SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Silverlight2 Security Microsoft Korea Next Web Team Reagan Hwang / UX Evangelist
Application Code
Silverlight 2 Application Security Model
How Silverlight 2 processes application code
More Silverlight Application Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HTML Bridge
Security Settings in HTML Bridge ,[object Object],[object Object],[object Object]
from Silverlight to JavaScript ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],<div id=&quot;silverlightControlHost&quot;> <object data=&quot;data:application/x-silverlight-2,&quot; type=&quot;application/x-silverlight-2&quot; width=&quot;300&quot; height=&quot;100&quot; <param name=&quot;source&quot; value=&quot;http://www.northwindtraders.com/MySample.xap&quot;/> <param name=&quot;enableHtmlAccess&quot; value=&quot;true&quot; />  // for cross-domain application </object> </div>
enableHtmlAccess Workarounds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
from JavaScript to Silverlight ,[object Object],<Deployment xmlns=&quot;http://schemas.microsoft.com/client/2007&quot; xmlns:x=&quot;http://schemas.microsoft.com/winfx/2006/xaml&quot;  EntryPointAssembly=&quot;MyAppAssembly&quot; EntryPointType=&quot;MyNamespace.MyApplication&quot; ExternalCallersFromCrossDomain=&quot;ScriptableOnly&quot; > <Deployment.Parts> <AssemblyPart Source=&quot;MyAppAssembly.dll” /> <AssemblyPart Source=&quot;MyUserControl.dll&quot; /> </Deployment.Parts> </Deployment>
ExternalCallersFromCrossDomain Workarounds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HTTP communication
Default HTTP Support  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HTTP Communication Scenario
Same Domain
Cross Domain ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cross-Domain Policy File Example Network Security Access Restrictions in Silverlight 2 (more crossdomain policy file) http://msdn.microsoft.com/en-us/library/cc645032(VS.95).aspx <?xml version=&quot;1.0&quot; encoding=&quot;utf-8&quot;?> <access-policy> <cross-domain-access> <policy > <allow-from http-request-headers=&quot;SOAPAction&quot;> <domain uri=&quot;*&quot;/> </allow-from> <grant-to> <resource path=&quot;/services/&quot; include-subpaths=&quot;true&quot;/> </grant-to> </policy> </cross-domain-access> </access-policy>
URL Access Restrictions in Silverlight 2
Reference ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Oauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 supportOauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 support
Gaurav Sharma
 
AppSec 2007 - .NET Web Services Hacking
AppSec 2007 - .NET Web Services HackingAppSec 2007 - .NET Web Services Hacking
AppSec 2007 - .NET Web Services Hacking
Shreeraj Shah
 
Hacking Web 2.0 - Defending Ajax and Web Services [HITB 2007 Dubai]
Hacking Web 2.0 - Defending Ajax and Web Services [HITB 2007 Dubai]Hacking Web 2.0 - Defending Ajax and Web Services [HITB 2007 Dubai]
Hacking Web 2.0 - Defending Ajax and Web Services [HITB 2007 Dubai]
Shreeraj Shah
 
Rest Security with JAX-RS
Rest Security with JAX-RSRest Security with JAX-RS
Rest Security with JAX-RS
Frank Kim
 

Was ist angesagt? (20)

Protecting your APIs with Doorkeeper and OAuth 2.0
Protecting your APIs with Doorkeeper and OAuth 2.0Protecting your APIs with Doorkeeper and OAuth 2.0
Protecting your APIs with Doorkeeper and OAuth 2.0
 
CSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open RedirectCSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open Redirect
 
2013 OWASP Top 10
2013 OWASP Top 102013 OWASP Top 10
2013 OWASP Top 10
 
XPATH, LDAP and Path Traversal Injection
XPATH, LDAP and Path Traversal InjectionXPATH, LDAP and Path Traversal Injection
XPATH, LDAP and Path Traversal Injection
 
Securing your apps with OAuth2 and OpenID Connect - Roland Guijt - Codemotion...
Securing your apps with OAuth2 and OpenID Connect - Roland Guijt - Codemotion...Securing your apps with OAuth2 and OpenID Connect - Roland Guijt - Codemotion...
Securing your apps with OAuth2 and OpenID Connect - Roland Guijt - Codemotion...
 
Oauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 supportOauth2 and OWSM OAuth2 support
Oauth2 and OWSM OAuth2 support
 
Best Practices in Building an API Security Ecosystem
Best Practices in Building an API Security EcosystemBest Practices in Building an API Security Ecosystem
Best Practices in Building an API Security Ecosystem
 
Top 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesTop 10 Web Security Vulnerabilities
Top 10 Web Security Vulnerabilities
 
AppSec 2007 - .NET Web Services Hacking
AppSec 2007 - .NET Web Services HackingAppSec 2007 - .NET Web Services Hacking
AppSec 2007 - .NET Web Services Hacking
 
D@W REST security
D@W REST securityD@W REST security
D@W REST security
 
SynapseIndia dotnet development ajax client library
SynapseIndia dotnet development ajax client librarySynapseIndia dotnet development ajax client library
SynapseIndia dotnet development ajax client library
 
SynapseIndia asp.net2.0 ajax Development
SynapseIndia asp.net2.0 ajax DevelopmentSynapseIndia asp.net2.0 ajax Development
SynapseIndia asp.net2.0 ajax Development
 
OAuth2 - Introduction
OAuth2 - IntroductionOAuth2 - Introduction
OAuth2 - Introduction
 
Web API 2 Token Based Authentication
Web API 2 Token Based AuthenticationWeb API 2 Token Based Authentication
Web API 2 Token Based Authentication
 
Hacking Web 2.0 - Defending Ajax and Web Services [HITB 2007 Dubai]
Hacking Web 2.0 - Defending Ajax and Web Services [HITB 2007 Dubai]Hacking Web 2.0 - Defending Ajax and Web Services [HITB 2007 Dubai]
Hacking Web 2.0 - Defending Ajax and Web Services [HITB 2007 Dubai]
 
Rest API Security
Rest API SecurityRest API Security
Rest API Security
 
OAuth 2.0
OAuth 2.0OAuth 2.0
OAuth 2.0
 
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
 
Rest Security with JAX-RS
Rest Security with JAX-RSRest Security with JAX-RS
Rest Security with JAX-RS
 
HTML5 hacking
HTML5 hackingHTML5 hacking
HTML5 hacking
 

Andere mochten auch

Ajax In Enterprise Portals Wesley Hales
Ajax In Enterprise Portals Wesley HalesAjax In Enterprise Portals Wesley Hales
Ajax In Enterprise Portals Wesley Hales
rajivmordani
 
Avaliacao da eficacia terapeutica de efavirenz em usuarios da rede publica de...
Avaliacao da eficacia terapeutica de efavirenz em usuarios da rede publica de...Avaliacao da eficacia terapeutica de efavirenz em usuarios da rede publica de...
Avaliacao da eficacia terapeutica de efavirenz em usuarios da rede publica de...
Giovanni Oliveira
 
Levantamento de casos de carcinoma basocelular.pdf
Levantamento de casos de carcinoma basocelular.pdfLevantamento de casos de carcinoma basocelular.pdf
Levantamento de casos de carcinoma basocelular.pdf
Giovanni Oliveira
 
SISTEMAS DE OTIMIZAÇÃO, ESTUDO CONCEITUAL PARA A VIDA PRÁTICA DOS GESTORES BA...
SISTEMAS DE OTIMIZAÇÃO, ESTUDO CONCEITUAL PARA A VIDA PRÁTICA DOS GESTORES BA...SISTEMAS DE OTIMIZAÇÃO, ESTUDO CONCEITUAL PARA A VIDA PRÁTICA DOS GESTORES BA...
SISTEMAS DE OTIMIZAÇÃO, ESTUDO CONCEITUAL PARA A VIDA PRÁTICA DOS GESTORES BA...
IHM Engenharia
 
