SlideShare una empresa de Scribd logo
1 de 45
Descargar para leer sin conexión
David Spencer
Bradford Linux Users Group
16 September 2013
http://www.bbc.co.uk/news/uk-24107854
by the end of 1920 the Black
Chamber had the secret and illegal
cooperation of almost the entire
American cable Industry
Bamford
The Puzzle Palace
1920
LOUIS W. TORDELLA
http://arstechnica.com/tech-policy/2013/06/how-a-30-year-old-lawyer-exposed-nsa-mass-surveillance-of-americans-in-1975/2/
Every day, a courier went up to New
York on the train and returned to Fort
Meade with large reels of magnetic
tape, which were copies of the
international telegrams sent from New
York the preceding day using the
facilities of three telegraph companies
Ars Technica
http://arstechnica.com/tech-policy/2013/06/how-a-30-year-old-lawyer-exposed-nsa-mass-surveillance-of-americans-in-1975/
2001-09-11
http://usvsth3m.com/post/61008418799/awkward-9-11-tribute-tweets-from-companies
A lot of people are trying to
say that it's a different
world today, and that
eavesdropping on a
massive scale is not
covered under the FISA
statute, because it just
wasn't possible or
anticipated back then.
That's a lie.
December 29, 2005
https://www.schneier.com/blog/archives/2005/12/project_shamroc.html
2005 FFS
2013
“You need the haystack to find the needle”
Keith Alexander
Aspen Security Forum, 17 July 2013
http://www.foreignpolicy.com/articles/2013/09/08/the_cowboy_of_the_nsa_keith_alexander
http://www.aspeninstitute.org/events/2013/07/17/2013-aspen-security-forum/transcript-clear-present-danger-cyber-crime-cyber
INFORMATION DOMINANCE CENTER
http://www.theguardian.com/commentisfree/2013/sep/15/nsa-mind-keith-alexander-star-trek
http://www.businessinsider.com/the-us-army-star-trek-command-center-2013-9
BIG DATA
Alexander reportedly gave several presentations
that detailed networks of suspected terrorists.
In one case it turned out that "all those guys
were connected to were pizza shops"
http://www.businessinsider.com/keith-alexanders-sidekick-james-heath-2013-9
MMM PIZZA OM NOM NOM
Another massive chart, which ostensibly detailed al Qaeda and its
connections in Afghanistan, turned out to be completely false.
"We found there was no data behind the links. No verifiable sources.
We later found out that a quarter of the guys named on the chart had
already been killed in Afghanistan."
U R TEH EN3MY OF TEH ST8
Counterencryption programmes
code-named after first battles
of respective Civil Wars
UK: EDGEHILL
US: MANASSAS / BULLRUN
http://www.emptywheel.net/2013/09/05/nsa-gchq-declare-civil-war-on-their-own-people/
Adwalton Moor = CCL
http://static.guim.co.uk/sys-images/Guardian/Pix/audio/video/2013/9/5/1378396354932/NSA-Bullrun-2-001.jpg
“Do not speculate on sources or methods”
HERE YA GO
● A company volunteers to help (and gets paid for it)
● Spies copy the traffic directly off the fiber
● A company complies under legal duress
● Spies infiltrate a company
● Spies coerce upstream companies to weaken crypto in their
products/install backdoors
● Spies brute force the crypto [weakened keys]
● Spies compromise a digital certificate
● Spies hack a target computer directly [zero-day exploits],
stealing keys and/or data, sabotage
Ars Technica
http://arstechnica.com/tech-policy/2013/09/let-us-count-the-ways-how-the-feds-legally-technically-get-our-data/
Encryption works.
Properly implemented strong crypto systems
are one of the few things that you can rely on.
Unfortunately, endpoint security is so terrifically weak
that NSA can frequently find ways around it.
Snowden 17 June 2013
The NSA is able to decrypt most of the Internet.
They're doing it primarily by cheating, not by mathematics.
Remember this: The math is good, but math has no agency.
Code has agency, and the code has been subverted.
Schneier 5 Sep 2013
http://www.theguardian.com/world/2013/jun/17/edward-snowden-nsa-files-whistleblower
https://www.schneier.com/blog/archives/2013/09/the_nsa_is_brea.html
IPSEC
Every once in a while, someone not an NSA employee,
but who had longstanding ties to NSA,
would make a suggestion that reduced privacy or security,
but which seemed to make sense
when viewed by people who didn't know much about crypto.
For example,
using the same IV (initialization vector) throughout a session,
rather than making a new one for each packet.
Or, retaining a way to for this encryption protocol
to specify that no encryption is to be applied.
John Gilmore 6 September 2013
http://www.mail-archive.com/cryptography@metzdowd.com/msg12325.html
Weakness in Dual_EC_DRBG
Dan Shumow and Niels Ferguson
(Microsoft)
Did NSA Put a Secret Backdoor in New
Encryption Standard?
Schneier 15 November 2007
http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115
http://rump2007.cr.yp.to/15-shumow.pdf
WTF 2007
Gov’t standards agency “strongly” discourages
use of NSA-influenced algorithm
13 September 2013
http://arstechnica.com/security/2013/09/government-standards-agency-strongly-suggests-dropping-its-own-encryption-standard/
http://www.change.org/en-GB/petitions/linus-torvalds-remove-rdrand-from-dev-random-4
Where do I start a petition to raise the IQ and kernel knowledge of people?
Guys, go read drivers/char/random.c. Then, learn about cryptography. Finally,
come back here and admit to the world that you were wrong. Short answer: we
actually know what we are doing. You don't. Long answer: we use rdrand as
_one_ of many inputs into the random pool, and we use it as a way to
_improve_ that random pool. So even if rdrand were to be back-doored by the
NSA, our use of rdrand actually improves the quality of the random numbers
you get from /dev/random. Really short answer: you're ignorant.
Linus 9 September 2013
http://www.change.org/en-GB/petitions/linus-torvalds-remove-rdrand-from-dev-random-4/responses/9066
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c2557a303ab6712bb6e09447df828c557c710ac9
https://plus.google.com/117091380454742934025/posts/SDcoemc9V3J
DIGINOTAR PWNED JULY 2011
Netherlands cert authority
“the list of fraudulent digital certificates obtained from
DigiNotar has been growing, expanding to include not
just Facebook, Google, Microsoft, Skype, Twitter, and
WordPress, but also the CIA, MI6, and Mossad
intelligence services, as well as the pro-privacy Tor
Project”
Information Week
6 September 2011
http://www.informationweek.com/security/attacks/stolen-digital-certificates-compromised/231600810
O HAI
http://koen.io/wp-content/uploads/2013/09/DigiNotar_slide.png
MAN IN THE MIDDLE
“FLYING PIG”
https://people.torproject.org/~andrew/2013-09-10-quick-ant-tor-events-qfd.png
MAN IN THE MIDDLE
“FLYING PIG”
http://4.bp.blogspot.com/-jUBwxB2JMuo/UjCPEX7CYtI/AAAAAAAAFAE/IXaJrZdyQhQ/s400/Flying+Pig.gif
MAN IN THE MIDDLE
https://ur.pwned.lol
Perfect Forward Secrecy
Netcraft toolbar
http://toolbar.netcraft.com/install
Gmail certificate
subverted?
u r teh fuX0r3d
lololol
Singularity Hub
http://singularityhub.com/2013/09/04/facebook-plans-to-add-millions-more-faces-to-its-facial-recognition-database/
http://arstechnica.com/security/2013/09/the-body-worn-imsi-catcher-for-all-your-covert-phone-snooping-needs/
Ars
Technica
http://arstechnica.com/tech-policy/2013/09/how-the-cops-watch-your-tweets-in-real-time/
http://www.wired.co.uk/news/archive/2013-06/26/socmint
Adam Curtis
http://www.bbc.co.uk/blogs/adamcurtis/posts/BUGGER
Charles Stross
1970s: deregulation of labour markets and the
deliberate destruction of the job for life culture.
Today, around 70% of the US intelligence budget is
spent on outside contractors.
Gen Y has never thought of jobs as permanent things.
Gen Y will stare at you blankly if you talk about loyalty to
their employer.
Edward Snowden is 30: he was born in 1983.
I think he's a sign of things to come.
PS: Chelsea Manning is 25.
http://www.antipope.org/charlie/blog-static/2013/08/snowden-leaks-the-real-take-ho.html
http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying
In ur-internets

