SlideShare une entreprise Scribd logo
1  sur  49
Télécharger pour lire hors ligne
Turing’s Curse
July 26, 2013 

John Graham-Cumming

www.cloudflare.com!
A LONG, LONG TIME
AGO...

www.cloudflare.com!
The Mother of All Demos - 1968

www.cloudflare.com!
WHAT’S NEW?

www.cloudflare.com!
I’ve got a bad feeling about this

www.cloudflare.com!
CLOUD COMPUTING

www.cloudflare.com!
Cloud Computing - 1966

www.cloudflare.com!

1966 - 1968
BIG DATA

www.cloudflare.com!
Big Data in 1955

www.cloudflare.com!

1955 - 1968
VIRTUAL MACHINE
HYPERVISOR

www.cloudflare.com!
Virtual Machine Hypervisor - 1967

www.cloudflare.com!

1955 - 1968
HYPERTEXT

www.cloudflare.com!
Hypertext - 1945

www.cloudflare.com!

1945 - 1968
HYPERTEXT WITH
CLICKABLE LINKS

www.cloudflare.com!
Hypertext with clickable links - 1967

www.cloudflare.com!

1945 - 1968
MARKUP LANGUAGES

www.cloudflare.com!
Markup Languages
•  IBM Generalized Markup Language – 1960s

www.cloudflare.com!

1945 - 1968
FIBRE OPTIC
NETWORKING

www.cloudflare.com!
Fibre Optic Networking - 1966

www.cloudflare.com!

1945 - 1968
WIRELESS
NETWORKING

www.cloudflare.com!
Wireless Networking – 1971

www.cloudflare.com!

1945 - 1971
ETHERNET

www.cloudflare.com!
Ethernet - 1973

www.cloudflare.com!

1945 - 1973
SOLID STATE DISKS

www.cloudflare.com!
SSDs – 4MB in 1976

www.cloudflare.com!

1945 - 1976
PROCESSOR
ARCHITECTURE

www.cloudflare.com!
Processor Architecture

1945 - 1976

•  RISC (1960s Cray; 1980s)
•  CISC (1960s IBM mainframes)
•  Instruction and Data Caching (1960s; IBM System/360)
•  Instruction Pipelining and Prefetch (1961 IBM Stretch;

1979 8086)
•  Branch Prediction (1961 IBM Stretch)
•  Vector processor (1974 STAR-100)

www.cloudflare.com!
INTERNETWORKING

www.cloudflare.com!
Internetworking

1945 - 1976

•  Chat – 1967 (NLS later Unix Talk)
•  File Transfer – 1971 (FTP)
•  Email – 1971 (host to host)
•  Remote Procedure Calls – 1975 (RFC 707)



www.cloudflare.com!
GRAPHICAL USER
INTERFACE

www.cloudflare.com!
GUI – Xerox 8010 (1981)

www.cloudflare.com!

1945 - 1981
GUI – Apple Lisa (1983)

www.cloudflare.com!

1945 - 1983
1945 - 1983

INTERNET
TCP/IP – 1983

www.cloudflare.com!
1945 - 1983

FUNCTIONAL
PROGRAMMING 

LISP – 1958
APL - 1964
ML – 1973


www.cloudflare.com!
1945 - 1983

OBJECT ORIENTED
PROGRAMMING
Simula 1 – 1967
C++ - 1979
Smalltalk - 1980

www.cloudflare.com!
1945 - 1983

CONCURRENT
PROGRAMMING
CSP – 1978
Ada - 1979
Occam – 1983


www.cloudflare.com!
1945 - 1983

EVENT DRIVEN
PROGRAMMING 

PL/1 - 1966

www.cloudflare.com!
1945 - 1983

DECLARATIVE
LANGUAGES 

SQL – 1979
Regular Expressions – 1970s

www.cloudflare.com!
HIGH WATER MARK IS
(ROUGHLY) 1983

www.cloudflare.com!
IMPLICATIONS

www.cloudflare.com!
THE THING YOU ARE
DOING HAS BEEN DONE
BEFORE 
There’s great value in computer science
education

www.cloudflare.com!
WE ARE IN THE AGE OF
GREAT PRODUCTIVITY
Be thankful all that stuff’s been invented
already

www.cloudflare.com!
WE HAVE YET TO
CONQUER
UNRELIABILITY

www.cloudflare.com!
Ada Lovelace (1840s)

www.cloudflare.com!
Grace Hopper (1947)

www.cloudflare.com!
Maurice Wilkes (1950s)
• As soon as we started programming,

we found to our surprise that it wasn't
as easy to get programs right as we
had thought. Debugging had to be
discovered. I can remember the
exact instant when I realized that a
large part of my life from then on
was going to be spent in finding
mistakes in my own programs.
www.cloudflare.com!
Donald Knuth (1990s)
•  Question from audience: “Which programming language

do you prefer Java or C++?”
•  Knuth: “Which has the better debugger?”

www.cloudflare.com!
TURING’S CURSE
1936: There is no program that, given a
description of an arbitrary computer program,
can decide whether the program finishes
running or continues to run forever. 


www.cloudflare.com!
WORK ON RELIABILITY
Help programmers make fewer mistakes
Help programmers find their mistakes

www.cloudflare.com!

