SlideShare una empresa de Scribd logo
1 de 88
Descargar para leer sin conexión
Apps World Europe 2012


                       With Great
                      Responsibility
                      Comes Great
                       Opportunity
Copyright (c) 2012 CommonsWare, LLC
opportunity




Copyright (c) 2012 CommonsWare, LLC
business opportunity




Copyright (c) 2012 CommonsWare, LLC
why?




Copyright (c) 2012 CommonsWare, LLC
“I don't wanna!”




Copyright (c) 2012 CommonsWare, LLC
audiences want you to “wanna!”




Copyright (c) 2012 CommonsWare, LLC
lighthouse model




Copyright (c) 2012 CommonsWare, LLC
cater to the audiences




Copyright (c) 2012 CommonsWare, LLC
meet responsibilities




Copyright (c) 2012 CommonsWare, LLC
exceed responsibilities




Copyright (c) 2012 CommonsWare, LLC
goal: sales to that audience




Copyright (c) 2012 CommonsWare, LLC
pickaxe model




Copyright (c) 2012 CommonsWare, LLC
selling pickaxes in a gold rush




Copyright (c) 2012 CommonsWare, LLC
make it easier to “wanna”




Copyright (c) 2012 CommonsWare, LLC
help others meet responsibilities




Copyright (c) 2012 CommonsWare, LLC
sell services, tools, etc. to that end




Copyright (c) 2012 CommonsWare, LLC
example #1: privacy




Copyright (c) 2012 CommonsWare, LLC
why privacy?




Copyright (c) 2012 CommonsWare, LLC
It’s not really a secret, per se, but
       there’s a quiet understanding among
       many iOS app developers that it is
       acceptable to send a user’s entire
       address book, without their permission,
       to remote servers and then store it for
       future reference. It’s common practice,
       and many companies likely have your
       address book stored in their database.
                                      Dustin Curtis, Febrary 8, 2012




Copyright (c) 2012 CommonsWare, LLC
Carrier IQ is able to query any metric from a
       device... The scope of the word metric is very
       broad though, including device type, such as
       manufacturer and model, available memory and
       battery life, the type of applications resident on
       the device, the geographical location of the
       device, the end user’s pressing of keys on the
       device, usage history of the device, including
       those that characterize a user’s interaction with
       a device.
                                      Trevor Eckhart, November 12, 2011




Copyright (c) 2012 CommonsWare, LLC
lighthouse model for privacy




Copyright (c) 2012 CommonsWare, LLC
minimum permissions




Copyright (c) 2012 CommonsWare, LLC
optional permissions via plugins




Copyright (c) 2012 CommonsWare, LLC
privacy policy with teeth




Copyright (c) 2012 CommonsWare, LLC
third-party audit




Copyright (c) 2012 CommonsWare, LLC
pickaxe model for privacy




Copyright (c) 2012 CommonsWare, LLC
offer such audits




Copyright (c) 2012 CommonsWare, LLC
data tagging and inspection




Copyright (c) 2012 CommonsWare, LLC
seal of approval




Copyright (c) 2012 CommonsWare, LLC
example #2: security




Copyright (c) 2012 CommonsWare, LLC
why security?




Copyright (c) 2012 CommonsWare, LLC
This HOWTO will guide you
       through the process of cracking
       the pin used to encrypt an
       Android device (Ice Cream
       Sandwich and Jelly Bean) using
       brute force on Santoku Linux
       Community edition.
                                      Santoku Linux Blog, September 17, 2012




Copyright (c) 2012 CommonsWare, LLC
lighthouse model for security




Copyright (c) 2012 CommonsWare, LLC
encrypted storage




Copyright (c) 2012 CommonsWare, LLC
encrypted communications




Copyright (c) 2012 CommonsWare, LLC
minimum surface area




Copyright (c) 2012 CommonsWare, LLC
third-party audit




Copyright (c) 2012 CommonsWare, LLC
pickaxe model for security




Copyright (c) 2012 CommonsWare, LLC
offer such audits




Copyright (c) 2012 CommonsWare, LLC
“pen testing”




Copyright (c) 2012 CommonsWare, LLC
better tools, libraries for encryption




Copyright (c) 2012 CommonsWare, LLC
seal of approval




Copyright (c) 2012 CommonsWare, LLC
example #3: accessibility




Copyright (c) 2012 CommonsWare, LLC
why accessibility?




