Enviar búsqueda
Cargar
CTO-CybersecurityForum-2010-Jayantha Fernando
•
Descargar como PPT, PDF
•
0 recomendaciones
•
963 vistas
S
segughana
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 24
Descargar ahora
Recomendados
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
segughana
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
segughana
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
segughana
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
Commonwealth Telecommunications Organisation
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
Habib Noroozi
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
segughana
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Benjamin Ang
Recomendados
CTO-CybersecurityForum-2010-Daisy francis
CTO-CybersecurityForum-2010-Daisy francis
segughana
CTO-CybersecurityForum-2010-Patricia Asognwe
CTO-CybersecurityForum-2010-Patricia Asognwe
segughana
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
segughana
CTO-CyberSecurityForum-2010-Charles Ward
CTO-CyberSecurityForum-2010-Charles Ward
segughana
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
Commonwealth Telecommunications Organisation
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
Habib Noroozi
CTO-CyberSecurityForum-2010-Anders Johanson
CTO-CyberSecurityForum-2010-Anders Johanson
segughana
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Adapting to changing cyber security threats in South East Asia (IFRI 2020)
Benjamin Ang
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Benjamin Ang
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
Cybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
Regulation and the Internet of Things
Regulation and the Internet of Things
blogzilla
Session 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
Commonwealth Telecommunications Organisation
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
Benjamin Ang
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Benjamin Ang
Overview of national cybercrime strategies
Overview of national cybercrime strategies
Benjamin Ang
IoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
Gwanhoo Lee
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Benjamin Ang
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
Cybersecurity
Cybersecurity
pronab Kurmi
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
Abbie Barbir
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
Dr David Probert
ITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
ITU
RESEARCH PAPER
RESEARCH PAPER
Tanvi Jindal
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
TRPC Pte Ltd
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Arazim Sheu
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
Ethical Sector
Internet of Things Gouvernance Challenges
Internet of Things Gouvernance Challenges
Sarra REBHI
Act9 e
Act9 e
International advisers
Presentation on cyber crime in european union
Presentation on cyber crime in european union
Saini Heena
Más contenido relacionado
La actualidad más candente
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Benjamin Ang
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Benjamin Ang
Cybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
Regulation and the Internet of Things
Regulation and the Internet of Things
blogzilla
Session 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
Commonwealth Telecommunications Organisation
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
Benjamin Ang
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Benjamin Ang
Overview of national cybercrime strategies
Overview of national cybercrime strategies
Benjamin Ang
IoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
Gwanhoo Lee
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Benjamin Ang
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Business Finland
Cybersecurity
Cybersecurity
pronab Kurmi
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
Abbie Barbir
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
Dr David Probert
ITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
ITU
RESEARCH PAPER
RESEARCH PAPER
Tanvi Jindal
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
TRPC Pte Ltd
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Arazim Sheu
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
Ethical Sector
Internet of Things Gouvernance Challenges
Internet of Things Gouvernance Challenges
Sarra REBHI
La actualidad más candente
(20)
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Law and warfare in the cyber domain (for NSSP, AFP, NDCP)
Cybersecurity and Internet Governance
Cybersecurity and Internet Governance
Regulation and the Internet of Things
Regulation and the Internet of Things
Session 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
Singapore Cybersecurity Strategy and Legislation (2018)
Singapore Cybersecurity Strategy and Legislation (2018)
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Cyber threats and cooperation in Indo Pacific for Pacific Forum 2020
Overview of national cybercrime strategies
Overview of national cybercrime strategies
IoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Singapore Cybersecurity Strategy and Legislation (for SMU Law School 2019)
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
Cybersecurity
Cybersecurity
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010
ITU Cybersecurity Capabilities
ITU Cybersecurity Capabilities
RESEARCH PAPER
RESEARCH PAPER
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Planning the Next Lap of ASEAN’s Digital Masterplan 2025 (Lim May-Ann)
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Data Protection: balancing convenience, privacy and security
Data Protection: balancing convenience, privacy and security
Internet of Things Gouvernance Challenges
Internet of Things Gouvernance Challenges
Destacado
Act9 e
Act9 e
International advisers
Presentation on cyber crime in european union
Presentation on cyber crime in european union
Saini Heena
Sri Lankan Tamils
Sri Lankan Tamils
sharlan
3 handouts section3-9
3 handouts section3-9
International advisers
Crap flooding
Crap flooding
Saini Heena
Negociation Techniques: Sri Lankan Government vs LTTE Analysis (MBA)
Negociation Techniques: Sri Lankan Government vs LTTE Analysis (MBA)
Delta Value Consulting
What Open Data and Open Source can do for Sri Lanka?
What Open Data and Open Source can do for Sri Lanka?
Srinath Perera
Taxonomy of educational objectives
Taxonomy of educational objectives
International advisers
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
Talwant Singh
Computer Network Security
Computer Network Security
Sachithra Gayan
The Lanka Gate Initiative
The Lanka Gate Initiative
Prabath Siriwardena
IGF Sri Lanka
IGF Sri Lanka
APNIC
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
Talwant Singh
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way Forward
APNIC
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
Scalar Decisions
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
Deploy360 Programme (Internet Society)
Notaries as amended chapter 110
Notaries as amended chapter 110
awasalam
Last will (1)
Last will (1)
awasalam
Malicious desersion sri lanka law report1
Malicious desersion sri lanka law report1
awasalam
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
Jackseen Jeyaluck
Destacado
(20)
Act9 e
Act9 e
Presentation on cyber crime in european union
Presentation on cyber crime in european union
Sri Lankan Tamils
Sri Lankan Tamils
3 handouts section3-9
3 handouts section3-9
Crap flooding
Crap flooding
Negociation Techniques: Sri Lankan Government vs LTTE Analysis (MBA)
Negociation Techniques: Sri Lankan Government vs LTTE Analysis (MBA)
What Open Data and Open Source can do for Sri Lanka?
