SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
Trends for 2008 And Trivia from 2007 Terry Bledsoe January 17, 2008 8 0 0 2
Trends for 2008 And trivia from 2007 http://money.aol.com/special/hot-products-2007
Surfing Will Slow
Email 90% Spam User generated content
[object Object],http://www.economist.com/science/displaystory.cfm?story_id=10410912 http://flickr.com/   http://www.digiframes.com/related/1017-4820/WiFi-Digital-Picture-Frames-Sungale-AW15B-WF.html   WIFI .
IP IPTV IP Surveillance IP Monitoring IP GPS Locating IPIPIPIPIPIPIPIPIP….
Implications…… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Surfing Will Detach
700 MHz Channels 52 to 69 Reserve Bid $4.6 Billion Bidders:  AT&T, Google, and Verizon “ open access” Public Safety Access
G Phone Open Handset Alliance ??? Core Business
Needs on and off Ramps to the Knowledge Sources and Knowledge Users
Needs on and off Ramps to the Knowledge Sources and Knowledge Users “ open access”
“ to everything”
The new personal computer….. The simple cell phone is a relic Laptops replace desktops personal use  /   business use
Implications…… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Surfing –  and everything else computer related  – will open
Linux Vista Gutsey Gibbon “ open applications”
https://wiki.ubuntu.com/GutsyGibbon http://www.pidgin.im/   http://www.openoffice.org/   http://www.mozilla.com/   http://www.mysql.com/   http://www.evolutionemail.com/ http://www.alfresco.com/ https://www.google.com/a/   Gutsey Gibbon
Implications…… ,[object Object],[object Object],[object Object],[object Object]
Applications Still Job One http://www.economist.com/science/displaystory.cfm?story_id=10410912 https://wiki.ubuntu.com/GutsyGibbon
Hardware Software Peripherals  Capacity  Users
External Internal Applications Linked to
PeopleSoft Portal
XML ODF PDF MARS project
Implications…… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT Job Skills for 2008 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.networkworld.com/etm/2007/122007-etm-jobs-matter.html   Skills in highest demand ,[object Object],[object Object],[object Object],[object Object],[object Object]
12 IT Skill That Employers Can’t Say No To ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.networkworld.com/news/2007/071107-12-it-skills-that-employers.html?page=1
Attack Trends from 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.symantec.com/ISTR2007
Government Attack Trends from 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],www.symantec.com/ISTR2007
 
Adaptive Security ,[object Object],[object Object],[object Object]
Implications…… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Going Green ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What really matters….. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sellers from the Future…….. BIG
Big Sellers from the Future ,[object Object],http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm   RFID Blocker
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm   Glacier Water
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm   Reputation Accounts
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm   Social Network Movie Tickets
Tagged and Shared ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Catawba County does not promote, endorse  and is not responsible for content on any of the sites or materials referenced on this page.  References  are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.
Research ,[object Object],[object Object],Catawba County does not promote, endorse  and is not responsible for content on any of the sites or materials referenced on this page.  References  are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.

Contenu connexe

Tendances

IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresUITSEC Teknoloji A.Ş.
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingSignals Defense, LLC
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...NetMotion Wireless
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoTExosite
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information SecurityGary Bahadur
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Black Duck by Synopsys
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2FitCEO, Inc. (FCI)
 

Tendances (18)

IoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructuresIoT based on cyber security in defense industry and critical infrastructures
IoT based on cyber security in defense industry and critical infrastructures
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be SurprisingCorporate America is Being ATTACKED and the Entry Vector May be Surprising
Corporate America is Being ATTACKED and the Entry Vector May be Surprising
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoT
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information Security
 
What are the 5G network security issues?
What are the 5G network security issues?What are the 5G network security issues?
What are the 5G network security issues?
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
188
188188
188
 
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 

En vedette

Presentación Jaime Vela, PERU INCUBA
Presentación Jaime Vela, PERU INCUBAPresentación Jaime Vela, PERU INCUBA
Presentación Jaime Vela, PERU INCUBACOPEME
 
Presentación del Consejo Regulador DOP Azafrán de La Mancha utilizada en el c...
Presentación del Consejo Regulador DOP Azafrán de La Mancha utilizada en el c...Presentación del Consejo Regulador DOP Azafrán de La Mancha utilizada en el c...
Presentación del Consejo Regulador DOP Azafrán de La Mancha utilizada en el c...Consejo Regulador DOP Azafrán de La Mancha
 
