Suche senden
Hochladen
Wikileaks
•
Als PPT, PDF herunterladen
•
3 gefällt mir
•
6,655 views
Alex bj?lig
Folgen
A short presentation about Wikileaks, and the tor network.
Weniger lesen
Mehr lesen
Technologie
Melden
Teilen
Melden
Teilen
1 von 15
Jetzt herunterladen
Empfohlen
About Wkikileaks and technology that run @ back
Wikileaks
Wikileaks
Thet Aung Min Latt
Presentation at ISSA 10th Annual InfoSec Summit about using OSINT for attack and defense
OSINT for Attack and Defense
OSINT for Attack and Defense
Andrew McNicol
Durante l’intervento verranno presentati i cardini del processo di ricerca delle informazioni mediante la consultazione di fonti di pubblico accesso. Sarà illustrata la teoria alla base di questo processo che prevede l’identificazione delle fonti, la selezione e la valutazione del loro contenuto informativo per arrivare infine all’utilizzo stesso dell’informazione estratta. Nella seconda fase della presentazione verranno mostrati i tool e le metodologie per l’estrazione di informazioni mediante l’analisi di documenti, foto, social network e altre fonti spesso trascurate. In ultimo saranno mostrati sistemi in grado di correlare diverse informazioni provenienti dalle fonti aperte e verranno discussi i relativi scenari di utilizzo nonché le possibili contromisure.
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
festival ICT 2016
Basic awareness in cybersecurity.After study people become aware in cyber security.The understand what is cyber security .They understand about some common threats. They also become aware that how to protect theirs data and devices from some common cyber attack.
cyber security
cyber security
sumitbajpeyee
Presentation with @JustinDenton (http://www.slideshare.net/JustinDenton)
Dark Web and Privacy
Dark Web and Privacy
Brian Pichman
OSINT - Open Source Intelligence by Rohit Srivastwa at c0c0n - International Cyber Security and Policing Conference http://is-ra.org/c0c0n/speakers.htm
OSINT - Open Source Intelligence
OSINT - Open Source Intelligence
c0c0n - International Cyber Security and Policing Conference
Secure Coding, What you need to know as a developer, SAST, DAST, DevOps, OWASP, Application Security
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
IT infrastructure security 101
IT infrastructure security 101
April Mardock CISSP
Empfohlen
About Wkikileaks and technology that run @ back
Wikileaks
Wikileaks
Thet Aung Min Latt
Presentation at ISSA 10th Annual InfoSec Summit about using OSINT for attack and defense
OSINT for Attack and Defense
OSINT for Attack and Defense
Andrew McNicol
Durante l’intervento verranno presentati i cardini del processo di ricerca delle informazioni mediante la consultazione di fonti di pubblico accesso. Sarà illustrata la teoria alla base di questo processo che prevede l’identificazione delle fonti, la selezione e la valutazione del loro contenuto informativo per arrivare infine all’utilizzo stesso dell’informazione estratta. Nella seconda fase della presentazione verranno mostrati i tool e le metodologie per l’estrazione di informazioni mediante l’analisi di documenti, foto, social network e altre fonti spesso trascurate. In ultimo saranno mostrati sistemi in grado di correlare diverse informazioni provenienti dalle fonti aperte e verranno discussi i relativi scenari di utilizzo nonché le possibili contromisure.
Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
festival ICT 2016
Basic awareness in cybersecurity.After study people become aware in cyber security.The understand what is cyber security .They understand about some common threats. They also become aware that how to protect theirs data and devices from some common cyber attack.
cyber security
cyber security
sumitbajpeyee
Presentation with @JustinDenton (http://www.slideshare.net/JustinDenton)
Dark Web and Privacy
Dark Web and Privacy
Brian Pichman
OSINT - Open Source Intelligence by Rohit Srivastwa at c0c0n - International Cyber Security and Policing Conference http://is-ra.org/c0c0n/speakers.htm
OSINT - Open Source Intelligence
OSINT - Open Source Intelligence
c0c0n - International Cyber Security and Policing Conference
Secure Coding, What you need to know as a developer, SAST, DAST, DevOps, OWASP, Application Security
Secure coding presentation Oct 3 2020
Secure coding presentation Oct 3 2020
Moataz Kamel
IT infrastructure security 101
IT infrastructure security 101
April Mardock CISSP
Deep Web seminar presentation slide.
