SlideShare a Scribd company logo
1 of 13
Download to read offline
A better understanding

Safety versus Security
The author

Stéphane POTIER
Technology Marketing Manager
B&R Automation
stephane.potier@br-automation.com

Perfection in Automation
www.br-automation.com
Safety
Definition
Safety is freedom from unacceptable risk of physical injury or of
damage to the health of people, either directly, or indirectly as a
result of damage to property or to the environment.
Safety is an attribute of Dependability.
Dependability
Definition
Dependability of a system is the ability to deliver service that can
justifiably be trusted.
Dependability is a measure of a system's availability, reliability,
safety, integrity and its maintainabilty
Security
Definition
Security is the prevention of illegal or unwanted penetration,
intentional or unintentional interference with the proper and intended
operation, or inappropriate access to confidential information in
industrial automation and control systems.

Security is a composite of availability, confidentiality and integrity.
Dependability & Security attributes
Definition
• Availability - readiness for correct service (usually expressed as a
percentage of uptime in a given year)
• Reliability - continuity of correct service (typically expressed as a
probability of failure-free system operation over a specified time)
• Safety - absence of catastrophic consequences or severe injuries
on the users and the environment
• Confidentiality: absence of unauthorized disclosure of information
• Integrity - absence of improper system alteration
• Maintainability - ability for a process to undergo modifications and
repairs
Dependability attributes
Relationship

Availability
Reliability
Safety
Dependability
Confidentiality

Integrity
Maintainability
Security attributes
Relationship

Availability
Reliability
Safety
Security
Confidentiality

Integrity
Maintainability
Functional Safety
Definition
Functional safety is part of the overall safety that depends on a
system or equipment operating correctly in response to its inputs.
including the safe management of likely operator errors, hardware
failures and environmental changes.

IEC 61508 is intended to be a basic functional safety standard
applicable to all kinds of industry.
Translation
French
•
•
•
•
•
•
•

Dependability = Sûreté de fonctionnement
Reliability = Fiabilité
Availability = Disponibilité
Maintainability = Maintenabilité
Safety = Sécurité/Sûreté (1)
Security = Sécurité (1)
Integrity = Intégrité

(1) The

French word « Sécurité » is used to translate
both « Safety » and « Security ». In some industries, the
word « Sûreté » is used to translate « Safety ».
Translation
German
•
•
•
•
•
•
•

Dependability = Verlässlichkeit
Reliability = Zuverlässigkeit
Availability = Verfügbarkeit
Maintainability = Instandhaltbarkeit
Safety = Sicherheit (2)
Security= Sicherheit (2)
Integrity = Integrität

(2) The

German word « Sicherheit » is used to translate
both « Safety » and « Security ». For this reason the
English terms are usually preferred.
References
[1] http://en.wikipedia.org/wiki/Dependability
[2] http://www.iec.ch/functionalsafety
[3] IEC/TS 62443-1-1 Industrial communication networks – Network
and system security – Part 1-1: Terminology, concepts and models
[4] A. Avizienis, J.-C. Laprie and B. Randell: Fundamental Concepts
of Dependability. Research Report No 1145, LAAS-CNRS, April
2001
[5] http://www.open-safety.org
YOUR GLOBAL PARTNER FOR
AUTOMATION EXCELLENCE

More Related Content

What's hot (20)

Industrial Safety
Industrial SafetyIndustrial Safety
Industrial Safety
 
INDUSTRIAL SAFETY
INDUSTRIAL SAFETYINDUSTRIAL SAFETY
INDUSTRIAL SAFETY
 
Emergency Response Plan
Emergency Response PlanEmergency Response Plan
Emergency Response Plan
 
Presentation Facility Safety Management
Presentation Facility Safety ManagementPresentation Facility Safety Management
Presentation Facility Safety Management
 
National safety week 2023.pptx
National safety week 2023.pptxNational safety week 2023.pptx
National safety week 2023.pptx
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?
 
Toolbox Talk
Toolbox TalkToolbox Talk
Toolbox Talk
 
Occupational safety and health
Occupational safety and healthOccupational safety and health
Occupational safety and health
 
Bank security
Bank securityBank security
Bank security
 
Emergency response planning and implementation
Emergency response planning and implementationEmergency response planning and implementation
Emergency response planning and implementation
 
Emergency response planning
Emergency response planningEmergency response planning
Emergency response planning
 
Industrial safety
Industrial safetyIndustrial safety
Industrial safety
 
BBS TRAINING.pptx
BBS TRAINING.pptxBBS TRAINING.pptx
BBS TRAINING.pptx
 
Conducting Hot Work Operations
Conducting Hot Work OperationsConducting Hot Work Operations
Conducting Hot Work Operations
 
