Enviar búsqueda
Cargar
Spam Clustering
•
Descargar como PPT, PDF
•
0 recomendaciones
•
798 vistas
Bitdefender
Seguir
Tecnología
Noticias y política
Denunciar
Compartir
Denunciar
Compartir
1 de 30
Descargar ahora
Recomendados
SMS Spam Classification using NLP: Methods, Approaches, and applications.
Sms spam classification
Sms spam classification
AnishaAgarwal41
Jose Maria Gomez_short.PPT
Jose Maria Gomez_short.PPT
butest
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning Approach
Reza Rahimi
Overfitting and-tbl
Overfitting and-tbl
Digvijay Singh
This paper shows different ways for the identification of age and gender in social networks with different data mining techniques. Dataprotection Problem: The problem is caused by users who don't want to reveal their personal gender and age information.
Text Mining Project: Identification of Age and Gender in Social Networks
Text Mining Project: Identification of Age and Gender in Social Networks
Lucas M
Slovenija
Slovenija
Renny
Ccna study
Ccna study
ccnaguide
MD Anderson Energy Initiatives, reduced annual energy costs by $1 million in 2009 Author: Timothy Peglow, MD Anderson Cancer Center, Patient Care and Prevention Facililties
Timothy Peglow- Gulf Coast Green 2010
Timothy Peglow- Gulf Coast Green 2010
Hayley Pallister
Recomendados
SMS Spam Classification using NLP: Methods, Approaches, and applications.
Sms spam classification
Sms spam classification
AnishaAgarwal41
Jose Maria Gomez_short.PPT
Jose Maria Gomez_short.PPT
butest
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning Approach
Reza Rahimi
Overfitting and-tbl
Overfitting and-tbl
Digvijay Singh
This paper shows different ways for the identification of age and gender in social networks with different data mining techniques. Dataprotection Problem: The problem is caused by users who don't want to reveal their personal gender and age information.
Text Mining Project: Identification of Age and Gender in Social Networks
Text Mining Project: Identification of Age and Gender in Social Networks
Lucas M
Slovenija
Slovenija
Renny
Ccna study
Ccna study
ccnaguide
MD Anderson Energy Initiatives, reduced annual energy costs by $1 million in 2009 Author: Timothy Peglow, MD Anderson Cancer Center, Patient Care and Prevention Facililties
Timothy Peglow- Gulf Coast Green 2010
Timothy Peglow- Gulf Coast Green 2010
Hayley Pallister
Practical Knowledge Representation
Practical Knowledge Representation
butest
As a data science Intern at Leapcheck Services private limited, I have developed a naive chatbot using sequence to sequence model by LSTM of RNN. Sharing the tutorial which I made explicitly for the deep learning enthusiasts to provide them a basic insight on how chatbot can be developed with the help of recurrent neural network.
Chatbot ppt
Chatbot ppt
Manish Mishra
Emailphishing(deep anti phishnet applying deep neural networks for phishing email detection)
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
Venkat Projects
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
Bitdefender
Implementing the Genetic Algorithm in XSLT from 2002
Implementing the Genetic Algorithm in XSLT: PoC
Implementing the Genetic Algorithm in XSLT: PoC
jimfuller2009
Bayesian classifier works efficiently on some fields, and badly on some. The performance of Bayesian Classifier suffers in fields that involve correlated features. Feature selection is beneficial in reducing dimensionality, removing irrelevant data, incrementing learning accuracy, and improving result comprehensibility. But, the recent increase of dimensionality of data place a hard challenge to many existing feature selection methods with respect to efficiency and effectiveness. In this paper, Bayesian Classifier with Correlation Based Feature Selection is introduced which can key out relevant features as well as redundancy among relevant features without pair wise correlation analysis. The efficiency and effectiveness of our method is presented through broad.
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
Bayesian classifier works efficiently on some fields, and badly on some. The performance of Bayesian Classifier suffers in fields that involve correlated features. Feature selection is beneficial in reducing dimensionality, removing irrelevant data, incrementing learning accuracy, and improving result comprehensibility. But, the recent increase of dimensionality of data place a hard challenge to many existing feature selection methods with respect to efficiency and effectiveness. In this paper, Bayesian Classifier with Correlation Based Feature Selection is introduced which can key out relevant features as well as redundancy among relevant features without pair wise correlation analysis. The efficiency and effectiveness of our method is presented through broad.