Deep web Seminar
Deep web Seminar
Hareendran MG
This was presented at Chennal Local Chapter - CISO Platform By Gowdhaman Jothilin
Osint presentation nov 2019
Osint presentation nov 2019
Priyanka Aash
A brief introduction to Dark Web. Covers difference between Surface, Deep and Dark Web. Shows application of Dark Web like illegal marketing of drugs, arms, etc. Also covers a case study of Silk Road which shows how it works and it's payment mode. It also covers technologies used to access Dark Web using various browsers like TOR and covers it's internal mechanism how it works keeping anonymity using Onion Routing.It also shows some Illegal marketing statistics which shows how it's affecting real world.
Introduction To Dark Web
Introduction To Dark Web
Adityakumar Yadav
OSINT: Open Source Intelligence gathering 101 Slides from my talk on OSINT. I listed examples in the slides about tools, legal methods for both online and physical information security reconnaissance.
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
Most investigators turn to Google and common social media platforms such as Facebook and Twitter to conduct research for their investigations. However, much of the Internet is inaccessible through simple searches, and criminals are increasingly turning to the dark web to conduct illicit business. The dark web is anonymous and requires a special browser to access and some knowledge of how to navigate it safely. However, used properly, it can be a valuable source of information for investigators. It’s worthwhile for every investigator to develop the skills and knowledge to mine this treasure trove of dark data. Join Chad Los Schumacher, investigator and researcher at iThreat Cyber Group, as he leads participants on an exploration of investigations in the dark web. Webinar attendees will learn: What the dark web is and how it fits into the rest of the worldwide web What can be found on the dark web How to get to the dark web using Tor and other browsers How to locate common hubs and resources on the dark web and explore what they have to offer How to bring leads from the dark web to the surface in an investigation
Investigating Using the Dark Web
Investigating Using the Dark Web
Case IQ
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
Olakanmi Oluwole
Bsides Knoxville - OSINT
Bsides Knoxville - OSINT
Bsides Knoxville - OSINT
Adam Compton
Deepweb and darkweb totally
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar
Speaker is going to conduct hands-on training on how an individual can use Open-source intelligence (OSINT) to collect data from publicly available sources. Speaker will showcase tools and techniques used in collecting information from the public sources. https://nsconclave.net-square.com/advanced-reconnaissance-using-OSINT.html
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
NSConclave
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
Cysinfo Cyber Security Community
Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
#Maltego #Recon-ng #FOCA #Shodan
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
Sudhanshu Chauhan
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies. Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c Presentation for Computer Society of Sri Lanka on 24 Feb 2015
Social media and Security risks
Social media and Security risks
Parakum Pathirana
www.lifein01.com - for more info and tutorials Maltego is an interactive data mining tool that renders directed graphs for link analysis. Used in online investigations for finding relationships between pieces of information from various sources located on the Internet.
Maltego Information Gathering
Maltego Information Gathering
Sreekanth Narendran
A data breach can threaten the continued existence of even the largest organizations.This presentation by Chris Roach, Managing Director at CBIZ shares what is at stake and, more importantly, what your business can do to minimize the risk of a data breach.
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
CBIZ, Inc.
The dark web
The dark web
hellboytonmoy
Introduction to the deep web
The Deep Web
The Deep Web
Niña Guno
OWASP - Vulnerable Flask App
OWASP-VulnerableFlaskApp
OWASP-VulnerableFlaskApp
anilyelken
Every investigator needs the skills and knowledge to use OSINT competently in investigations. As online information continues to multiply in volume and complexity, the tools required to find, sift through, authenticate and preserve that information become more and more important for investigators. Failure to master these tools to tap into the rich resources of the web can hamper your investigations. Learn the intricacies of online investigating from an expert in the field. Join Sandra Stibbards, owner and president of Camelot Investigations and a financial fraud investigator, speaker and trainer, for a free webinar on How to Use OSINT in Investigations. Webinar attendees will learn: -How to find information on the hidden web -How to find publicly available information in government and private databases -Dos and don’ts for searching social media effectively -Tips for remaining anonymous while researching investigation subjects -Accessing archived information -How criminals hide, and how to find them
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
Case IQ
Presented live at Alpharetta Pentest virtual meetup https://discord.gg/Bq3w5Nt
From OSINT to Phishing presentation
From OSINT to Phishing presentation
Jesse Ratcliffe, OSCP
An overview of issues related to whistleblowing. Intended for computing students as part of a professional and ethical issues module.
