SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
The Future of
                                    Visualization

pixlcloud |   creating big data experiences         copyright (c) 2012
The Future of Visualization
The Future of Visualization
The Future of Visualization
The Future of Visualization
The Future of Visualization
The Future of Visualization
The Future of Visualization
The Future of Visualization
The Future of Visualization
The Future of Visualization
The Future of Visualization
The Future of Visualization

Weitere ähnliche Inhalte

Ähnlich wie The Future of Visualization

Icv forum programm_2012_final
Icv forum programm_2012_finalIcv forum programm_2012_final
Icv forum programm_2012_finalICV_eV
 
Icv forum programm_2012
Icv forum programm_2012Icv forum programm_2012
Icv forum programm_2012ICV_eV
 
Manual Peapo
Manual PeapoManual Peapo
Manual Peaponarri
 
Fallbeispiel recht2.0
Fallbeispiel recht2.0Fallbeispiel recht2.0
Fallbeispiel recht2.0dca8
 
N029 tecnicas venta 1
N029 tecnicas venta 1N029 tecnicas venta 1
N029 tecnicas venta 1rcofrechile
 
Icv folder 2011_final1
Icv folder 2011_final1Icv folder 2011_final1
Icv folder 2011_final1ICV_eV
 
Art estudo de viabilidade sobre a substiuição de agregados naturais por agreg...
Art estudo de viabilidade sobre a substiuição de agregados naturais por agreg...Art estudo de viabilidade sobre a substiuição de agregados naturais por agreg...
Art estudo de viabilidade sobre a substiuição de agregados naturais por agreg...Petiano Camilo Bin
 
Jose Ruiz Subauste: Actor - Bailarin - Coreografo - Director / Curriculum Vitae
Jose Ruiz Subauste: Actor - Bailarin - Coreografo - Director / Curriculum VitaeJose Ruiz Subauste: Actor - Bailarin - Coreografo - Director / Curriculum Vitae
Jose Ruiz Subauste: Actor - Bailarin - Coreografo - Director / Curriculum VitaeJose Alejandro Ruiz Subauste
 
Tu dien tieng Viet_Vien Ngon ngu hoc.pdf
Tu dien tieng Viet_Vien Ngon ngu hoc.pdfTu dien tieng Viet_Vien Ngon ngu hoc.pdf
Tu dien tieng Viet_Vien Ngon ngu hoc.pdfngPhVinh
 

Ähnlich wie The Future of Visualization (20)

Icv forum programm_2012_final
Icv forum programm_2012_finalIcv forum programm_2012_final
Icv forum programm_2012_final
 
Icv forum programm_2012
Icv forum programm_2012Icv forum programm_2012
Icv forum programm_2012
 
Conversation3
Conversation3Conversation3
Conversation3
 
Conversation3
Conversation3Conversation3
Conversation3
 
Manual Peapo
Manual PeapoManual Peapo
Manual Peapo
 
Fallbeispiel recht2.0
Fallbeispiel recht2.0Fallbeispiel recht2.0
Fallbeispiel recht2.0
 
Fallbeispiel recht2.0
Fallbeispiel recht2.0Fallbeispiel recht2.0
Fallbeispiel recht2.0
 
Conversation2
Conversation2Conversation2
Conversation2
 
Conversation2
Conversation2Conversation2
Conversation2
 
Vorsicht Aspartam
Vorsicht AspartamVorsicht Aspartam
Vorsicht Aspartam
 
N029 tecnicas venta 1
N029 tecnicas venta 1N029 tecnicas venta 1
N029 tecnicas venta 1
 
Icv folder 2011_final1
Icv folder 2011_final1Icv folder 2011_final1
Icv folder 2011_final1
 
Art estudo de viabilidade sobre a substiuição de agregados naturais por agreg...
Art estudo de viabilidade sobre a substiuição de agregados naturais por agreg...Art estudo de viabilidade sobre a substiuição de agregados naturais por agreg...
Art estudo de viabilidade sobre a substiuição de agregados naturais por agreg...
 
Jose Ruiz Subauste: Actor - Bailarin - Coreografo - Director / Curriculum Vitae
Jose Ruiz Subauste: Actor - Bailarin - Coreografo - Director / Curriculum VitaeJose Ruiz Subauste: Actor - Bailarin - Coreografo - Director / Curriculum Vitae
Jose Ruiz Subauste: Actor - Bailarin - Coreografo - Director / Curriculum Vitae
 
Tu dien tieng Viet_Vien Ngon ngu hoc.pdf
Tu dien tieng Viet_Vien Ngon ngu hoc.pdfTu dien tieng Viet_Vien Ngon ngu hoc.pdf
Tu dien tieng Viet_Vien Ngon ngu hoc.pdf
 
Grays anatomie
Grays anatomieGrays anatomie
Grays anatomie
 
Hans wehr
Hans wehrHans wehr
Hans wehr
 
Windbg.pdf
Windbg.pdfWindbg.pdf
Windbg.pdf
 
12746266462 2
12746266462 212746266462 2
12746266462 2
 
Sullivan.algebra.7a.ed
Sullivan.algebra.7a.edSullivan.algebra.7a.ed
Sullivan.algebra.7a.ed
 

Mehr von Raffael Marty

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's AdvantageRaffael Marty
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security DataRaffael Marty
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Raffael Marty
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIRaffael Marty
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousRaffael Marty
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationRaffael Marty
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at ScaleRaffael Marty
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationRaffael Marty
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data VisualizationRaffael Marty
 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityRaffael Marty
 
Visualization for Security
Visualization for SecurityVisualization for Security
Visualization for SecurityRaffael Marty
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?Raffael Marty
 
Cloud - Security - Big Data
Cloud - Security - Big DataCloud - Security - Big Data
Cloud - Security - Big DataRaffael Marty
 
Cyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock InsightCyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock InsightRaffael Marty
 

Mehr von Raffael Marty (20)

Exploring the Defender's Advantage
Exploring the Defender's AdvantageExploring the Defender's Advantage
Exploring the Defender's Advantage
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
How To Drive Value with Security Data
How To Drive Value with Security DataHow To Drive Value with Security Data
How To Drive Value with Security Data
 
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
Cyber Security Beyond 2020 – Will We Learn From Our Mistakes?
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
 
Delivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and VisualizationDelivering Security Insights with Data Analytics and Visualization
Delivering Security Insights with Data Analytics and Visualization
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at Scale
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
Creating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & VisualizationCreating Your Own Threat Intel Through Hunting & Visualization
Creating Your Own Threat Intel Through Hunting & Visualization
 
Big Data Visualization
Big Data VisualizationBig Data Visualization
Big Data Visualization
 
Workshop: Big Data Visualization for Security
Workshop: Big Data Visualization for SecurityWorkshop: Big Data Visualization for Security
Workshop: Big Data Visualization for Security
 
Visualization for Security
Visualization for SecurityVisualization for Security
Visualization for Security
 
The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?The Heatmap
 - Why is Security Visualization so Hard?
The Heatmap
 - Why is Security Visualization so Hard?
 
Cloud - Security - Big Data
Cloud - Security - Big DataCloud - Security - Big Data
Cloud - Security - Big Data
 
Cyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock InsightCyber Security – How Visual Analytics Unlock Insight
Cyber Security – How Visual Analytics Unlock Insight
 

The Future of Visualization

  • 1. The Future of Visualization pixlcloud | creating big data experiences copyright (c) 2012