Submit Search
Upload
Insecure Trends in Web 2.0
•
Download as PPS, PDF
•
1 like
•
607 views
Ferruh Mavituna
Follow
Insecure Trends in Web 2.0 applications.
Read less
Read more
Technology
Design
Report
Share
Report
Share
1 of 20
Download now
Recommended
Privacy security
Privacy security
hanjunxian
The WordPress community has a huge security challenge on the horizon. Now powering almost 20% of the Internet, WordPress lets us build businesses and lifestyles behind a single password. Protecting one site is hard, but the real challenge is making sure that distributed attacks across WordPress sites don't find unprotected sites to attack. In this talk, Brennen Byrne, the CEO of Clef, discusses the attacks and defenses being established in the new security paradigm and the new strategies being worked on to protect your site from the robot army.
Passwords and Botnets and Zombies (oh my!)
Passwords and Botnets and Zombies (oh my!)
jessepollak
This practical talk focused on steps one can take which could save them or someone else while traveling internationally or even around town. The focus was on the information that is “leaked” by mobile devices and social media, along with some of the most-overlooked steps that could lower risk.
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tips
Ernest Staats
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Bruce Johnson
My Presentation of Web² for Ignite#2 Strasbourg
What The Fuck Is Web Squared - Web²
What The Fuck Is Web Squared - Web²
Salah Benzakour
Digital safety
Digital safety
psusmith
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
Quek Lilian
This is a revised edition of the L'internet pour Tous programme. It is aimed to initiate the internet to everybody! Hope you enjoy it!
Internet for everyone
Internet for everyone
Ashesh R
Recommended
Privacy security
Privacy security
hanjunxian
The WordPress community has a huge security challenge on the horizon. Now powering almost 20% of the Internet, WordPress lets us build businesses and lifestyles behind a single password. Protecting one site is hard, but the real challenge is making sure that distributed attacks across WordPress sites don't find unprotected sites to attack. In this talk, Brennen Byrne, the CEO of Clef, discusses the attacks and defenses being established in the new security paradigm and the new strategies being worked on to protect your site from the robot army.
Passwords and Botnets and Zombies (oh my!)
Passwords and Botnets and Zombies (oh my!)
jessepollak
This practical talk focused on steps one can take which could save them or someone else while traveling internationally or even around town. The focus was on the information that is “leaked” by mobile devices and social media, along with some of the most-overlooked steps that could lower risk.
Border crossing mobile social media life-saving security tips
Border crossing mobile social media life-saving security tips
Ernest Staats
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation
Bruce Johnson
My Presentation of Web² for Ignite#2 Strasbourg
What The Fuck Is Web Squared - Web²
What The Fuck Is Web Squared - Web²
Salah Benzakour
Digital safety
Digital safety
psusmith
Lkw Security Part 1_MVPs Azra & Sanjay
Lkw Security Part 1_MVPs Azra & Sanjay
Quek Lilian
This is a revised edition of the L'internet pour Tous programme. It is aimed to initiate the internet to everybody! Hope you enjoy it!
Internet for everyone
Internet for everyone
Ashesh R
Web 2.0 applications have become increasingly popular among Internet users in the past few years. This trend is very unlikely to come to an end soon. More and more 'classic' websites are shifting towards web 2.0 concepts, start-ups are all about web 2.0 and new users are adopting the web 2.0 lifestyle every day. This paper aims to address the following questions: What exactly is web 2.0? What are the concepts and technologies that make web 2.0 what it is? Why does web 2.0 attract malware authors? How did malware spread over the Internet before web 2.0? What are the new attack vectors created by web 2.0 technologies? What social engineering tactics emerge over the web 2.0 concepts? How dangerous is the combination of human & technological vulnerabilities? Are web 2.0 attacks more efficient? How difficult is it to protect ourselves? How are web 2.0 threats going to evolve? Web 2.0 applications are not only being used at home, but also in the corporate environment. The new attack vectors are raising the stakes, both for malware authors and security professionals. The user is somewhere in between the two sides, unwittingly helping the attackers while also suffering from the attacks.
