SlideShare a Scribd company logo
1 of 44
Download to read offline
Open Source Systems &
Security
Sherif El-Kassas
OSS & Security
● Outline:
– Principles, Motives, & Opportunity
– Trends and attitudes
– Case and examples
(The small matter of Mr. Snowden)
– The way forward
principles
Design Principles
• Well known set of principles
– Saltzer, J.H.; Schroeder, M.D., "The protection of
information in computer systems," Proceedings
of the IEEE , vol.63, no.9, pp.1278,1308, Sept.
1975
– Smith, R.E., "A Contemporary Look at Saltzer
and Schroeder's 1975 Design Principles,"
Security & Privacy, IEEE , vol.10, no.6, pp.20,25,
Nov.-Dec. 2012
– See also:
http://www.cryptosmith.com/book/export/html/365
Saltzer & Schroeder
1. Economy of mechanism
2. Fail-safe defaults
3. Complete mediation
4. Open design
5. Separation of privilege
6. Least privilege
7. Least common mechanism
8. Psychological acceptability
Saltzer & Schroeder
1. Economy of mechanism
2. Fail-safe defaults
3. Complete mediation
4.Open design
Kerckhoffs (19th century)
Shannon: “The enemy knows the system”
5. Separation of privilege
6. Least privilege
7. Least common mechanism
8. Psychological acceptability
motive
Motive
“While security for the user might
mean the repulse of `evil hackers […]
security for the vendor means
growing the market and crushing the
competition.”
– Ross Anderson, "Security in Open versus Closed
Systems - The Dance of Boltzmann, Coase and
Moore", Open Source Software : Economics, Law
and Policy, Toulouse, France, June 20-21, 2002.
opportunity
Reflections on
Trusting Trust
Ken Tompson
Communication of the ACM, Vol. 27, No. 8,
August 1984
Opportunity
Reflections on
Trusting Trust
Ken Tompson
Communication of the ACM, Vol. 27, No. 8,
August 1984
Opportunity
“The moral is obvious. You
can't trust code that you
did not totally create
yourself. (Especially code
from companies that
employ people like me.)”
http://www.cs.tufts.edu/comp/98/Ken_Thompson_84-Reflections_on_Trusting_Trust.pdf
What if we don’t manage
trust & ignore scrutiny?
Lastupdated6July,2011
The Two Faces of Hackinghttp://spctrum.ieee.og/static/hacker-matrix
dependability of the connected world
https://www.wired.com/story/car-hack-shut-down-safety-features/
War stories
http://www.quadibloc.com/crypto/ro0204.htm
http://www.iwm.org.uk/online/eniga/eni-intro.htm
French Weapons in the Falklands
• France manufactured the Exocet
[…]
– France also provided a vast,
virtually unprecedented
amount of technical
assistance, including
information on how to combat
the Exocet missile, which
could well have been
decisive in assuring a British
victory.
http://en.wikipedia.org/wiki/Exocet
conspiracies as facts
www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-google
en.wikipedia.org/wiki/2013_mass_surveillance_disclosures
https://www.schneier.com/crypto-gram-1311.html
https://www.schneier.com/crypto-gram-1311.html
“Attacks only get better”
the way forward
Physical vs. Digital world
• what Morpheus might have said
– “Do you believe that my being stronger or
faster has anything to do with my muscles in
this place?”
• mediation, proxies, and trust
● Stallman: How Much Surveillance
Can Democracy Withstand?
“Robust protection for privacy must be
technical”
wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/
R&D agenda
R&D agenda
• Trustworthy technology
– Build our own?
– Open source strategy
– Open scrutiny
– Certification program to ensure quality
●
Note worthy:
• People
• Ensure no harmful shortcuts are taken
Opportunity
CRA, November 2003, [unsolved] grand challenges:
● Economic
● Epidemic
● Engineering
● Human
http://archive.cra.org/Activities/grand.challenges/security/home.html
– The Economist, November 2015:
● “The cost of immaturity”
– Average time to breach detection 205 days
– Estimated global cost of 90m cyber-attacks: $575 billion
● “cyber-security industry is booming”
– Market: $75 billion a year now [...] $170 billion by 2020
– 2016:
● cloud, mobile, social media, and more: “Cybersecurity is terrible,
and will get worse”; IoT “will be a security disaster”
https://www.lightbluetouchpaper.org/2016/02/22/financial-cryptography-2016/
Thank you..
Questions?
www.cse.aucegypt.edu/~skassas/Eitesal-oss-2017
Trusting organization
http://spectrum.ieee.org/telecom/security/the-athens-affair
Kill switches!
spectrum.ieee.org/may08/6171
trends
2013 2014 2105
.00
500,000.00
1,000,000.00
1,500,000.00
2,000,000.00
2,500,000.00
3,000,000.00
3,500,000.00
4,000,000.00
4,500,000.00
insider
unintended
physical loss
portable device
stationary device
“DataBreachesbytheNumbers,”http://www.securityweek.com/data-breaches-numbers
2013 2014 2105
.00
20,000,000.00
40,000,000.00
60,000,000.00
80,000,000.00
100,000,000.00
120,000,000.00
140,000,000.00
hacking
“DataBreachesbytheNumbers,”http://www.securityweek.com/data-breaches-numbers
other conspiracies
http://www.f-
secure.com/weblog/archives/00002226.html
http://vincentarnold.com/blog/chinese-backdoors-hidden-in-router-
firmware/
What can be done about trust?
Only the paranoid survive!
“Anything that happens, happens.
Anything that, in happening, causes
something else to happen, causes
something else to happen.
Anything that, in happening, causes
itself to happen again, happens again.
It doesn't necessarily do it in
chronological order, though.”
--Douglas N. Adams, “Mostly
Harmless”