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
Bayesian classifier works efficiently on some fields, and badly on some. The performance of Bayesian Classifier suffers in fields that involve correlated features. Feature selection is beneficial in reducing dimensionality, removing irrelevant data, incrementing learning accuracy, and improving result comprehensibility. But, the recent increase of dimensionality of data place a hard challenge to many existing feature selection methods with respect to efficiency and effectiveness. In this paper, Bayesian Classifier with Correlation Based Feature Selection is introduced which can key out relevant features as well as redundancy among relevant features without pair wise correlation analysis. The efficiency and effectiveness of our method is presented through broad.
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
Bayesian classifier works efficiently on some fields, and badly on some. The performance of Bayesian Classifier suffers in fields that involve correlated features. Feature selection is beneficial in reducing dimensionality, removing irrelevant data, incrementing learning accuracy, and improving result comprehensibility. But, the recent increase of dimensionality of data place a hard challenge to many existing feature selection methods with respect to efficiency and effectiveness. In this paper, Bayesian Classifier with Correlation Based Feature Selection is introduced which can key out relevant features as well as redundancy among relevant features without pair wise correlation analysis. The efficiency and effectiveness of our method is presented through broad.
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
My general recipes for maintainable software, from years in the trenches creating maintainable software.
Good++
Good++
Jade Ritchie Annand
A brief discription on the basic Email function charctertics etc...
Email
Email
Roy Thomas
Why Micro services, what do they solve and a little bit how via GRPC instead of REST, Docker to containerize and Continuous Deployment
Micro services
Micro services
Alex Punnen
Dr. Bobby Krupczak's slides about the Cartographer management agent and the underlying XMP management framework. Presented at the February 10, 2009 meeting of the Atlanta Network and Systems Management Technical User Group (ANSMTUG).
Cartographer, or Building A Next Generation Management Framework
Cartographer, or Building A Next Generation Management Framework
ansmtug
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012
Bitdefender
The first six months of 2011 have been placed under the sign of vulnerabilities and data breaches. While the malware landscape has witnessed little to no significant changes or epidemics, the numbers of data breaches and outages have increased considerably during the monitored period. IT security companies have been the primary targets of cybercriminals in an attempt to take them offline and, at the same time, to diminish their expertise in the eyes of their customers. Two of the most important IT security vendors that have been slammed with such attacks are HBGary and RSA, the security division of EMC. Another major data leak followed by almost one month of outage was the Sony PlayStation Network incident, which exposed credit card details of about two million PSN users. The data leak was disclosed with a significant delay. The damage inflicted to users is yet to be estimated. Significant outages have also happened in Egypt, following the massive wave of protests that took place on January 28. In order to prevent demonstrations and protests, the Egyptian government had all the local ISPs pull the plug on the Internet, thus rendering the bulk of electronic communications useless. The Internet blackout in Egypt has brought up endless debates on the importance of digital communications and the catastrophic results of outages. Social networks have played a key role in maintaining a climate of insecurity. Although the number of e-threats especially designed to infect social network users (such as the infamous Koobface and Boonana worms) has dramatically decreased, cyber-criminals have focused their efforts on pushing an unprecedented number of rogue applications. The purpose of these virally/spreading applications is two-fold: on the one side, they redirect the users to websites where they are forced to fill in surveys; on the other side, these applications collect exhaustive information about their victims and their friends, which are later used in targeted spam and phishing campaigns.
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
Bitdefender
Más contenido relacionado
Similar a Spam Clustering
Practical Knowledge Representation
Practical Knowledge Representation
butest
As a data science Intern at Leapcheck Services private limited, I have developed a naive chatbot using sequence to sequence model by LSTM of RNN. Sharing the tutorial which I made explicitly for the deep learning enthusiasts to provide them a basic insight on how chatbot can be developed with the help of recurrent neural network.