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
Stefan Tanase
Computer And Internet Security
Computer And Internet Security
JFashant
Security for javascript
Security for javascript
Hữu Đại
Web security
Web security
ekostyuk
my presentation for hacker halted
Hacker halted2
Hacker halted2
samsniderheld
<p>Security design is an important, but often neglected, component of system design. In this session, Douglas Crockford, creator of Javascript Object Notation, will outline the security issues that must be considered in the architecture of Ajax applications.</p> <p>The design of the browser did not anticipate the needs of multiparty applications. The browser’s security model frustrates useful activities and allows some very dangerous activities. This talk will look at the small set of options before us that will determine the future of the Web.<br /> During this session, attendees will:</p> <ul> <li>Learn why effective security is an inherent feature of good design;</li> <li>Experience a real-time demo of a Ajax client/server system based on sound security principles</li> <li>See how to apply secure design to rich web applications.</li> </ul>
Douglas Crockford - Ajax Security
Douglas Crockford - Ajax Security
Web Directions
Punto 16
Punto 16
Laura Gálvez
Punto 16
Punto 16
Laura Gálvez
Learn Session Hijacking One of the threat mainly used for cookie stealing. Learn from Rahul Tyagi In this slide what is session hijacking.
Session hijacking by rahul tyagi
Session hijacking by rahul tyagi
amansyal
Blueteam infosec defense measures you can take to strengthen your infrastructure against script kiddies, hackers, and compliance mongers
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is Fucked
Amanda Berlin
Social media is now the top delivery vehicle for malware. And social media attacks are no longer limited to those who simply post too much private informatio to their profiles. They utilize advanced techniques. What are those techniques and what can you do to avoid them? Security and forensics analyst Paul Henry of Lumension explains
2011 Social Media Malware Trends
2011 Social Media Malware Trends
Lumension
Straight to the point, with the multitude of leaks, the latest new age hacking weapons have brought an onslaught of new attack vectors! This is one of the presentations you don’t want to miss! Wayne will be demonstrating highly modified custom mobile deployable network hacking cyber weapons, such as Network BlackBoxs, Evil WiFi Honeypots, custom USB delivered payloads and finally how we can take these weapons to the sky autonomously using various custom build drones.
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
EC-Council
The year is 2015, there are a little over a billion websites online, they range in size, complexity and popularity and yet they all share a common denominator – the threat of a security incident. The past two years have been especially challenging for most businesses; this talk will provide a holistic overview of the challenges and threats website owners face. These insights will come from years of research and analysis, but more importantly from the experiences of 100’s of thousands of website owners like you. We will share the latest threats website owners face, but deliver them in a meaningful way that provides each attendee actionable take-aways. Lastly, the talk will place emphasis on the responsibility that each of us have as online stewards, to our brand, our users and the internet as a whole. The most effective toolset we have at our disposal is knowledge, and so this presentation focuses on education.
Navigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website Owners
Tony Perez
Year 7 slides for teaching about e-safety
Year 7 - Week 5 esafety
Year 7 - Week 5 esafety
teachesict
The Enemy On The Web
The Enemy On The Web
Bishan Singh
An introduction to WordPress Security
Passwords, Attacks, and Security oh my!
Passwords, Attacks, and Security oh my!
Michele Butcher-Jones
Content Management System Security. How to secure your CMS? Common rules: + Choose your CMS with both functionality and security in mind + Update with urgency + Use a strong password (admin dashboard access, database users, etc.) + Have a firewall in place (detect or prevent suspicious requests) + Keep track of the changes to your site and their source code + Give the user permissions (and their levels of access) a lot of thought + Limit the type of files to non-executables and monitor them closely + Backup your CMS (daily backups of your files and databases) + Uninstall plugins you do not use or trust.