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
Michael Heron
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
raghuarr
Weitere ähnliche Inhalte
Was ist angesagt?
Deep Web seminar presentation slide.
Deep web Seminar
Deep web Seminar
Hareendran MG
This was presented at Chennal Local Chapter - CISO Platform By Gowdhaman Jothilin
Osint presentation nov 2019
Osint presentation nov 2019
Priyanka Aash
A brief introduction to Dark Web. Covers difference between Surface, Deep and Dark Web. Shows application of Dark Web like illegal marketing of drugs, arms, etc. Also covers a case study of Silk Road which shows how it works and it's payment mode. It also covers technologies used to access Dark Web using various browsers like TOR and covers it's internal mechanism how it works keeping anonymity using Onion Routing.It also shows some Illegal marketing statistics which shows how it's affecting real world.
Introduction To Dark Web
Introduction To Dark Web
Adityakumar Yadav
OSINT: Open Source Intelligence gathering 101 Slides from my talk on OSINT. I listed examples in the slides about tools, legal methods for both online and physical information security reconnaissance.
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Jeremiah Tillman
Most investigators turn to Google and common social media platforms such as Facebook and Twitter to conduct research for their investigations. However, much of the Internet is inaccessible through simple searches, and criminals are increasingly turning to the dark web to conduct illicit business. The dark web is anonymous and requires a special browser to access and some knowledge of how to navigate it safely. However, used properly, it can be a valuable source of information for investigators. It’s worthwhile for every investigator to develop the skills and knowledge to mine this treasure trove of dark data. Join Chad Los Schumacher, investigator and researcher at iThreat Cyber Group, as he leads participants on an exploration of investigations in the dark web. Webinar attendees will learn: What the dark web is and how it fits into the rest of the worldwide web What can be found on the dark web How to get to the dark web using Tor and other browsers How to locate common hubs and resources on the dark web and explore what they have to offer How to bring leads from the dark web to the surface in an investigation
Investigating Using the Dark Web
Investigating Using the Dark Web
Case IQ
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
Olakanmi Oluwole
Bsides Knoxville - OSINT
Bsides Knoxville - OSINT
Bsides Knoxville - OSINT
Adam Compton
Deepweb and darkweb totally
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar
Speaker is going to conduct hands-on training on how an individual can use Open-source intelligence (OSINT) to collect data from publicly available sources. Speaker will showcase tools and techniques used in collecting information from the public sources. https://nsconclave.net-square.com/advanced-reconnaissance-using-OSINT.html
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
NSConclave
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
Cysinfo Cyber Security Community
Open-source intelligence (OSINT) is intelligence collected from publicly available sources. In the intelligence community (IC), the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources); it is not related to open-source software or public intelligence.
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
#Maltego #Recon-ng #FOCA #Shodan
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
Sudhanshu Chauhan
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies. Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c Presentation for Computer Society of Sri Lanka on 24 Feb 2015
Social media and Security risks
Social media and Security risks
Parakum Pathirana
www.lifein01.com - for more info and tutorials Maltego is an interactive data mining tool that renders directed graphs for link analysis. Used in online investigations for finding relationships between pieces of information from various sources located on the Internet.
Maltego Information Gathering
Maltego Information Gathering
Sreekanth Narendran
A data breach can threaten the continued existence of even the largest organizations.This presentation by Chris Roach, Managing Director at CBIZ shares what is at stake and, more importantly, what your business can do to minimize the risk of a data breach.
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
CBIZ, Inc.