Chatbot ppt
Chatbot ppt
Manish Mishra
Emailphishing(deep anti phishnet applying deep neural networks for phishing email detection)
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
Venkat Projects
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
Bitdefender
Implementing the Genetic Algorithm in XSLT from 2002
Implementing the Genetic Algorithm in XSLT: PoC
Implementing the Genetic Algorithm in XSLT: PoC
jimfuller2009
Bayesian classifier works efficiently on some fields, and badly on some. The performance of Bayesian Classifier suffers in fields that involve correlated features. Feature selection is beneficial in reducing dimensionality, removing irrelevant data, incrementing learning accuracy, and improving result comprehensibility. But, the recent increase of dimensionality of data place a hard challenge to many existing feature selection methods with respect to efficiency and effectiveness. In this paper, Bayesian Classifier with Correlation Based Feature Selection is introduced which can key out relevant features as well as redundancy among relevant features without pair wise correlation analysis. The efficiency and effectiveness of our method is presented through broad.
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
Bayesian classifier works efficiently on some fields, and badly on some. The performance of Bayesian Classifier suffers in fields that involve correlated features. Feature selection is beneficial in reducing dimensionality, removing irrelevant data, incrementing learning accuracy, and improving result comprehensibility. But, the recent increase of dimensionality of data place a hard challenge to many existing feature selection methods with respect to efficiency and effectiveness. In this paper, Bayesian Classifier with Correlation Based Feature Selection is introduced which can key out relevant features as well as redundancy among relevant features without pair wise correlation analysis. The efficiency and effectiveness of our method is presented through broad.
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
Bayesian classifier works efficiently on some fields, and badly on some. The performance of Bayesian Classifier suffers in fields that involve correlated features. Feature selection is beneficial in reducing dimensionality, removing irrelevant data, incrementing learning accuracy, and improving result comprehensibility. But, the recent increase of dimensionality of data place a hard challenge to many existing feature selection methods with respect to efficiency and effectiveness. In this paper, Bayesian Classifier with Correlation Based Feature Selection is introduced which can key out relevant features as well as redundancy among relevant features without pair wise correlation analysis. The efficiency and effectiveness of our method is presented through broad.
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
Bayesian classifier works efficiently on some fields, and badly on some. The performance of Bayesian Classifier suffers in fields that involve correlated features. Feature selection is beneficial in reducing dimensionality, removing irrelevant data, incrementing learning accuracy, and improving result comprehensibility. But, the recent increase of dimensionality of data place a hard challenge to many existing feature selection methods with respect to efficiency and effectiveness. In this paper, Bayesian Classifier with Correlation Based Feature Selection is introduced which can key out relevant features as well as redundancy among relevant features without pair wise correlation analysis. The efficiency and effectiveness of our method is presented through broad.
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
My general recipes for maintainable software, from years in the trenches creating maintainable software.
Good++
Good++
Jade Ritchie Annand
A brief discription on the basic Email function charctertics etc...
Email
Email
Roy Thomas
Why Micro services, what do they solve and a little bit how via GRPC instead of REST, Docker to containerize and Continuous Deployment
Micro services
Micro services
Alex Punnen
Dr. Bobby Krupczak's slides about the Cartographer management agent and the underlying XMP management framework. Presented at the February 10, 2009 meeting of the Atlanta Network and Systems Management Technical User Group (ANSMTUG).
Cartographer, or Building A Next Generation Management Framework
Cartographer, or Building A Next Generation Management Framework
ansmtug
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
lec21.ppt
lec21.ppt
butest
Similar a Spam Clustering
(20)
Practical Knowledge Representation
Practical Knowledge Representation
Chatbot ppt
Chatbot ppt
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
Emailphishing(deep anti phishnet applying deep neural networks for phishing e...