Content Management System Security
Content Management System Security
Samvel Gevorgyan
On February 25, 2018, Shinagawa Japan Microsoft Windows Insider Meetup in Japan 3 English version
Mastering windows 10 (English version)
Mastering windows 10 (English version)
Takae Sakushima
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
Mohammed Adam
15 Minute presentation on Cloud Security. Includes classroom interactive quiz to encourage audience participation
Sept 2014 cloud security presentation
Sept 2014 cloud security presentation
Joan Dembowski
One Click Ownage
One Click Ownage
Ferruh Mavituna
Web 2.0 uygulamalarinda goz ardi edilen guvenlik sorunlari.
Web 2.0 Guvenlik Trendleri
Web 2.0 Guvenlik Trendleri
Ferruh Mavituna
More Related Content
What's hot
Web 2.0 applications have become increasingly popular among Internet users in the past few years. This trend is very unlikely to come to an end soon. More and more 'classic' websites are shifting towards web 2.0 concepts, start-ups are all about web 2.0 and new users are adopting the web 2.0 lifestyle every day. This paper aims to address the following questions: What exactly is web 2.0? What are the concepts and technologies that make web 2.0 what it is? Why does web 2.0 attract malware authors? How did malware spread over the Internet before web 2.0? What are the new attack vectors created by web 2.0 technologies? What social engineering tactics emerge over the web 2.0 concepts? How dangerous is the combination of human & technological vulnerabilities? Are web 2.0 attacks more efficient? How difficult is it to protect ourselves? How are web 2.0 threats going to evolve? Web 2.0 applications are not only being used at home, but also in the corporate environment. The new attack vectors are raising the stakes, both for malware authors and security professionals. The user is somewhere in between the two sides, unwittingly helping the attackers while also suffering from the attacks.
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
Stefan Tanase
Computer And Internet Security
Computer And Internet Security
JFashant
Security for javascript
Security for javascript
Hữu Đại
Web security
Web security
ekostyuk
my presentation for hacker halted
Hacker halted2
Hacker halted2
samsniderheld
<p>Security design is an important, but often neglected, component of system design. In this session, Douglas Crockford, creator of Javascript Object Notation, will outline the security issues that must be considered in the architecture of Ajax applications.</p> <p>The design of the browser did not anticipate the needs of multiparty applications. The browser’s security model frustrates useful activities and allows some very dangerous activities. This talk will look at the small set of options before us that will determine the future of the Web.<br /> During this session, attendees will:</p> <ul> <li>Learn why effective security is an inherent feature of good design;</li> <li>Experience a real-time demo of a Ajax client/server system based on sound security principles</li> <li>See how to apply secure design to rich web applications.</li> </ul>
Douglas Crockford - Ajax Security
Douglas Crockford - Ajax Security
Web Directions
Punto 16
Punto 16
Laura Gálvez
Punto 16
Punto 16
Laura Gálvez
Learn Session Hijacking One of the threat mainly used for cookie stealing. Learn from Rahul Tyagi In this slide what is session hijacking.
Session hijacking by rahul tyagi
Session hijacking by rahul tyagi
amansyal
Blueteam infosec defense measures you can take to strengthen your infrastructure against script kiddies, hackers, and compliance mongers
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is Fucked
Amanda Berlin
Social media is now the top delivery vehicle for malware. And social media attacks are no longer limited to those who simply post too much private informatio to their profiles. They utilize advanced techniques. What are those techniques and what can you do to avoid them? Security and forensics analyst Paul Henry of Lumension explains
2011 Social Media Malware Trends
2011 Social Media Malware Trends
Lumension
Straight to the point, with the multitude of leaks, the latest new age hacking weapons have brought an onslaught of new attack vectors! This is one of the presentations you don’t want to miss! Wayne will be demonstrating highly modified custom mobile deployable network hacking cyber weapons, such as Network BlackBoxs, Evil WiFi Honeypots, custom USB delivered payloads and finally how we can take these weapons to the sky autonomously using various custom build drones.
