SlideShare une entreprise Scribd logo
1  sur  8
What we will cover
•What is email?
•Sending and receiving email
•Attachments
•Mailing lists
•E greeting cards
What is email?
http://en.wikipedia.org/wiki/E-mail
Spam
http://en.wikipedia.org/wiki/E-mail_spam
Be careful of viruses. Don’t open an email from someone you
don’t know. Don’t open attachments or follow links in an email
unless you know that the person really did send them to you.
What is Email?
• Email is a method of sending digital messages via the Internet from
one person to one or more recipients.
• Gmail, Hotmail and Yahoo Mail are three common brands of email.
• There is NO COST to sign up with and use any of these three
brands.
What you need to send an Email
To send and receive e-mail, you will need:
1.A computer.
2.2. Internet service.
3. An e-mail address.
4.Friends who also have these three elements.
Why get an email address?
Send and receive letters, message, pictures or videos, documents
Receive notices from services you have signed up with.
Use other websites that require an email address to sign up for them.
Email providers
Web based (allows you to check your email from anywhere).
http://mail.yahoo.com
Also get access to flickr, geocities, calendar, bookmarks, maps.
http://gmail.google.com
Also get access to picasa pictures, blogger, office, calendar, reader, documents, maps.
http://www.hotmail.com/
Also get access to all of the live.com products as well.
mail.aol.com/
http://www.myqwest.com/
http://ww2.cox.com/myconnection/arizona/home.cox
Software
http://www.mozilla.com/en-US/thunderbird/
http://www.eudora.com/
http://get.live.com/wlmail/overview
Microsoft Outlook (comes with Microsoft Office)
Mac Mail – comes with Mac computers
Most smartphones, tablets, etc come with an app to read your mail.
Sending email
http://www.learnthenet.tv/learn-email/
http://en.wikipedia.org/wiki/E-mail_attachment
http://help.yahoo.com/us/tutorials/cg/index.html
Email Ettiquette
http://www.mrmodem.net/cgi-bin/library.pl?action=view&article=113
Mailing Lists
http://en.wikipedia.org/wiki/Electronic_mailing_list
E greeting cards
http://en.wikipedia.org/wiki/E-card
http://www.yahoo.americangreetings.com/
http://www.hallmark.com
Safety
http://www.onguardonline.gov/media/video-0104-hacked-email-what-do
https://techboomers.com/t/email-safety
https://techboomers.com/t/how-to-stop-spam-email
https://techboomers.com/t/phishing-scams
https://techboomers.com/t/advance-fee-fraud
Help
http://www.commoncraft.com/video/email-access
http://www.gcflearnfree.org/emailbasics
http://denverlibrary.org/ctc/email-managing-your-inbox
https://sites.google.com/a/nypl.org/techconnect/course-materials/emailforbeginnersforthe50
https://sites.google.com/a/nypl.org/techconnect/course-materials/advancedemail
http://denverlibrary.org/files/Email_Attaching_a_File_handout_2014_04_19_0.pdf
http://www.tscpl.org/wp-content/uploads/2011/12/YahooEmail.pdf
http://www.gcflearnfree.org/googleaccount/2
http://trysomethingnewpimacounty.wordpress.com/category/gmail/
http://digitallearn.org/learn/intro-email
http://digitallearn.org/learn/intro-email-part-2
https://support.google.com/mail/?hl=en
http://windows.microsoft.com/en-us/windows/email-communication-help
http://help.yahoo.com/help/us/mail/
http://office.microsoft.com/en-us/outlook-help/basic-tasks-in-outlook-2010-HA101829999.aspx
http://www.apple.com/support/mac-apps/mail/
http://www.apple.com/support/ipad/mail/
http://www.spl.org/Documents/audiences/adults/LearningPackets/Email.pdf
http://library.unc.edu/wp-content/uploads/2014/04/Email_Basics_Gmail.pdf
http://library.unc.edu/wp-content/uploads/2014/04/Password-Recovery-Gmail-and-Yahoo.pdf
https://www.denverlibrary.org/ctc/computer-basics-email-gmail
https://www.denverlibrary.org/ctc/google-calendar-101
https://techboomers.com/p/gmail
https://www.youtube.com/playlist?list=PLk3xjyeTggSbo9aFyfojGaAqqowkim3rh
https://www.digitallearn.org/courses/intro-to-email/attachment/89
https://www.digitallearn.org/courses/intro-to-email/attachment/92
https://www.digitallearn.org/courses/intro-to-email/lessons/sign-up-for-email
https://www.digitallearn.org/courses/intro-to-email/attachment/93
http://www.gcflearnfree.org/emailbasics/email101/4/print
https://docs.google.com/viewer?
a=v&pid=sites&srcid=bnlwbC5vcmd8dGVjaGNvbm5lY3R8Z3g6NjczMWVhZ
DE0YWRkOWI1Ng
https://www.youtube.com/playlist?
list=PLk3xjyeTggSbo9aFyfojGaAqqowkim3rh
https://www.gailstoolkit.com/basics
attachment - file sent along with an email
email (electronic mail) - to send or receive typed messages via the Internet
email address - person’s or organization’s address used to receive email (for example,
abby@AskAbbyStokes.com)
emoticon - playful use of keyboard characters and symbols to represent emotional responses (also
referred to as smileys), usually used in email or text messages (for example, >: -( means angry)
phishing - scam email sent to elicit private information from the recipient to be used for identity theft
snail mail - nickname for mail delivered by the postal service that negatively refers to the time it takes to
be delivered in contrast to the speed with which an email is sent
spam - unsolicited commercial/junk email
Spoofing – Email spoofing is when you receive an email message that appears to be from someone
other than the actual sender. This method enables the junk e-mailer to hide his or her identity from the
recipient. In spoofing, the sender places a false return address on the junk message. When spoofed, the
recipient has no idea who sent the message and has no way of responding or stopping the problem.
Emails can also contain a spoofed web site address.

