SlideShare une entreprise Scribd logo
1  sur  44
Government Policy Needs  in a Web 2.0 World Alexander Koudry Office of Governmentwide Policy Office of Technology Strategy Presented on April 14, 2009
GSA Office of Governmentwide Policy ,[object Object]
[object Object],[object Object]
Policy Life Cycle ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web 2.0 Policy Needs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Points ,[object Object]
Key Points ,[object Object],[object Object]
Key Points ,[object Object],[object Object],[object Object]
Why Have Policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy Areas Other Information  Management Equal Access Information Assurance Technology Overlap
Policy Evolution ,[object Object],[object Object]
Types of Policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Information  Management
Types of Policy ,[object Object],[object Object],[object Object],[object Object],Information Assurance
Types of Policy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Technology Equal Access
Types of Policy ,[object Object],[object Object],[object Object],[object Object],Other
Information  Management
Management of Information Exchange  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Accountability for Information Dissemination Products  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Information Quality  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intellectual Property  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Public Data ,[object Object],[object Object],[object Object],[object Object]
Usability of Data  ,[object Object],[object Object],[object Object],[object Object]
Records Management and Archiving ,[object Object],[object Object],[object Object]
Information Assurance
Security ,[object Object],[object Object],[object Object]
FISMA ,[object Object],[object Object]
Identity Authentication of Users ,[object Object],[object Object],[object Object]
Protection of Children ,[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy ,[object Object],[object Object],[object Object]
Technology
Linking to External Servers  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Persistent Cookies (Privacy) ,[object Object],[object Object],[object Object]
Equal Access
Equal Access to Citizens Who Have Disabilities ,[object Object],[object Object],[object Object],[object Object],[object Object]
Equal Access to Citizens Who Have Limited English Proficiency ,[object Object],[object Object],[object Object],[object Object]
Equal Access to Citizens Who Do Not Have High Speed Internet ,[object Object],[object Object],[object Object],[object Object],In general, this requirement is no different for Web 2.0 implementations than it is for other electronic service offerings.  Programs must simply make alternative, non-electronic, forms of information dissemination available upon request.
Other
Rulemaking ,[object Object],[object Object],[object Object]
Advisory Groups ,[object Object],[object Object],[object Object],[object Object]
Procurement ,[object Object],[object Object],Many, if not most of these policies are supported by procurement law.
Dot Gov Domains ,[object Object],[object Object]
How to ensure policy compliance when developing web 2.0 applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Points ,[object Object],[object Object],[object Object]
Thank you ,[object Object],[object Object],Questions?

Contenu connexe

Tendances

Research on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsResearch on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsYogeshIJTSRD
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresPatton Boggs LLP
 
Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
 
ICT for fighting Corruption
ICT for fighting CorruptionICT for fighting Corruption
ICT for fighting CorruptionDeris Stiawan
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...anthonywong
 
Smarsh social media in investment banking
Smarsh social media in investment bankingSmarsh social media in investment banking
Smarsh social media in investment bankingSmarsh
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020MYO AUNG Myanmar
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...IDC4EU
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management Endcode_org
 
Interoperability_White paper_WGK 8-25-15
Interoperability_White paper_WGK 8-25-15Interoperability_White paper_WGK 8-25-15
Interoperability_White paper_WGK 8-25-15William Kowalski
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Ted Myerson
 

Tendances (20)

Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Research on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsResearch on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform Operators
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy Disclosures
 
It ppt 3
It ppt 3It ppt 3
It ppt 3
 
Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
 
ICT for fighting Corruption
ICT for fighting CorruptionICT for fighting Corruption
ICT for fighting Corruption
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
Smarsh social media in investment banking
Smarsh social media in investment bankingSmarsh social media in investment banking
Smarsh social media in investment banking
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
Interoperability_White paper_WGK 8-25-15
Interoperability_White paper_WGK 8-25-15Interoperability_White paper_WGK 8-25-15
Interoperability_White paper_WGK 8-25-15
 
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
 

Similaire à Government Policy Needs in a Web 2.0 World

Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software developmentMuhammadArif823
 
Making the cloud work for you: institutional risk and governance
Making the cloud work for you: institutional risk and governanceMaking the cloud work for you: institutional risk and governance
Making the cloud work for you: institutional risk and governanceRichard Hall
 
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfWritten-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfjiricejka
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfRobertBrown631492
 
Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019Greg Sterling
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsDoubleHorn
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptxHow to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptxRobertBrown631492
 
Digital Divide And Accessibility
Digital Divide And AccessibilityDigital Divide And Accessibility
Digital Divide And AccessibilityGlenn McKnight
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companiesiasaglobal
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperativebutest
 
E com iii unit-16-8-13
E com iii unit-16-8-13E com iii unit-16-8-13
E com iii unit-16-8-13naaaaz
 
Digital Divide And Accessibility
Digital Divide And AccessibilityDigital Divide And Accessibility
Digital Divide And AccessibilityGlenn McKnight
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca vMike Kuhn
 
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_videoNavigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_videoSmarsh
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsKristian Alisasis Pura
 
Accessibility 101 for Financial Institutions
Accessibility 101 for Financial Institutions Accessibility 101 for Financial Institutions
Accessibility 101 for Financial Institutions 3Play Media
 