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
EC-Council
The year is 2015, there are a little over a billion websites online, they range in size, complexity and popularity and yet they all share a common denominator – the threat of a security incident. The past two years have been especially challenging for most businesses; this talk will provide a holistic overview of the challenges and threats website owners face. These insights will come from years of research and analysis, but more importantly from the experiences of 100’s of thousands of website owners like you. We will share the latest threats website owners face, but deliver them in a meaningful way that provides each attendee actionable take-aways. Lastly, the talk will place emphasis on the responsibility that each of us have as online stewards, to our brand, our users and the internet as a whole. The most effective toolset we have at our disposal is knowledge, and so this presentation focuses on education.
Navigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website Owners
Tony Perez
Year 7 slides for teaching about e-safety
Year 7 - Week 5 esafety
Year 7 - Week 5 esafety
teachesict
The Enemy On The Web
The Enemy On The Web
Bishan Singh
An introduction to WordPress Security
Passwords, Attacks, and Security oh my!
Passwords, Attacks, and Security oh my!
Michele Butcher-Jones
Content Management System Security. How to secure your CMS? Common rules: + Choose your CMS with both functionality and security in mind + Update with urgency + Use a strong password (admin dashboard access, database users, etc.) + Have a firewall in place (detect or prevent suspicious requests) + Keep track of the changes to your site and their source code + Give the user permissions (and their levels of access) a lot of thought + Limit the type of files to non-executables and monitor them closely + Backup your CMS (daily backups of your files and databases) + Uninstall plugins you do not use or trust.
Content Management System Security
Content Management System Security
Samvel Gevorgyan
On February 25, 2018, Shinagawa Japan Microsoft Windows Insider Meetup in Japan 3 English version
Mastering windows 10 (English version)
Mastering windows 10 (English version)
Takae Sakushima
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
Mohammed Adam
15 Minute presentation on Cloud Security. Includes classroom interactive quiz to encourage audience participation
Sept 2014 cloud security presentation
Sept 2014 cloud security presentation
Joan Dembowski
What's hot
(20)
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
Computer And Internet Security
Computer And Internet Security
Security for javascript
Security for javascript
Web security
Web security
Hacker halted2
Hacker halted2
Douglas Crockford - Ajax Security
Douglas Crockford - Ajax Security
Punto 16
Punto 16
Punto 16
Punto 16
Session hijacking by rahul tyagi
Session hijacking by rahul tyagi
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is Fucked
2011 Social Media Malware Trends
2011 Social Media Malware Trends
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Navigating Online Threats - Website Security for Everyday Website Owners
Navigating Online Threats - Website Security for Everyday Website Owners
Year 7 - Week 5 esafety
Year 7 - Week 5 esafety
The Enemy On The Web
The Enemy On The Web
Passwords, Attacks, and Security oh my!
Passwords, Attacks, and Security oh my!
Content Management System Security
Content Management System Security
Mastering windows 10 (English version)
Mastering windows 10 (English version)
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
Sept 2014 cloud security presentation
Sept 2014 cloud security presentation
Viewers also liked
One Click Ownage
One Click Ownage
Ferruh Mavituna
Web 2.0 uygulamalarinda goz ardi edilen guvenlik sorunlari.
Web 2.0 Guvenlik Trendleri
Web 2.0 Guvenlik Trendleri
Ferruh Mavituna
Getting a reverse shell from an SQL Injection with one request without using an extra channel such as TFTP, FTP to upload the initial payload.
One Click Ownage
One Click Ownage
Ferruh Mavituna
Flash Uygulamalarinda Guvenlik
Guvenli Flash Uygulamalari
Guvenli Flash Uygulamalari
Ferruh Mavituna
IstSec 2009' da SQL Injection üzerinden tek bir istek ile reverse shell almayı anlatan sunum.
