SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved.
Apps	&	Data	
Secure	Delivery
Strategy
©	2017	Citrix All	Rights	Reserved.
Damián Prieto	Acosta
Sales	Specialist	– South	
of	Latin	America
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved.
A	Strategy	to	deliver	Apps	&	Data?
18
25%
85%
80%
Software	
Define	
Perimeter
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved.
¿?
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved.
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved. 5
Mobile	
Security
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved. 6
Secured	
Access
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved. 7
Data	&	IP	
Protection
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved. 8
Comp.	&	
Gov.
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved. 9
Business	
Cont.
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved.
Safeguard	sensitive	
information	from	theft	
and	loss,	and	IP	from	
infringement	and	
misappropriation
Manage	mobile	device	
and	mobile	app	security	
without	compromising	
productivity
Provide	employees	and	
third	parties	with	secure,	
contextual	access	to	
business	apps	and	data
Address	risk	and	global	
compliance	standards	
and	industry	regulations
Ensure	continuity	
of	operations	and	system	
availability	during	
business	
changes/disruptions
Secured	
Access
Mobile	
Security
Data	&	IP	
Protection
Compliance	
&	
Governance	
Business	
Continuity
Visibility	&	insights	into	user,	device,	data,	network,	and	cloud	activity
Insider	Threats
Third	Party	
Remote	Access
M&A	Integration
Mobile	Devices
Mobile	Apps
Unmanaged	Devices
Legacy	&	Custom	Apps
Loss	of	IP	&	Data
Data	Sharing
Standards:	GLBA,	SOX,	
NIST,	GDPR
Industry:	PCI	DSS,	EHR,	
HIPAA,	HITECH,	FFIEC,	
NUAC,	OCC,	FISMA,	FIPS,	
CJIS,	FTI
Ransomware &	
Malware	attacks
DDoS Protection
Workforce	Continuity
Disaster	Recovery
Security	Challenges	&	Initiatives
23
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved.
Confidentiality	 Integrity	 Availability
On-Premises Hybrid	Cloud Public/Private	Cloud
Application
Security
Centralization
Containerization
Inspection
Data	
Security
Centralization
Containerization
File	Sharing
Contextual
Access
Authentication
Authorization
Policy	Orchestration	
Analytics	&	
Insights
Visibility
Auditing
Compliance
Network
Security
Remote	Access
Segmentation
Availability
What is?
22
Software	Defined	Perimeter
Users Secure	IT
Security	&	Performance	Analytics
Unified	
Experience
“BYO”	
Identity
Single
Sign-on
Unified	Endpoint	
ManagementContextual
Access
Contextual	
Performance
App	Ops
Content	Control
Legacy/
Custom
Apps
The	Secure	Digital	Workspace
©	2017	Citrix and	DSG	Consulting.	All	Rights	Reserved. 20
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved.
…Security	Means Business!
18
60%
30%
Just to	remember…
©	2017	Citrix	and	DSG	Consulting.	All	Rights	Reserved. 14
¡Charlemos!
©	2017	Citrix.	All	Rights	Reserved.
vanessa.vilchez@citrix.com
+	51	987	400	624
damian.prieto@citrix.com
+	54	9	11	2877	4527

Weitere ähnliche Inhalte

Was ist angesagt?

[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
Nur Shiqim Chok
 
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
African Cyber Security Summit
 
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Nur Shiqim Chok
 

Was ist angesagt? (20)

Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
 
Feb13 webinar the path to u.s. - japan data transfer compliance - final
Feb13 webinar   the path to u.s. - japan data transfer compliance - finalFeb13 webinar   the path to u.s. - japan data transfer compliance - final
Feb13 webinar the path to u.s. - japan data transfer compliance - final
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
 
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Minh dang hcmc_cisco aci_delivering intent for...
 
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
 
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...
Cisco Connect 2018 Vietnam - cisco aci_delivering intent for data center netw...
 
