SlideShare une entreprise Scribd logo
1  sur  46
What Shazam doesn't want you to know ,[object Object]
[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object]
Let it listen for +/- 20 seconds.
It tells you: ,[object Object],[object Object],[object Object]
[object Object]
[object Object],private  AudioFormat getFormat() {   float  sampleRate = 44100;   int  sampleSizeInBits = 8;   int  channels = 1;   boolean  signed =  true ;   boolean  bigEndian =  true ; return   new  AudioFormat( sampleRate, sampleSizeInBits, channels, signed,  bigEndian); } ,[object Object],[object Object],[object Object]
[object Object],final  AudioFormat format = getFormat();  DataLine.Info info =  new  DataLine.Info(TargetDataLine. class , format); final  TargetDataLine line =    (TargetDataLine) AudioSystem. getLine (info); line.open(format); line.start(); ,[object Object],[object Object],[object Object]
[object Object],out  =  new  ByteArrayOutputStream(); running  =  true ; try  {   while  ( running ) {   int  count = line.read( buffer , 0,  buffer . length );   if  (count > 0) {   out .write( buffer , 0, count);   }   }   out .close(); }  catch  (IOException e) {   throw new RuntimeException(e); } ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object]
The amount of cycles per second
i.e. one sine wave. ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],byte  audio[] =  out .toByteArray(); final int  amountSlices = audio. length / SLICE_SIZE ; Complex[][] results =  new  Complex[amountChucks][]; for ( int  slice = 0;slice < amountSlices; slice++) {   Complex[] complex =  new  Complex[ SLICE_SIZE ];   for ( int  i = 0;i< SLICE_SIZE ;i++) {   complex[i] =  new  Complex(audio[(slice* SLICE_SIZE )+i], 0);   }   results[slice] = FFT. fft (complex); } ,[object Object],[object Object],[object Object]
[object Object],Spectum Analyzer A spectrum analyzer or spectral analyzer is a device used to examine the  spectral composition  of some electrical,  acoustic , or optical  waveform. ,[object Object],[object Object],[object Object]
Demo:  Aphex Twin
[object Object]
[object Object]
34 41 92 129 186
39 41 117 130 218
40 42 106 129 191
40 47 117 121 217
40 53 81 129 208
40 48 109 132 260
39 45 89 135 247
40 42 84 125 251
40 41 81 121 232
38 42 113 131 245 (etc...) ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],public   void  harvest(File rootDirectory) {   String[] itemsInDirectory = rootDirectory.list();     for (String itemInDirectory:itemsInDirectory) {   if (itemInDirectory.endsWith( &quot;.mp3&quot; )) {   //Assume mp3 file   File mp3File =  new  File(mp3Directory, itemInDirectory);   captureAudio(mp3File);   }  else   if ( new  File(mp3Directory, itemInDirectory).isDirectory()) {   //Directory? Recurse!   harvest( new  File(mp3Directory, itemInDirectory));   }   } } ,[object Object],[object Object],[object Object]
[object Object],[object Object]

Contenu connexe

Tendances

Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationOlehLevytskyi1
 
Introduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse EngineeringIntroduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse Engineeringintertelinvestigations
 
Practical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgPractical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgSam Bowne
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking pptHarsh Kevadia
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingAmine SAIGHI
 
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixCloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixMITRE ATT&CK
 
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...Amazon Web Services
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li Inmhaviv
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introductionMostafa Abdel-sallam
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 
Ransomware Resistance
Ransomware ResistanceRansomware Resistance
Ransomware ResistanceFlorian Roth
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)Marco Balduzzi
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learningSecurity Bootcamp
 

Tendances (20)

Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
Introduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse EngineeringIntroduction to Malware Detection and Reverse Engineering
Introduction to Malware Detection and Reverse Engineering
 
Practical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbgPractical Malware Analysis: Ch 9: OllyDbg
Practical Malware Analysis: Ch 9: OllyDbg
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Rootkit
RootkitRootkit
Rootkit
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
 
TỰ HỌC LPI 2
TỰ HỌC LPI 2TỰ HỌC LPI 2
TỰ HỌC LPI 2
 
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixCloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK Matrix
 
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 
01 Metasploit kung fu introduction
01 Metasploit kung fu introduction01 Metasploit kung fu introduction
01 Metasploit kung fu introduction
 