5 Dakkada Beşiktaş
5 Dakkada Beşiktaş
Ferruh Mavituna
Attacking and Defending Flash Applications.
Flash Security
Flash Security
Ferruh Mavituna
Beşiktaş çarşi grubu
Beşiktaş çarşi grubu
efiliz
One click Ownage - OWASP AppSec DC 2009
One Click Ownage Ferruh Mavituna (3)
One Click Ownage Ferruh Mavituna (3)
Ferruh Mavituna
BEŞİKTAŞ SUNUMU
Beşi̇ktaş sunumu
Beşi̇ktaş sunumu
seydacagan
Viewers also liked
(9)
One Click Ownage
One Click Ownage
Web 2.0 Guvenlik Trendleri
Web 2.0 Guvenlik Trendleri
One Click Ownage
One Click Ownage
Guvenli Flash Uygulamalari
Guvenli Flash Uygulamalari
5 Dakkada Beşiktaş
5 Dakkada Beşiktaş
Flash Security
Flash Security
Beşiktaş çarşi grubu
Beşiktaş çarşi grubu
One Click Ownage Ferruh Mavituna (3)
One Click Ownage Ferruh Mavituna (3)
Beşi̇ktaş sunumu
Beşi̇ktaş sunumu
Similar to Insecure Trends in Web 2.0
This is a ppt from Null Meet Bhopal on News Bytes. It is till 10th sep 2016 by Jaskaran Narula.
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
Jaskaran Narula
Presentation presented at UC Davis conference June 2011 at a University of California wide Security Conference
Current Emerging Threats
Current Emerging Threats
dnomura
Social networks security risks
Social networks security risks
osuhaibany
Null Hyderabad, December meet's presentation
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
Raghunath G
A presentation I gave at the first b-sides Las Vegas security conference showing the security challenges we face going forward in the era of open-by-default social networking.
B-sides Las Vegas - social network security
B-sides Las Vegas - social network security
Damon Cortesi
This is a PPT of SOCIAL MEDIA THREATS AND THEIR PREVENTION. This is help full for learning. Thanks. Social media offers an outlet for people to connect, share life experiences, pictures and video. But too much sharing—or a lack of attention to impostors—can lead to a compromise of business and personal accounts. Attackers often use social media accounts during the reconnaissance phase of a social engineering or phishing attack. Social media can give attackers a platform to impersonate trusted people and brands or the information they need carry out additional attacks, including social engineering and phishing.
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
SurajGurushetti
Web 2.0 Presentation
Web 2.0 Presentation
xia_bofa
Computer Security Intro Course
CS155 Computer Security at Stanford University
CS155 Computer Security at Stanford University
Rick Patterson
Click or not_to_click-2019, Cyber Security Awareness Seminar organised by IDEB ICT & Innovation Division
Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )
Jobayer Almahmud Hossain (RHCA, RHCDS, RHCSS)
Online Safety, Security, Ethics and Etiquette
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Jesus Rances
In Social Zombies II: Your Friends Need More Brains, Tom Eston, Kevin Johnson and Robin Wood continue the Zombie invasion from "Social Zombies: Your Friends want to eat Your Brains" presented at DEFCON 17. This presentation will further examine the risks of social networks and then present new techniques and tools that can be used to exploit these issues. This presentation begins by discussing new twists on existing privacy concerns that are caused by the trust mass that is social networks. We use this privacy confusion to exploit members and their companies during our penetration tests. The presentation then discusses social network botnets and bot programs. Both the delivery of malware through social networks and the use of these social networks as command and control channels will be examined. Tom, Kevin and Robin next explore the use of browser-based bots and their delivery through custom social network applications and show new ways social network applications can be used for malware delivery. Finally, the information available through the social network APIs is explored using third-party applications designed for penetration testing. This allows for complete coverage of the targets and their information. This was presented at Shmoocon 2010 on February 6, 2010.