The dark web
The dark web
hellboytonmoy
Introduction to the deep web
The Deep Web
The Deep Web
Niña Guno
OWASP - Vulnerable Flask App
OWASP-VulnerableFlaskApp
OWASP-VulnerableFlaskApp
anilyelken
Every investigator needs the skills and knowledge to use OSINT competently in investigations. As online information continues to multiply in volume and complexity, the tools required to find, sift through, authenticate and preserve that information become more and more important for investigators. Failure to master these tools to tap into the rich resources of the web can hamper your investigations. Learn the intricacies of online investigating from an expert in the field. Join Sandra Stibbards, owner and president of Camelot Investigations and a financial fraud investigator, speaker and trainer, for a free webinar on How to Use OSINT in Investigations. Webinar attendees will learn: -How to find information on the hidden web -How to find publicly available information in government and private databases -Dos and don’ts for searching social media effectively -Tips for remaining anonymous while researching investigation subjects -Accessing archived information -How criminals hide, and how to find them
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
Case IQ
Presented live at Alpharetta Pentest virtual meetup https://discord.gg/Bq3w5Nt
From OSINT to Phishing presentation
From OSINT to Phishing presentation
Jesse Ratcliffe, OSCP
Was ist angesagt?
(20)
Deep web Seminar
Deep web Seminar
Osint presentation nov 2019
Osint presentation nov 2019
Introduction To Dark Web
Introduction To Dark Web
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Investigating Using the Dark Web
Investigating Using the Dark Web
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
Bsides Knoxville - OSINT
Bsides Knoxville - OSINT
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
Social media and Security risks
Social media and Security risks
Maltego Information Gathering
Maltego Information Gathering
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
The dark web
The dark web
The Deep Web
The Deep Web
OWASP-VulnerableFlaskApp
OWASP-VulnerableFlaskApp
How to Use Open Source Intelligence (OSINT) in Investigations
How to Use Open Source Intelligence (OSINT) in Investigations
From OSINT to Phishing presentation
From OSINT to Phishing presentation
Ähnlich wie Wikileaks
An overview of issues related to whistleblowing. Intended for computing students as part of a professional and ethical issues module.
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
Michael Heron
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
raghuarr
Wiki leaks
Wiki leaks
Kyuuketsuki
Campaign material directed to create awareness about role of Wikileaks and Web-democracy, relevant to the Indian context
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
raghuarr
Wikileaks
Wikileaks
tdcjackson
Mass Media
Mass Media
cherylchoo
presentation, misleading websites, project, group work, script
Wikileaks script
Wikileaks script
043cyeung
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
Emily Blegvad
Lecture slides dealing with the role of sources and whistleblowers in the 21st century information war - part of the University of Sunderland media ethics module
Med312 spies and whistleblowers lecture
Med312 spies and whistleblowers lecture
Rob Jewitt
An important tool, intended to collect and share confidential information worldwide.
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018
JErickPPTs
FYS Information Literacy Paper 30 Jan 2015
Information Literacy Paper
Information Literacy Paper
shelbyard2
WikiLeaks Presentation
WikiLeaks Presentation
Emily Blegvad
course material
wikileaks.docx
wikileaks.docx
write5
Economic policy has no sense of direction and this is largely because Planning Commission, with all its deficiencies....was a positive dynamic instrument of steering the country’s economy and much more..
India legal 15 december 2015
India legal 15 december 2015
ENC
Virtual Revolution BBC
Wikileaks
Wikileaks
Willem Kuypers
Global Governance: Cyber, Ideological, and Transnational Security
Global Governance: Cyber, Ideological, and Transnational Security
Bobur Nazarmuhamedov
Spilling+Secrets
Spilling+Secrets
Liz Houghton
References for photos and charts coming soon. Standing on the shoulder of giants putting this together.