Natural Language Processing (NLP) Market - Information Technology Outlook (20...
Natural Language Processing (NLP) Market - Information Technology Outlook (20...Natural Language Processing (NLP) Market - Information Technology Outlook (20...
Natural Language Processing (NLP) Market - Information Technology Outlook (20...ResearchFox
 
Day2 sp5 2015-icgfm_miami conference_sawadogo_final_sp
Day2 sp5 2015-icgfm_miami conference_sawadogo_final_spDay2 sp5 2015-icgfm_miami conference_sawadogo_final_sp
Day2 sp5 2015-icgfm_miami conference_sawadogo_final_spicgfmconference
 
Innere Aufrüstung in der EU und Aktivismus im Netz: Chancen & Risiken
Innere Aufrüstung in der EU und Aktivismus im Netz: Chancen & RisikenInnere Aufrüstung in der EU und Aktivismus im Netz: Chancen & Risiken
Innere Aufrüstung in der EU und Aktivismus im Netz: Chancen & RisikenAktion Freiheit statt Angst e.V.
 
Cisco UCCX használata külsős szoftverrel
Cisco UCCX használata külsős szoftverrelCisco UCCX használata külsős szoftverrel
Cisco UCCX használata külsős szoftverrelGloster telekom Kft.
 
Proceedit 20130205 modelo de negocio para miembros
Proceedit 20130205 modelo de negocio para miembrosProceedit 20130205 modelo de negocio para miembros
Proceedit 20130205 modelo de negocio para miembrosAurora López García
 
Trabajo de compu
Trabajo de compuTrabajo de compu
Trabajo de compuMCGT
 
Minneapolis RiverCurrent 9-29-11
Minneapolis RiverCurrent 9-29-11Minneapolis RiverCurrent 9-29-11
Minneapolis RiverCurrent 9-29-11Mill City Times
 
World journal of islamic history and civilization,
World journal of islamic history and civilization,World journal of islamic history and civilization,
World journal of islamic history and civilization,Younis I Munshi
 
VOLANTINO maggio 2013 Bricofer Cangianiello!
VOLANTINO maggio 2013 Bricofer Cangianiello! VOLANTINO maggio 2013 Bricofer Cangianiello!
VOLANTINO maggio 2013 Bricofer Cangianiello! Giuseppe Cangianiello
 
Waste 2 Energy
Waste 2 EnergyWaste 2 Energy
Waste 2 EnergyRaul Amaro
 
Alergia Alimentaria - Introducción Clínica y Diagnóstica
Alergia Alimentaria - Introducción Clínica y DiagnósticaAlergia Alimentaria - Introducción Clínica y Diagnóstica
Alergia Alimentaria - Introducción Clínica y DiagnósticaCesar Martin Bozzola
 
Origen del universo y lo vivo...
Origen del universo y lo vivo...Origen del universo y lo vivo...
Origen del universo y lo vivo...Sandra Liliana
 
Formación de hueso esponjoso con esfe
Formación de hueso esponjoso con esfeFormación de hueso esponjoso con esfe
Formación de hueso esponjoso con esfemrcs89
 

En vedette (20)

Presentación Jaime Vela, PERU INCUBA
Presentación Jaime Vela, PERU INCUBAPresentación Jaime Vela, PERU INCUBA
Presentación Jaime Vela, PERU INCUBA
 
Presentación del Consejo Regulador DOP Azafrán de La Mancha utilizada en el c...
Presentación del Consejo Regulador DOP Azafrán de La Mancha utilizada en el c...Presentación del Consejo Regulador DOP Azafrán de La Mancha utilizada en el c...
Presentación del Consejo Regulador DOP Azafrán de La Mancha utilizada en el c...
 
Lexpro Litigation Presentation
Lexpro Litigation PresentationLexpro Litigation Presentation
Lexpro Litigation Presentation
 
Natural Language Processing (NLP) Market - Information Technology Outlook (20...
Natural Language Processing (NLP) Market - Information Technology Outlook (20...Natural Language Processing (NLP) Market - Information Technology Outlook (20...
Natural Language Processing (NLP) Market - Information Technology Outlook (20...
 