Pentest with Metasploit
Pentest with MetasploitPentest with Metasploit
Pentest with Metasploit
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
Ransomware Resistance
Ransomware ResistanceRansomware Resistance
Ransomware Resistance
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 

En vedette

Supply Chain It Convergence MBA talk
Supply Chain It Convergence MBA talkSupply Chain It Convergence MBA talk
Supply Chain It Convergence MBA talkArpad Hevizi
 
Green Economy and Timber Value Chains
Green Economy and Timber Value ChainsGreen Economy and Timber Value Chains
Green Economy and Timber Value ChainsCIFOR-ICRAF
 
The Great Awakening
The Great AwakeningThe Great Awakening
The Great AwakeningTom Richey
 
Presentacion entornos
Presentacion entornosPresentacion entornos
Presentacion entornosMilena2424
 
Права_споживачів_комунальних_послуг
Права_споживачів_комунальних_послугПрава_споживачів_комунальних_послуг
Права_споживачів_комунальних_послугVitalij Misjats
 
Become a Formula Ninja
Become a Formula NinjaBecome a Formula Ninja
Become a Formula NinjaConfigero
 
Wuletawu Abera Ph.D. defense
Wuletawu Abera Ph.D. defenseWuletawu Abera Ph.D. defense
Wuletawu Abera Ph.D. defenseRiccardo Rigon
 
Evaluation question 1 - Jemima Chamberlin
Evaluation question 1 - Jemima ChamberlinEvaluation question 1 - Jemima Chamberlin
Evaluation question 1 - Jemima Chamberlinlongroadmedia14
 
テストプラン
テストプランテストプラン
テストプランstucon
 
3 d pie chart circular puzzle with hole in center process 9 stages style 1 po...
3 d pie chart circular puzzle with hole in center process 9 stages style 1 po...3 d pie chart circular puzzle with hole in center process 9 stages style 1 po...
3 d pie chart circular puzzle with hole in center process 9 stages style 1 po...SlideTeam.net
 
Sistema de Liquidación Directa Cret@
Sistema de Liquidación Directa Cret@Sistema de Liquidación Directa Cret@
Sistema de Liquidación Directa Cret@Grup Pitagora
 
Social Enterprise Comes to Life with Integration
Social Enterprise Comes to Life with IntegrationSocial Enterprise Comes to Life with Integration
Social Enterprise Comes to Life with IntegrationConfigero
 
Средство индивидуального перемещения "СИП-С"
Средство индивидуального перемещения "СИП-С"Средство индивидуального перемещения "СИП-С"
Средство индивидуального перемещения "СИП-С"kulibin
 
HOW TO SET-UP A FREE BLOG USING BLOGGER TO PROMOTE YOUR BOOKS AND BRAND YOURSELF
HOW TO SET-UP A FREE BLOG USING BLOGGER TO PROMOTE YOUR BOOKS AND BRAND YOURSELFHOW TO SET-UP A FREE BLOG USING BLOGGER TO PROMOTE YOUR BOOKS AND BRAND YOURSELF
HOW TO SET-UP A FREE BLOG USING BLOGGER TO PROMOTE YOUR BOOKS AND BRAND YOURSELFzion thompson
 
July 12, 2016 Webcast for the Management of Technology MS at NYU Tandon Online
July 12, 2016 Webcast for the Management of Technology MS at NYU Tandon OnlineJuly 12, 2016 Webcast for the Management of Technology MS at NYU Tandon Online
July 12, 2016 Webcast for the Management of Technology MS at NYU Tandon OnlineNYU Tandon Online
 
British Galleries 2002
British Galleries 2002British Galleries 2002
British Galleries 2002James Jensen
 
Mind-mapping for Developers
Mind-mapping for DevelopersMind-mapping for Developers
Mind-mapping for DevelopersRey Mayson
 

En vedette (20)

Supply Chain It Convergence MBA talk
Supply Chain It Convergence MBA talkSupply Chain It Convergence MBA talk
Supply Chain It Convergence MBA talk
 
Green Economy and Timber Value Chains
Green Economy and Timber Value ChainsGreen Economy and Timber Value Chains
Green Economy and Timber Value Chains
 
A value-chain approach - Forest-based Sector Technology Platform FTP
A value-chain approach - Forest-based Sector Technology Platform FTPA value-chain approach - Forest-based Sector Technology Platform FTP
A value-chain approach - Forest-based Sector Technology Platform FTP
 
The Great Awakening
The Great AwakeningThe Great Awakening
The Great Awakening
 
Presentacion entornos
Presentacion entornosPresentacion entornos
Presentacion entornos
 
