SlideShare une entreprise Scribd logo
1  sur  27
Cookies and more...




                      By,
                      Vinay Shriyan
It all started from a ...




             ...shopping cart at Netscape
Wikipedia says...




                 ...a cookie is used for an origin
website to send state information to a user's
browser and for the browser to return the state
information to the origin site
Typical flow

             Go to URL


            Read Cookie


                          Yes
              Is Cookie         Write new Cookie
    No         Empty?



 Use Cookie info




Update Cookie info
Unique Cookies


                             47,908
    382,576


13,489        12,246                     11,219




   10,580         9,895                  4,372

                          Source: Feb 2012 statistics by cookielaw.org
Cookies is used by 49.7% of all the websites.
Cookies cannot...
Automatically access to personal information

Read or write data to hard disk

Read or write information in cookies placed by
 other sites

Run programs on your computer
Cookies can...

Store any information you explicitly provide to a
site



Track your interaction with parent site such as
  pages visited, time of visits, number of visits
Max 4Kb in size




                                            3 imp Attributes: Name,Value,Expiry




300 cookies per browser
Cookies are used for...
User Tracking                     Session Management




                Personalization
Ad server




            Web server
Social widgets are
collaborative but act as homing
devices for online advertisers...
Facebook Case study




I window shop at
Yes I Love
Audience profiling


It knows who you are

        +              =   Better Targeting

  What you like
It knows you, before you even login...
Cookies and UK
  26th May 2011, the Cookie law


  Obtain informed consent from visitors




82% of digital marketers think the EU cookie law is bad for the web
                                                - eConsultancy.com
The ICO case




           “Websites face £500k fine for
           breaching ‘cookie’ law“
Cookies and Privacy
Opt-out of targeting
Opt-out of targeting
RTB – Ecosystem, remember?
What about Chitika??
Thank you...

Contenu connexe

Tendances

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Introduction to Ethics and Social Media Powerpoint 22.10.14
Introduction to Ethics and Social Media Powerpoint 22.10.14Introduction to Ethics and Social Media Powerpoint 22.10.14
Introduction to Ethics and Social Media Powerpoint 22.10.14Jessica Stokes
 
Social Media Presentation
Social Media PresentationSocial Media Presentation
Social Media PresentationDakota Byard
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)Ritesh Gupta
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Types of websites
Types of websites Types of websites
Types of websites Faiz Ahmed
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
The dark web
The dark webThe dark web
The dark webBella M
 
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...Clarisse Anne Jose
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Role Of Social Media In Our Personal Life
Role Of Social Media In Our Personal LifeRole Of Social Media In Our Personal Life
Role Of Social Media In Our Personal LifeYogesh Mahar
 

Tendances (20)

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Introduction to Ethics and Social Media Powerpoint 22.10.14
Introduction to Ethics and Social Media Powerpoint 22.10.14Introduction to Ethics and Social Media Powerpoint 22.10.14
Introduction to Ethics and Social Media Powerpoint 22.10.14
 
Social Media Presentation
Social Media PresentationSocial Media Presentation
Social Media Presentation
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Black hat hackers
Black hat hackersBlack hat hackers
Black hat hackers
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Types of websites
Types of websites Types of websites
Types of websites
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
The dark web
The dark webThe dark web
The dark web
 
E-Publishing
E-Publishing E-Publishing
E-Publishing
 
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
The Power of Media Communication and Social Networks (Stand-alone PowerPoint ...
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Social media
Social mediaSocial media
Social media
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Role Of Social Media In Our Personal Life
Role Of Social Media In Our Personal LifeRole Of Social Media In Our Personal Life
Role Of Social Media In Our Personal Life
 

En vedette

Google Adwords - Marketing Analysis
Google Adwords - Marketing AnalysisGoogle Adwords - Marketing Analysis
Google Adwords - Marketing AnalysisAniket Kalaskar
 
Amazon hidden empire
Amazon hidden empireAmazon hidden empire
Amazon hidden empirejuthanik
 
Introduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the PixelIntroduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the PixelWishpond
 
Online_Offline_infographic
Online_Offline_infographicOnline_Offline_infographic
Online_Offline_infographicJohn Haake
 
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...Unified
 
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...Intracto digital agency
 
Knowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertisingKnowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertisingLode Lauwers
 
The Cookie--Digital Story
The Cookie--Digital StoryThe Cookie--Digital Story
The Cookie--Digital StoryRob Jacklin
 
UK Cookie Law Compliance: Implications & Answers
 UK Cookie Law Compliance: Implications & Answers  UK Cookie Law Compliance: Implications & Answers
UK Cookie Law Compliance: Implications & Answers Ensighten
 
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...Invest Northern Ireland
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party CookiesWill Clayton
 
LUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Partners
 
The History of Advertising Technology
The History of Advertising TechnologyThe History of Advertising Technology
The History of Advertising TechnologyClearcode
 

En vedette (16)

Google Adwords - Marketing Analysis
Google Adwords - Marketing AnalysisGoogle Adwords - Marketing Analysis
Google Adwords - Marketing Analysis
 
Amazon hidden empire
Amazon hidden empireAmazon hidden empire
Amazon hidden empire
 
Introduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the PixelIntroduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the Pixel
 
Online_Offline_infographic
Online_Offline_infographicOnline_Offline_infographic
Online_Offline_infographic
 
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
 
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
 
MMA Forum D2 Track 04 - Privacidade
MMA Forum D2 Track 04 - PrivacidadeMMA Forum D2 Track 04 - Privacidade
MMA Forum D2 Track 04 - Privacidade
 
Knowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertisingKnowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertising
 
The Cookie--Digital Story
The Cookie--Digital StoryThe Cookie--Digital Story
The Cookie--Digital Story
 
UK Cookie Law Compliance: Implications & Answers
 UK Cookie Law Compliance: Implications & Answers  UK Cookie Law Compliance: Implications & Answers
UK Cookie Law Compliance: Implications & Answers
 
WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?
 