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Tom Eston
Security
Security Primer
Security Primer
Alison Gianotto
Η παρουσίαση αυτή έγινε στα πλαίσια του Συνεδρίου e-Business World 2013, το οποίο πραγματοποιήθηκε στις 19 Ιουνίου, στο Divani Caravel στην Αθήνα.
e-Business World 2013 - Βεντούρης Χρήστος: The Landscape of 2013 … Mind your ...
e-Business World 2013 - Βεντούρης Χρήστος: The Landscape of 2013 … Mind your ...
InfoCom Conferences
This is a presentation Bill gave at the May 2009 NAISG meeting on the security dangers of such social networking entities as Facebook, LinkedIn and Twitter.
Security Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
Keynote presentation held at ICT Expo conference in Helsinki 20.3.2013.
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
khalavak
Ethical Hacking, Cyber Security and Indian Cyber Law
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber Security
Neeraj Negi
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
By Dominik Wojcik and Andre Alpar - A presentation about blackhat and craphat SEO and affiliate techniques and some indications for possible defence strategies
Black Hat Protection - SEO Campixx 2011
Black Hat Protection - SEO Campixx 2011
Andre Alpar
Materi ini berisi tentang sistem keamanan teknologi informasi.
Trend keamanan komputer 2012
Trend keamanan komputer 2012
Ayu Anita
Thane Barnier presenting at the 2016 MACE Annual Conference
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
Jeff Zahn
Similar to Insecure Trends in Web 2.0
(20)
News Bytes by Jaskaran Narula - Null Meet Bhopal
News Bytes by Jaskaran Narula - Null Meet Bhopal
Current Emerging Threats
Current Emerging Threats
Social networks security risks
Social networks security risks
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
B-sides Las Vegas - social network security
B-sides Las Vegas - social network security
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
Web 2.0 Presentation
Web 2.0 Presentation
CS155 Computer Security at Stanford University
CS155 Computer Security at Stanford University
Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
Security Primer
Security Primer
e-Business World 2013 - Βεντούρης Χρήστος: The Landscape of 2013 … Mind your ...
e-Business World 2013 - Βεντούρης Χρήστος: The Landscape of 2013 … Mind your ...
Security Dangers of Social Networking
Security Dangers of Social Networking
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber Security
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
Black Hat Protection - SEO Campixx 2011
Black Hat Protection - SEO Campixx 2011
Trend keamanan komputer 2012
Trend keamanan komputer 2012
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
Recently uploaded
In this talk, we are going to cover the use-case of food image generation at Delivery Hero, its impact and the challenges. In particular, we will present our image scoring solution for filtering out inappropriate images and elaborate on the models we are using.
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Modernizing Securities Finance: The cloud-native prime brokerage platform transforming capital markets. Madhu Subbu, Managing Director, Head of Securities Finance Engineering Apidays Singapore 2024: Connecting Customers, Business and Technology (April 17 & 18, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Three things you will take away from the session: • How to run an effective tenant-to-tenant migration • Best practices for before, during, and after migration • Tips for using migration as a springboard to prepare for Copilot in Microsoft 365 Main ideas: Migration Overview: The presentation covers the current reality of cross-tenant migrations, the triggers, phases, best practices, and benefits of a successful tenant migration Considerations: When considering a migration, it is important to consider the migration scope, performance, customization, flexibility, user-friendly interface, automation, monitoring, support, training, scalability, data integrity, data security, cost, and licensing structure Next Wave: The next wave of change includes the launch of Copilot, which requires businesses to be prepared for upcoming changes related to Copilot and the cloud, and to consolidate data and tighten governance ShareGate: ShareGate can help with pre-migration analysis, configurable migration tool, and automated, end-user driven collaborative governance
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Abhishek Deb(1), Mr Abdul Kalam(2) M. Des (UX) , School of Design, DIT University , Dehradun. This paper explores the future potential of AI-enabled smartphone processors, aiming to investigate the advancements, capabilities, and implications of integrating artificial intelligence (AI) into smartphone technology. The research study goals consist of evaluating the development of AI in mobile phone processors, analyzing the existing state as well as abilities of AI-enabled cpus determining future patterns as well as chances together with reviewing obstacles as well as factors to consider for more growth.
