SlideShare une entreprise Scribd logo
1  sur  59
U   C   L (daniele quercia)
I’m finishing my PhD @
U niversity C ollege L ondon
<My Research>
Ratings on ...
Ratings on phones
MobiRate:  how mobiles  collect  &  store  ratings
Why   ratings on mobiles?
Daniele Quercia Situation : People exchange digital content
drowning user (content overload) help! who will come to the rescue?
Proposal: Accept content only from reputable people
how mobiles  collect  &  store  ratings
collect >  store  > use
Ignorant   Forgers   Liars   collect >  store  > use
Ignorant   Forgers   Liars   [Suspected]
Ignorant   Forgers   Liars   [Suspected] [Exposed]
Ignorant   Forgers   Liars   [Suspected] [Exposed] [Filtered Out]
Ignorant   Forgers   Liars   [Suspected] [Exposed] [Filtered Out] Work done:    AAAI,KDD,   ICDM,...
Ignorant   Forgers   Liars   [Suspected] [Exposed] [Filtered Out] Work done:    AAAI,KDD,   ICDM,... ~ø ~ø
Ignorant   Forgers   Liars   [Exposed] [Filtered Out] Work done:    AAAI,KDD,   ICDM,... MobiRate collect >  store
How to  collect  &  store  ratings?
1.Log (credentials) 2. Gossip (to check each credential)
1.Log (credentials) 2. Gossip (to check each credential)   Impractical 
Idea behind MobiRate
Let’s make it practical...
1.Sealed Log (of credentials) 2. Gossip (to check seals only)
1.Sealed Log (of credentials) 2. Gossip (to check seals only)    Practical
1.Sealed Log (of credentials) entry (rating) “ seal” (for the entry)
1.Sealed Log (of credentials) entry (rating) “ seal” (for the entry) “ hash chain” binding whole table
Assumption  ID is a  unique  public key
Gossiping:   To whom?
To witnesses [slow down]
Audit!  [slow down] What  witnesses do
Audit!  [slow down] What  witnesses do Why?
If one is ignorant   If one is a forger   [Suspected] [Exposed]
Who  are my witnesses Those who will share  content with me
. Who  are my witnesses Like-minded   familiar strangers
1.Sealed Log (of credentials) 2. Gossip (to check seals only)    Practical
Does MobiRate work?
Mobility Traces  AND  Social Networks Reality Mining
Does MobiRate work?
Does MobiRate work?  <1> Is it  robust  to malicious individuals? <2> Does it  run  on phones?
<1>  robust The  f  factor
 
 
MobiRate Oracle
MobiRate reduces  f!!!
<2>  run
“ heaviest” protocol runs < 2sec
“ longest” protocol completed in 2.5ms   (if Bluetooth 100kb/s)
MobiRate works    robust     runs on phones
Ignorant   Forgers   is a step towards...
…  rescuing drowning user help!
Daniele Quercia All this on … mobblog mobirate
 
Assumption   ID is  unique  public key
If not unique    Sybil attacks!
Ignorant   Forgers   Liars [Exposed] MobiRate (eg, Sybils) collect >  store  > use
Ignorant   Forgers   Liars [Exposed] Filtered Out  by [ICDM07] MobiRate (eg, Sybils) collect >  store  > use [ICDM07]  Lightweight Distributed Trust Propagation

Contenu connexe

Similaire à MobiRate [Ubicomp 2008]

Selecting Trustworthy Content Using Tags
Selecting Trustworthy Content Using TagsSelecting Trustworthy Content Using Tags
Selecting Trustworthy Content Using TagsDaniele Quercia
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemskhalavak
 
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Positive Hack Days
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Kenneth Carnesi, JD
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngI am Cipher
 
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Santhosh Tuppad
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
PSCR 2019 - ICAM Standards
PSCR 2019 - ICAM StandardsPSCR 2019 - ICAM Standards
PSCR 2019 - ICAM StandardsAdam Lewis
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Identity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityIdentity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityMartin Strandbygaard
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 

Similaire à MobiRate [Ubicomp 2008] (20)

Selecting Trustworthy Content Using Tags
Selecting Trustworthy Content Using TagsSelecting Trustworthy Content Using Tags
Selecting Trustworthy Content Using Tags
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
 
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
 
Phd final
Phd finalPhd final
Phd final
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
PSCR 2019 - ICAM Standards
PSCR 2019 - ICAM StandardsPSCR 2019 - ICAM Standards
PSCR 2019 - ICAM Standards
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Identity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityIdentity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric Identity
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 

Plus de Daniele Quercia

10 urban intangible properties
10 urban intangible properties10 urban intangible properties
10 urban intangible propertiesDaniele Quercia
 
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...Daniele Quercia
 
Trend Makers and Trend Spotters in a Mobile Application
Trend Makers and Trend Spotters in a Mobile ApplicationTrend Makers and Trend Spotters in a Mobile Application
Trend Makers and Trend Spotters in a Mobile ApplicationDaniele Quercia
 
Unleashing the potential of spatial data
Unleashing the potential of spatial dataUnleashing the potential of spatial data
Unleashing the potential of spatial dataDaniele Quercia
 
Loosing "Friends" on Facebook
Loosing "Friends" on FacebookLoosing "Friends" on Facebook
Loosing "Friends" on FacebookDaniele Quercia
 
