SlideShare ist ein Scribd-Unternehmen logo
1 von 18
E-Discovery Collection Best Practices & Emerging Technology :  IT Preparing for Litigation
The Increasing Scope of Electronic Discovery: Traditional Sources of Data ,[object Object],[object Object],[object Object],[object Object]
The Increasing Scope of Electronic Discovery: Traditional Sources of Data ,[object Object],[object Object],[object Object],[object Object],[object Object]
How it was….
The Increasing Scope of Electronic Discovery: Increased Technological Scope of Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How it is….
Social Networking/Blogs: Blurring Lines Between “Work” and “Professional” ,[object Object],[object Object],[object Object],[object Object],[object Object]
“ New” Technology: Blogging – Big Brother is Beginning to Watch You ,[object Object],[object Object],[object Object],[object Object],F I R E D !
“ New” Technology: Employee Privacy Expectations ,[object Object],[object Object],[object Object],Employee subjective privacy expectations re: discovery may look like this: Home Computer iPod/Media Player USB Drives Blackberry / Work Cell Social Networking Sites Instant Messages Corporate Wikis Text Messages Blog Email High Expectation Expect no discovery Medium Expectation Expect limited discovery Low Expectation:  Expect discovery
The Increasing Scope of Electronic Discovery: Increased Technological Scope of Data The Cloud! ,[object Object],[object Object],[object Object]
The Increasing Scope of Electronic Discovery: Increased Technological Scope of Data ,[object Object],[object Object],[object Object],When your data goes into the "cloud…."
Audience Experiences? ,[object Object]
Geographic Scope: Privacy Expectations in EU Data ,[object Object]
“ New” Technology: Text Messages in Litigation ,[object Object],[object Object],[object Object]
Having a Policy…. ,[object Object],[object Object],[object Object]
Where do we go from here?  ,[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Has Internet of Things really happened?
Has Internet of Things really happened? Has Internet of Things really happened?
Has Internet of Things really happened? Opher Etzion
 
Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag ConferenceJonathan Yarmis
 
E discovery3
E discovery3E discovery3
E discovery3elijaht
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyTifanija
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 
Matter Centricity 101
Matter Centricity 101Matter Centricity 101
Matter Centricity 101Prosperoware
 
Blacks In Technology for BMI Technology Workshop Presentation
Blacks In Technology for BMI Technology Workshop PresentationBlacks In Technology for BMI Technology Workshop Presentation
Blacks In Technology for BMI Technology Workshop Presentationblacksintechnology
 
computes Methods - What's Required
computes Methods - What's Requiredcomputes Methods - What's Required
computes Methods - What's Requiredlyingdeputy2981
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2manpreet04
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the WorkplaceTawny Brown
 
Inconsistencies in big data
Inconsistencies in big dataInconsistencies in big data
Inconsistencies in big dataminujoseph
 
Graph Structure In The Web
Graph Structure In The WebGraph Structure In The Web
Graph Structure In The Webdailyye
 

Was ist angesagt? (20)

Has Internet of Things really happened?
Has Internet of Things really happened? Has Internet of Things really happened?
Has Internet of Things really happened?
 
PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag Conference
 
Ethics
EthicsEthics
Ethics
 
E discovery3
E discovery3E discovery3
E discovery3
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad Kaminsky
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Matter Centricity 101
Matter Centricity 101Matter Centricity 101
Matter Centricity 101
 
Blacks In Technology for BMI Technology Workshop Presentation
Blacks In Technology for BMI Technology Workshop PresentationBlacks In Technology for BMI Technology Workshop Presentation
Blacks In Technology for BMI Technology Workshop Presentation
 
computes Methods - What's Required
computes Methods - What's Requiredcomputes Methods - What's Required
computes Methods - What's Required
 
1 Mechanics
1 Mechanics1 Mechanics
1 Mechanics
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
102 Chapter 4 Pt 2
102 Chapter 4   Pt 2102 Chapter 4   Pt 2
102 Chapter 4 Pt 2
 
An Introduction: Technology, Ethics, and the Workplace
An Introduction:  Technology, Ethics, and the WorkplaceAn Introduction:  Technology, Ethics, and the Workplace
An Introduction: Technology, Ethics, and the Workplace
 
Inconsistencies in big data
Inconsistencies in big dataInconsistencies in big data
Inconsistencies in big data
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Graph Structure In The Web
Graph Structure In The WebGraph Structure In The Web
Graph Structure In The Web
 

Ähnlich wie Techno Security 2009 Presentation-Myrtle Beach

Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Assignment 1 Your Mobile Ordering Project team needs to provide a s
Assignment 1 Your Mobile Ordering Project team needs to provide a sAssignment 1 Your Mobile Ordering Project team needs to provide a s
Assignment 1 Your Mobile Ordering Project team needs to provide a sdesteinbrook
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxsangeetha865539
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docxtodd271
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
Big Data has Big Problems
Big Data has Big ProblemsBig Data has Big Problems
Big Data has Big ProblemsAhmed Banafa
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)Timothy Holborn
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAIMAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAIBig Data Week
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsMuruga J
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxaudeleypearl
 
A Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at QualcommA Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at QualcommB.J. Schone
 

Ähnlich wie Techno Security 2009 Presentation-Myrtle Beach (20)

Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Big Data 101
Big Data 101Big Data 101
Big Data 101
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Assignment 1 Your Mobile Ordering Project team needs to provide a s
Assignment 1 Your Mobile Ordering Project team needs to provide a sAssignment 1 Your Mobile Ordering Project team needs to provide a s
Assignment 1 Your Mobile Ordering Project team needs to provide a s
 
GCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptxGCSECS-ImpactOfTechnology.pptx
GCSECS-ImpactOfTechnology.pptx
 
Running Head DATA BREACH .docx
Running Head DATA BREACH                                        .docxRunning Head DATA BREACH                                        .docx
Running Head DATA BREACH .docx
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
Big Data has Big Problems
Big Data has Big ProblemsBig Data has Big Problems
Big Data has Big Problems
 
Trust Factory Slides (2015)
Trust Factory Slides (2015)Trust Factory Slides (2015)
Trust Factory Slides (2015)
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAIMAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
MAKING SENSE OF IOT DATA W/ BIG DATA + DATA SCIENCE - CHARLES CAI
 
Networking Essay Example
Networking Essay ExampleNetworking Essay Example
Networking Essay Example
 
Starting the Small Case: Technical Considerations
Starting the Small Case: Technical ConsiderationsStarting the Small Case: Technical Considerations
Starting the Small Case: Technical Considerations
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
A Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at QualcommA Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at Qualcomm
 
GITA April 2015 Newsletter
GITA April 2015 NewsletterGITA April 2015 Newsletter
GITA April 2015 Newsletter
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 

Kürzlich hochgeladen

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Techno Security 2009 Presentation-Myrtle Beach