Social technology & revolutions
Social technology & revolutions
matt gierhart
Brochure for audience, wikileaks, project, presentation
Wikileaks brochure
Wikileaks brochure
043cyeung
Presentation to Law Librarians Association of Wisconsin & Special Library Association April 14, 2011
Information Ethics & WikiLeaks
Information Ethics & WikiLeaks
Michael Zimmer
Ähnlich wie Wikileaks
(20)
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
ETHICS10 - Wikileaks and the Ethics of Whistleblowing
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
Wiki leaks
Wiki leaks
Wikileaks Awareness and Support Campaign
Wikileaks Awareness and Support Campaign
Wikileaks
Wikileaks
Mass Media
Mass Media
Wikileaks script
Wikileaks script
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
WikiLeaks and the Legitimacy of the Fifth Estate_By Emily Blegvad
Med312 spies and whistleblowers lecture
Med312 spies and whistleblowers lecture
Wikileaks - Victoria University - 2018
Wikileaks - Victoria University - 2018
Information Literacy Paper
Information Literacy Paper
WikiLeaks Presentation
WikiLeaks Presentation
wikileaks.docx
wikileaks.docx
India legal 15 december 2015
India legal 15 december 2015
Wikileaks
Wikileaks
Global Governance: Cyber, Ideological, and Transnational Security
Global Governance: Cyber, Ideological, and Transnational Security
Spilling+Secrets
Spilling+Secrets
Social technology & revolutions
Social technology & revolutions
Wikileaks brochure
Wikileaks brochure
Information Ethics & WikiLeaks
Information Ethics & WikiLeaks
Kürzlich hochgeladen
Accelerating FinTech Innovation: Unleashing API Economy and GenAI Vasa Krishnan, Chief Technology Officer - FinResults Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
The value of a flexible API Management solution for Open Banking Steve Melan, Manager for IT Innovation and Architecture - State's and Saving's Bank of Luxembourg Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Abhishek Deb(1), Mr Abdul Kalam(2) M. Des (UX) , School of Design, DIT University , Dehradun. This paper explores the future potential of AI-enabled smartphone processors, aiming to investigate the advancements, capabilities, and implications of integrating artificial intelligence (AI) into smartphone technology. The research study goals consist of evaluating the development of AI in mobile phone processors, analyzing the existing state as well as abilities of AI-enabled cpus determining future patterns as well as chances together with reviewing obstacles as well as factors to consider for more growth.
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Tracing the root cause of a performance issue requires a lot of patience, experience, and focus. It’s so hard that we sometimes attempt to guess by trying out tentative fixes, but that usually results in frustration, messy code, and a considerable waste of time and money. This talk explains how to correctly zoom in on a performance bottleneck using three levels of profiling: distributed tracing, metrics, and method profiling. After we learn to read the JVM profiler output as a flame graph, we explore a series of bottlenecks typical for backend systems, like connection/thread pool starvation, invisible aspects, blocking code, hot CPU methods, lock contention, and Virtual Thread pinning, and we learn to trace them even if they occur in library code you are not familiar with. Attend this talk and prepare for the performance issues that will eventually hit any successful system. About authorWith two decades of experience, Victor is a Java Champion working as a trainer for top companies in Europe. Five thousands developers in 120 companies attended his workshops, so he gets to debate every week the challenges that various projects struggle with. In return, Victor summarizes key points from these workshops in conference talks and online meetups for the European Software Crafters, the world’s largest developer community around architecture, refactoring, and testing. Discover how Victor can help you on victorrentea.ro : company training catalog, consultancy and YouTube playlists.
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving. A report by Poten & Partners as part of the Hydrogen Asia 2024 Summit in Singapore. Copyright Poten & Partners 2024.
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Explore how multimodal embeddings work with Milvus. We will see how you can explore a popular multimodal model - CLIP - on a popular dataset - CIFAR 10. You use CLIP to create the embeddings of the input data, Milvus to store the embeddings of the multimodal data (sometimes termed “multimodal embeddings”), and we will then explore the embeddings.
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Following the popularity of “Cloud Revolution: Exploring the New Wave of Serverless Spatial Data,” we’re thrilled to announce this much-anticipated encore webinar. In this sequel, we’ll dive deeper into the Cloud-Native realm by uncovering practical applications and FME support for these new formats, including COGs, COPC, FlatGeoBuf, GeoParquet, STAC, and ZARR. Building on the foundation laid by industry leaders Michelle Roby of Radiant Earth and Chris Holmes of Planet in the first webinar, this second part offers an in-depth look at the real-world application and behind-the-scenes dynamics of these cutting-edge formats. We will spotlight specific use-cases and workflows, showcasing their efficiency and relevance in practical scenarios. Discover the vast possibilities each format holds, highlighted through detailed discussions and demonstrations. Our expert speakers will dissect the key aspects and provide critical takeaways for effective use, ensuring attendees leave with a thorough understanding of how to apply these formats in their own projects. Elevate your understanding of how FME supports these cutting-edge technologies, enhancing your ability to manage, share, and analyze spatial data. Whether you’re building on knowledge from our initial session or are new to the serverless spatial data landscape, this webinar is your gateway to mastering cloud-native formats in your workflows.