More Related Content

Similar to Open Source Systems & Security - EiTESAL Digital Transformation "Role of Open Source" Event 29/11/2017

The_Information_Age.pptx
The_Information_Age.pptxThe_Information_Age.pptx
The_Information_Age.pptxAllisaAlcober1
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseShujun Li
 
The New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesThe New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesMajor Hayden
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_ProvidersJon-Michael C. Brook, CISSP
 
IS-Intro.pdf
IS-Intro.pdfIS-Intro.pdf
IS-Intro.pdfwdwd10
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityClare Nelson, CISSP, CIPP-E
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityMark Masterson
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityClaus Cramon Houmann
 
Emerging Technologies - Neuromorphic Engineering / Computing
Emerging Technologies - Neuromorphic Engineering / ComputingEmerging Technologies - Neuromorphic Engineering / Computing
Emerging Technologies - Neuromorphic Engineering / ComputingKevin Espera
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology100656472mercier
 
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureThe challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureJeni Tennison
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxDIPESH30
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Dr. Ann Cavoukian
 

Similar to Open Source Systems & Security - EiTESAL Digital Transformation "Role of Open Source" Event 29/11/2017 (20)

The_Information_Age.pptx
The_Information_Age.pptxThe_Information_Age.pptx
The_Information_Age.pptx
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
The New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesThe New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilities
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
top 10 Data Mining Algorithms
top 10 Data Mining Algorithmstop 10 Data Mining Algorithms
top 10 Data Mining Algorithms
 
IS-Intro.pdf
IS-Intro.pdfIS-Intro.pdf
IS-Intro.pdf
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
 
Cybersecurity fundamental
Cybersecurity fundamentalCybersecurity fundamental
Cybersecurity fundamental
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
Emerging Technologies - Neuromorphic Engineering / Computing
Emerging Technologies - Neuromorphic Engineering / ComputingEmerging Technologies - Neuromorphic Engineering / Computing
Emerging Technologies - Neuromorphic Engineering / Computing
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology
 
Ben Hutchinson
Ben HutchinsonBen Hutchinson
Ben Hutchinson
 
Ben Hutchinson,
Ben Hutchinson, Ben Hutchinson,
Ben Hutchinson,
 
Design Principles for Digital Preservation Systems
Design Principles for Digital Preservation SystemsDesign Principles for Digital Preservation Systems
Design Principles for Digital Preservation Systems
 
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureThe challenges of building a strong data infrastructure
The challenges of building a strong data infrastructure
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 

More from EITESANGO

Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...EITESANGO
 
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...EITESANGO
 
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...EITESANGO
 
Open source communities - EiTESAL Digital Transformation "Role of Open Source...
Open source communities - EiTESAL Digital Transformation "Role of Open Source...Open source communities - EiTESAL Digital Transformation "Role of Open Source...
Open source communities - EiTESAL Digital Transformation "Role of Open Source...EITESANGO
 
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...EITESANGO
 
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...EITESANGO
 
EiTESAL event UK Market challenges & opportunities 18/7/2017
EiTESAL event UK Market challenges & opportunities 18/7/2017EiTESAL event UK Market challenges & opportunities 18/7/2017
EiTESAL event UK Market challenges & opportunities 18/7/2017EITESANGO
 
EiTESAL Gender Diversity Initiative Launching day 12/7/2014
EiTESAL Gender Diversity Initiative Launching day 12/7/2014EiTESAL Gender Diversity Initiative Launching day 12/7/2014
EiTESAL Gender Diversity Initiative Launching day 12/7/2014EITESANGO
 
EiTESAL Gender Diversity Initiative Launching day 12/7/2017
EiTESAL Gender Diversity Initiative Launching day 12/7/2017EiTESAL Gender Diversity Initiative Launching day 12/7/2017
EiTESAL Gender Diversity Initiative Launching day 12/7/2017EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 

More from EITESANGO (20)

Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
 
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
 
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
 
Open source communities - EiTESAL Digital Transformation "Role of Open Source...
Open source communities - EiTESAL Digital Transformation "Role of Open Source...Open source communities - EiTESAL Digital Transformation "Role of Open Source...
Open source communities - EiTESAL Digital Transformation "Role of Open Source...
 
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
 
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
 
EiTESAL event UK Market challenges & opportunities 18/7/2017
EiTESAL event UK Market challenges & opportunities 18/7/2017EiTESAL event UK Market challenges & opportunities 18/7/2017
EiTESAL event UK Market challenges & opportunities 18/7/2017
 
EiTESAL Gender Diversity Initiative Launching day 12/7/2014
EiTESAL Gender Diversity Initiative Launching day 12/7/2014EiTESAL Gender Diversity Initiative Launching day 12/7/2014
EiTESAL Gender Diversity Initiative Launching day 12/7/2014
 
EiTESAL Gender Diversity Initiative Launching day 12/7/2017
EiTESAL Gender Diversity Initiative Launching day 12/7/2017EiTESAL Gender Diversity Initiative Launching day 12/7/2017
EiTESAL Gender Diversity Initiative Launching day 12/7/2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Open Source Systems & Security - EiTESAL Digital Transformation "Role of Open Source" Event 29/11/2017