SlideShare a Scribd company logo
1 of 5
New media and security   Chendan  XU ID: n7360169 TUT: Friday 1pm
Security risk  Social media Social media web sites allow users to ,[object Object]
communicate with each other,
network
and interact but because of the easy transfer of information between different social media sites, information that should be private becomes public and opens the users to serious security risks.

More Related Content

What's hot

'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...
'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...
'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...Axel Bruns
 
Social Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationSocial Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationAxel Bruns
 
Social Media May 2009
Social Media May 2009Social Media May 2009
Social Media May 2009derekabdinor
 
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...Axel Bruns
 
Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...Scott A. Hale
 
From Cable Niche to Social Media Success: International Engagement with Sky N...
From Cable Niche to Social Media Success: International Engagement with Sky N...From Cable Niche to Social Media Success: International Engagement with Sky N...
From Cable Niche to Social Media Success: International Engagement with Sky N...Axel Bruns
 
Social Network Site personal use
Social Network Site personal useSocial Network Site personal use
Social Network Site personal useJennifer LeBeau
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 
Social Media Brownbag Presentation
Social Media Brownbag PresentationSocial Media Brownbag Presentation
Social Media Brownbag PresentationArlton Lowry
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesIJCNCJournal
 
Let’s get social tm speech presentation
Let’s get social tm speech presentationLet’s get social tm speech presentation
Let’s get social tm speech presentationaudragerger
 
Teaching with Social Media | Faculty Seminars at Michigan State University 2014
Teaching with Social Media | Faculty Seminars at Michigan State University 2014Teaching with Social Media | Faculty Seminars at Michigan State University 2014
Teaching with Social Media | Faculty Seminars at Michigan State University 2014Emily Brozovic
 
CityWeek presentation by Mark Jones
CityWeek presentation by Mark JonesCityWeek presentation by Mark Jones
CityWeek presentation by Mark JonesMark Jones
 
Social Media Best Practices
Social Media Best PracticesSocial Media Best Practices
Social Media Best PracticesEric Sheninger
 
2013 05 20 field_directors
2013 05 20 field_directors2013 05 20 field_directors
2013 05 20 field_directorsCliff Lampe
 
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...Axel Bruns
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
Crowdsourcing Investigative Journalism
Crowdsourcing Investigative JournalismCrowdsourcing Investigative Journalism
Crowdsourcing Investigative JournalismPaul Bradshaw
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickStefan Tanase
 

What's hot (20)

'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...
'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...
'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...
 
Social Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationSocial Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)information
 
Social Media May 2009
Social Media May 2009Social Media May 2009
Social Media May 2009
 
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...
 
Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...
 
From Cable Niche to Social Media Success: International Engagement with Sky N...
From Cable Niche to Social Media Success: International Engagement with Sky N...From Cable Niche to Social Media Success: International Engagement with Sky N...
From Cable Niche to Social Media Success: International Engagement with Sky N...
 
Social Network Site personal use
Social Network Site personal useSocial Network Site personal use
Social Network Site personal use
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
Social Media Brownbag Presentation
Social Media Brownbag PresentationSocial Media Brownbag Presentation
Social Media Brownbag Presentation
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking Websites
 
Let’s get social tm speech presentation
Let’s get social tm speech presentationLet’s get social tm speech presentation
Let’s get social tm speech presentation
 
Teaching with Social Media | Faculty Seminars at Michigan State University 2014
Teaching with Social Media | Faculty Seminars at Michigan State University 2014Teaching with Social Media | Faculty Seminars at Michigan State University 2014
Teaching with Social Media | Faculty Seminars at Michigan State University 2014
 
Social media
Social mediaSocial media
Social media
 
CityWeek presentation by Mark Jones
CityWeek presentation by Mark JonesCityWeek presentation by Mark Jones
CityWeek presentation by Mark Jones
 
Social Media Best Practices
Social Media Best PracticesSocial Media Best Practices
Social Media Best Practices
 
2013 05 20 field_directors
2013 05 20 field_directors2013 05 20 field_directors
2013 05 20 field_directors
 
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Crowdsourcing Investigative Journalism
Crowdsourcing Investigative JournalismCrowdsourcing Investigative Journalism
Crowdsourcing Investigative Journalism
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 

Viewers also liked

Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLucy Shop
 
00.水域安全與救生 目錄
00.水域安全與救生 目錄00.水域安全與救生 目錄
00.水域安全與救生 目錄Wen-Hsien SU
 
How to kill your product
How to kill your productHow to kill your product
How to kill your productVineet Markan
 
Pluto7 meetup -silicon valley - 2015 version3
Pluto7    meetup -silicon valley -  2015 version3Pluto7    meetup -silicon valley -  2015 version3
Pluto7 meetup -silicon valley - 2015 version3Manju Devadas
 
Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLucy Shop
 
Pluto7 - Vizualization and BI Trends and Best Practices 2015
Pluto7   - Vizualization and BI Trends and Best Practices 2015Pluto7   - Vizualization and BI Trends and Best Practices 2015
Pluto7 - Vizualization and BI Trends and Best Practices 2015Manju Devadas
 