How to prevent the cache problem in AJAX
How to prevent the cache problem in AJAXHow to prevent the cache problem in AJAX
How to prevent the cache problem in AJAX
Ramzi Alqrainy
 
TR's Square Deal
TR's Square DealTR's Square Deal
TR's Square Deal
Melissa
 
Negotiation Lewecki Ch 3 Integrative Negotiations [sav lecture]
Negotiation Lewecki Ch 3 Integrative Negotiations [sav lecture]Negotiation Lewecki Ch 3 Integrative Negotiations [sav lecture]
Negotiation Lewecki Ch 3 Integrative Negotiations [sav lecture]
Fan DiFu, Ph.D. (Steve)
 

Andere mochten auch (20)

ppt
pptppt
ppt
 
Disenoparachile
DisenoparachileDisenoparachile
Disenoparachile
 
Architecting RIAs with Silverlight
Architecting RIAs with SilverlightArchitecting RIAs with Silverlight
Architecting RIAs with Silverlight
 
TheStoreFront Community project: May - Oct 2008
TheStoreFront Community project: May - Oct 2008TheStoreFront Community project: May - Oct 2008
TheStoreFront Community project: May - Oct 2008
 
Ajax In Enterprise Portals Wesley Hales
Ajax In Enterprise Portals Wesley HalesAjax In Enterprise Portals Wesley Hales
Ajax In Enterprise Portals Wesley Hales
 
Lectura en el Aula E.Infantil 3 años
Lectura en el Aula E.Infantil 3 añosLectura en el Aula E.Infantil 3 años
Lectura en el Aula E.Infantil 3 años
 
Roberto Bicchierai - Defending web applications from attacks
Roberto Bicchierai - Defending web applications from attacksRoberto Bicchierai - Defending web applications from attacks
Roberto Bicchierai - Defending web applications from attacks
 
Conservancy Safaris Launch Webinar
Conservancy Safaris Launch WebinarConservancy Safaris Launch Webinar
Conservancy Safaris Launch Webinar
 
Avaliacao da eficacia terapeutica de efavirenz em usuarios da rede publica de...
Avaliacao da eficacia terapeutica de efavirenz em usuarios da rede publica de...Avaliacao da eficacia terapeutica de efavirenz em usuarios da rede publica de...
Avaliacao da eficacia terapeutica de efavirenz em usuarios da rede publica de...
 
Learning Pool Social Care Webinar Presentation
Learning Pool Social Care Webinar PresentationLearning Pool Social Care Webinar Presentation
Learning Pool Social Care Webinar Presentation
 
Levantamento de casos de carcinoma basocelular.pdf
Levantamento de casos de carcinoma basocelular.pdfLevantamento de casos de carcinoma basocelular.pdf
Levantamento de casos de carcinoma basocelular.pdf
 
SISTEMAS DE OTIMIZAÇÃO, ESTUDO CONCEITUAL PARA A VIDA PRÁTICA DOS GESTORES BA...
SISTEMAS DE OTIMIZAÇÃO, ESTUDO CONCEITUAL PARA A VIDA PRÁTICA DOS GESTORES BA...SISTEMAS DE OTIMIZAÇÃO, ESTUDO CONCEITUAL PARA A VIDA PRÁTICA DOS GESTORES BA...
SISTEMAS DE OTIMIZAÇÃO, ESTUDO CONCEITUAL PARA A VIDA PRÁTICA DOS GESTORES BA...
 