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Dubai, often portrayed as a shimmering oasis in the desert, faces its own set of challenges, including the occasional threat of flooding. Despite its reputation for opulence and modernity, the emirate is not immune to the forces of nature. In recent years, Dubai has experienced sporadic but significant floods, testing the resilience of its infrastructure and communities. Among the critical lifelines in this bustling metropolis is the Dubai International Airport, a bustling hub that connects the city to the world. This article explores the intersection of Dubai flood events and the resilience demonstrated by the Dubai International Airport in the face of such challenges.
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
Presentation on the progress in the Domino Container community project as delivered at the Engage 2024 conference
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Presentation from Melissa Klemke from her talk at Product Anonymous in April 2024
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
In this talk, we are going to cover the use-case of food image generation at Delivery Hero, its impact and the challenges. In particular, we will present our image scoring solution for filtering out inappropriate images and elaborate on the models we are using.
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
In the thrilling conclusion to 2023, ransomware groups had a banner year, really outdoing themselves in the "make everyone's life miserable" department. LockBit 3.0 took gold in the hacking olympics, followed by the plucky upstarts Clop and ALPHV/BlackCat. Apparently, 48% of organizations were feeling left out and decided to get in on the cyber attack action. Business services won the "most likely to get digitally mugged" award, with education and retail nipping at their heels. Hackers expanded their repertoire beyond boring old encryption to the much more exciting world of extortion. The US, UK and Canada took top honors in the "countries most likely to pay up" category. Bitcoins were the currency of choice for discerning hackers, because who doesn't love untraceable money?
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows. We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases. This video focuses on the deployment of external web forms using Jotform for Bonterra Impact Management. This solution can be customized to your organization’s needs and deployed to support the common use cases below: - Intake and consent - Assessments - Surveys - Applications - Program registration Interested in deploying web form automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
ICT role in 21 century education. How to ICT help in education
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
💥 You’re lucky! We’ve found two different (lead) developers that are willing to share their valuable lessons learned about using UiPath Document Understanding! Based on recent implementations in appealing use cases at Partou and SPIE. Don’t expect fancy videos or slide decks, but real and practical experiences that will help you with your own implementations. 📕 Topics that will be addressed: • Training the ML-model by humans: do or don't? • Rule-based versus AI extractors • Tips for finding use cases • How to start 👨🏫👨💻 Speakers: o Dion Morskieft, RPA Product Owner @Partou o Jack Klein-Schiphorst, Automation Developer @Tacstone Technology
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
AXA XL - Insurer Innovation Award 2024
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
DBX 1Q24 Investor Presentation
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
This reviewer is for the second quarter of Empowerment Technology / ICT in Grade 11
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Effective data discovery is crucial for maintaining compliance and mitigating risks in today's rapidly evolving privacy landscape. However, traditional manual approaches often struggle to keep pace with the growing volume and complexity of data. Join us for an insightful webinar where industry leaders from TrustArc and Privya will share their expertise on leveraging AI-powered solutions to revolutionize data discovery. You'll learn how to: - Effortlessly maintain a comprehensive, up-to-date data inventory - Harness code scanning insights to gain complete visibility into data flows leveraging the advantages of code scanning over DB scanning - Simplify compliance by leveraging Privya's integration with TrustArc - Implement proven strategies to mitigate third-party risks Our panel of experts will discuss real-world case studies and share practical strategies for overcoming common data discovery challenges. They'll also explore the latest trends and innovations in AI-driven data management, and how these technologies can help organizations stay ahead of the curve in an ever-changing privacy landscape.
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Kürzlich hochgeladen
(20)
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Wikileaks
1.
WikipediaLeaks
2.
3.
4.
5.
WHY IS WIKILEAKS
IMPORTANT?
6.
MEDIA AND DEMOCRACY
7.
8.
9.
DANGERS OF WIKILEAKS
10.
11.
12.
13.
14.
15.
Jetzt herunterladen