3º básico a semana 02 al 06 mayo
3º básico a  semana 02  al 06 mayo3º básico a  semana 02  al 06 mayo
3º básico a semana 02 al 06 mayo
 
Права_споживачів_комунальних_послуг
Права_споживачів_комунальних_послугПрава_споживачів_комунальних_послуг
Права_споживачів_комунальних_послуг
 
Become a Formula Ninja
Become a Formula NinjaBecome a Formula Ninja
Become a Formula Ninja
 
Wuletawu Abera Ph.D. defense
Wuletawu Abera Ph.D. defenseWuletawu Abera Ph.D. defense
Wuletawu Abera Ph.D. defense
 
Evaluation question 1 - Jemima Chamberlin
Evaluation question 1 - Jemima ChamberlinEvaluation question 1 - Jemima Chamberlin
Evaluation question 1 - Jemima Chamberlin
 
テストプラン
テストプランテストプラン
テストプラン
 
3 d pie chart circular puzzle with hole in center process 9 stages style 1 po...
3 d pie chart circular puzzle with hole in center process 9 stages style 1 po...3 d pie chart circular puzzle with hole in center process 9 stages style 1 po...
3 d pie chart circular puzzle with hole in center process 9 stages style 1 po...
 
Sistema de Liquidación Directa Cret@
Sistema de Liquidación Directa Cret@Sistema de Liquidación Directa Cret@
Sistema de Liquidación Directa Cret@
 
Social Enterprise Comes to Life with Integration
Social Enterprise Comes to Life with IntegrationSocial Enterprise Comes to Life with Integration
Social Enterprise Comes to Life with Integration
 
Средство индивидуального перемещения "СИП-С"
Средство индивидуального перемещения "СИП-С"Средство индивидуального перемещения "СИП-С"
Средство индивидуального перемещения "СИП-С"
 
How to wear a hard hat
How to wear a hard hatHow to wear a hard hat
How to wear a hard hat
 
HOW TO SET-UP A FREE BLOG USING BLOGGER TO PROMOTE YOUR BOOKS AND BRAND YOURSELF
HOW TO SET-UP A FREE BLOG USING BLOGGER TO PROMOTE YOUR BOOKS AND BRAND YOURSELFHOW TO SET-UP A FREE BLOG USING BLOGGER TO PROMOTE YOUR BOOKS AND BRAND YOURSELF
HOW TO SET-UP A FREE BLOG USING BLOGGER TO PROMOTE YOUR BOOKS AND BRAND YOURSELF
 
July 12, 2016 Webcast for the Management of Technology MS at NYU Tandon Online
July 12, 2016 Webcast for the Management of Technology MS at NYU Tandon OnlineJuly 12, 2016 Webcast for the Management of Technology MS at NYU Tandon Online
July 12, 2016 Webcast for the Management of Technology MS at NYU Tandon Online
 
British Galleries 2002
British Galleries 2002British Galleries 2002
British Galleries 2002
 
Mind-mapping for Developers
Mind-mapping for DevelopersMind-mapping for Developers
Mind-mapping for Developers
 

Similaire à What Shazam doesn't want you to know

Nerd sniping myself into a rabbit hole... Streaming online audio to a Sonos s...
Nerd sniping myself into a rabbit hole... Streaming online audio to a Sonos s...Nerd sniping myself into a rabbit hole... Streaming online audio to a Sonos s...
Nerd sniping myself into a rabbit hole... Streaming online audio to a Sonos s...Maarten Balliauw
 
Automatic subtitle generation
Automatic subtitle generationAutomatic subtitle generation
Automatic subtitle generationtanyasaxena1611
 
Deep dive into Android’s audio latency problem
Deep dive into Android’s audio latency problemDeep dive into Android’s audio latency problem
Deep dive into Android’s audio latency problemSirawat Pitaksarit
 
Audio Fingerprinting Introduction
Audio Fingerprinting IntroductionAudio Fingerprinting Introduction
Audio Fingerprinting IntroductionVikesh Khanna
 
Digital signal processing through speech, hearing, and Python
Digital signal processing through speech, hearing, and PythonDigital signal processing through speech, hearing, and Python
Digital signal processing through speech, hearing, and PythonMel Chua
 
A CTF Hackers Toolbox
A CTF Hackers ToolboxA CTF Hackers Toolbox
A CTF Hackers ToolboxStefan
 