Anger
AngerAnger
Anger
 
How to prevent the cache problem in AJAX
How to prevent the cache problem in AJAXHow to prevent the cache problem in AJAX
How to prevent the cache problem in AJAX
 
What We Are Learning From Google & Flickr About Digitization and Partnership
What We Are Learning From Google & Flickr About Digitization and PartnershipWhat We Are Learning From Google & Flickr About Digitization and Partnership
What We Are Learning From Google & Flickr About Digitization and Partnership
 
TR's Square Deal
TR's Square DealTR's Square Deal
TR's Square Deal
 
Web 2.0 Challenges for appraisal
Web 2.0 Challenges for appraisalWeb 2.0 Challenges for appraisal
Web 2.0 Challenges for appraisal
 
Negotiation Lewecki Ch 3 Integrative Negotiations [sav lecture]
Negotiation Lewecki Ch 3 Integrative Negotiations [sav lecture]Negotiation Lewecki Ch 3 Integrative Negotiations [sav lecture]
Negotiation Lewecki Ch 3 Integrative Negotiations [sav lecture]
 
Ntpc ltd
Ntpc ltdNtpc ltd
Ntpc ltd
 
Itc ltd
Itc ltdItc ltd
Itc ltd
 

Ähnlich wie Silverlight2 Security

Flex security
Flex securityFlex security
Flex security
chengalva
 
Dom Hackking & Security - BlackHat Preso
Dom Hackking & Security - BlackHat PresoDom Hackking & Security - BlackHat Preso
Dom Hackking & Security - BlackHat Preso
Shreeraj Shah
 
Chapter5-Bypass-ClientSide-Control-Presentation.pptx
Chapter5-Bypass-ClientSide-Control-Presentation.pptxChapter5-Bypass-ClientSide-Control-Presentation.pptx
Chapter5-Bypass-ClientSide-Control-Presentation.pptx
ilhamilyas5
 

Ähnlich wie Silverlight2 Security (20)

Html bridge
Html bridgeHtml bridge
Html bridge
 
MTaulty_DevWeek_Silverlight
MTaulty_DevWeek_SilverlightMTaulty_DevWeek_Silverlight
MTaulty_DevWeek_Silverlight
 
DODN2009 - Jump Start Silverlight
DODN2009 - Jump Start SilverlightDODN2009 - Jump Start Silverlight
DODN2009 - Jump Start Silverlight
 
Top security threats to Flash/Flex applications and how to avoid them
Top security threats to Flash/Flex applications and how to avoid themTop security threats to Flash/Flex applications and how to avoid them
Top security threats to Flash/Flex applications and how to avoid them
 
14. html 5 security considerations
14. html 5 security considerations14. html 5 security considerations
14. html 5 security considerations
 
Web 20 Security - Vordel
Web 20 Security - VordelWeb 20 Security - Vordel
Web 20 Security - Vordel
 
Flex security
Flex securityFlex security
Flex security
 
Extending the Browser Programming Model with Silverlight
Extending the Browser Programming Model with SilverlightExtending the Browser Programming Model with Silverlight
Extending the Browser Programming Model with Silverlight
 
Silverlight 2
Silverlight 2Silverlight 2
Silverlight 2
 
Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008Top Ten Web Hacking Techniques – 2008
Top Ten Web Hacking Techniques – 2008
 
04. xss and encoding
04.  xss and encoding04.  xss and encoding
04. xss and encoding
 
Owasp web security
Owasp web securityOwasp web security
Owasp web security
 
High Velocity DevOps: Four Ways to Leverage CloudFront in Faster DevOps Workf...
High Velocity DevOps: Four Ways to Leverage CloudFront in Faster DevOps Workf...High Velocity DevOps: Four Ways to Leverage CloudFront in Faster DevOps Workf...
High Velocity DevOps: Four Ways to Leverage CloudFront in Faster DevOps Workf...
 
The Same-Origin Policy
The Same-Origin PolicyThe Same-Origin Policy
The Same-Origin Policy
 
JavaScript
JavaScriptJavaScript
JavaScript
 
Introduction to the Client OM in SharePoint 2010
Introduction to the Client OM in SharePoint 2010Introduction to the Client OM in SharePoint 2010
Introduction to the Client OM in SharePoint 2010
 
Dom Hackking & Security - BlackHat Preso
Dom Hackking & Security - BlackHat PresoDom Hackking & Security - BlackHat Preso
Dom Hackking & Security - BlackHat Preso
 