Copyright (c) 2012 CommonsWare, LLC
The links on this page provide a starting point for
       locating information on government policies
       relating to Web accessibility in different
       countries around the world. Information linked
       from this page may include laws, regulations,
       policies, directives, government-related
       standards or guidelines, or implementation
       guidance which relates to Web accessibility, as
       well as government speeches, press releases,
       etc.
                                      W3C WAI Policy Page, September 18, 2012




Copyright (c) 2012 CommonsWare, LLC
benefits for all users




Copyright (c) 2012 CommonsWare, LLC
lighthouse model for accessibility




Copyright (c) 2012 CommonsWare, LLC
offer multi-modal inputs




Copyright (c) 2012 CommonsWare, LLC
touchscreen




Copyright (c) 2012 CommonsWare, LLC
device-hosted pointer




Copyright (c) 2012 CommonsWare, LLC
external pointer




Copyright (c) 2012 CommonsWare, LLC
voice




Copyright (c) 2012 CommonsWare, LLC
offer multi-modal outputs




Copyright (c) 2012 CommonsWare, LLC
visual




Copyright (c) 2012 CommonsWare, LLC
auditory




Copyright (c) 2012 CommonsWare, LLC
haptics




Copyright (c) 2012 CommonsWare, LLC
Smell-O-Vision




Copyright (c) 2012 CommonsWare, LLC
third-party audit




Copyright (c) 2012 CommonsWare, LLC
pickaxe model for accessibility




Copyright (c) 2012 CommonsWare, LLC
offer such audits




Copyright (c) 2012 CommonsWare, LLC
accessibility app frameworks




Copyright (c) 2012 CommonsWare, LLC
automated accessibility testing




Copyright (c) 2012 CommonsWare, LLC
seal of approval




Copyright (c) 2012 CommonsWare, LLC
example #4: data portability




Copyright (c) 2012 CommonsWare, LLC
platform migrations




Copyright (c) 2012 CommonsWare, LLC
multi-device users




Copyright (c) 2012 CommonsWare, LLC
lighthouse model for data portability




Copyright (c) 2012 CommonsWare, LLC
standards!




Copyright (c) 2012 CommonsWare, LLC
export/import → sync




Copyright (c) 2012 CommonsWare, LLC
pluggable back-end service




Copyright (c) 2012 CommonsWare, LLC
recipes for data migration




Copyright (c) 2012 CommonsWare, LLC
third-party audit




Copyright (c) 2012 CommonsWare, LLC
pickaxe model for data migration




Copyright (c) 2012 CommonsWare, LLC
offer such audits




Copyright (c) 2012 CommonsWare, LLC
document databases




Copyright (c) 2012 CommonsWare, LLC
frameworks around document databases




Copyright (c) 2012 CommonsWare, LLC
frameworks for data synchronization




Copyright (c) 2012 CommonsWare, LLC
more tools, libraries, services




Copyright (c) 2012 CommonsWare, LLC
summary




Copyright (c) 2012 CommonsWare, LLC
do not fear responsibility




Copyright (c) 2012 CommonsWare, LLC
do not fear responsibility... too much




Copyright (c) 2012 CommonsWare, LLC
embrace responsibility




Copyright (c) 2012 CommonsWare, LLC
sell responsibility




Copyright (c) 2012 CommonsWare, LLC
sell responsibility to audiences




Copyright (c) 2012 CommonsWare, LLC
sell responsibility to developers




Copyright (c) 2012 CommonsWare, LLC
sell ways of addressing responsibility




Copyright (c) 2012 CommonsWare, LLC
With Great
                      Responsibility
                      Comes Great
                       Opportunity
Copyright (c) 2012 CommonsWare, LLC
Speaker Contact
            Information