Contenu connexe

En vedette

Lua London Meetup 2013
Lua London Meetup 2013Lua London Meetup 2013
Lua London Meetup 2013Cloudflare
 
Pregnancy five
Pregnancy fivePregnancy five
Pregnancy fiveSimpony
 
Chc earthquake
Chc earthquakeChc earthquake
Chc earthquakekenbeckles
 
Spring 2 Smithe
Spring 2 SmitheSpring 2 Smithe
Spring 2 SmitheSimpony
 
Spring 2 cooke
Spring 2 cookeSpring 2 cooke
Spring 2 cookeSimpony
 
CMC Teacher Education SIG Presentation; Masats & Ambròs
CMC Teacher Education SIG Presentation; Masats & AmbròsCMC Teacher Education SIG Presentation; Masats & Ambròs
CMC Teacher Education SIG Presentation; Masats & AmbròsCmcTchrEdSIG
 
Flex vektor
Flex vektorFlex vektor
Flex vektorqaib
 
Dualacy uni chapter one
Dualacy uni chapter oneDualacy uni chapter one
Dualacy uni chapter oneSimpony
 
Go Concurrency
Go ConcurrencyGo Concurrency
Go ConcurrencyCloudflare
 
Winter 2 cooke
Winter 2 cookeWinter 2 cooke
Winter 2 cookeSimpony
 
Melamine epichlorohydrin prepolymers syntheses and characterization
Melamine epichlorohydrin prepolymers syntheses and characterizationMelamine epichlorohydrin prepolymers syntheses and characterization
Melamine epichlorohydrin prepolymers syntheses and characterizationArif Yavuz Akartepe
 
Summer 3 vega
Summer 3 vegaSummer 3 vega
Summer 3 vegaSimpony
 
Koike's_work_style.pdf
Koike's_work_style.pdfKoike's_work_style.pdf
Koike's_work_style.pdfTomokazuKoike
 

En vedette (15)

Lua London Meetup 2013
Lua London Meetup 2013Lua London Meetup 2013
Lua London Meetup 2013
 
2pac
2pac2pac
2pac
 
Pregnancy five
Pregnancy fivePregnancy five
Pregnancy five
 
Chc earthquake
Chc earthquakeChc earthquake
Chc earthquake
 
Spring 2 Smithe
Spring 2 SmitheSpring 2 Smithe
Spring 2 Smithe
 
Spring 2 cooke
Spring 2 cookeSpring 2 cooke
Spring 2 cooke
 
CMC Teacher Education SIG Presentation; Masats & Ambròs
CMC Teacher Education SIG Presentation; Masats & AmbròsCMC Teacher Education SIG Presentation; Masats & Ambròs
CMC Teacher Education SIG Presentation; Masats & Ambròs
 
Flex vektor
Flex vektorFlex vektor
Flex vektor
 
Dualacy uni chapter one
Dualacy uni chapter oneDualacy uni chapter one
Dualacy uni chapter one
 
Go Concurrency
Go ConcurrencyGo Concurrency
Go Concurrency
 
Bio Lab Paper
Bio Lab PaperBio Lab Paper
Bio Lab Paper
 
Winter 2 cooke
Winter 2 cookeWinter 2 cooke
Winter 2 cooke
 
Melamine epichlorohydrin prepolymers syntheses and characterization
Melamine epichlorohydrin prepolymers syntheses and characterizationMelamine epichlorohydrin prepolymers syntheses and characterization
Melamine epichlorohydrin prepolymers syntheses and characterization
 
Summer 3 vega
Summer 3 vegaSummer 3 vega
Summer 3 vega
 
Koike's_work_style.pdf
Koike's_work_style.pdfKoike's_work_style.pdf
Koike's_work_style.pdf
 

Similaire à OSCON 2013: Turing's Curse

Storia Dellinformatica 1215072576738244 8
Storia Dellinformatica 1215072576738244 8Storia Dellinformatica 1215072576738244 8
Storia Dellinformatica 1215072576738244 8myoo
 
historia de la informatica
historia de la informaticahistoria de la informatica
historia de la informaticamyoo
 
Storia Dell'informatica
Storia Dell'informaticaStoria Dell'informatica
Storia Dell'informaticaMarco Rovatti
 
INTERFACE, by apidays - APIs of the Future: Are you Ready? by Mike Amundsen
INTERFACE, by apidays  - APIs of the Future: Are you Ready? by Mike AmundsenINTERFACE, by apidays  - APIs of the Future: Are you Ready? by Mike Amundsen
INTERFACE, by apidays - APIs of the Future: Are you Ready? by Mike Amundsenapidays
 