Capitulo 6
Capitulo  6Capitulo  6
Capitulo 6
 
Day2 sp5 2015-icgfm_miami conference_sawadogo_final_sp
Day2 sp5 2015-icgfm_miami conference_sawadogo_final_spDay2 sp5 2015-icgfm_miami conference_sawadogo_final_sp
Day2 sp5 2015-icgfm_miami conference_sawadogo_final_sp
 
Innere Aufrüstung in der EU und Aktivismus im Netz: Chancen & Risiken
Innere Aufrüstung in der EU und Aktivismus im Netz: Chancen & RisikenInnere Aufrüstung in der EU und Aktivismus im Netz: Chancen & Risiken
Innere Aufrüstung in der EU und Aktivismus im Netz: Chancen & Risiken
 
Cisco UCCX használata külsős szoftverrel
Cisco UCCX használata külsős szoftverrelCisco UCCX használata külsős szoftverrel
Cisco UCCX használata külsős szoftverrel
 
Pga 2012 2013
Pga 2012 2013Pga 2012 2013
Pga 2012 2013
 
Proceedit 20130205 modelo de negocio para miembros
Proceedit 20130205 modelo de negocio para miembrosProceedit 20130205 modelo de negocio para miembros
Proceedit 20130205 modelo de negocio para miembros
 
Tabletak
TabletakTabletak
Tabletak
 
Trabajo de compu
Trabajo de compuTrabajo de compu
Trabajo de compu
 
Pais de Megha
Pais de MeghaPais de Megha
Pais de Megha
 
Minneapolis RiverCurrent 9-29-11
Minneapolis RiverCurrent 9-29-11Minneapolis RiverCurrent 9-29-11
Minneapolis RiverCurrent 9-29-11
 
World journal of islamic history and civilization,
World journal of islamic history and civilization,World journal of islamic history and civilization,
World journal of islamic history and civilization,
 
VOLANTINO maggio 2013 Bricofer Cangianiello!
VOLANTINO maggio 2013 Bricofer Cangianiello! VOLANTINO maggio 2013 Bricofer Cangianiello!
VOLANTINO maggio 2013 Bricofer Cangianiello!
 
Waste 2 Energy
Waste 2 EnergyWaste 2 Energy
Waste 2 Energy
 
Alergia Alimentaria - Introducción Clínica y Diagnóstica
Alergia Alimentaria - Introducción Clínica y DiagnósticaAlergia Alimentaria - Introducción Clínica y Diagnóstica
Alergia Alimentaria - Introducción Clínica y Diagnóstica
 
Origen del universo y lo vivo...
Origen del universo y lo vivo...Origen del universo y lo vivo...
Origen del universo y lo vivo...
 
Formación de hueso esponjoso con esfe
Formación de hueso esponjoso con esfeFormación de hueso esponjoso con esfe
Formación de hueso esponjoso con esfe
 

Similaire à 2008 Trends

Making a Better World with Technology Innovations
Making a Better World with Technology InnovationsMaking a Better World with Technology Innovations
Making a Better World with Technology InnovationsImesh Gunaratne
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
 
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
An Overview and Competitive Analysis of the One-Time Password (OTP) MarketAn Overview and Competitive Analysis of the One-Time Password (OTP) Market
An Overview and Competitive Analysis of the One-Time Password (OTP) MarketEMC
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
A New Security System On Captcha Technology Essay
A New Security System On Captcha Technology EssayA New Security System On Captcha Technology Essay
A New Security System On Captcha Technology EssayAlicia Brooks
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Mahbubul Alam
 
Essay About Threats To Computer And Data Systems Today
Essay About Threats To Computer And Data Systems TodayEssay About Threats To Computer And Data Systems Today
Essay About Threats To Computer And Data Systems TodayAngilina Jones
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_AdamsJulius Adams
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 

Similaire à 2008 Trends (20)

Making a Better World with Technology Innovations
Making a Better World with Technology InnovationsMaking a Better World with Technology Innovations
Making a Better World with Technology Innovations
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
An Overview and Competitive Analysis of the One-Time Password (OTP) MarketAn Overview and Competitive Analysis of the One-Time Password (OTP) Market
An Overview and Competitive Analysis of the One-Time Password (OTP) Market
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
A New Security System On Captcha Technology Essay
A New Security System On Captcha Technology EssayA New Security System On Captcha Technology Essay
A New Security System On Captcha Technology Essay
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Security Industry Overview
Security Industry OverviewSecurity Industry Overview
Security Industry Overview
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
 
