SlideShare une entreprise Scribd logo
1  sur  44
PRIMER
PRIVACY LAW
piiLabsSeattleWorkshop_ChristinaGagnier
Experience won’t just be about the tool you
build, but it will include how you manage
sensitive data and how you respect users.
This talk is not about Facebook.
This talk is about you.
uncharted legal territory




                     What do we mean by “privacy?”
piiLabsSeattleWorkshop_ChristinaGagnier
Distinguishing Fourth Amendment from privacy
in the civil sense.
Electronic Communications Privacy Act
Personally Identifiable Information (Pii)
“Personally identifiable information” is information that
identifies a particular person. “Pii” includes:

  • Full name;
  • National identification number;
  • IP address;
  • Vehicle registration plate number;
  • Driver’s license number;
  • Face;
  • Fingerprints;
  • Handwriting;
  • Credit card numbers;
  • Digital identity;
  • Date of birth;
  • Birthplace; and
  • Genetic information.
federal movement on privacy




                     I just want to build cool stuff.
                               Why should I care?
piiLabsSeattleWorkshop_ChristinaGagnier
Problem #1: The laws around data reside in
industry silos.
piiLabsSeattleWorkshop_ChristinaGagnier
Few pieces of key legislation:

    Do Not Track Act

    Commercial Privacy Bill of Rights Act of 2011

    Personal Data Privacy and Security Act

    Secure and Fortify Electronics Data Act (SAFE)

    Data Security and Breach Notification Act
Problem #2: They aren’t getting it in DC.
Silicon Valley, Alley, Beach > DC
Problem #3: This isn’t going away.
FTC Action

   Opting Out = ScanScout

   Children’s Privacy = SkidKids
oh crap.




           What Developers Can Do
What people care about:
Data control
Data minimization
Data portability
Data withdrawal
Here are a few places to start:
Conducting an assessment on privacy and
data security.
type

         amount
Audit:
         use

         intake
Architectural solutions to privacy. Build with
privacy in mind.
We can work to create a marketplace that
rewards “privacy by design” while promoting
innovation.
Policy solutions to privacy.
Privacy policies and practices in their current
incarnation are not working.
piiLabsSeattleWorkshop_ChristinaGagnier
piiLabsSeattleWorkshop_ChristinaGagnier
kidz.




        yes, different rules apply.
piiLabsSeattleWorkshop_ChristinaGagnier
Minors

Children’s Online Privacy Protection Act
Children’s Online Privacy Protection Act

Regulates all types of identifying information

Exemptions: electronic postcards, contests, online
newsletters, homework help

Example: Disney’s Club Penguin

If you know you have minors on your site, close
the accounts
Children’s Online Privacy Protection Act

Requires websites to get parental consent before
collecting or sharing info for children under 13

Enforced by the Federal Trade Commission

Applies to commercial websites and other online
services

If you know you have minors on your site, close
the accounts
Children’s Online Privacy Protection Act

To comply:

   Post a privacy policy/advise whenever personal
   information collected

   Parental notice, consent, access to information

   Can’t condition participation on providing
   more info

   Confidentiality & security of information
   collected from children
We just scratched the surface.
Lawyer

         Christina Gagnier
         @gagnier
         gagnier@gamallp.com
         gamallp.com
?
PRIMER
PRIVACY LAW

Contenu connexe

Tendances

The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerceWisnu Dewobroto
 
Aleksandr Yampolskiy Presentation
Aleksandr Yampolskiy PresentationAleksandr Yampolskiy Presentation
Aleksandr Yampolskiy PresentationMediabistro
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyThoughtworks
 
Update on Access to Digital Assets: Are We There Yet?
Update on Access to Digital Assets: Are We There Yet?Update on Access to Digital Assets: Are We There Yet?
Update on Access to Digital Assets: Are We There Yet?gallowayandcollens
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingAIIM International
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
Legal aspects of e commerce
Legal aspects of e commerceLegal aspects of e commerce
Legal aspects of e commerceImmo Böhm
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijingInternet Law Center
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity Digital-identity
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceNicholas Davis
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethicalSheetal Verma
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...VALLOYD
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 

Tendances (20)

Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerce
 
Aleksandr Yampolskiy Presentation
Aleksandr Yampolskiy PresentationAleksandr Yampolskiy Presentation
Aleksandr Yampolskiy Presentation
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
Update on Access to Digital Assets: Are We There Yet?
Update on Access to Digital Assets: Are We There Yet?Update on Access to Digital Assets: Are We There Yet?
Update on Access to Digital Assets: Are We There Yet?
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
Privacy Concerns and Cloud Computing
Privacy Concerns and Cloud ComputingPrivacy Concerns and Cloud Computing
Privacy Concerns and Cloud Computing
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Legal aspects of e commerce
Legal aspects of e commerceLegal aspects of e commerce
Legal aspects of e commerce
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Ethical issues in Digital Identity
Ethical issues in Digital Identity Ethical issues in Digital Identity
Ethical issues in Digital Identity
 
Ethical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E CommerceEthical, Social And Political Issues Raised By E Commerce
Ethical, Social And Political Issues Raised By E Commerce
 
Legal social ethical
Legal social ethicalLegal social ethical
Legal social ethical
 
GDPRforum London
GDPRforum LondonGDPRforum London
GDPRforum London
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 

En vedette

Pii2011 jason cavnar_lockerproject
Pii2011 jason cavnar_lockerprojectPii2011 jason cavnar_lockerproject
Pii2011 jason cavnar_lockerprojectpii2011
 
