SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
URV Master on Computer Engineering: Computer Security and Intelligent Systems

Fall semester

Spring semester

Research and Entrepreneurship in 
Computer Engineering (6)

Management of Informatic Projects 
(3)
Architectures for Distributed 
Systems (6)

High‐Performance Architectures (6)
First year 
(60)

Software Architecture (6)
Visualisation and Interaction 
Systems (6)
Numerical Methods in Engineering 
(6)

Criptology and Information Security 
(6)
Neural and Evolutive Computing / 
Complex Networks (6)
Optional topics (9)
Biometric Identification (4.5)
Privacy Protection (4.5)
Multi‐Criteria Decision Support 
Systems (4.5)
Ubiquitous Computing (4.5)

Fall semester
Development of Informatic Projects 
(3)
Knowledge Representation and 
Engineering / Planning and 
Approximate Reasoning (6)
Optional topics (9)
Second year 
(30)

Forensic Informatics (4.5)
Introduction to Multi‐Agent 
Systems (4.5)
Artificial Vision and Pattern 
Recognition (4.5)
Multimedia Security (4.5)
External practical work (up to 9)
Master Thesis (12)

Más contenido relacionado

Similar a URV Master on Computer Engineering: Computer Security and Inteligent Systems

Computer science presentation
Computer science presentationComputer science presentation
Computer science presentationdehrabf
 
International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...ijscai
 
4 th International Conference on Data Science and Machine Learning (DSML 2023)
4 th International Conference on Data Science and Machine Learning (DSML 2023)4 th International Conference on Data Science and Machine Learning (DSML 2023)
4 th International Conference on Data Science and Machine Learning (DSML 2023)gerogepatton
 
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)IJDKP
 
International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...ijscai
 
4th International Conference on Data Science and Machine Learning (DSML 2023)
4th International Conference on Data Science and Machine Learning (DSML 2023) 4th International Conference on Data Science and Machine Learning (DSML 2023)
4th International Conference on Data Science and Machine Learning (DSML 2023) gerogepatton
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...josephjonse
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity laurieannwilliams
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)ijcisjournal
 
Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...Chadni Islam
 
Call for Research Articles - 7th International Conference on Computer Science...
Call for Research Articles - 7th International Conference on Computer Science...Call for Research Articles - 7th International Conference on Computer Science...
Call for Research Articles - 7th International Conference on Computer Science...IJNSA Journal
 
Call for Papers - 7th International Conference on Computer Science and Inform...
Call for Papers - 7th International Conference on Computer Science and Inform...Call for Papers - 7th International Conference on Computer Science and Inform...
Call for Papers - 7th International Conference on Computer Science and Inform...ijistjournal
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...GiselleginaGloria
 
Automotive security (cvta)
Automotive security (cvta)Automotive security (cvta)
Automotive security (cvta)Alan Tatourian
 
Research Paper Submission- 5th International Conference on Machine Learning a...
Research Paper Submission- 5th International Conference on Machine Learning a...Research Paper Submission- 5th International Conference on Machine Learning a...
Research Paper Submission- 5th International Conference on Machine Learning a...ijpla
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...gerogepatton
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationChadni Islam
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...GiselleginaGloria
 
On Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineOn Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineMustafa Jarrar
 

Similar a URV Master on Computer Engineering: Computer Security and Inteligent Systems (20)

Computer science presentation
Computer science presentationComputer science presentation
Computer science presentation
 
International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...
 
4 th International Conference on Data Science and Machine Learning (DSML 2023)
4 th International Conference on Data Science and Machine Learning (DSML 2023)4 th International Conference on Data Science and Machine Learning (DSML 2023)
4 th International Conference on Data Science and Machine Learning (DSML 2023)
 
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
FINAL CALL - 7th International Conference on Networks and Security (NSEC 2023)
 
International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...
 
4th International Conference on Data Science and Machine Learning (DSML 2023)
4th International Conference on Data Science and Machine Learning (DSML 2023) 4th International Conference on Data Science and Machine Learning (DSML 2023)
4th International Conference on Data Science and Machine Learning (DSML 2023)
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity The Rising Tide Lifts All Boats:  The Advancement of Science in Cybersecurity
The Rising Tide Lifts All Boats: The Advancement of Science in Cybersecurity
 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security  (IJCIS)International Journal on Cryptography and Information Security  (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
 
Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...Architecture-centric Support for Integrating Security Tool in a Security Orch...
Architecture-centric Support for Integrating Security Tool in a Security Orch...
 
