SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
MDM.
Cemented Security?
What do you see?
Web Browser                       Communication
                     Community
Internet in my                      GPS


Opportunity
     hand




    ?            Collaboration            Camera
   HDTV
                                 Tricorder
Crisis?
Crisitunit

      Flexibility   Security
Risks Are
How do we
secure these things?
Protect the castle
             75% of employees
             work outside the “walls”
Ah Ha! What if...
Cement Security

             +




Mobile Device Management
The MDM way
  Data
  App
  OS
              MDM
 Device
Network
Location
The MDM way
The Good
Device is secure.

um... did I mention the device is secure?
The not so good
•   Privacy concerns
•   Can’t mix personal & business
    Apps & data
•   Policies are draconian
•   Forced to use 2 devices


•   Inherited liability
•   One-size-fits-all security model
•   Complete device wipe upon threat
    detection
What if we used
  the MDM
 approach to
using old solutions
   to solve new



    (doesn’t always work)
A better way
  Data
  App
  OS
                     MAM
 Device
Network
Location
A better way
Every time a phone gets
MDM’d, god kills a kitten

Contenu connexe

En vedette

The keytoproductivity 1273
The keytoproductivity 1273The keytoproductivity 1273
The keytoproductivity 1273Hayriye Selekler
 
Small business regulations in Perú and some political problems
Small business regulations in Perú and some political problemsSmall business regulations in Perú and some political problems
Small business regulations in Perú and some political problemsJose Luis Tapia
 
Photoshop assignment #1
Photoshop assignment #1Photoshop assignment #1
Photoshop assignment #1pranidhi
 
Retailin france 2011_kh
Retailin france 2011_khRetailin france 2011_kh
Retailin france 2011_khAllystephen
 
Nikki the hungry dinosaur
Nikki the hungry dinosaurNikki the hungry dinosaur
Nikki the hungry dinosaurAmanda Harris
 
Non warrantable condos
Non warrantable condosNon warrantable condos
Non warrantable condosNagyudBenajmin
 
Breaking of Granular Cluster in Two-Dimension due to Splitting of the Central...
Breaking of Granular Cluster in Two-Dimension due to Splitting of the Central...Breaking of Granular Cluster in Two-Dimension due to Splitting of the Central...
Breaking of Granular Cluster in Two-Dimension due to Splitting of the Central...Sparisoma Viridi
 
TOÀN CẢNH THƯƠNG MẠI ĐIỆN TỬ VIỆT NAM 2011
TOÀN CẢNH THƯƠNG MẠI ĐIỆN TỬ VIỆT NAM 2011TOÀN CẢNH THƯƠNG MẠI ĐIỆN TỬ VIỆT NAM 2011
TOÀN CẢNH THƯƠNG MẠI ĐIỆN TỬ VIỆT NAM 2011Bui Hang
 
In Searching of Trees Natural Vibration Frequency Based on Granular Particles...
In Searching of Trees Natural Vibration Frequency Based on Granular Particles...In Searching of Trees Natural Vibration Frequency Based on Granular Particles...
In Searching of Trees Natural Vibration Frequency Based on Granular Particles...Sparisoma Viridi
 
Is Your Association Doing Enough to Close the Skills Gap? National Leadership...
Is Your Association Doing Enough to Close the Skills Gap? National Leadership...Is Your Association Doing Enough to Close the Skills Gap? National Leadership...
Is Your Association Doing Enough to Close the Skills Gap? National Leadership...Council of Manufacturing Associations
 
Empreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioEmpreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioBruno Ghisi
 
Презентация Social Media Club Almaty
Презентация Social Media Club AlmatyПрезентация Social Media Club Almaty
Презентация Social Media Club AlmatySocialMediaClubCA
 
2 класс. lesson 19. мир верх ногами
2 класс. lesson 19. мир верх ногами2 класс. lesson 19. мир верх ногами
2 класс. lesson 19. мир верх ногамиshpinat
 