Copyright (c) 2012 CommonsWare, LLC

Más contenido relacionado

Similar a AppsWorld Keynote

50 Business Models in 20 Minutes
50 Business Models in 20 Minutes50 Business Models in 20 Minutes
50 Business Models in 20 MinutesCommonsWare
 
Koneki @ Eclipse Day Toulouse 2012
Koneki @ Eclipse Day Toulouse 2012Koneki @ Eclipse Day Toulouse 2012
Koneki @ Eclipse Day Toulouse 2012Benjamin Cabé
 
Securing Android Applications
Securing Android ApplicationsSecuring Android Applications
Securing Android ApplicationsInfosys
 
Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles Kingsley Uyi Idehen
 
Deploying WebRTC successfully – A web developer perspective
Deploying WebRTC successfully – A web developer perspectiveDeploying WebRTC successfully – A web developer perspective
Deploying WebRTC successfully – A web developer perspectiveDialogic Inc.
 
Sl virtual apps-131106
Sl virtual apps-131106Sl virtual apps-131106
Sl virtual apps-131106SL Corporation
 
App Integration (Revised and Updated)
App Integration (Revised and Updated)App Integration (Revised and Updated)
App Integration (Revised and Updated)CommonsWare
 
Cloud and cloud adoption risks
Cloud and cloud adoption risksCloud and cloud adoption risks
Cloud and cloud adoption riskscalypsori
 
Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)vvmenon22
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Lumension
 
Debugging mobile websites and web apps
Debugging mobile websites and web appsDebugging mobile websites and web apps
Debugging mobile websites and web appsMihai Corlan
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageEMC
 
Don't Ship That Container - Dirk Hohndel
Don't Ship That Container - Dirk HohndelDon't Ship That Container - Dirk Hohndel
Don't Ship That Container - Dirk HohndelShane Coughlan
 
Jubula tutorial EclipseCon North America 2012
Jubula tutorial EclipseCon North America 2012Jubula tutorial EclipseCon North America 2012
Jubula tutorial EclipseCon North America 2012bredex
 
New Capabilities and Product Strategy for .NET on PCF
New Capabilities and Product Strategy for .NET on PCF New Capabilities and Product Strategy for .NET on PCF
New Capabilities and Product Strategy for .NET on PCF VMware Tanzu
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitBrian Campbell
 
Lua on Steroids - EclipseCon NA 2012
Lua on Steroids - EclipseCon NA 2012Lua on Steroids - EclipseCon NA 2012
Lua on Steroids - EclipseCon NA 2012Benjamin Cabé
 
Wired2Win Azure Series- New Open World of Windows Azure-0830
Wired2Win Azure Series- New Open World of Windows Azure-0830Wired2Win Azure Series- New Open World of Windows Azure-0830
Wired2Win Azure Series- New Open World of Windows Azure-0830WinWire Technologies Inc
 

Similar a AppsWorld Keynote (20)

The Next Billion
The Next BillionThe Next Billion
The Next Billion
 
50 Business Models in 20 Minutes
50 Business Models in 20 Minutes50 Business Models in 20 Minutes
50 Business Models in 20 Minutes
 
Koneki @ Eclipse Day Toulouse 2012
Koneki @ Eclipse Day Toulouse 2012Koneki @ Eclipse Day Toulouse 2012
Koneki @ Eclipse Day Toulouse 2012
 
Securing Android Applications
Securing Android ApplicationsSecuring Android Applications
Securing Android Applications
 
Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles
 
Deploying WebRTC successfully – A web developer perspective
Deploying WebRTC successfully – A web developer perspectiveDeploying WebRTC successfully – A web developer perspective
Deploying WebRTC successfully – A web developer perspective
 
X Means Y
X Means YX Means Y
X Means Y
 
Sl virtual apps-131106
Sl virtual apps-131106Sl virtual apps-131106
Sl virtual apps-131106
 
App Integration (Revised and Updated)
App Integration (Revised and Updated)App Integration (Revised and Updated)
App Integration (Revised and Updated)
 
Cloud and cloud adoption risks
Cloud and cloud adoption risksCloud and cloud adoption risks
Cloud and cloud adoption risks
 
Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)Understanding Cloud Computing (basics)
Understanding Cloud Computing (basics)
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Debugging mobile websites and web apps
Debugging mobile websites and web appsDebugging mobile websites and web apps
Debugging mobile websites and web apps
 
Software Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and StorageSoftware Defined Data Center: The Intersection of Networking and Storage
Software Defined Data Center: The Intersection of Networking and Storage
 
Don't Ship That Container - Dirk Hohndel
Don't Ship That Container - Dirk HohndelDon't Ship That Container - Dirk Hohndel
Don't Ship That Container - Dirk Hohndel
 
Jubula tutorial EclipseCon North America 2012
Jubula tutorial EclipseCon North America 2012Jubula tutorial EclipseCon North America 2012
Jubula tutorial EclipseCon North America 2012
 
New Capabilities and Product Strategy for .NET on PCF
New Capabilities and Product Strategy for .NET on PCF New Capabilities and Product Strategy for .NET on PCF
New Capabilities and Product Strategy for .NET on PCF
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity SummitOAuth 101 & Secure APIs 2012 Cloud Identity Summit
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
 
Lua on Steroids - EclipseCon NA 2012
Lua on Steroids - EclipseCon NA 2012Lua on Steroids - EclipseCon NA 2012
Lua on Steroids - EclipseCon NA 2012
 
Wired2Win Azure Series- New Open World of Windows Azure-0830
Wired2Win Azure Series- New Open World of Windows Azure-0830Wired2Win Azure Series- New Open World of Windows Azure-0830
Wired2Win Azure Series- New Open World of Windows Azure-0830
 

Más de CommonsWare

Gradle and Your Android Wearable Projects
Gradle and Your Android Wearable ProjectsGradle and Your Android Wearable Projects
Gradle and Your Android Wearable ProjectsCommonsWare
 
Getting Android Developers for Your Wearables
Getting Android Developers for Your WearablesGetting Android Developers for Your Wearables
Getting Android Developers for Your WearablesCommonsWare
 
When Microwatts Are Precious: Battery Tips for Wearable Apps
When Microwatts Are Precious: Battery Tips for Wearable AppsWhen Microwatts Are Precious: Battery Tips for Wearable Apps
When Microwatts Are Precious: Battery Tips for Wearable AppsCommonsWare
 
The Action Bar: Front to Back
The Action Bar: Front to BackThe Action Bar: Front to Back
The Action Bar: Front to BackCommonsWare
 
Android Security: Defending Your Users
Android Security: Defending Your UsersAndroid Security: Defending Your Users
Android Security: Defending Your UsersCommonsWare
 
Secondary Screen Support Using DisplayManager
Secondary Screen Support Using DisplayManagerSecondary Screen Support Using DisplayManager
Secondary Screen Support Using DisplayManagerCommonsWare
 
Mastering the Master Detail Pattern
Mastering the Master Detail PatternMastering the Master Detail Pattern
Mastering the Master Detail PatternCommonsWare
 
Not Quite As Painful Threading
Not Quite As Painful ThreadingNot Quite As Painful Threading
Not Quite As Painful ThreadingCommonsWare
 
Android Development: The 20,000-Foot View
Android Development: The 20,000-Foot ViewAndroid Development: The 20,000-Foot View
Android Development: The 20,000-Foot ViewCommonsWare
 
Maps V2... And You!
Maps V2... And You!Maps V2... And You!
Maps V2... And You!CommonsWare
 
A Deep Dive Into ViewPager
A Deep Dive Into ViewPagerA Deep Dive Into ViewPager
A Deep Dive Into ViewPagerCommonsWare
 
Second-Screen Support in Android 4.2
Second-Screen Support in Android 4.2Second-Screen Support in Android 4.2
Second-Screen Support in Android 4.2CommonsWare
 
Integrate Android Apps and Web Apps
Integrate Android Apps and Web AppsIntegrate Android Apps and Web Apps
Integrate Android Apps and Web AppsCommonsWare
 
From Android to the Mobile Web
From Android to the Mobile WebFrom Android to the Mobile Web
From Android to the Mobile WebCommonsWare
 