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
 
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
 
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki
 
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
Cisco Connect 2018 Malaysia - Cisco meraki-an innovation journey to a smarter...
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center
 
Cisco Connect 2018 Indonesia - The Network Intutive
Cisco Connect 2018 Indonesia - The Network IntutiveCisco Connect 2018 Indonesia - The Network Intutive
Cisco Connect 2018 Indonesia - The Network Intutive
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
Sprint Secure Portfolio
Sprint Secure PortfolioSprint Secure Portfolio
Sprint Secure Portfolio
 
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
Cisco Connect 2018 Malaysia - Cisco aci-delivering intent for data center net...
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
 

Andere mochten auch

Andere mochten auch (6)

Insight Challenge eBook
Insight Challenge eBookInsight Challenge eBook
Insight Challenge eBook
 
Risk of Not Aligning Sales - Infographic
Risk of Not Aligning Sales - InfographicRisk of Not Aligning Sales - Infographic
Risk of Not Aligning Sales - Infographic
 
B2B Sales Transformation Checklist
B2B Sales Transformation ChecklistB2B Sales Transformation Checklist
B2B Sales Transformation Checklist
 
Top10 Sales Transformation Keys to Success
Top10 Sales Transformation Keys to SuccessTop10 Sales Transformation Keys to Success
Top10 Sales Transformation Keys to Success
 
Strategy Implementation
Strategy ImplementationStrategy Implementation
Strategy Implementation
 
Citrix Netscaler SD WAN
Citrix Netscaler SD WANCitrix Netscaler SD WAN
Citrix Netscaler SD WAN
 

Ähnlich wie Garantice la continuidad de su negocio Damian Prieto

Ähnlich wie Garantice la continuidad de su negocio Damian Prieto (20)

Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 
IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...
IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...
IT Sales Opportunities at the VA - Everything you Need to Know but Were Afrai...
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Infodream
InfodreamInfodream
Infodream
 
[Cisco Connect 2018 - Vietnam] Jijun cai present - cisco connect 2018 vn- c...
[Cisco Connect 2018 - Vietnam] Jijun cai   present - cisco connect 2018 vn- c...[Cisco Connect 2018 - Vietnam] Jijun cai   present - cisco connect 2018 vn- c...
[Cisco Connect 2018 - Vietnam] Jijun cai present - cisco connect 2018 vn- c...
 
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and PredictionsA Data Privacy & Security Year in Review: Top 10 Trends and Predictions
A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
 
Oracle Customer Engagement in a Digital World
Oracle Customer Engagement in a Digital WorldOracle Customer Engagement in a Digital World
Oracle Customer Engagement in a Digital World
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and GovernanceGeek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Cisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights onCisco Connect 2018 Philippines - do more than keeping the lights on
Cisco Connect 2018 Philippines - do more than keeping the lights on
 
The GDPR and What It Means to You
The GDPR and What It Means to YouThe GDPR and What It Means to You
The GDPR and What It Means to You
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Next Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart Manufacturing
 
Cisco Connect 2018 Vietnam - Cisco services
Cisco Connect 2018 Vietnam - Cisco servicesCisco Connect 2018 Vietnam - Cisco services
Cisco Connect 2018 Vietnam - Cisco services
 
General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?General Data Protection Regulation: Where are we now?
General Data Protection Regulation: Where are we now?
 
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...[Cisco Connect 2018 - Vietnam] Jinjun cai   print -cisco connect 2018 vn-cisc...
[Cisco Connect 2018 - Vietnam] Jinjun cai print -cisco connect 2018 vn-cisc...
 
Cisco Connect 2018 Indonesia - Do More Than Keep The Lights On
Cisco Connect 2018 Indonesia - Do More Than Keep The Lights OnCisco Connect 2018 Indonesia - Do More Than Keep The Lights On
Cisco Connect 2018 Indonesia - Do More Than Keep The Lights On
 

Mehr von Cristian Garcia G.

Mehr von Cristian Garcia G. (20)

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Symantec Enterprise Cloud
Symantec Enterprise CloudSymantec Enterprise Cloud
Symantec Enterprise Cloud
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
 
Gestión de la Exposición
Gestión de la ExposiciónGestión de la Exposición
Gestión de la Exposición
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecina
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Garantice la continuidad de su negocio Damian Prieto