10 downing street bhopal
10 downing street   bhopal10 downing street   bhopal
10 downing street bhopalRahul Bajaj
 

En vedette (20)

Etemplate
EtemplateEtemplate
Etemplate
 
The keytoproductivity 1273
The keytoproductivity 1273The keytoproductivity 1273
The keytoproductivity 1273
 
Small business regulations in Perú and some political problems
Small business regulations in Perú and some political problemsSmall business regulations in Perú and some political problems
Small business regulations in Perú and some political problems
 
Photoshop assignment #1
Photoshop assignment #1Photoshop assignment #1
Photoshop assignment #1
 
Jodhpur media
Jodhpur mediaJodhpur media
Jodhpur media
 
Hongkong
HongkongHongkong
Hongkong
 
Retailin france 2011_kh
Retailin france 2011_khRetailin france 2011_kh
Retailin france 2011_kh
 
Nikki the hungry dinosaur
Nikki the hungry dinosaurNikki the hungry dinosaur
Nikki the hungry dinosaur
 
Non warrantable condos
Non warrantable condosNon warrantable condos
Non warrantable condos
 
Breaking of Granular Cluster in Two-Dimension due to Splitting of the Central...
Breaking of Granular Cluster in Two-Dimension due to Splitting of the Central...Breaking of Granular Cluster in Two-Dimension due to Splitting of the Central...
Breaking of Granular Cluster in Two-Dimension due to Splitting of the Central...
 
Natural treasure
Natural treasureNatural treasure
Natural treasure
 
TOÀN CẢNH THƯƠNG MẠI ĐIỆN TỬ VIỆT NAM 2011
TOÀN CẢNH THƯƠNG MẠI ĐIỆN TỬ VIỆT NAM 2011TOÀN CẢNH THƯƠNG MẠI ĐIỆN TỬ VIỆT NAM 2011
TOÀN CẢNH THƯƠNG MẠI ĐIỆN TỬ VIỆT NAM 2011
 
Slide blog
Slide blogSlide blog
Slide blog
 
In Searching of Trees Natural Vibration Frequency Based on Granular Particles...
In Searching of Trees Natural Vibration Frequency Based on Granular Particles...In Searching of Trees Natural Vibration Frequency Based on Granular Particles...
In Searching of Trees Natural Vibration Frequency Based on Granular Particles...
 
Is Your Association Doing Enough to Close the Skills Gap? National Leadership...
Is Your Association Doing Enough to Close the Skills Gap? National Leadership...Is Your Association Doing Enough to Close the Skills Gap? National Leadership...
Is Your Association Doing Enough to Close the Skills Gap? National Leadership...
 
Empreendendo na Ilha do Silício
Empreendendo na Ilha do SilícioEmpreendendo na Ilha do Silício
Empreendendo na Ilha do Silício
 
Презентация Social Media Club Almaty
Презентация Social Media Club AlmatyПрезентация Social Media Club Almaty
Презентация Social Media Club Almaty
 
2 класс. lesson 19. мир верх ногами
2 класс. lesson 19. мир верх ногами2 класс. lesson 19. мир верх ногами
2 класс. lesson 19. мир верх ногами
 
Kyoko
KyokoKyoko
Kyoko
 
10 downing street bhopal
10 downing street   bhopal10 downing street   bhopal
10 downing street bhopal
 

Similaire à Pouring Cement on Mobile Devices

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldPro Mrkt
 
Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Justin Pirie
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyie-Democracy Conference
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityarms8586
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?EMC
 
Cyber Defense - Cloud Based or On-premises
Cyber Defense - Cloud Based or On-premisesCyber Defense - Cloud Based or On-premises
Cyber Defense - Cloud Based or On-premisesHachmdhmdzad
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
Threat Modeling / iPad
Threat Modeling / iPadThreat Modeling / iPad
Threat Modeling / iPadSylvain Maret
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Reportfinance40
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your UsersMike Murray
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...Andris Soroka
 