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
In this session, we will delve into strategic approaches for optimizing knowledge management within Microsoft 365, amidst the evolving landscape of Copilot. From leveraging automatic metadata classification and permission governance with SharePoint Premium, to unlocking Viva Engage for the cultivation of knowledge and communities, you will gain actionable insights to bolster your organization's knowledge-sharing initiatives. In this session, we will also explore how to facilitate solutions to enable your employees to find answers and expertise within Microsoft 365. You will leave equipped with practical techniques and a deeper understanding of how there is more to effective knowledge management than just enabling Copilot, but building actual solutions to prepare the knowledge that Copilot and your employees can use.
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows. We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases. This video focuses on the deployment of external web forms using Jotform for Bonterra Impact Management. This solution can be customized to your organization’s needs and deployed to support the common use cases below: - Intake and consent - Assessments - Surveys - Applications - Program registration Interested in deploying web form automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Presented by Mike Hicks
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving. A report by Poten & Partners as part of the Hydrogen Asia 2024 Summit in Singapore. Copyright Poten & Partners 2024.
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Join our latest Connector Corner webinar to discover how UiPath Integration Service revolutionizes API-centric automation in a 'Quote to Cash' process—and how that automation empowers businesses to accelerate revenue generation. A comprehensive demo will explore connecting systems, GenAI, and people, through powerful pre-built connectors designed to speed process cycle times. Speakers: James Dickson, Senior Software Engineer Charlie Greenberg, Host, Product Marketing Manager
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Scaling API-first – The story of a global engineering organization Ian Reasor, Senior Computer Scientist - Adobe Radu Cotescu, Senior Computer Scientist - Adobe Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Following the popularity of "Cloud Revolution: Exploring the New Wave of Serverless Spatial Data," we're thrilled to announce this much-anticipated encore webinar. In this sequel, we'll dive deeper into the Cloud-Native realm by uncovering practical applications and FME support for these new formats, including COGs, COPC, FlatGeoBuf, GeoParquet, STAC, and ZARR. Building on the foundation laid by industry leaders Michelle Roby of Radiant Earth and Chris Holmes of Planet in the first webinar, this second part offers an in-depth look at the real-world application and behind-the-scenes dynamics of these cutting-edge formats. We will spotlight specific use-cases and workflows, showcasing their efficiency and relevance in practical scenarios. Discover the vast possibilities each format holds, highlighted through detailed discussions and demonstrations. Our expert speakers will dissect the key aspects and provide critical takeaways for effective use, ensuring attendees leave with a thorough understanding of how to apply these formats in their own projects. Elevate your understanding of how FME supports these cutting-edge technologies, enhancing your ability to manage, share, and analyze spatial data. Whether you're building on knowledge from our initial session or are new to the serverless spatial data landscape, this webinar is your gateway to mastering cloud-native formats in your workflows.
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
We present an architecture of embedding models, vector databases, LLMs, and narrow ML for tracking global news narratives across a variety of countries/languages/news sources. As an example, we explore the real-time application of this architecture for tracking the news narrative surrounding the death of Russian opposition leader Alexei Navalny coming from Russian, French, and English sources.