Similaire à Government Policy Needs in a Web 2.0 World (20)

Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Making the cloud work for you: institutional risk and governance
Making the cloud work for you: institutional risk and governanceMaking the cloud work for you: institutional risk and governance
Making the cloud work for you: institutional risk and governance
 
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdfWritten-Blog_Ethic_AI_08Aug23_pub_jce.pdf
Written-Blog_Ethic_AI_08Aug23_pub_jce.pdf
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
 
Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptxHow to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptx
 
Digital Divide And Accessibility
Digital Divide And AccessibilityDigital Divide And Accessibility
Digital Divide And Accessibility
 
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
 
Open Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated CompaniesOpen Source Governance in Highly Regulated Companies
Open Source Governance in Highly Regulated Companies
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
 
E com iii unit-16-8-13
E com iii unit-16-8-13E com iii unit-16-8-13
E com iii unit-16-8-13
 
Digital Divide And Accessibility
Digital Divide And AccessibilityDigital Divide And Accessibility
Digital Divide And Accessibility
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
 
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_videoNavigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working TogetherTrustArc Webinar-Advertising, Privacy, and Data Management Working Together
TrustArc Webinar-Advertising, Privacy, and Data Management Working Together
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
Accessibility 101 for Financial Institutions
Accessibility 101 for Financial Institutions Accessibility 101 for Financial Institutions
Accessibility 101 for Financial Institutions
 

Plus de Franciel

Social Virtual Networks - Government 2.0 Boot Camp
Social Virtual Networks - Government 2.0 Boot CampSocial Virtual Networks - Government 2.0 Boot Camp
Social Virtual Networks - Government 2.0 Boot CampFranciel
 
Web 2.0 101
Web 2.0 101Web 2.0 101
Web 2.0 101Franciel
 
Advancing Science In A Collaborative Web 20 World
Advancing Science In A Collaborative Web 20 WorldAdvancing Science In A Collaborative Web 20 World
Advancing Science In A Collaborative Web 20 WorldFranciel
 
Georgia Navigator 511
Georgia Navigator 511Georgia Navigator 511
Georgia Navigator 511Franciel
 
Sensorpedia
SensorpediaSensorpedia
SensorpediaFranciel
 
Web 2.0 & Government: EPA
Web 2.0 & Government: EPAWeb 2.0 & Government: EPA
Web 2.0 & Government: EPAFranciel
 
The Collaboration Project: Building Open, Participatory and Collaborative Gov...
The Collaboration Project: Building Open, Participatory and Collaborative Gov...The Collaboration Project: Building Open, Participatory and Collaborative Gov...
The Collaboration Project: Building Open, Participatory and Collaborative Gov...Franciel
 
Laying Track For Web 2.0: Learning from Luddites
Laying Track For Web 2.0: Learning from LudditesLaying Track For Web 2.0: Learning from Luddites
Laying Track For Web 2.0: Learning from LudditesFranciel
 
Viral Marketing
Viral MarketingViral Marketing
Viral MarketingFranciel
 
Outreach for the 21st Centur: Viral Marketing for the Government
Outreach for the 21st Centur: Viral Marketing for the GovernmentOutreach for the 21st Centur: Viral Marketing for the Government
Outreach for the 21st Centur: Viral Marketing for the GovernmentFranciel
 

Plus de Franciel (10)

Social Virtual Networks - Government 2.0 Boot Camp
Social Virtual Networks - Government 2.0 Boot CampSocial Virtual Networks - Government 2.0 Boot Camp
Social Virtual Networks - Government 2.0 Boot Camp
 
Web 2.0 101
Web 2.0 101Web 2.0 101
Web 2.0 101
 
Advancing Science In A Collaborative Web 20 World
Advancing Science In A Collaborative Web 20 WorldAdvancing Science In A Collaborative Web 20 World
Advancing Science In A Collaborative Web 20 World
 
Georgia Navigator 511
Georgia Navigator 511Georgia Navigator 511
Georgia Navigator 511
 
Sensorpedia
SensorpediaSensorpedia
Sensorpedia
 
Web 2.0 & Government: EPA
Web 2.0 & Government: EPAWeb 2.0 & Government: EPA
Web 2.0 & Government: EPA
 
The Collaboration Project: Building Open, Participatory and Collaborative Gov...
The Collaboration Project: Building Open, Participatory and Collaborative Gov...The Collaboration Project: Building Open, Participatory and Collaborative Gov...
The Collaboration Project: Building Open, Participatory and Collaborative Gov...
 
Laying Track For Web 2.0: Learning from Luddites
Laying Track For Web 2.0: Learning from LudditesLaying Track For Web 2.0: Learning from Luddites
Laying Track For Web 2.0: Learning from Luddites
 
Viral Marketing
Viral MarketingViral Marketing
Viral Marketing
 
Outreach for the 21st Centur: Viral Marketing for the Government
Outreach for the 21st Centur: Viral Marketing for the GovernmentOutreach for the 21st Centur: Viral Marketing for the Government
Outreach for the 21st Centur: Viral Marketing for the Government
 

Dernier

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Dernier (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Government Policy Needs in a Web 2.0 World