Essay About Threats To Computer And Data Systems Today
Essay About Threats To Computer And Data Systems TodayEssay About Threats To Computer And Data Systems Today
Essay About Threats To Computer And Data Systems Today
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Securing Digital_Adams
Securing Digital_AdamsSecuring Digital_Adams
Securing Digital_Adams
 
Trends in IoT 2017
Trends in IoT 2017Trends in IoT 2017
Trends in IoT 2017
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 

Plus de TBledsoe

NCARD Social Media Terry Bledsoe
NCARD Social Media Terry BledsoeNCARD Social Media Terry Bledsoe
NCARD Social Media Terry BledsoeTBledsoe
 
It Governance April 2009
It Governance April 2009It Governance April 2009
It Governance April 2009TBledsoe
 
NC3C Conference Presentation
NC3C Conference PresentationNC3C Conference Presentation
NC3C Conference PresentationTBledsoe
 
Cagp Conference
Cagp ConferenceCagp Conference
Cagp ConferenceTBledsoe
 
NCLGISA Fall Conference Web 2.0
NCLGISA Fall Conference Web 2.0NCLGISA Fall Conference Web 2.0
NCLGISA Fall Conference Web 2.0TBledsoe
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends PostTBledsoe
 
Gov 2.0 Post
Gov 2.0 PostGov 2.0 Post
Gov 2.0 PostTBledsoe
 

Plus de TBledsoe (7)

NCARD Social Media Terry Bledsoe
NCARD Social Media Terry BledsoeNCARD Social Media Terry Bledsoe
NCARD Social Media Terry Bledsoe
 
It Governance April 2009
It Governance April 2009It Governance April 2009
It Governance April 2009
 
NC3C Conference Presentation
NC3C Conference PresentationNC3C Conference Presentation
NC3C Conference Presentation
 
Cagp Conference
Cagp ConferenceCagp Conference
Cagp Conference
 
NCLGISA Fall Conference Web 2.0
NCLGISA Fall Conference Web 2.0NCLGISA Fall Conference Web 2.0
NCLGISA Fall Conference Web 2.0
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
 
Gov 2.0 Post
Gov 2.0 PostGov 2.0 Post
Gov 2.0 Post
 

Dernier

Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxSatishbabu Gunukula
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)IES VE
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInThousandEyes
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxKaustubhBhavsar6
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdfThe Good Food Institute
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...DianaGray10
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingMAGNIntelligence
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosErol GIRAUDY
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2DianaGray10
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNeo4j
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxNeo4j
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfTejal81
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Muhammad Tiham Siddiqui
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIVijayananda Mohire
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1DianaGray10
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl
 

Dernier (20)

Oracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptxOracle Database 23c Security New Features.pptx
Oracle Database 23c Security New Features.pptx
 
The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)The Importance of Indoor Air Quality (English)
The Importance of Indoor Air Quality (English)
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptx
 
2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf2024.03.12 Cost drivers of cultivated meat production.pdf
2024.03.12 Cost drivers of cultivated meat production.pdf
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced Computing
 
Scenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenariosScenario Library et REX Discover industry- and role- based scenarios
Scenario Library et REX Discover industry- and role- based scenarios
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2UiPath Studio Web workshop series - Day 2
UiPath Studio Web workshop series - Day 2
 
Novo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4jNovo Nordisk's journey in developing an open-source application on Neo4j
Novo Nordisk's journey in developing an open-source application on Neo4j
 
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptxEmil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
Emil Eifrem at GraphSummit Copenhagen 2024 - The Art of the Possible.pptx
 
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdfQ4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
Q4 2023 Quarterly Investor Presentation - FINAL - v1.pdf
 
Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)Trailblazer Community - Flows Workshop (Session 2)
Trailblazer Community - Flows Workshop (Session 2)
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
My key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAIMy key hands-on projects in Quantum, and QAI
My key hands-on projects in Quantum, and QAI
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Planetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile BrochurePlanetek Italia Srl - Corporate Profile Brochure
Planetek Italia Srl - Corporate Profile Brochure
 

2008 Trends