Contenu connexe

Tendances

How to upload your contact files into Linkedin
How to upload your contact files into LinkedinHow to upload your contact files into Linkedin
How to upload your contact files into LinkedinMood Design Solutions
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centrejatin batra
 
Social Media Automation Automation Using IFTTT
Social Media Automation Automation Using IFTTTSocial Media Automation Automation Using IFTTT
Social Media Automation Automation Using IFTTTEdu Rojas
 
Social media ingles tecnico 3
Social media ingles tecnico 3Social media ingles tecnico 3
Social media ingles tecnico 3UTECO
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
How to add your hotmail account to ipad
How to add your hotmail account to ipadHow to add your hotmail account to ipad
How to add your hotmail account to ipadstaefenia sun
 
Email strategies
Email strategiesEmail strategies
Email strategiesAlan Haller
 
Maryam Abbas 9 B
Maryam Abbas 9 BMaryam Abbas 9 B
Maryam Abbas 9 Bjboulanger
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer JungleJason S
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Slide share-Susan Branch
Slide share-Susan BranchSlide share-Susan Branch
Slide share-Susan BranchSusan Branch
 

Tendances (19)

Email
EmailEmail
Email
 
How to upload your contact files into Linkedin
How to upload your contact files into LinkedinHow to upload your contact files into Linkedin
How to upload your contact files into Linkedin
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Gmail Security
Gmail SecurityGmail Security
Gmail Security
 
Social Media Automation Automation Using IFTTT
Social Media Automation Automation Using IFTTTSocial Media Automation Automation Using IFTTT
Social Media Automation Automation Using IFTTT
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Social media ingles tecnico 3
Social media ingles tecnico 3Social media ingles tecnico 3
Social media ingles tecnico 3
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
How to add your hotmail account to ipad
How to add your hotmail account to ipadHow to add your hotmail account to ipad
How to add your hotmail account to ipad
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
Threats – m2
Threats – m2Threats – m2
Threats – m2
 
Maryam Abbas 9 B
Maryam Abbas 9 BMaryam Abbas 9 B
Maryam Abbas 9 B
 
Introduction To Email
Introduction To EmailIntroduction To Email
Introduction To Email
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Social media
Social mediaSocial media
Social media
 
Protect
ProtectProtect
Protect
 
Slide share-Susan Branch
Slide share-Susan BranchSlide share-Susan Branch
Slide share-Susan Branch
 

En vedette

Web 2.0 & Social Computing
Web 2.0 & Social Computing Web 2.0 & Social Computing
Web 2.0 & Social Computing Munaz Anjum
 
TEDx Poetry and Science
TEDx Poetry and ScienceTEDx Poetry and Science
TEDx Poetry and ScienceMark Underwood
 
Exercises
ExercisesExercises
Exercisescat509
 
Millennial Generation Panel Discussion
Millennial Generation Panel DiscussionMillennial Generation Panel Discussion
Millennial Generation Panel Discussionjsnugent
 
Hpl Questions(V2.0)
Hpl Questions(V2.0)Hpl Questions(V2.0)
Hpl Questions(V2.0)jsnugent
 
Learning in the Open: Faculty and Student Perspectives of blogging to Support...
Learning in the Open: Faculty and Student Perspectives of blogging to Support...Learning in the Open: Faculty and Student Perspectives of blogging to Support...
Learning in the Open: Faculty and Student Perspectives of blogging to Support...jsnugent
 
Safari
SafariSafari
Safaricat509
 
Advent 2006
Advent 2006Advent 2006
Advent 2006valenejl
 
Overdrive
OverdriveOverdrive
Overdrivecat509
 
Netbook
NetbookNetbook
Netbookcat509
 
Windows10
Windows10Windows10
Windows10cat509
 
mp3 players
mp3 playersmp3 players
mp3 playerscat509
 
Self-Directed Learning in a PLN
Self-Directed Learning in a PLNSelf-Directed Learning in a PLN
Self-Directed Learning in a PLNjsnugent
 
UA and Google Tag Manager – Why & How!
UA and Google Tag Manager – Why & How!UA and Google Tag Manager – Why & How!
UA and Google Tag Manager – Why & How!Munaz Anjum
 

En vedette (16)

Web 2.0 & Social Computing
Web 2.0 & Social Computing Web 2.0 & Social Computing
Web 2.0 & Social Computing
 