Do Humans Beat Computers At Pattern Recognition
Do Humans Beat Computers At Pattern Recognition
Implementing the Genetic Algorithm in XSLT: PoC
Implementing the Genetic Algorithm in XSLT: PoC
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Good++
Good++
Email
Email
Micro services
Micro services
Cartographer, or Building A Next Generation Management Framework
Cartographer, or Building A Next Generation Management Framework
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
lec21.ppt
Más de Bitdefender
E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012
Bitdefender
The first six months of 2011 have been placed under the sign of vulnerabilities and data breaches. While the malware landscape has witnessed little to no significant changes or epidemics, the numbers of data breaches and outages have increased considerably during the monitored period. IT security companies have been the primary targets of cybercriminals in an attempt to take them offline and, at the same time, to diminish their expertise in the eyes of their customers. Two of the most important IT security vendors that have been slammed with such attacks are HBGary and RSA, the security division of EMC. Another major data leak followed by almost one month of outage was the Sony PlayStation Network incident, which exposed credit card details of about two million PSN users. The data leak was disclosed with a significant delay. The damage inflicted to users is yet to be estimated. Significant outages have also happened in Egypt, following the massive wave of protests that took place on January 28. In order to prevent demonstrations and protests, the Egyptian government had all the local ISPs pull the plug on the Internet, thus rendering the bulk of electronic communications useless. The Internet blackout in Egypt has brought up endless debates on the importance of digital communications and the catastrophic results of outages. Social networks have played a key role in maintaining a climate of insecurity. Although the number of e-threats especially designed to infect social network users (such as the infamous Koobface and Boonana worms) has dramatically decreased, cyber-criminals have focused their efforts on pushing an unprecedented number of rogue applications. The purpose of these virally/spreading applications is two-fold: on the one side, they redirect the users to websites where they are forced to fill in surveys; on the other side, these applications collect exhaustive information about their victims and their friends, which are later used in targeted spam and phishing campaigns.
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
Bitdefender
Cyberthreats 2009
Cyberthreats 2009
Bitdefender
Suita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefender
Bitdefender
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1
Bitdefender
Noile Campuri De Lupta Ale Amenintarilor Informatice
Noile Campuri De Lupta Ale Amenintarilor Informatice
Bitdefender
Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0
Bitdefender
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatate
Bitdefender
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009
Bitdefender
Phishing101
Phishing101
Bitdefender
Más de Bitdefender
(10)
E-Threat Landscape Report H1 2012
E-Threat Landscape Report H1 2012
H1 2011 E-Threat Landscape Report
H1 2011 E-Threat Landscape Report
Cyberthreats 2009
Cyberthreats 2009
Suita 2010 de solutii BitDefender
Suita 2010 de solutii BitDefender
H1 2009 Malware And Spam Review1
H1 2009 Malware And Spam Review1
Noile Campuri De Lupta Ale Amenintarilor Informatice
Noile Campuri De Lupta Ale Amenintarilor Informatice
Conferinta Securitate Web 2.0
Conferinta Securitate Web 2.0
Atacurile de phishing in Romania si in strainatate
Atacurile de phishing in Romania si in strainatate
Gama De Produse BitDefender 2009
Gama De Produse BitDefender 2009
Phishing101
Phishing101
Último
ICT role in 21 century education. How to ICT help in education
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Stay safe, grab a drink and join us virtually for our upcoming "GenAI Risks & Security" Meetup to hear about how to uncover critical GenAI risks and vulnerabilities, AI security considerations in every company, and how a CISO should navigate through GenAI Risks.
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Scaling API-first – The story of a global engineering organization Ian Reasor, Senior Computer Scientist - Adobe Radu Cotescu, Senior Computer Scientist - Adobe Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
We present an architecture of embedding models, vector databases, LLMs, and narrow ML for tracking global news narratives across a variety of countries/languages/news sources. As an example, we explore the real-time application of this architecture for tracking the news narrative surrounding the death of Russian opposition leader Alexei Navalny coming from Russian, French, and English sources.
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
Corporate and higher education. Two industries that, in the past, have had a clear divide with very little crossover. The difference in goals, learning styles and objectives paved the way for differing learning technologies platforms to evolve. Now, those stark lines are blurring as both sides are discovering they have content that’s relevant to the other. Join Tammy Rutherford as she walks through the pros and cons of corporate and higher ed collaborating. And the challenges of these different technology platforms working together for a brighter future.