The Wonderful World of Wearables
The Wonderful World of WearablesThe Wonderful World of Wearables
The Wonderful World of WearablesCommonsWare
 
Securing User Data with SQLCipher
Securing User Data with SQLCipherSecuring User Data with SQLCipher
Securing User Data with SQLCipherCommonsWare
 
Beaming Data to Devices with NFC
Beaming Data to Devices with NFCBeaming Data to Devices with NFC
Beaming Data to Devices with NFCCommonsWare
 
What's New in Jelly Bean
What's New in Jelly BeanWhat's New in Jelly Bean
What's New in Jelly BeanCommonsWare
 
Rich Text Editing and Beyond
Rich Text Editing and BeyondRich Text Editing and Beyond
Rich Text Editing and BeyondCommonsWare
 
App integration: Strategies and Tactics
App integration: Strategies and TacticsApp integration: Strategies and Tactics
App integration: Strategies and TacticsCommonsWare
 

Más de CommonsWare (20)

Gradle and Your Android Wearable Projects
Gradle and Your Android Wearable ProjectsGradle and Your Android Wearable Projects
Gradle and Your Android Wearable Projects
 
Getting Android Developers for Your Wearables
Getting Android Developers for Your WearablesGetting Android Developers for Your Wearables
Getting Android Developers for Your Wearables
 
When Microwatts Are Precious: Battery Tips for Wearable Apps
When Microwatts Are Precious: Battery Tips for Wearable AppsWhen Microwatts Are Precious: Battery Tips for Wearable Apps
When Microwatts Are Precious: Battery Tips for Wearable Apps
 
The Action Bar: Front to Back
The Action Bar: Front to BackThe Action Bar: Front to Back
The Action Bar: Front to Back
 
Android Security: Defending Your Users
Android Security: Defending Your UsersAndroid Security: Defending Your Users
Android Security: Defending Your Users
 
Secondary Screen Support Using DisplayManager
Secondary Screen Support Using DisplayManagerSecondary Screen Support Using DisplayManager
Secondary Screen Support Using DisplayManager
 
Mastering the Master Detail Pattern
Mastering the Master Detail PatternMastering the Master Detail Pattern
Mastering the Master Detail Pattern
 
Not Quite As Painful Threading
Not Quite As Painful ThreadingNot Quite As Painful Threading
Not Quite As Painful Threading
 
Android Development: The 20,000-Foot View
Android Development: The 20,000-Foot ViewAndroid Development: The 20,000-Foot View
Android Development: The 20,000-Foot View
 
Maps V2... And You!
Maps V2... And You!Maps V2... And You!
Maps V2... And You!
 
A Deep Dive Into ViewPager
A Deep Dive Into ViewPagerA Deep Dive Into ViewPager
A Deep Dive Into ViewPager
 
Second-Screen Support in Android 4.2
Second-Screen Support in Android 4.2Second-Screen Support in Android 4.2
Second-Screen Support in Android 4.2
 
Integrate Android Apps and Web Apps
Integrate Android Apps and Web AppsIntegrate Android Apps and Web Apps
Integrate Android Apps and Web Apps
 
From Android to the Mobile Web
From Android to the Mobile WebFrom Android to the Mobile Web
From Android to the Mobile Web
 
The Wonderful World of Wearables
The Wonderful World of WearablesThe Wonderful World of Wearables
The Wonderful World of Wearables
 
Securing User Data with SQLCipher
Securing User Data with SQLCipherSecuring User Data with SQLCipher
Securing User Data with SQLCipher
 
Beaming Data to Devices with NFC
Beaming Data to Devices with NFCBeaming Data to Devices with NFC
Beaming Data to Devices with NFC
 
What's New in Jelly Bean
What's New in Jelly BeanWhat's New in Jelly Bean
What's New in Jelly Bean
 
Rich Text Editing and Beyond
Rich Text Editing and BeyondRich Text Editing and Beyond
Rich Text Editing and Beyond
 
App integration: Strategies and Tactics
App integration: Strategies and TacticsApp integration: Strategies and Tactics
App integration: Strategies and Tactics
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

AppsWorld Keynote