SlideShare a Scribd company logo
1 of 18
Gov 2.0, People 2.0 and Bad Guys 2.0 A Presentation to : Gov 2.0 Conference 14th June 2010 Dr. Rodger Manning, QinetiQ
Overview ,[object Object]
National Broadband Network
Public 2.0
Bad Guys 2.0
Concluding Remarks2
….is a good thing Education & Empowerment Allows Government to Talk to Each Other Listening Allows me to Talk to Government Reacting Engaging with Youths Efficiency New Ways of Working Opening up Government Making Tougher Choices Innovation Gov 2.0 3 Democracy
National Broadband Network Overwhelming public support Some implications… ,[object Object]
Mass hardware upgrades will likely follow
Upload speeds are faster
It’s always on
Prices fall, open/public access grows rapidly
Home and SMB use of WiFi explodes4 ….is a good thing 77% of Internet Users agree that the NBN is a good thing1 1Source – The Internet In Australia, S. Ewing & J. Thomas, Swinburne University of Technology
Public 2.0 ,[object Object]
3rd largest Tweater by capita5 ….are ready ….are frustrated? 53 % 44% Respondents disagreeing with: By using the Internet will people like you have more say about what the government does? 2007 2009 Source – The Internet In Australia, S. Ewing & J. Thomas, Swinburne University of Technology
Public 2.0 ,[object Object]
Expensive Internet access
25th out of 34 (OECD Survey, 2010)

More Related Content

What's hot

Cyberspace
CyberspaceCyberspace
CyberspaceG Prachi
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_systemKwame Afreh
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
2024 Future of Communication Technology
2024 Future of Communication Technology2024 Future of Communication Technology
2024 Future of Communication TechnologyHolly Baldwin
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber RiskCapitolTechU
 
Mao p.cs.102.01
Mao p.cs.102.01Mao p.cs.102.01
Mao p.cs.102.01L14MaoP
 
The Internet
The InternetThe Internet
The InternetR.K. Anik
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital DivideDeniz Cengiz
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Future Of Internet Presentation
Future Of Internet PresentationFuture Of Internet Presentation
Future Of Internet Presentationguestf0bdc63
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected SocietyCentraComm
 
Future opportunities in social communications
Future opportunities in social communicationsFuture opportunities in social communications
Future opportunities in social communicationsPawan Gupta
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityDavid B. Whittier, Ed D
 
Future Technologies Presentation
Future Technologies PresentationFuture Technologies Presentation
Future Technologies Presentationanthony librarian
 

What's hot (19)

Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_system
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
2024 Future of Communication Technology
2024 Future of Communication Technology2024 Future of Communication Technology
2024 Future of Communication Technology
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber Risk
 
Mao p.cs.102.01
Mao p.cs.102.01Mao p.cs.102.01
Mao p.cs.102.01
 
The Internet
The InternetThe Internet
The Internet
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyberspace & Digital Divide
Cyberspace & Digital DivideCyberspace & Digital Divide
Cyberspace & Digital Divide
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Future Of Internet Presentation
Future Of Internet PresentationFuture Of Internet Presentation
Future Of Internet Presentation
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected Society
 
Future opportunities in social communications
Future opportunities in social communicationsFuture opportunities in social communications
Future opportunities in social communications
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school community
 
Future Technologies Presentation
Future Technologies PresentationFuture Technologies Presentation
Future Technologies Presentation
 

Viewers also liked

Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Australia
 
Afternoon 2a Darren Whitelaw Web 2
Afternoon 2a  Darren  Whitelaw  Web 2Afternoon 2a  Darren  Whitelaw  Web 2
Afternoon 2a Darren Whitelaw Web 2Frocomm Australia
 
0900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 20900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 2Frocomm Australia
 
1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copyFrocomm Australia
 

Viewers also liked (6)

Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DIFrocomm Social Media Bootcamp 2009 Ogilvy 360 DI
Frocomm Social Media Bootcamp 2009 Ogilvy 360 DI
 
Afternoon 2a Darren Whitelaw Web 2
Afternoon 2a  Darren  Whitelaw  Web 2Afternoon 2a  Darren  Whitelaw  Web 2
Afternoon 2a Darren Whitelaw Web 2
 
0900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 20900 brad argent 2011 government 2 point 0 conference - 2
0900 brad argent 2011 government 2 point 0 conference - 2
 
03 Malcolm Crompton
03 Malcolm Crompton03 Malcolm Crompton
03 Malcolm Crompton
 
02 Peter Williams
02 Peter Williams02 Peter Williams
02 Peter Williams
 
1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy1140 matt frocomm2011-aerin's copy
1140 matt frocomm2011-aerin's copy
 

Similar to Gov 2.0 public 2.0 bad guys 2.0 v3

111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)Christopher Lisasi
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxamrit47
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Open for business_dalberg
Open for business_dalbergOpen for business_dalberg
Open for business_dalbergVictor Gridnev
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends PostTBledsoe
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social mediaSupriya Radhakrishna
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...Dana Gardner
 
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumActiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumBusiness Development Institute
 

Similar to Gov 2.0 public 2.0 bad guys 2.0 v3 (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docxANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Open for business_dalberg
Open for business_dalbergOpen for business_dalberg
Open for business_dalberg
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
Abso lutely!
Abso lutely!Abso lutely!
Abso lutely!
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
 
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumActiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
 

More from Frocomm Australia

The pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resThe pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resFrocomm Australia
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Frocomm Australia
 
1150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap20111150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap2011Frocomm Australia
 
1120+emma web 2.0 presentation
1120+emma web 2.0 presentation1120+emma web 2.0 presentation
1120+emma web 2.0 presentationFrocomm Australia
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009Frocomm Australia
 
10 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 0910 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 09Frocomm Australia
 
04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu CaseFrocomm Australia
 

More from Frocomm Australia (11)

The pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high resThe pr report top 20 trends for 2012 high res
The pr report top 20 trends for 2012 high res
 
Welcome slide day 1
Welcome slide day 1Welcome slide day 1
Welcome slide day 1
 
Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3Gov 2.0 public 2.0 bad guys 2.0 v3
Gov 2.0 public 2.0 bad guys 2.0 v3
 
1150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap20111150 tom acmasocmediaroadmap2011
1150 tom acmasocmediaroadmap2011
 
1120+emma web 2.0 presentation
1120+emma web 2.0 presentation1120+emma web 2.0 presentation
1120+emma web 2.0 presentation
 
Sydney conf presentation
Sydney conf presentationSydney conf presentation
Sydney conf presentation
 
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009Malcolm  Crompton  I I S  Frocomm  Web 2 O In  Govt  24  June 2009
Malcolm Crompton I I S Frocomm Web 2 O In Govt 24 June 2009
 
Web2 0 Holding Slide
Web2 0 Holding SlideWeb2 0 Holding Slide
Web2 0 Holding Slide
 
10 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 0910 Nick Baker Pr And Media Pres June 09
10 Nick Baker Pr And Media Pres June 09
 
04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case04 Brian Giesen Pandemic Flu Case
04 Brian Giesen Pandemic Flu Case
 
01 Pia Waugh Gov2 Syd
01 Pia Waugh Gov2 Syd01 Pia Waugh Gov2 Syd
01 Pia Waugh Gov2 Syd
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Gov 2.0 public 2.0 bad guys 2.0 v3