Future of Work and Birch
Future of Work and BirchFuture of Work and Birch
Future of Work and BirchVineet Markan
 
TweetUp presentation
TweetUp presentationTweetUp presentation
TweetUp presentationKanna Taylor
 
Lời hứa anh và em
Lời hứa anh và emLời hứa anh và em
Lời hứa anh và emLucy Shop
 
Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLucy Shop
 
第二次讀書會活動流程簡報
第二次讀書會活動流程簡報第二次讀書會活動流程簡報
第二次讀書會活動流程簡報Wen-Hsien SU
 
創意發想 I travel
創意發想   I travel創意發想   I travel
創意發想 I travelWen-Hsien SU
 
Pluto7 - Tableau Webinar on enabling Organization to be Data Driven in 201...
Pluto7   -  Tableau Webinar on enabling Organization to be Data Driven in 201...Pluto7   -  Tableau Webinar on enabling Organization to be Data Driven in 201...
Pluto7 - Tableau Webinar on enabling Organization to be Data Driven in 201...Manju Devadas
 

Viewers also liked (17)

Circuit Simplifier
Circuit SimplifierCircuit Simplifier
Circuit Simplifier
 
Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàng
 
00.水域安全與救生 目錄
00.水域安全與救生 目錄00.水域安全與救生 目錄
00.水域安全與救生 目錄
 
How to kill your product
How to kill your productHow to kill your product
How to kill your product
 
Pluto7 meetup v2
Pluto7    meetup v2Pluto7    meetup v2
Pluto7 meetup v2
 
Pluto7 meetup -silicon valley - 2015 version3
Pluto7    meetup -silicon valley -  2015 version3Pluto7    meetup -silicon valley -  2015 version3
Pluto7 meetup -silicon valley - 2015 version3
 
Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàng
 
Pluto7 - Vizualization and BI Trends and Best Practices 2015
Pluto7   - Vizualization and BI Trends and Best Practices 2015Pluto7   - Vizualization and BI Trends and Best Practices 2015
Pluto7 - Vizualization and BI Trends and Best Practices 2015
 
Future of Work and Birch
Future of Work and BirchFuture of Work and Birch
Future of Work and Birch
 
TweetUp presentation
TweetUp presentationTweetUp presentation
TweetUp presentation
 
Lời hứa anh và em
Lời hứa anh và emLời hứa anh và em
Lời hứa anh và em
 
Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàng
 
Storyboard 研究
Storyboard 研究Storyboard 研究
Storyboard 研究
 
第二次讀書會活動流程簡報
第二次讀書會活動流程簡報第二次讀書會活動流程簡報
第二次讀書會活動流程簡報
 
創意發想 I travel
創意發想   I travel創意發想   I travel
創意發想 I travel
 
Pluto7 - Tableau Webinar on enabling Organization to be Data Driven in 201...
Pluto7   -  Tableau Webinar on enabling Organization to be Data Driven in 201...Pluto7   -  Tableau Webinar on enabling Organization to be Data Driven in 201...
Pluto7 - Tableau Webinar on enabling Organization to be Data Driven in 201...
 
Start the f **k up
Start the f **k upStart the f **k up
Start the f **k up
 

Similar to Kcb207

PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...ijwscjournal
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...ijwscjournal
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationshipsElizabeth Gestier
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Social media visualization for crisis management
Social media visualization for crisis managementSocial media visualization for crisis management
Social media visualization for crisis managementMustafa Alkhunni
 
A Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesA Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesIOSR Journals
 
Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)rhonabwy
 
Masters Thesis Project
Masters Thesis ProjectMasters Thesis Project
Masters Thesis ProjectDaniel Moran
 
Social Media Guidelines for INC Journalists
Social Media Guidelines for INC Journalists Social Media Guidelines for INC Journalists
Social Media Guidelines for INC Journalists Daniel Moran
 
Slides
SlidesSlides
Slidesrkc20
 
Social networking-overview
Social networking-overviewSocial networking-overview
Social networking-overviewsakshicherry
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt Sudhanshu Sandhir
 

Similar to Kcb207 (20)

PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Suciu et al_ ro_edunet_2015
Suciu et al_ ro_edunet_2015Suciu et al_ ro_edunet_2015
Suciu et al_ ro_edunet_2015
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationships
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social media visualization for crisis management
Social media visualization for crisis managementSocial media visualization for crisis management
Social media visualization for crisis management
 
A Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesA Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking Sites
 
Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)
 
Masters Thesis Project
Masters Thesis ProjectMasters Thesis Project
Masters Thesis Project
 
Social Media Guidelines for INC Journalists
Social Media Guidelines for INC Journalists Social Media Guidelines for INC Journalists
Social Media Guidelines for INC Journalists
 
Slides
SlidesSlides
Slides
 
Social networking-overview
Social networking-overviewSocial networking-overview
Social networking-overview
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt
 

Recently uploaded

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Kcb207