Mobile matures and becomes ubiquitous
Mobile matures and becomes ubiquitousMobile matures and becomes ubiquitous
Mobile matures and becomes ubiquitousSascha Pallenberg
 
The Artificial Intelligence (AI) Era
The Artificial Intelligence (AI) Era The Artificial Intelligence (AI) Era
The Artificial Intelligence (AI) Era Ambeent
 
Engineering 4 0
Engineering 4 0Engineering 4 0
Engineering 4 0SOLIDWORKS
 
Pramonės revoliucijos inžinieriaus akimis.
Pramonės revoliucijos inžinieriaus akimis.Pramonės revoliucijos inžinieriaus akimis.
Pramonės revoliucijos inžinieriaus akimis.IN RE UAB
 
From Abacus To I Phone To Cresta Tv Share
From Abacus To I Phone To Cresta Tv ShareFrom Abacus To I Phone To Cresta Tv Share
From Abacus To I Phone To Cresta Tv ShareGeorge T. Haber
 
Tandem Launch Presentation
Tandem Launch PresentationTandem Launch Presentation
Tandem Launch PresentationPhilippe Collard
 
A Brief History Of The Computer
A Brief History Of The ComputerA Brief History Of The Computer
A Brief History Of The ComputerApril Knyff
 
Advancing the web without breaking it - #btconf
Advancing the web without breaking it - #btconfAdvancing the web without breaking it - #btconf
Advancing the web without breaking it - #btconfChristian Heilmann
 
Abriefhistoryofcomputers 121009151031-phpapp01
Abriefhistoryofcomputers 121009151031-phpapp01Abriefhistoryofcomputers 121009151031-phpapp01
Abriefhistoryofcomputers 121009151031-phpapp01Ishmael Ople-Oporto
 

Similaire à OSCON 2013: Turing's Curse (14)

Storia Dellinformatica 1215072576738244 8
Storia Dellinformatica 1215072576738244 8Storia Dellinformatica 1215072576738244 8
Storia Dellinformatica 1215072576738244 8
 
historia de la informatica
historia de la informaticahistoria de la informatica
historia de la informatica
 
Storia Dell'informatica
Storia Dell'informaticaStoria Dell'informatica
Storia Dell'informatica
 
INTERFACE, by apidays - APIs of the Future: Are you Ready? by Mike Amundsen
INTERFACE, by apidays  - APIs of the Future: Are you Ready? by Mike AmundsenINTERFACE, by apidays  - APIs of the Future: Are you Ready? by Mike Amundsen
INTERFACE, by apidays - APIs of the Future: Are you Ready? by Mike Amundsen
 
Mobile matures and becomes ubiquitous
Mobile matures and becomes ubiquitousMobile matures and becomes ubiquitous
Mobile matures and becomes ubiquitous
 
The Artificial Intelligence (AI) Era
The Artificial Intelligence (AI) Era The Artificial Intelligence (AI) Era
The Artificial Intelligence (AI) Era
 
Engineering 4 0
Engineering 4 0Engineering 4 0
Engineering 4 0
 
Pramonės revoliucijos inžinieriaus akimis.
Pramonės revoliucijos inžinieriaus akimis.Pramonės revoliucijos inžinieriaus akimis.
Pramonės revoliucijos inžinieriaus akimis.
 
From Abacus To I Phone To Cresta Tv Share
From Abacus To I Phone To Cresta Tv ShareFrom Abacus To I Phone To Cresta Tv Share
From Abacus To I Phone To Cresta Tv Share
 
Tandem Launch Presentation
Tandem Launch PresentationTandem Launch Presentation
Tandem Launch Presentation
 
A Brief History Of The Computer
A Brief History Of The ComputerA Brief History Of The Computer
A Brief History Of The Computer
 
Advancing the web without breaking it - #btconf
Advancing the web without breaking it - #btconfAdvancing the web without breaking it - #btconf
Advancing the web without breaking it - #btconf
 
A brief history of computers
A brief history of computersA brief history of computers
A brief history of computers
 
Abriefhistoryofcomputers 121009151031-phpapp01
Abriefhistoryofcomputers 121009151031-phpapp01Abriefhistoryofcomputers 121009151031-phpapp01
Abriefhistoryofcomputers 121009151031-phpapp01
 

Plus de Cloudflare

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Cloudflare
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareCloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceCloudflare
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarCloudflare
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Cloudflare
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...Cloudflare
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Cloudflare
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataCloudflare
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondCloudflare
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cloudflare
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksCloudflare
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaCloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?Cloudflare
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cloudflare
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsCloudflare
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformationCloudflare
 

Plus de Cloudflare (20)

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 

Dernier

Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneUiPathCommunity
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 

Dernier (20)

Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
WomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyoneWomenInAutomation2024: AI and Automation for eveyone
WomenInAutomation2024: AI and Automation for eveyone
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 

OSCON 2013: Turing's Curse