What Open Data and Open Source can do for Sri Lanka?
Taxonomy of educational objectives
Taxonomy of educational objectives
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
Computer Network Security
Computer Network Security
The Lanka Gate Initiative
The Lanka Gate Initiative
IGF Sri Lanka
IGF Sri Lanka
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way Forward
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
Notaries as amended chapter 110
Notaries as amended chapter 110
Last will (1)
Last will (1)
Malicious desersion sri lanka law report1
Malicious desersion sri lanka law report1
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
Similar a CTO-CybersecurityForum-2010-Jayantha Fernando
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
Lance Michalson
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
Ambrose Ruyooka,PMP,CGEIT, CRISC
IT Act,2000 - Law
IT Act,2000 - Law
Apurva Kavishwar
Business Law - Unit 3
Business Law - Unit 3
SOMASUNDARAM T
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
Jahid Khan Rahat
Information technology act
Information technology act
AKSHAY KHATRI
IT LAW PRESENATION
IT LAW PRESENATION
Nayana Pingle
Indian it act 2000
Indian it act 2000
Avinash Katariya
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Ambrose Ruyooka,PMP,CGEIT, CRISC
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Ashish Karan
Cyber Governemace In Pakistan
Cyber Governemace In Pakistan
Shakeel Ahmed
Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)
Lance Michalson
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
Lance Michalson
Cyber security laws
Cyber security laws
Sri Manakula Vinayagar Engineering College
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
segughana
Computer Crimes and Data Protection
Computer Crimes and Data Protection
LawPlus Ltd.
Cyber crime laws in Pakistan
Cyber crime laws in Pakistan
Ayesha Majid
Legal Issues in Online Environment
Legal Issues in Online Environment
MSC Malaysia Cybercentre @ Bangsar South City
Cybercrime Prevention Act
Cybercrime Prevention Act
MarkFredderickAbejo
Information technology act 2000
Information technology act 2000
priya rana
Similar a CTO-CybersecurityForum-2010-Jayantha Fernando
(20)
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
Digital identity theft remedial efforts case of uganda_ruyooka
Digital identity theft remedial efforts case of uganda_ruyooka
IT Act,2000 - Law
IT Act,2000 - Law
Business Law - Unit 3
Business Law - Unit 3
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
Information technology act
Information technology act
IT LAW PRESENATION
IT LAW PRESENATION
Indian it act 2000
Indian it act 2000
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Uganda cyber laws _ isaca workshop_kampala_by Ruyooka
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cybercrime Analysis using Criminal Information Management System: An E-Govern...
Cyber Governemace In Pakistan
Cyber Governemace In Pakistan
Ict Compliance @ Gartner (August 2005)
Ict Compliance @ Gartner (August 2005)
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
Cyber security laws
Cyber security laws
CTO-CybersecurityForum-2010-Trilok-Debeesing
CTO-CybersecurityForum-2010-Trilok-Debeesing
Computer Crimes and Data Protection
Computer Crimes and Data Protection
Cyber crime laws in Pakistan
Cyber crime laws in Pakistan
Legal Issues in Online Environment
Legal Issues in Online Environment
Cybercrime Prevention Act
Cybercrime Prevention Act
Information technology act 2000
Information technology act 2000
Más de segughana
CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
segughana
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
segughana
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
segughana
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
segughana
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
segughana
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
segughana
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
segughana
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
segughana
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
segughana
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
segughana
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
segughana
Tomasz Czajkowski
Tomasz Czajkowski
segughana
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardner
segughana
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
segughana
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
segughana
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
segughana
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
segughana
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
segughana
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
segughana
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
segughana
Más de segughana
(20)
CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-Cybersecurity-2010-Mohamed-El-Kattani
CTO-CRC-Africa-2010-Report
CTO-CRC-Africa-2010-Report
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Anthony dyhouse
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CyberSecurityForum-2010-Philip Victor
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Des Ward
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Carr
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-John Crain
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Michael Katundu
CTO-CybersecurityForum-2010-Joe Torres
CTO-CybersecurityForum-2010-Joe Torres
Tomasz Czajkowski
Tomasz Czajkowski
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Will Gardner
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-Mark-Oram
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CTO-Cybersecurity-Forum2010-Thomas-Machdonogh
CyberSecurity-Forum-2010-Mario Hoffmann
CyberSecurity-Forum-2010-Mario Hoffmann
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-JohnCrain-Ddos
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Cristina Buetti
CTO-Cybersecurity-Forum-2010-Peter Burnett
CTO-Cybersecurity-Forum-2010-Peter Burnett
Último
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Último
(20)
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
CTO-CybersecurityForum-2010-Jayantha Fernando
1.
2.
3.
Agenda
4.
Sri Lanka –
Country Facts Land Area: 65,610 Sq. Km Population: 21,130,000 GDP: US$ 27 Billion GDP/cap: US$ 1600 Currency: Sri Lankan Rupee Time Zone: GMT +5:30 Capital: Colombo (Commercial) Sri Jayawardenepura (Ad) Languages: Sinhala, Tamil, English Exports: Garments, Tea, Gems, Rubber, Tourism, IT/BPO Administr’n: 9 Provinces, 25 Districts, 325 Divisional Secretariats
5.
6.
7.
Companies Off-Shoring in
Sri Lanka
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
THANK YOU
Descargar ahora