management Conference | “Social Media…• HUBweek / Federal Reserve Bank of Boston | “The Hype and Promise of Blockchain” – Boston, MA (2016)
• Consensus 2016 Conference | Blockchain Hackathon Judge – New York, NY (2016)
• InformationWeek IT Leadership Summit | “Emerging Technology in Financial Services”– New York, NY (2014)
• Innovation Models In Digital Banking & Financial Services Conference | “Wearable Computing Innovation in Financial Services” – Boston, MA (2013)
• ABA, Wealth Management Conference | “Social Media for Banking Industry”– Miami, FL (2011)
• T3 Conference | “Social Media 101” – San Diego, CA (2010)
• 140 Character Conference | Social Media Panelist – New York, NY (2009
Honors & Awards
-
Fidelity Global Leadership Program, Selected by Management
Fidelity Investments
-
Excellence Award, Fidelity Customer and Marketing
Fidelity Investments
-
Fidelity Ad Agency Achievement Award
Fidelity Investments
More activity by Hadley
-
Guess what? CoinFund is hiring. We are excited to announce that we are seeking a Director of Investor Relations and Business Development to join our…
Guess what? CoinFund is hiring. We are excited to announce that we are seeking a Director of Investor Relations and Business Development to join our…
Liked by Hadley Stern
-
We are starting to see an increasing number of job scams using opportunities at Coinbase to lure potential victims. Please don't be a victim to…
We are starting to see an increasing number of job scams using opportunities at Coinbase to lure potential victims. Please don't be a victim to…
Liked by Hadley Stern
-
Rarely do we get the chance to join an organization that we've admired deeply, as an outsider and eventually a client. I was given that opportunity…
Rarely do we get the chance to join an organization that we've admired deeply, as an outsider and eventually a client. I was given that opportunity…
Liked by Hadley Stern
-
We’re proud to announce the addition of four new team members to support an uptick in deal activity and the long-term growth of the brand…
We’re proud to announce the addition of four new team members to support an uptick in deal activity and the long-term growth of the brand…
Liked by Hadley Stern
-
Joy is the number one predictor of high performance. When you do things for the love passion shines through, and ignites that cocktail of…
Joy is the number one predictor of high performance. When you do things for the love passion shines through, and ignites that cocktail of…
Liked by Hadley Stern
-
Had a great time in Nashville last week with the BitGo team. The Bitcoin Conference is the convergence of the brightest minds in our industry and the…
Had a great time in Nashville last week with the BitGo team. The Bitcoin Conference is the convergence of the brightest minds in our industry and the…
Liked by Hadley Stern
-
Proud of the incredible team of innovators that we are blessed to work alongside at #BNY. You push the boundaries every day to deliver…
Proud of the incredible team of innovators that we are blessed to work alongside at #BNY. You push the boundaries every day to deliver…
Liked by Hadley Stern
-
Unsure if a hot take but CEO’s should get more equity than their co-founders.
Unsure if a hot take but CEO’s should get more equity than their co-founders.
Liked by Hadley Stern
-
CEO? No, the title I’m most proud of is “Dad”. I just finished a long weekend in Boston that was a great mix of business and pleasure. And the best…
CEO? No, the title I’m most proud of is “Dad”. I just finished a long weekend in Boston that was a great mix of business and pleasure. And the best…
Liked by Hadley Stern
-
Today marks a decade in crypto for me and I’m feeling reflective about the journey and my hopes for the future 🚀🎂 I started at ItBit (now Paxos)…
Today marks a decade in crypto for me and I’m feeling reflective about the journey and my hopes for the future 🚀🎂 I started at ItBit (now Paxos)…
Liked by Hadley Stern
-
Money is changing. And so am I. I’m thrilled to announce that I've joined Kiln, the premier enterprise-grade staking services provider, to…
Money is changing. And so am I. I’m thrilled to announce that I've joined Kiln, the premier enterprise-grade staking services provider, to…
Liked by Hadley Stern
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More