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party Cookies
 
LUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the People
 
What is Retargeting?
What is Retargeting?What is Retargeting?
What is Retargeting?
 
The History of Advertising Technology
The History of Advertising TechnologyThe History of Advertising Technology
The History of Advertising Technology
 

Similaire à Cookies (in Online Advertising)

Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 EricZhuZhengyi
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakePiwik PRO
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to knowCrafted
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanismJivan Nepali
 
Cookies in php lecture 1
Cookies in php lecture 1Cookies in php lecture 1
Cookies in php lecture 1Mudasir Syed
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]yvonneschnurr
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentationNilu Desai
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessionsSukrit Gupta
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxMIsmail73
 
Cookie Policy Verfication Framework
Cookie Policy Verfication FrameworkCookie Policy Verfication Framework
Cookie Policy Verfication Frameworksitemorse
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookiesSimilarweb
 
What are cookies and what is changing
What are cookies and what is changingWhat are cookies and what is changing
What are cookies and what is changingDCRB
 
Cookies and its threats.pptx
Cookies and its threats.pptxCookies and its threats.pptx
Cookies and its threats.pptxatharvbaghel4444
 

Similaire à Cookies (in Online Advertising) (20)

Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
 
Cookies
CookiesCookies
Cookies
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to know
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanism
 
Cookies in php lecture 1
Cookies in php lecture 1Cookies in php lecture 1
Cookies in php lecture 1
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessions
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 
Cookies
CookiesCookies
Cookies
 
Cookie Policy Verfication Framework
Cookie Policy Verfication FrameworkCookie Policy Verfication Framework
Cookie Policy Verfication Framework
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookies
 
What are cookies and what is changing
What are cookies and what is changingWhat are cookies and what is changing
What are cookies and what is changing
 
Cookie management
Cookie managementCookie management
Cookie management
 
Cookies and its threats.pptx
Cookies and its threats.pptxCookies and its threats.pptx
Cookies and its threats.pptx
 

Plus de Vinay Shriyan, Certified ScrumMaster® (CSM)

Plus de Vinay Shriyan, Certified ScrumMaster® (CSM) (17)

How to sell anything to anybody - Joe Girard
How to sell anything to anybody - Joe GirardHow to sell anything to anybody - Joe Girard
How to sell anything to anybody - Joe Girard
 
Biography of a giant - Amazon.com
Biography of a giant - Amazon.comBiography of a giant - Amazon.com
Biography of a giant - Amazon.com
 
Giving Feedbacks (Management)
Giving Feedbacks (Management)Giving Feedbacks (Management)
Giving Feedbacks (Management)
 
HNI Selling - The Rolls Royce Case
HNI Selling  - The Rolls Royce CaseHNI Selling  - The Rolls Royce Case
HNI Selling - The Rolls Royce Case
 
Google Ad - Parisian Love
Google Ad - Parisian LoveGoogle Ad - Parisian Love
Google Ad - Parisian Love
 
Brand management Apple inc.
Brand management Apple inc.Brand management Apple inc.
Brand management Apple inc.
 
Brand management ICICI Bank
Brand management ICICI BankBrand management ICICI Bank
Brand management ICICI Bank
 
MIS and BPO (Avaya's solution)
MIS and BPO (Avaya's solution)MIS and BPO (Avaya's solution)
MIS and BPO (Avaya's solution)
 
Personality not included (Book concise)
Personality not included (Book concise)Personality not included (Book concise)
Personality not included (Book concise)
 
Personality not included (Book concise)
Personality not included (Book concise)Personality not included (Book concise)
Personality not included (Book concise)
 
Environment reporting (Starbucks case)
Environment reporting (Starbucks case)Environment reporting (Starbucks case)
Environment reporting (Starbucks case)
 
Snowball Sampling Using Social Networks to Research Non heterosexual Women
Snowball Sampling Using Social Networks to Research Non heterosexual WomenSnowball Sampling Using Social Networks to Research Non heterosexual Women
Snowball Sampling Using Social Networks to Research Non heterosexual Women
 
Environment ethics (brief)
Environment ethics (brief)Environment ethics (brief)
Environment ethics (brief)
 
Making a business(or any other ) presentation worth it
Making a business(or any other ) presentation worth itMaking a business(or any other ) presentation worth it
Making a business(or any other ) presentation worth it
 
Effect of demographics on consumer behavior
Effect of demographics on consumer behaviorEffect of demographics on consumer behavior
Effect of demographics on consumer behavior
 
Search engines, SEO and SEM
Search engines, SEO and SEMSearch engines, SEO and SEM
Search engines, SEO and SEM
 
Intro to Web Development
Intro to Web DevelopmentIntro to Web Development
Intro to Web Development
 

Dernier

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Dernier (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Cookies (in Online Advertising)