Call for Research Articles - 7th International Conference on Computer Science...
Call for Research Articles - 7th International Conference on Computer Science...Call for Research Articles - 7th International Conference on Computer Science...
Call for Research Articles - 7th International Conference on Computer Science...
 
Call for Papers - 7th International Conference on Computer Science and Inform...
Call for Papers - 7th International Conference on Computer Science and Inform...Call for Papers - 7th International Conference on Computer Science and Inform...
Call for Papers - 7th International Conference on Computer Science and Inform...
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
Automotive security (cvta)
Automotive security (cvta)Automotive security (cvta)
Automotive security (cvta)
 
Research Paper Submission- 5th International Conference on Machine Learning a...
Research Paper Submission- 5th International Conference on Machine Learning a...Research Paper Submission- 5th International Conference on Machine Learning a...
Research Paper Submission- 5th International Conference on Machine Learning a...
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
Architecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automationArchitecture centric support for security orchestration and automation
Architecture centric support for security orchestration and automation
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
On Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineOn Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in Palestine
 
Ijwns
IjwnsIjwns
Ijwns
 

Más de Antonio Moreno

ECAI 2014 poster - Unsupervised semantic clustering of Twitter hashtags
ECAI 2014 poster - Unsupervised semantic clustering of Twitter hashtagsECAI 2014 poster - Unsupervised semantic clustering of Twitter hashtags
ECAI 2014 poster - Unsupervised semantic clustering of Twitter hashtagsAntonio Moreno
 
Dynamic learning of keyword-based preferences for news recommendation (WI-2014)
Dynamic learning of keyword-based preferences for news recommendation (WI-2014)Dynamic learning of keyword-based preferences for news recommendation (WI-2014)
Dynamic learning of keyword-based preferences for news recommendation (WI-2014)Antonio Moreno
 
Automatic and unsupervised topic discovery in social networks
Automatic and unsupervised topic discovery in social networksAutomatic and unsupervised topic discovery in social networks
Automatic and unsupervised topic discovery in social networksAntonio Moreno
 
Artificial Intelligence Master URV-UPC-UB
Artificial Intelligence Master URV-UPC-UBArtificial Intelligence Master URV-UPC-UB
Artificial Intelligence Master URV-UPC-UBAntonio Moreno
 
EnoSigTur: recomanació personalitzada d'activitats enoturístiques
EnoSigTur: recomanació personalitzada d'activitats enoturístiquesEnoSigTur: recomanació personalitzada d'activitats enoturístiques
EnoSigTur: recomanació personalitzada d'activitats enoturístiquesAntonio Moreno
 
On the application of multi-agent systems in Health Care
On the application of multi-agent systems in Health CareOn the application of multi-agent systems in Health Care
On the application of multi-agent systems in Health CareAntonio Moreno
 
Multi-agent systems applied in Health Care
Multi-agent systems applied in Health CareMulti-agent systems applied in Health Care
Multi-agent systems applied in Health CareAntonio Moreno
 
Artificial Intelligence techniques in Tourism at URV
Artificial Intelligence techniques in Tourism at URVArtificial Intelligence techniques in Tourism at URV
Artificial Intelligence techniques in Tourism at URVAntonio Moreno
 
MAS course Lect13 industrial applications
MAS course Lect13 industrial applicationsMAS course Lect13 industrial applications
MAS course Lect13 industrial applicationsAntonio Moreno
 
MAS course - Lect12 - URV health care applications
MAS course - Lect12 - URV health care applicationsMAS course - Lect12 - URV health care applications
MAS course - Lect12 - URV health care applicationsAntonio Moreno
 
MAS course - Lect11 - URV applications
MAS course - Lect11 - URV applicationsMAS course - Lect11 - URV applications
MAS course - Lect11 - URV applicationsAntonio Moreno
 
MAS Course - Lect10 - coordination
MAS Course - Lect10 - coordinationMAS Course - Lect10 - coordination
MAS Course - Lect10 - coordinationAntonio Moreno
 