201302 jawsug cloudgirl ♡AWS de Diet♡
201302 jawsug cloudgirl ♡AWS de Diet♡201302 jawsug cloudgirl ♡AWS de Diet♡
201302 jawsug cloudgirl ♡AWS de Diet♡Gyori Nagafuchi
 
Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii marketpii2011
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneIDpii2011
 
Startup Spotlight: Disconnect
Startup Spotlight: DisconnectStartup Spotlight: Disconnect
Startup Spotlight: Disconnectpii2011
 
Pii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkPii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkpii2011
 

En vedette (8)

Pii2011 jason cavnar_lockerproject
Pii2011 jason cavnar_lockerprojectPii2011 jason cavnar_lockerproject
Pii2011 jason cavnar_lockerproject
 
201302 jawsug cloudgirl ♡AWS de Diet♡
201302 jawsug cloudgirl ♡AWS de Diet♡201302 jawsug cloudgirl ♡AWS de Diet♡
201302 jawsug cloudgirl ♡AWS de Diet♡
 
Mapping the pii market
Mapping the pii marketMapping the pii market
Mapping the pii market
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneID
 
Startup Spotlight: Disconnect
Startup Spotlight: DisconnectStartup Spotlight: Disconnect
Startup Spotlight: Disconnect
 
Profilo aziendale KDEV
Profilo aziendale KDEVProfilo aziendale KDEV
Profilo aziendale KDEV
 
SUG - Sistema Unico Gestione
SUG - Sistema Unico Gestione SUG - Sistema Unico Gestione
SUG - Sistema Unico Gestione
 
Pii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalkPii2012 jim adler_may15_lightningtalk
Pii2012 jim adler_may15_lightningtalk
 

Similaire à piiLabsSeattleWorkshop_ChristinaGagnier

Essay On Threat To Internet Privacy
Essay On Threat To Internet PrivacyEssay On Threat To Internet Privacy
Essay On Threat To Internet PrivacyMelissa Hewitt
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelAffiliate Summit
 
Improving Customer Data Security Of A Company
Improving Customer Data Security Of A CompanyImproving Customer Data Security Of A Company
Improving Customer Data Security Of A CompanyHolly Hernandez
 
Lack Of Privacy On The Internet
Lack Of Privacy On The InternetLack Of Privacy On The Internet
Lack Of Privacy On The InternetMichelle Frantz
 
Snowden And Privacy
Snowden And PrivacySnowden And Privacy
Snowden And PrivacyJen Williams
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
Examples Of Identity Theft
Examples Of Identity TheftExamples Of Identity Theft
Examples Of Identity TheftJanet Robinson
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
Personal Information Security Report
Personal Information Security ReportPersonal Information Security Report
Personal Information Security ReportJill Bell
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Vivastream
 
Privacy Under Attack Analysis
Privacy Under Attack AnalysisPrivacy Under Attack Analysis
Privacy Under Attack AnalysisKate Subramanian
 
Informative Essay On Identity Theft
Informative Essay On Identity TheftInformative Essay On Identity Theft
Informative Essay On Identity TheftRebecca Harris
 
GDPR General Awarness for employees and personal data types
GDPR General Awarness for employees and personal data typesGDPR General Awarness for employees and personal data types
GDPR General Awarness for employees and personal data typesAbdullaFatiya3
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldRobert Stribley
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Privacy In The Information Age
Privacy In The Information AgePrivacy In The Information Age
Privacy In The Information AgeDeb Birch
 
Security And Control Of Privacy
Security And Control Of PrivacySecurity And Control Of Privacy
Security And Control Of PrivacySasha Jones
 

Similaire à piiLabsSeattleWorkshop_ChristinaGagnier (20)

Essay On Threat To Internet Privacy
Essay On Threat To Internet PrivacyEssay On Threat To Internet Privacy
Essay On Threat To Internet Privacy
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
Improving Customer Data Security Of A Company
Improving Customer Data Security Of A CompanyImproving Customer Data Security Of A Company
Improving Customer Data Security Of A Company
 
Lack Of Privacy On The Internet
Lack Of Privacy On The InternetLack Of Privacy On The Internet
Lack Of Privacy On The Internet
 
Snowden And Privacy
Snowden And PrivacySnowden And Privacy
Snowden And Privacy
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Examples Of Identity Theft
Examples Of Identity TheftExamples Of Identity Theft
Examples Of Identity Theft
 
CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Personal Information Security Report
Personal Information Security ReportPersonal Information Security Report
Personal Information Security Report
 
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
Is More Data Always Better? The Legal Risks of Data Collection, Storage and U...
 
Privacy Under Attack Analysis
Privacy Under Attack AnalysisPrivacy Under Attack Analysis
Privacy Under Attack Analysis
 
Informative Essay On Identity Theft
Informative Essay On Identity TheftInformative Essay On Identity Theft
Informative Essay On Identity Theft
 
GDPR General Awarness for employees and personal data types
GDPR General Awarness for employees and personal data typesGDPR General Awarness for employees and personal data types
GDPR General Awarness for employees and personal data types
 
Designing for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public WorldDesigning for Privacy in an Increasingly Public World
Designing for Privacy in an Increasingly Public World
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Privacy In The Information Age
Privacy In The Information AgePrivacy In The Information Age
Privacy In The Information Age
 
Security And Control Of Privacy
Security And Control Of PrivacySecurity And Control Of Privacy
Security And Control Of Privacy
 

Dernier

UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Alexander Turgeon
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...Daniel Zivkovic
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Juan Carlos Gonzalez
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 

Dernier (20)

UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 

piiLabsSeattleWorkshop_ChristinaGagnier