Similaire à Pouring Cement on Mobile Devices (20)

La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile WorldDarren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
Darren Rawlinson - Dealing with Cyber Threats in an Enterprise Mobile World
 
Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Compliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan PrecsenyiCompliance standards interoperability - Zoltan Precsenyi
Compliance standards interoperability - Zoltan Precsenyi
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
 
Cyber Defense - Cloud Based or On-premises
Cyber Defense - Cloud Based or On-premisesCyber Defense - Cloud Based or On-premises
Cyber Defense - Cloud Based or On-premises
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
Threat Modeling / iPad
Threat Modeling / iPadThreat Modeling / iPad
Threat Modeling / iPad
 
Chris D'Aguanno
Chris D'AguannoChris D'Aguanno
Chris D'Aguanno
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 
Avoiding a BYOD Blowup!
Avoiding a BYOD Blowup!Avoiding a BYOD Blowup!
Avoiding a BYOD Blowup!
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 

Plus de Apperian

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian WebinarApperian
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilityApperian
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiApperian
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with MocanaApperian
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityApperian
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityApperian
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldApperian
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19Apperian
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21Apperian
 
Applification of Business
Applification of BusinessApplification of Business
Applification of BusinessApperian
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Apperian
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE Apperian
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApperian
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now. Apperian
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in RetailApperian
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them OutApperian
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseApperian
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsApperian
 

Plus de Apperian (19)

451 Research Apperian Webinar
451 Research  Apperian Webinar451 Research  Apperian Webinar
451 Research Apperian Webinar
 
Slides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of MobilitySlides - The 4 Golden Rules Of Mobility
Slides - The 4 Golden Rules Of Mobility
 
How to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roiHow to scale enterprise mobility and improve roi
How to scale enterprise mobility and improve roi
 
Federal Grade Security with Mocana
Federal Grade Security with MocanaFederal Grade Security with Mocana
Federal Grade Security with Mocana
 
The Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise MobilityThe Innovative CIO's Discussion of Enterprise Mobility
The Innovative CIO's Discussion of Enterprise Mobility
 
How to Make BYOD a Great Opportunity
How to Make BYOD a Great OpportunityHow to Make BYOD a Great Opportunity
How to Make BYOD a Great Opportunity
 
Security In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM WorldSecurity In A Hybrid MAM and MDM World
Security In A Hybrid MAM and MDM World
 
The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19The Boston Globe - 19 jul 2012 - page #19
The Boston Globe - 19 jul 2012 - page #19
 
The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21The Boston Globe - 19 jul 2012 - page #21
The Boston Globe - 19 jul 2012 - page #21
 
Applification of Business
Applification of BusinessApplification of Business
Applification of Business
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
Managing ONLY devices is BYOD Policy FAILURE
 Managing ONLY devices is BYOD Policy FAILURE  Managing ONLY devices is BYOD Policy FAILURE
Managing ONLY devices is BYOD Policy FAILURE
 
Apps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & ProductivityApps in the Enterprise: Creating New Lines of Business & Productivity
Apps in the Enterprise: Creating New Lines of Business & Productivity
 
Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.  Why You Must Mobilize Your Workforce. Now.
Why You Must Mobilize Your Workforce. Now.
 
Mobile Apps in Retail
Mobile Apps in RetailMobile Apps in Retail
Mobile Apps in Retail
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out5 Starting Apps for Your Business and How to Roll Them Out
5 Starting Apps for Your Business and How to Roll Them Out
 
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The EnterpriseBuilding & Managing The Lifecycle of Mobile Apps For The Enterprise
Building & Managing The Lifecycle of Mobile Apps For The Enterprise
 
HTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native AppsHTML5 Web Apps vs. Native Apps
HTML5 Web Apps vs. Native Apps
 

Dernier

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Dernier (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Pouring Cement on Mobile Devices