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
Understanding Identity in the World of Web APIs – Ronnie Mitra,  API Architec...Understanding Identity in the World of Web APIs – Ronnie Mitra,  API Architec...
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
 
Chapter 5: Attack Execution - The Client
Chapter 5: Attack Execution - The ClientChapter 5: Attack Execution - The Client
Chapter 5: Attack Execution - The Client
 
Chapter5-Bypass-ClientSide-Control-Presentation.pptx
Chapter5-Bypass-ClientSide-Control-Presentation.pptxChapter5-Bypass-ClientSide-Control-Presentation.pptx
Chapter5-Bypass-ClientSide-Control-Presentation.pptx
 

Mehr von Reagan Hwang

JSLounge - TypeScript 소개
JSLounge - TypeScript 소개JSLounge - TypeScript 소개
JSLounge - TypeScript 소개
Reagan Hwang
 
3 Screen UX - uxcampseoul 2011
3 Screen UX - uxcampseoul 20113 Screen UX - uxcampseoul 2011
3 Screen UX - uxcampseoul 2011
Reagan Hwang
 
Introducing Microsoft ux platforms
Introducing Microsoft ux platformsIntroducing Microsoft ux platforms
Introducing Microsoft ux platforms
Reagan Hwang
 
Internet Explorer 8 Beta 2 Features For Better Browsing Experience
Internet Explorer 8 Beta 2 Features For Better Browsing ExperienceInternet Explorer 8 Beta 2 Features For Better Browsing Experience
Internet Explorer 8 Beta 2 Features For Better Browsing Experience
Reagan Hwang
 

Mehr von Reagan Hwang (16)

윈도우 스토어의 가능성
윈도우 스토어의 가능성윈도우 스토어의 가능성
윈도우 스토어의 가능성
 
JSLounge - TypeScript 소개
JSLounge - TypeScript 소개JSLounge - TypeScript 소개
JSLounge - TypeScript 소개
 
IE10 PP4 update for W3C HTML5 KIG
IE10 PP4 update for W3C HTML5 KIGIE10 PP4 update for W3C HTML5 KIG
IE10 PP4 update for W3C HTML5 KIG
 
3 Screen UX - uxcampseoul 2011
3 Screen UX - uxcampseoul 20113 Screen UX - uxcampseoul 2011
3 Screen UX - uxcampseoul 2011
 
사용자의 경험가치
사용자의 경험가치사용자의 경험가치
사용자의 경험가치
 
IE9에서 HTML5 개발하기
IE9에서 HTML5 개발하기IE9에서 HTML5 개발하기
IE9에서 HTML5 개발하기
 
Pp3 devweb
Pp3 devwebPp3 devweb
Pp3 devweb
 
Ux tech trends
Ux tech trendsUx tech trends
Ux tech trends
 
Html5 ie9
Html5 ie9Html5 ie9
Html5 ie9
 
김진우 2009 Uxeye A Unverified View From Hci Perspective
김진우 2009 Uxeye A Unverified View From Hci Perspective김진우 2009 Uxeye A Unverified View From Hci Perspective
김진우 2009 Uxeye A Unverified View From Hci Perspective
 
Introducing Microsoft ux platforms
Introducing Microsoft ux platformsIntroducing Microsoft ux platforms
Introducing Microsoft ux platforms
 
Designing widget
Designing widgetDesigning widget
Designing widget
 
Introducing UX
Introducing UXIntroducing UX
Introducing UX
 
Designing Silverlight
Designing SilverlightDesigning Silverlight
Designing Silverlight
 
Korean Silverlight Showcases
Korean Silverlight ShowcasesKorean Silverlight Showcases
Korean Silverlight Showcases
 
Internet Explorer 8 Beta 2 Features For Better Browsing Experience
Internet Explorer 8 Beta 2 Features For Better Browsing ExperienceInternet Explorer 8 Beta 2 Features For Better Browsing Experience
Internet Explorer 8 Beta 2 Features For Better Browsing Experience
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Silverlight2 Security