The method of comparing two audio files
The method of comparing two audio filesThe method of comparing two audio files
The method of comparing two audio filesMinh Anh Nguyen
 
Sound recording glossary updated
Sound recording glossary updated Sound recording glossary updated
Sound recording glossary updated TomCrook
 
The method of comparing two audio files
The method of comparing two audio filesThe method of comparing two audio files
The method of comparing two audio filesMinh Anh Nguyen
 
Enhancing Free PBX with Adhearsion at Fosdem 2012
Enhancing Free PBX with Adhearsion at Fosdem 2012Enhancing Free PBX with Adhearsion at Fosdem 2012
Enhancing Free PBX with Adhearsion at Fosdem 2012Luca Pradovera
 
Sound recording glossary tom crook
Sound recording glossary tom crookSound recording glossary tom crook
Sound recording glossary tom crookTomCrook
 
gegerageSound recording glossary tom crook
gegerageSound recording glossary tom crookgegerageSound recording glossary tom crook
gegerageSound recording glossary tom crookTomCrook
 
Fourier project presentation
Fourier project  presentationFourier project  presentation
Fourier project presentation志璿 楊
 
Digital speech within 125 hz bandwidth (DS-125)
Digital speech within 125 hz bandwidth (DS-125)Digital speech within 125 hz bandwidth (DS-125)
Digital speech within 125 hz bandwidth (DS-125)Michael Lebo
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheetLuke Summers
 

Similaire à What Shazam doesn't want you to know (20)

Nerd sniping myself into a rabbit hole... Streaming online audio to a Sonos s...
Nerd sniping myself into a rabbit hole... Streaming online audio to a Sonos s...Nerd sniping myself into a rabbit hole... Streaming online audio to a Sonos s...
Nerd sniping myself into a rabbit hole... Streaming online audio to a Sonos s...
 
Automatic subtitle generation
Automatic subtitle generationAutomatic subtitle generation
Automatic subtitle generation
 
Deep dive into Android’s audio latency problem
Deep dive into Android’s audio latency problemDeep dive into Android’s audio latency problem
Deep dive into Android’s audio latency problem
 
Audio Fingerprinting Introduction
Audio Fingerprinting IntroductionAudio Fingerprinting Introduction
Audio Fingerprinting Introduction
 
Digital signal processing through speech, hearing, and Python
Digital signal processing through speech, hearing, and PythonDigital signal processing through speech, hearing, and Python
Digital signal processing through speech, hearing, and Python
 
Music as data
Music as dataMusic as data
Music as data
 
A CTF Hackers Toolbox
A CTF Hackers ToolboxA CTF Hackers Toolbox
A CTF Hackers Toolbox
 
The method of comparing two audio files
The method of comparing two audio filesThe method of comparing two audio files
The method of comparing two audio files
 
Sound recording glossary updated
Sound recording glossary updated Sound recording glossary updated
Sound recording glossary updated
 
The method of comparing two audio files
The method of comparing two audio filesThe method of comparing two audio files
The method of comparing two audio files
 
Enhancing Free PBX with Adhearsion at Fosdem 2012
Enhancing Free PBX with Adhearsion at Fosdem 2012Enhancing Free PBX with Adhearsion at Fosdem 2012
Enhancing Free PBX with Adhearsion at Fosdem 2012
 
Sound recording glossary tom crook
Sound recording glossary tom crookSound recording glossary tom crook
Sound recording glossary tom crook
 
gegerageSound recording glossary tom crook
gegerageSound recording glossary tom crookgegerageSound recording glossary tom crook
gegerageSound recording glossary tom crook
 
Fourier project presentation
Fourier project  presentationFourier project  presentation
Fourier project presentation
 
Digital speech within 125 hz bandwidth (DS-125)
Digital speech within 125 hz bandwidth (DS-125)Digital speech within 125 hz bandwidth (DS-125)
Digital speech within 125 hz bandwidth (DS-125)
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheet
 
Ig2 task 1 re edit version
Ig2 task 1 re edit versionIg2 task 1 re edit version
Ig2 task 1 re edit version
 
Otto AI
Otto AIOtto AI
Otto AI
 
Ig2 task 1 work sheet
Ig2 task 1 work sheetIg2 task 1 work sheet
Ig2 task 1 work sheet
 
IG1 Task 1
IG1 Task 1IG1 Task 1
IG1 Task 1
 

Dernier

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 

Dernier (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 

What Shazam doesn't want you to know