Más contenido relacionado

Similar a In ur-internets

Francis da costa rethinks the internet of things zd_net
Francis da costa rethinks the internet of things   zd_netFrancis da costa rethinks the internet of things   zd_net
Francis da costa rethinks the internet of things zd_netMeshDynamics
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via smsqqlan
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!EnergySec
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.Jan Geirnaert
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hackSlawomir Jasek
 
2600 v01 n03 (march 1984)
2600 v01 n03 (march 1984)2600 v01 n03 (march 1984)
2600 v01 n03 (march 1984)Felipe Prado
 
2600 v09 n2 (summer 1992)
2600 v09 n2 (summer 1992)2600 v09 n2 (summer 1992)
2600 v09 n2 (summer 1992)Felipe Prado
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology100656472mercier
 
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Marco Balduzzi
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for MainframesCheryl Biswas
 
Let’s Get Cirrus About Personal Clouds
Let’s Get Cirrus About Personal CloudsLet’s Get Cirrus About Personal Clouds
Let’s Get Cirrus About Personal CloudsT.Rob Wyatt
 
Group 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb ideaGroup 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb ideaBluepie1
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 AssignmentLaura Aviles
 

Similar a In ur-internets (20)

ISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism AnalysisISIS Cyber Terrorism Analysis
ISIS Cyber Terrorism Analysis
 
Francis da costa rethinks the internet of things zd_net
Francis da costa rethinks the internet of things   zd_netFrancis da costa rethinks the internet of things   zd_net
Francis da costa rethinks the internet of things zd_net
 
Tor talk-prosa-screen
Tor talk-prosa-screenTor talk-prosa-screen
Tor talk-prosa-screen
 
Darknet - Is it good for you?
Darknet - Is it good for you?Darknet - Is it good for you?
Darknet - Is it good for you?
 
D1 t1 t. yunusov k. nesterov - bootkit via sms
D1 t1   t. yunusov k. nesterov - bootkit via smsD1 t1   t. yunusov k. nesterov - bootkit via sms
D1 t1 t. yunusov k. nesterov - bootkit via sms
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Security
SecuritySecurity
Security
 
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
 
2600 v01 n03 (march 1984)
2600 v01 n03 (march 1984)2600 v01 n03 (march 1984)
2600 v01 n03 (march 1984)
 
2600 v09 n2 (summer 1992)
2600 v09 n2 (summer 1992)2600 v09 n2 (summer 1992)
2600 v09 n2 (summer 1992)
 
Hacking for Dummies 2
Hacking for Dummies 2Hacking for Dummies 2
Hacking for Dummies 2
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology
 
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
 
Let’s Get Cirrus About Personal Clouds
Let’s Get Cirrus About Personal CloudsLet’s Get Cirrus About Personal Clouds
Let’s Get Cirrus About Personal Clouds
 
Group 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb ideaGroup 4 why smart object maybe a dumb idea
Group 4 why smart object maybe a dumb idea
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

In ur-internets