15 introduction to occupational health & safety-file 1
15   introduction to occupational health & safety-file 115   introduction to occupational health & safety-file 1
15 introduction to occupational health & safety-file 1
 
WHS presentation v3 (CPCCOHS2001A)
WHS presentation v3 (CPCCOHS2001A)WHS presentation v3 (CPCCOHS2001A)
WHS presentation v3 (CPCCOHS2001A)
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Safety engineering
Safety engineering Safety engineering
Safety engineering
 
Accident Causation
Accident CausationAccident Causation
Accident Causation
 
PPT ON PERMIT TO WORK, by Ekemezie E
PPT ON PERMIT TO WORK, by Ekemezie EPPT ON PERMIT TO WORK, by Ekemezie E
PPT ON PERMIT TO WORK, by Ekemezie E
 

Similar to Safety versus security

Tuv rheinland-ot-security-risk-management-flyer-en
Tuv rheinland-ot-security-risk-management-flyer-enTuv rheinland-ot-security-risk-management-flyer-en
Tuv rheinland-ot-security-risk-management-flyer-enZiv Nuss
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 
Information Assurance & Reliability Architecture
Information Assurance & Reliability ArchitectureInformation Assurance & Reliability Architecture
Information Assurance & Reliability ArchitectureSrikar Sagi
 
A holistic view_of_enterprise_security
A holistic view_of_enterprise_securityA holistic view_of_enterprise_security
A holistic view_of_enterprise_securityehawk01
 
Word of the week - Safety Integrity Level
Word of the week - Safety Integrity LevelWord of the week - Safety Integrity Level
Word of the week - Safety Integrity LevelRoadmapITSolution
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Seungjoo Kim
 
Reliability Engineering and Terotechnology
Reliability Engineering and TerotechnologyReliability Engineering and Terotechnology
Reliability Engineering and TerotechnologyChristian Enoval
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general attSHIVA101531
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンスchomchana trevai
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationISA Boston Section
 
Gtg product brochure 2015
Gtg product brochure 2015Gtg product brochure 2015
Gtg product brochure 2015Graham Halliday
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Richard Lawson
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for JavaTim Ellison
 
System Safety Engineering 2011
System Safety Engineering 2011System Safety Engineering 2011
System Safety Engineering 2011Ola Odejayi
 
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Thorne & Derrick UK
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System PresentationAaDi Malik
 

Similar to Safety versus security (20)

Continuous Security
Continuous SecurityContinuous Security
Continuous Security
 
Tuv rheinland-ot-security-risk-management-flyer-en
Tuv rheinland-ot-security-risk-management-flyer-enTuv rheinland-ot-security-risk-management-flyer-en
Tuv rheinland-ot-security-risk-management-flyer-en
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
Information Assurance & Reliability Architecture
Information Assurance & Reliability ArchitectureInformation Assurance & Reliability Architecture
Information Assurance & Reliability Architecture
 
A holistic view_of_enterprise_security
A holistic view_of_enterprise_securityA holistic view_of_enterprise_security
A holistic view_of_enterprise_security
 
Word of the week - Safety Integrity Level
Word of the week - Safety Integrity LevelWord of the week - Safety Integrity Level
Word of the week - Safety Integrity Level
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
 
Reliability Engineering and Terotechnology
Reliability Engineering and TerotechnologyReliability Engineering and Terotechnology
Reliability Engineering and Terotechnology
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Gtg product brochure 2015
Gtg product brochure 2015Gtg product brochure 2015
Gtg product brochure 2015
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
SIL.ppt
SIL.pptSIL.ppt
SIL.ppt
 
9536322.ppt
9536322.ppt9536322.ppt
9536322.ppt
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 
System Safety Engineering 2011
System Safety Engineering 2011System Safety Engineering 2011
System Safety Engineering 2011
 
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
 

More from Stephane Potier

Create your own OPC UA information model
Create your own OPC UA information modelCreate your own OPC UA information model
Create your own OPC UA information modelStephane Potier
 
OPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion SpecificationsOPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion SpecificationsStephane Potier
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificatesStephane Potier
 
Emballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelleEmballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelleStephane Potier
 
Industry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging linesIndustry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging linesStephane Potier
 
Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0Stephane Potier
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesStephane Potier
 

More from Stephane Potier (7)

Create your own OPC UA information model
Create your own OPC UA information modelCreate your own OPC UA information model
Create your own OPC UA information model
 
OPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion SpecificationsOPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion Specifications
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
Emballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelleEmballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelle
 
Industry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging linesIndustry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging lines
 
Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
 

Recently uploaded

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Safety versus security