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Accelerating FinTech Innovation: Unleashing API Economy and GenAI Vasa Krishnan, Chief Technology Officer - FinResults Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
Webinar Recording: https://www.panagenda.com/webinars/why-teams-call-analytics-is-critical-to-your-entire-business Nothing is as frustrating and noticeable as being in an important call and being unable to see or hear the other person. Not surprising then, that issues with Teams calls are among the most common problems users call their helpdesk for. Having in depth insight into everything relevant going on at the user’s device, local network, ISP and Microsoft itself during the call is crucial for good Microsoft Teams Call quality support. To ensure a quick and adequate solution and to ensure your users get the most out of their Microsoft 365. But did you know that ‘bad calls’ are also an excellent indicator of other problems arising? Precisely because it is so noticeable!? Like the canary in the mine, bad calls can be early indicators of problems. Problems that might otherwise not have been noticed for a while but can have a big impact on productivity and satisfaction. Join this session by Christoph Adler to learn how true Microsoft Teams call quality analytics helped other organizations troubleshoot bad calls and identify and fix problems that impacted Teams calls or the use of Microsoft365 in general. See what it can do to keep your users happy and productive! In this session we will cover - Why CQD data alone is not enough to troubleshoot call problems - The importance of attributing call problems to the right call participant - What call quality analytics can do to help you quickly find, fix-, and prevent problems - Why having retrospective detailed insights matters - Real life examples of how others have used Microsoft Teams call quality monitoring to problem shoot problems with their ISP, network, device health and more.
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Abhishek Deb(1), Mr Abdul Kalam(2) M. Des (UX) , School of Design, DIT University , Dehradun. This paper explores the future potential of AI-enabled smartphone processors, aiming to investigate the advancements, capabilities, and implications of integrating artificial intelligence (AI) into smartphone technology. The research study goals consist of evaluating the development of AI in mobile phone processors, analyzing the existing state as well as abilities of AI-enabled cpus determining future patterns as well as chances together with reviewing obstacles as well as factors to consider for more growth.
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving. A report by Poten & Partners as part of the Hydrogen Asia 2024 Summit in Singapore. Copyright Poten & Partners 2024.
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
The Good, the Bad and the Governed - Why is governance a dirty word? David O'Neill, Chief Operating Officer - APIContext Apidays New York 2024: The API Economy in the AI Era (April 30 & May 1, 2024) ------ Check out our conferences at https://www.apidays.global/ Do you want to sponsor or talk at one of our conferences? https://apidays.typeform.com/to/ILJeAaV8 Learn more on APIscene, the global media made by the community for the community: https://www.apiscene.io Explore the API ecosystem with the API Landscape: https://apilandscape.apiscene.io/
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Copy of the slides presented by Matt Robison to the SFWelly Salesforce user group community on May 2 2024. The audience was truly international with attendees from at least 4 different countries joining online. Matt is an expert in data cloud and this was a brilliant session.
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Presentation on the progress in the Domino Container community project as delivered at the Engage 2024 conference
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
DBX 1Q24 Investor Presentation
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
AXA XL - Insurer Innovation Award 2024
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
MySQL Webinar, presented on the 25th of April, 2024. Summary: MySQL solutions enable the deployment of diverse Database Architectures tailored to specific needs, including High Availability, Disaster Recovery, and Read Scale-Out. With MySQL Shell's AdminAPI, administrators can seamlessly set up, manage, and monitor these solutions, ensuring efficiency and ease of use in their administration. MySQL Router, on the other hand, provides transparent routing from the application traffic to the backend servers in the architectures, requiring minimal configuration. Completely built in-house and supported by Oracle, these solutions have been adopted by enterprises of all sizes for their business-critical applications. In this presentation, we'll delve into various database architecture solutions to help you choose the right one based on your business requirements. Focusing on technical details and the latest features to maximize the potential of these solutions.
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
In this talk, we are going to cover the use-case of food image generation at Delivery Hero, its impact and the challenges. In particular, we will present our image scoring solution for filtering out inappropriate images and elaborate on the models we are using.
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Terragrunt, Terraspace, Terramate, terra... whatever. What is wrong with Terraform so people keep on creating wrappers and solutions around it? How OpenTofu will affect this dynamic? In this presentation, we will look into the fundamental driving forces behind a zoo of wrappers. Moreover, we are going to put together a wrapper ourselves so you can make an educated decision if you need one.
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
This reviewer is for the second quarter of Empowerment Technology / ICT in Grade 11
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
Último
(20)
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Spam Clustering
1.
Claudiu MUSAT, Ionut
GRIGORESCU, Carmen MITRICA, Alexandru TRIFAN Spam Clustering using Wave Oriented K Means
2.
3.
4.
5.
And we’ll connect
the dots
6.
7.
And finally some
result charts
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
And finally the
promised charts
30.
And finally the
promised charts (2)
Descargar ahora