Talk of the City: Londoners and Social Media
Talk of the City: Londoners and Social MediaTalk of the City: Londoners and Social Media
Talk of the City: Londoners and Social MediaDaniele Quercia
 
The Social World of Twitter: Topics, Geography, and Emotions
The Social World of Twitter: Topics, Geography, and EmotionsThe Social World of Twitter: Topics, Geography, and Emotions
The Social World of Twitter: Topics, Geography, and EmotionsDaniele Quercia
 
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...Daniele Quercia
 
Middleware for social computing: a roadmap
Middleware for social computing: a roadmap	Middleware for social computing: a roadmap
Middleware for social computing: a roadmap Daniele Quercia
 
Auralist: Introducing Serendipity into Music Recommendation
Auralist: Introducing Serendipity into Music RecommendationAuralist: Introducing Serendipity into Music Recommendation
Auralist: Introducing Serendipity into Music RecommendationDaniele Quercia
 
Personality in Twitter: influentials and popular users
Personality in Twitter: influentials and popular usersPersonality in Twitter: influentials and popular users
Personality in Twitter: influentials and popular usersDaniele Quercia
 
In the mood for being influential
In the mood for being influential In the mood for being influential
In the mood for being influential Daniele Quercia
 
Geomob London September 2011
Geomob London September 2011Geomob London September 2011
Geomob London September 2011Daniele Quercia
 
Sybil Attacks Against Mobile Users
Sybil Attacks Against Mobile UsersSybil Attacks Against Mobile Users
Sybil Attacks Against Mobile UsersDaniele Quercia
 
Promoting location privacy… one lie at a time
Promoting location privacy… one lie at a timePromoting location privacy… one lie at a time
Promoting location privacy… one lie at a timeDaniele Quercia
 
Lightweight Distributed Trust Propagation
Lightweight Distributed Trust PropagationLightweight Distributed Trust Propagation
Lightweight Distributed Trust PropagationDaniele Quercia
 
TRULLO - local trust bootstrapping
TRULLO - local trust bootstrappingTRULLO - local trust bootstrapping
TRULLO - local trust bootstrappingDaniele Quercia
 
Inter-context Trust Bootstrapping for Mobile Content Sharing
Inter-context Trust Bootstrapping for Mobile Content SharingInter-context Trust Bootstrapping for Mobile Content Sharing
Inter-context Trust Bootstrapping for Mobile Content SharingDaniele Quercia
 

Plus de Daniele Quercia (20)

10 urban intangible properties
10 urban intangible properties10 urban intangible properties
10 urban intangible properties
 
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
 
Trend Makers and Trend Spotters in a Mobile Application
Trend Makers and Trend Spotters in a Mobile ApplicationTrend Makers and Trend Spotters in a Mobile Application
Trend Makers and Trend Spotters in a Mobile Application
 
Ads and the City
Ads and the CityAds and the City
Ads and the City
 
Unleashing the potential of spatial data
Unleashing the potential of spatial dataUnleashing the potential of spatial data
Unleashing the potential of spatial data
 
Loosing "Friends" on Facebook
Loosing "Friends" on FacebookLoosing "Friends" on Facebook
Loosing "Friends" on Facebook
 
Talk of the City: Londoners and Social Media
Talk of the City: Londoners and Social MediaTalk of the City: Londoners and Social Media
Talk of the City: Londoners and Social Media
 
The Social World of Twitter: Topics, Geography, and Emotions
The Social World of Twitter: Topics, Geography, and EmotionsThe Social World of Twitter: Topics, Geography, and Emotions
The Social World of Twitter: Topics, Geography, and Emotions
 
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
 
Middleware for social computing: a roadmap
Middleware for social computing: a roadmap	Middleware for social computing: a roadmap
Middleware for social computing: a roadmap
 
Auralist: Introducing Serendipity into Music Recommendation
Auralist: Introducing Serendipity into Music RecommendationAuralist: Introducing Serendipity into Music Recommendation
Auralist: Introducing Serendipity into Music Recommendation
 
Personality in Twitter: influentials and popular users
Personality in Twitter: influentials and popular usersPersonality in Twitter: influentials and popular users
Personality in Twitter: influentials and popular users
 
In the mood for being influential
In the mood for being influential In the mood for being influential
In the mood for being influential
 
Geomob London September 2011
Geomob London September 2011Geomob London September 2011
Geomob London September 2011
 
FriendSensing
FriendSensingFriendSensing
FriendSensing
 
Sybil Attacks Against Mobile Users
Sybil Attacks Against Mobile UsersSybil Attacks Against Mobile Users
Sybil Attacks Against Mobile Users
 
Promoting location privacy… one lie at a time
Promoting location privacy… one lie at a timePromoting location privacy… one lie at a time
Promoting location privacy… one lie at a time
 
Lightweight Distributed Trust Propagation
Lightweight Distributed Trust PropagationLightweight Distributed Trust Propagation
Lightweight Distributed Trust Propagation
 
TRULLO - local trust bootstrapping
TRULLO - local trust bootstrappingTRULLO - local trust bootstrapping
TRULLO - local trust bootstrapping
 
Inter-context Trust Bootstrapping for Mobile Content Sharing
Inter-context Trust Bootstrapping for Mobile Content SharingInter-context Trust Bootstrapping for Mobile Content Sharing
Inter-context Trust Bootstrapping for Mobile Content Sharing
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

MobiRate [Ubicomp 2008]