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
Presentation on the progress in the Domino Container community project as delivered at the Engage 2024 conference
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
The value of a flexible API Management solution for Open Banking Steve Melan, Manager for IT Innovation and Architecture - State's and Saving's Bank of Luxembourg Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
💉💊+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI}}+971581248768 +971581248768 Mtp-Kit (500MG) Prices » Dubai [(+971581248768**)] Abortion Pills For Sale In Dubai, UAE, Mifepristone and Misoprostol Tablets Available In Dubai, UAE CONTACT DR.Maya Whatsapp +971581248768 We Have Abortion Pills / Cytotec Tablets /Mifegest Kit Available in Dubai, Sharjah, Abudhabi, Ajman, Alain, Fujairah, Ras Al Khaimah, Umm Al Quwain, UAE, Buy cytotec in Dubai +971581248768''''Abortion Pills near me DUBAI | ABU DHABI|UAE. Price of Misoprostol, Cytotec” +971581248768' Dr.DEEM ''BUY ABORTION PILLS MIFEGEST KIT, MISOPROTONE, CYTOTEC PILLS IN DUBAI, ABU DHABI,UAE'' Contact me now via What's App…… abortion Pills Cytotec also available Oman Qatar Doha Saudi Arabia Bahrain Above all, Cytotec Abortion Pills are Available In Dubai / UAE, you will be very happy to do abortion in Dubai we are providing cytotec 200mg abortion pill in Dubai, UAE. Medication abortion offers an alternative to Surgical Abortion for women in the early weeks of pregnancy. We only offer abortion pills from 1 week-6 Months. We then advise you to use surgery if its beyond 6 months. Our Abu Dhabi, Ajman, Al Ain, Dubai, Fujairah, Ras Al Khaimah (RAK), Sharjah, Umm Al Quwain (UAQ) United Arab Emirates Abortion Clinic provides the safest and most advanced techniques for providing non-surgical, medical and surgical abortion methods for early through late second trimester, including the Abortion By Pill Procedure (RU 486, Mifeprex, Mifepristone, early options French Abortion Pill), Tamoxifen, Methotrexate and Cytotec (Misoprostol). The Abu Dhabi, United Arab Emirates Abortion Clinic performs Same Day Abortion Procedure using medications that are taken on the first day of the office visit and will cause the abortion to occur generally within 4 to 6 hours (as early as 30 minutes) for patients who are 3 to 12 weeks pregnant. When Mifepristone and Misoprostol are used, 50% of patients complete in 4 to 6 hours; 75% to 80% in 12 hours; and 90% in 24 hours. We use a regimen that allows for completion without the need for surgery 99% of the time. All advanced second trimester and late term pregnancies at our Tampa clinic (17 to 24 weeks or greater) can be completed within 24 hours or less 99% of the time without the need surgery. The procedure is completed with minimal to no complications. Our Women's Health Center located in Abu Dhabi, United Arab Emirates, uses the latest medications for medical abortions (RU-486, Mifeprex, Mifegyne, Mifepristone, early options French abortion pill), Methotrexate and Cytotec (Misoprostol). The safety standards of our Abu Dhabi, United Arab Emirates Abortion Doctors remain unparalleled. They consistently maintain the lowest complication rates throughout the nation. Our Physicians and staff are always available to answer questions and care for women in one of the most difficult times in their lives. The decision to have an abortion at the Abortion Cl
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Presentation from Melissa Klemke from her talk at Product Anonymous in April 2024
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Stay safe, grab a drink and join us virtually for our upcoming "GenAI Risks & Security" Meetup to hear about how to uncover critical GenAI risks and vulnerabilities, AI security considerations in every company, and how a CISO should navigate through GenAI Risks.
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Copy of the slides presented by Matt Robison to the SFWelly Salesforce user group community on May 2 2024. The audience was truly international with attendees from at least 4 different countries joining online. Matt is an expert in data cloud and this was a brilliant session.
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
This presentations targets students or working professionals. You may know Google for search, YouTube, Android, Chrome, and Gmail, but did you know Google has many developer tools, platforms & APIs? This comprehensive yet still high-level overview outlines the most impactful tools for where to run your code, store & analyze your data. It will also inspire you as to what's possible. This talk is 50 minutes in length.
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Recently uploaded
(20)
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Insecure Trends in Web 2.0
1.
Insecure Trends in
Web 2.0 Applications
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
Thanks ...
Download now