Start
StartStart
Start
 
TEDx Poetry and Science
TEDx Poetry and ScienceTEDx Poetry and Science
TEDx Poetry and Science
 
4 Tob
4 Tob4 Tob
4 Tob
 
Exercises
ExercisesExercises
Exercises
 
Millennial Generation Panel Discussion
Millennial Generation Panel DiscussionMillennial Generation Panel Discussion
Millennial Generation Panel Discussion
 
Hpl Questions(V2.0)
Hpl Questions(V2.0)Hpl Questions(V2.0)
Hpl Questions(V2.0)
 
Learning in the Open: Faculty and Student Perspectives of blogging to Support...
Learning in the Open: Faculty and Student Perspectives of blogging to Support...Learning in the Open: Faculty and Student Perspectives of blogging to Support...
Learning in the Open: Faculty and Student Perspectives of blogging to Support...
 
Safari
SafariSafari
Safari
 
Advent 2006
Advent 2006Advent 2006
Advent 2006
 
Overdrive
OverdriveOverdrive
Overdrive
 
Netbook
NetbookNetbook
Netbook
 
Windows10
Windows10Windows10
Windows10
 
mp3 players
mp3 playersmp3 players
mp3 players
 
Self-Directed Learning in a PLN
Self-Directed Learning in a PLNSelf-Directed Learning in a PLN
Self-Directed Learning in a PLN
 
UA and Google Tag Manager – Why & How!
UA and Google Tag Manager – Why & How!UA and Google Tag Manager – Why & How!
UA and Google Tag Manager – Why & How!
 

Similaire à Email

General Internet Services
General Internet ServicesGeneral Internet Services
General Internet ServicesCeliaBSeaton
 
Email security netwroking
Email security  netwrokingEmail security  netwroking
Email security netwrokingSalman Memon
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?Tayfun TEK
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptxenukahansana
 
Web 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web AppWeb 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web AppAndy Denmark
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28Dave Archer
 

Similaire à Email (20)

General Internet Services
General Internet ServicesGeneral Internet Services
General Internet Services
 
Email security netwroking
Email security  netwrokingEmail security  netwroking
Email security netwroking
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
 
Ibm vciso sunderland
Ibm vciso sunderlandIbm vciso sunderland
Ibm vciso sunderland
 
E‑mail
E‑mailE‑mail
E‑mail
 
Web 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web AppWeb 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web App
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Viruses
VirusesViruses
Viruses
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
 
All about email
All about emailAll about email
All about email
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 

Plus de cat509

Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
Myspace
MyspaceMyspace
Myspacecat509
 
Microsoft Office Basics
Microsoft Office BasicsMicrosoft Office Basics
Microsoft Office Basicscat509
 
Health apps
Health appsHealth apps
Health appscat509
 
Video apps
Video appsVideo apps
Video appscat509
 
Blogs 101 and Websites for Free
Blogs 101 and Websites for Free Blogs 101 and Websites for Free
Blogs 101 and Websites for Free cat509
 
Music apps
Music appsMusic apps
Music appscat509
 
Travel apps
Travel appsTravel apps
Travel appscat509
 
Todo apps
Todo appsTodo apps
Todo appscat509
 
Ebooksandmp3s
Ebooksandmp3sEbooksandmp3s
Ebooksandmp3scat509
 
Cutting the cord
Cutting the cordCutting the cord
Cutting the cordcat509
 
Digphoto
DigphotoDigphoto
Digphotocat509
 
Train The Trainer
Train The TrainerTrain The Trainer
Train The Trainercat509
 
craigslist
craigslistcraigslist
craigslistcat509
 
Organization
OrganizationOrganization
Organizationcat509
 
Youtube
YoutubeYoutube
Youtubecat509
 
Buy computers
Buy computersBuy computers
Buy computerscat509
 

Plus de cat509 (19)

Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Myspace
MyspaceMyspace
Myspace
 
Microsoft Office Basics
Microsoft Office BasicsMicrosoft Office Basics
Microsoft Office Basics
 
Health apps
Health appsHealth apps
Health apps
 
Video apps
Video appsVideo apps
Video apps
 
Blogs 101 and Websites for Free
Blogs 101 and Websites for Free Blogs 101 and Websites for Free
Blogs 101 and Websites for Free
 
Music apps
Music appsMusic apps
Music apps
 
Travel apps
Travel appsTravel apps
Travel apps
 
Todo apps
Todo appsTodo apps
Todo apps
 
Ebooksandmp3s
Ebooksandmp3sEbooksandmp3s
Ebooksandmp3s
 
Cutting the cord
Cutting the cordCutting the cord
Cutting the cord
 
Digphoto
DigphotoDigphoto
Digphoto
 
Train The Trainer
Train The TrainerTrain The Trainer
Train The Trainer
 
Wifi
WifiWifi
Wifi
 
craigslist
craigslistcraigslist
craigslist
 
Organization
OrganizationOrganization
Organization
 
End
EndEnd
End
 
Youtube
YoutubeYoutube
Youtube
 
Buy computers
Buy computersBuy computers
Buy computers
 

Dernier

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Dernier (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Email