Lect6-An introduction to ontologies and ontology development
Lect6-An introduction to ontologies and ontology developmentLect6-An introduction to ontologies and ontology development
Lect6-An introduction to ontologies and ontology developmentAntonio Moreno
 
Lecture 5 - Agent communication
Lecture 5 - Agent communicationLecture 5 - Agent communication
Lecture 5 - Agent communicationAntonio Moreno
 
Lecture 4- Agent types
Lecture 4- Agent typesLecture 4- Agent types
Lecture 4- Agent typesAntonio Moreno
 

Más de Antonio Moreno (20)

ECAI 2014 poster - Unsupervised semantic clustering of Twitter hashtags
ECAI 2014 poster - Unsupervised semantic clustering of Twitter hashtagsECAI 2014 poster - Unsupervised semantic clustering of Twitter hashtags
ECAI 2014 poster - Unsupervised semantic clustering of Twitter hashtags
 
Dynamic learning of keyword-based preferences for news recommendation (WI-2014)
Dynamic learning of keyword-based preferences for news recommendation (WI-2014)Dynamic learning of keyword-based preferences for news recommendation (WI-2014)
Dynamic learning of keyword-based preferences for news recommendation (WI-2014)
 
Automatic and unsupervised topic discovery in social networks
Automatic and unsupervised topic discovery in social networksAutomatic and unsupervised topic discovery in social networks
Automatic and unsupervised topic discovery in social networks
 
Artificial Intelligence Master URV-UPC-UB
Artificial Intelligence Master URV-UPC-UBArtificial Intelligence Master URV-UPC-UB
Artificial Intelligence Master URV-UPC-UB
 
EnoSigTur: recomanació personalitzada d'activitats enoturístiques
EnoSigTur: recomanació personalitzada d'activitats enoturístiquesEnoSigTur: recomanació personalitzada d'activitats enoturístiques
EnoSigTur: recomanació personalitzada d'activitats enoturístiques
 
On the application of multi-agent systems in Health Care
On the application of multi-agent systems in Health CareOn the application of multi-agent systems in Health Care
On the application of multi-agent systems in Health Care
 
Multi-agent systems applied in Health Care
Multi-agent systems applied in Health CareMulti-agent systems applied in Health Care
Multi-agent systems applied in Health Care
 
Artificial Intelligence techniques in Tourism at URV
Artificial Intelligence techniques in Tourism at URVArtificial Intelligence techniques in Tourism at URV
Artificial Intelligence techniques in Tourism at URV
 
MAS course Lect13 industrial applications
MAS course Lect13 industrial applicationsMAS course Lect13 industrial applications
MAS course Lect13 industrial applications
 
MAS course - Lect12 - URV health care applications
MAS course - Lect12 - URV health care applicationsMAS course - Lect12 - URV health care applications
MAS course - Lect12 - URV health care applications
 
MAS course - Lect11 - URV applications
MAS course - Lect11 - URV applicationsMAS course - Lect11 - URV applications
MAS course - Lect11 - URV applications
 
MAS Course - Lect10 - coordination
MAS Course - Lect10 - coordinationMAS Course - Lect10 - coordination
MAS Course - Lect10 - coordination
 
MAS course - Lect 9
MAS course - Lect 9 MAS course - Lect 9
MAS course - Lect 9
 
Lect 8-auctions
Lect 8-auctionsLect 8-auctions
Lect 8-auctions
 
Lect7MAS-Coordination
Lect7MAS-CoordinationLect7MAS-Coordination
Lect7MAS-Coordination
 
Lect6-An introduction to ontologies and ontology development
Lect6-An introduction to ontologies and ontology developmentLect6-An introduction to ontologies and ontology development
Lect6-An introduction to ontologies and ontology development
 
Lecture 5 - Agent communication
Lecture 5 - Agent communicationLecture 5 - Agent communication
Lecture 5 - Agent communication
 
Lecture 4- Agent types
Lecture 4- Agent typesLecture 4- Agent types
Lecture 4- Agent types
 
Agent properties
Agent propertiesAgent properties
Agent properties
 
Agent architectures
Agent architecturesAgent architectures
Agent architectures
 

Último

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Último (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko