SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
Data sharing
in the Age of the SOCIAL MACHINE
Thanassis Tiropanis
University of Southampton
t.tiropanis@southampton.ac.uk
Data and Social Machines
• Social Machines generate data
– E.g. Web, Zooniverse, Twitter, Wikipedia
• Social Machines consume data
– E.g. Web, Zooniverse, Twitter, Wikipedia
• The human element in Social Machines for data generation,
analysis, visualisation and consumption
The human element in data analysis
• More than one interpretations of data
• Different visualisations for different people
• Discourse on data
• Data and visualisation sharing
• Ethics
• Privacy
• Algorithms
• Marketplace
Data for Social Machines
• It is beyond a system, we need an infrastructure
• Which, in turn, is a Social Machine
Web Observatory
People
Datasets
Streams Apps
Thanassis Tiropanis – University of Southampton
A unifying concept
Datastore
People
Datasets
Streams
Apps
People
Datasets
Streams
Apps
People
Datasets
Streams
Apps
People
Datasets
Streams
Apps
Appstore
Personal Dashboard Personal Datastore
Thanassis Tiropanis – University of Southampton
webobservatory.soton.ac.uk
webobservatory.soton.ac.uk
webobservatory.soton.ac.uk
webobservatory.soton.ac.uk
WO Architectural Principles
• Not all datasets or applications can be public.
• Web Observatories list two main types of
resources: datasets [or streams] and analytic
applications, including visualisations.
• Not all listed resources need to be locally hosted
• Metadata describing the listed resources and
projects are published.
The Web Observatory: A Middle Layer for Broad Data. (2014). Tiropanis, T, Hall, W, Hendler, J A, De Larinaga, C. Big Data, 2(3).
The Web Observatory: A Middle Layer for Broad Data. (2014). Tiropanis, T, Hall, W, Hendler, J A, De Larinaga, C. Big Data, 2(3).
..and complex relationships,
and, varied stakeholder
expectations
WO Stakeholders
Opportunities
• Virtual Research Data Repositories
– Data sharing across repositories
• Management of ‘Live’ Research Data
– Beyond research data archival
– Engagement with researchers across Universities, across
disciplines
• Secure Access Control and Attribution
– How research data are used
– Data publishers take back control
Challenges
• Designing for generality
• Ethical and legal challenges
• Infrastructural challenges
– Standards for metadata and security
– Network and cloud infrastructures
• Technological challenges
– Fine-grain access control
– Searching across personal datastores
– Performance on lightweight computers
Ongoing discussion
Thank you!
www.petrashub.org
The human element in data analysis
• Artificial Intelligence thrives on data
– but also thrives on people’s contribution
• In the age of AI the human element is essential
– Web Observatories support the human element
webobservatory.org
Follow us: @wo_team
Contact us: hello@webobservatory.org

Más contenido relacionado

La actualidad más candente

Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...LIBER Europe
 
20100417 Hover Bee Ar Dev Camp
20100417 Hover Bee Ar Dev Camp20100417 Hover Bee Ar Dev Camp
20100417 Hover Bee Ar Dev CampHans Overbeek
 
Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008Mark Conrad
 
Design and Prototyping of a Social Media Observatory
Design and Prototyping of a Social Media ObservatoryDesign and Prototyping of a Social Media Observatory
Design and Prototyping of a Social Media ObservatoryKarissa Rae McKelvey
 
Protecting our privacy: The role of information and library professionals
Protecting our privacy: The role of information and library professionalsProtecting our privacy: The role of information and library professionals
Protecting our privacy: The role of information and library professionalsCILIPScotland
 
Lizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesLizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesGeneva Declaration
 
Data for nuclear non-proliferation
Data for nuclear non-proliferation Data for nuclear non-proliferation
Data for nuclear non-proliferation fisherali
 
Jisc R&D work in Research Analytics
Jisc R&D work in Research AnalyticsJisc R&D work in Research Analytics
Jisc R&D work in Research AnalyticsVerena139
 
Big data analytics data structure
Big data analytics data structureBig data analytics data structure
Big data analytics data structureSubrahmanyam Gunda
 
Exploring human behaviour in interdisciplinary learning environments - Ali Fi...
Exploring human behaviour in interdisciplinary learning environments - Ali Fi...Exploring human behaviour in interdisciplinary learning environments - Ali Fi...
Exploring human behaviour in interdisciplinary learning environments - Ali Fi...The Higher Education Academy
 
Researching Social Media and the Digital Humanities
Researching Social Media and the Digital HumanitiesResearching Social Media and the Digital Humanities
Researching Social Media and the Digital Humanitiesinfohorizon
 
Technological trends by louise thomasen, track 6 leadership and organisation,...
Technological trends by louise thomasen, track 6 leadership and organisation,...Technological trends by louise thomasen, track 6 leadership and organisation,...
Technological trends by louise thomasen, track 6 leadership and organisation,...Louise Thomasen
 
Profiling information sources and services for discovery
Profiling information sources and services for discoveryProfiling information sources and services for discovery
Profiling information sources and services for discoveryMathieu d'Aquin
 
Sinead Redmond - Data repositories and data protection in Ireland
Sinead Redmond - Data repositories and data protection in Ireland Sinead Redmond - Data repositories and data protection in Ireland
Sinead Redmond - Data repositories and data protection in Ireland dri_ireland
 
NordForsk Open Access Reykjavik 14-15/8-2014:Dri ireland
NordForsk Open Access Reykjavik 14-15/8-2014:Dri irelandNordForsk Open Access Reykjavik 14-15/8-2014:Dri ireland
NordForsk Open Access Reykjavik 14-15/8-2014:Dri irelandNordForsk
 

La actualidad más candente (20)

Research on the Internet @ IDLO
Research on the Internet @ IDLOResearch on the Internet @ IDLO
Research on the Internet @ IDLO
 
Niso library law
Niso library lawNiso library law
Niso library law
 
Using social media to address professional issues in LIS
Using social media to address professional issues in LISUsing social media to address professional issues in LIS
Using social media to address professional issues in LIS
 
Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...Tensions between intellectual property and knowledge discovery in the digital...
Tensions between intellectual property and knowledge discovery in the digital...
 
20100417 Hover Bee Ar Dev Camp
20100417 Hover Bee Ar Dev Camp20100417 Hover Bee Ar Dev Camp
20100417 Hover Bee Ar Dev Camp
 
Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008Mid-Sweden University/SNIA Conference 13 October 2008
Mid-Sweden University/SNIA Conference 13 October 2008
 
Design and Prototyping of a Social Media Observatory
Design and Prototyping of a Social Media ObservatoryDesign and Prototyping of a Social Media Observatory
Design and Prototyping of a Social Media Observatory
 
Protecting our privacy: The role of information and library professionals
Protecting our privacy: The role of information and library professionalsProtecting our privacy: The role of information and library professionals
Protecting our privacy: The role of information and library professionals
 
Lizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security StudiesLizette Lancaster - Institute for Security Studies
Lizette Lancaster - Institute for Security Studies
 
Data for nuclear non-proliferation
Data for nuclear non-proliferation Data for nuclear non-proliferation
Data for nuclear non-proliferation
 
Jisc R&D work in Research Analytics
Jisc R&D work in Research AnalyticsJisc R&D work in Research Analytics
Jisc R&D work in Research Analytics
 
Big data analytics data structure
Big data analytics data structureBig data analytics data structure
Big data analytics data structure
 
Leahy Transforming the User Experience with Identity Management and SSO
Leahy Transforming the User Experience with Identity Management and SSOLeahy Transforming the User Experience with Identity Management and SSO
Leahy Transforming the User Experience with Identity Management and SSO
 
Exploring human behaviour in interdisciplinary learning environments - Ali Fi...
Exploring human behaviour in interdisciplinary learning environments - Ali Fi...Exploring human behaviour in interdisciplinary learning environments - Ali Fi...
Exploring human behaviour in interdisciplinary learning environments - Ali Fi...
 
Researching Social Media and the Digital Humanities
Researching Social Media and the Digital HumanitiesResearching Social Media and the Digital Humanities
Researching Social Media and the Digital Humanities
 
Technological trends by louise thomasen, track 6 leadership and organisation,...
Technological trends by louise thomasen, track 6 leadership and organisation,...Technological trends by louise thomasen, track 6 leadership and organisation,...
Technological trends by louise thomasen, track 6 leadership and organisation,...
 
Profiling information sources and services for discovery
Profiling information sources and services for discoveryProfiling information sources and services for discovery
Profiling information sources and services for discovery
 
Sinead Redmond - Data repositories and data protection in Ireland
Sinead Redmond - Data repositories and data protection in Ireland Sinead Redmond - Data repositories and data protection in Ireland
Sinead Redmond - Data repositories and data protection in Ireland
 
Cybersecurity and Academic Research
Cybersecurity and Academic ResearchCybersecurity and Academic Research
Cybersecurity and Academic Research
 
NordForsk Open Access Reykjavik 14-15/8-2014:Dri ireland
NordForsk Open Access Reykjavik 14-15/8-2014:Dri irelandNordForsk Open Access Reykjavik 14-15/8-2014:Dri ireland
NordForsk Open Access Reykjavik 14-15/8-2014:Dri ireland
 

Similar a Data sharing in the age of the Social Machine

Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris
 
Infrastructure, relationships, trust, and RDA
Infrastructure, relationships, trust, and RDAInfrastructure, relationships, trust, and RDA
Infrastructure, relationships, trust, and RDAResearch Data Alliance
 
Trust and Accountability: experiences from the FAIRDOM Commons Initiative.
Trust and Accountability: experiences from the FAIRDOM Commons Initiative.Trust and Accountability: experiences from the FAIRDOM Commons Initiative.
Trust and Accountability: experiences from the FAIRDOM Commons Initiative.Carole Goble
 
Introduction Data Science.pptx
Introduction Data Science.pptxIntroduction Data Science.pptx
Introduction Data Science.pptxAkhirulAminulloh2
 
Dataverse in the Universe of Data by Christine L. Borgman
Dataverse in the Universe of Data by Christine L. BorgmanDataverse in the Universe of Data by Christine L. Borgman
Dataverse in the Universe of Data by Christine L. Borgmandatascienceiqss
 
Digital Humanities and “Digital” Social Sciences
Digital Humanities and “Digital” Social SciencesDigital Humanities and “Digital” Social Sciences
Digital Humanities and “Digital” Social SciencesChantal van Son
 
Big and Small Web Data
Big and Small Web DataBig and Small Web Data
Big and Small Web DataMarieke Guy
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...ICPSR
 
State of the Art Informatics for Research Reproducibility, Reliability, and...
 State of the Art  Informatics for Research Reproducibility, Reliability, and... State of the Art  Informatics for Research Reproducibility, Reliability, and...
State of the Art Informatics for Research Reproducibility, Reliability, and...Micah Altman
 
Critical issues in the collection, analysis and use of student (digital) data
Critical issues in the collection, analysis and use of student (digital) dataCritical issues in the collection, analysis and use of student (digital) data
Critical issues in the collection, analysis and use of student (digital) dataUniversity of South Africa (Unisa)
 
Online-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxOnline-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxRomaSmart1
 
Data commons bonazzi bd2 k fundamentals of science feb 2017
Data commons bonazzi   bd2 k fundamentals of science feb 2017Data commons bonazzi   bd2 k fundamentals of science feb 2017
Data commons bonazzi bd2 k fundamentals of science feb 2017Vivien Bonazzi
 
Research into Practice case study 2: Library linked data implementations an...
	Research into Practice case study 2:  Library linked data implementations an...	Research into Practice case study 2:  Library linked data implementations an...
Research into Practice case study 2: Library linked data implementations an...Hazel Hall
 

Similar a Data sharing in the age of the Social Machine (20)

Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
Sirris innovate2011 - Smart Products with smart data - introduction, Dr. Elen...
 
Infrastructure, relationships, trust, and RDA
Infrastructure, relationships, trust, and RDAInfrastructure, relationships, trust, and RDA
Infrastructure, relationships, trust, and RDA
 
Trust and Accountability: experiences from the FAIRDOM Commons Initiative.
Trust and Accountability: experiences from the FAIRDOM Commons Initiative.Trust and Accountability: experiences from the FAIRDOM Commons Initiative.
Trust and Accountability: experiences from the FAIRDOM Commons Initiative.
 
Introduction Data Science.pptx
Introduction Data Science.pptxIntroduction Data Science.pptx
Introduction Data Science.pptx
 
Oess NCRM Festival
Oess NCRM FestivalOess NCRM Festival
Oess NCRM Festival
 
Dataverse in the Universe of Data by Christine L. Borgman
Dataverse in the Universe of Data by Christine L. BorgmanDataverse in the Universe of Data by Christine L. Borgman
Dataverse in the Universe of Data by Christine L. Borgman
 
Digital Humanities and “Digital” Social Sciences
Digital Humanities and “Digital” Social SciencesDigital Humanities and “Digital” Social Sciences
Digital Humanities and “Digital” Social Sciences
 
Big and Small Web Data
Big and Small Web DataBig and Small Web Data
Big and Small Web Data
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
 
State of the Art Informatics for Research Reproducibility, Reliability, and...
 State of the Art  Informatics for Research Reproducibility, Reliability, and... State of the Art  Informatics for Research Reproducibility, Reliability, and...
State of the Art Informatics for Research Reproducibility, Reliability, and...
 
Critical issues in the collection, analysis and use of student (digital) data
Critical issues in the collection, analysis and use of student (digital) dataCritical issues in the collection, analysis and use of student (digital) data
Critical issues in the collection, analysis and use of student (digital) data
 
Digital Methods by Richard Rogers
Digital Methods by Richard RogersDigital Methods by Richard Rogers
Digital Methods by Richard Rogers
 
Online-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxOnline-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptx
 
Online-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptxOnline-Resources-and-ICT-in-Research.pptx
Online-Resources-and-ICT-in-Research.pptx
 
Data commons bonazzi bd2 k fundamentals of science feb 2017
Data commons bonazzi   bd2 k fundamentals of science feb 2017Data commons bonazzi   bd2 k fundamentals of science feb 2017
Data commons bonazzi bd2 k fundamentals of science feb 2017
 
DBMS
DBMSDBMS
DBMS
 
Digital Academe: Implications of Digital Research
Digital Academe: Implications of Digital ResearchDigital Academe: Implications of Digital Research
Digital Academe: Implications of Digital Research
 
Research into Practice case study 2: Library linked data implementations an...
	Research into Practice case study 2:  Library linked data implementations an...	Research into Practice case study 2:  Library linked data implementations an...
Research into Practice case study 2: Library linked data implementations an...
 
Big Data World
Big Data WorldBig Data World
Big Data World
 
Data 101: A Gentle Introduction
Data 101: A Gentle IntroductionData 101: A Gentle Introduction
Data 101: A Gentle Introduction
 

Más de Ulrik Lyngs

Social Machines: Theoretical perspectives, Paul Smart
Social Machines: Theoretical perspectives, Paul SmartSocial Machines: Theoretical perspectives, Paul Smart
Social Machines: Theoretical perspectives, Paul SmartUlrik Lyngs
 
Mandevillian Intelligence, Paul Smart
Mandevillian Intelligence, Paul SmartMandevillian Intelligence, Paul Smart
Mandevillian Intelligence, Paul SmartUlrik Lyngs
 
Human-Extended Machine Cognition, Paul Smart
Human-Extended Machine Cognition, Paul SmartHuman-Extended Machine Cognition, Paul Smart
Human-Extended Machine Cognition, Paul SmartUlrik Lyngs
 
Understanding Algorithmic Decisions
Understanding Algorithmic DecisionsUnderstanding Algorithmic Decisions
Understanding Algorithmic DecisionsUlrik Lyngs
 
Zooniverse Update
Zooniverse UpdateZooniverse Update
Zooniverse UpdateUlrik Lyngs
 
Ulysses in Cyberspace: Distraction and Self-Regulation in Social Machines
Ulysses in Cyberspace: Distraction and Self-Regulation in Social MachinesUlysses in Cyberspace: Distraction and Self-Regulation in Social Machines
Ulysses in Cyberspace: Distraction and Self-Regulation in Social MachinesUlrik Lyngs
 
SoLiD co operating.systems
SoLiD co operating.systemsSoLiD co operating.systems
SoLiD co operating.systemsUlrik Lyngs
 
Sociagrams: How to design a social machine
Sociagrams: How to design a social machineSociagrams: How to design a social machine
Sociagrams: How to design a social machineUlrik Lyngs
 
Safe Haven in a Box, Petros Papapanagiotou
Safe Haven in a Box, Petros PapapanagiotouSafe Haven in a Box, Petros Papapanagiotou
Safe Haven in a Box, Petros PapapanagiotouUlrik Lyngs
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconUlrik Lyngs
 
A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social MachinesUlrik Lyngs
 
SOCIAM Book: The Theory and Practice of Social Machines
SOCIAM Book: The Theory and Practice of Social MachinesSOCIAM Book: The Theory and Practice of Social Machines
SOCIAM Book: The Theory and Practice of Social MachinesUlrik Lyngs
 
Provenance and Analytics for Social Machines, Trung Dong Huynh
Provenance and Analytics for Social Machines, Trung Dong HuynhProvenance and Analytics for Social Machines, Trung Dong Huynh
Provenance and Analytics for Social Machines, Trung Dong HuynhUlrik Lyngs
 

Más de Ulrik Lyngs (14)

Social Machines: Theoretical perspectives, Paul Smart
Social Machines: Theoretical perspectives, Paul SmartSocial Machines: Theoretical perspectives, Paul Smart
Social Machines: Theoretical perspectives, Paul Smart
 
Mandevillian Intelligence, Paul Smart
Mandevillian Intelligence, Paul SmartMandevillian Intelligence, Paul Smart
Mandevillian Intelligence, Paul Smart
 
Human-Extended Machine Cognition, Paul Smart
Human-Extended Machine Cognition, Paul SmartHuman-Extended Machine Cognition, Paul Smart
Human-Extended Machine Cognition, Paul Smart
 
Understanding Algorithmic Decisions
Understanding Algorithmic DecisionsUnderstanding Algorithmic Decisions
Understanding Algorithmic Decisions
 
Zooniverse Update
Zooniverse UpdateZooniverse Update
Zooniverse Update
 
Ulysses in Cyberspace: Distraction and Self-Regulation in Social Machines
Ulysses in Cyberspace: Distraction and Self-Regulation in Social MachinesUlysses in Cyberspace: Distraction and Self-Regulation in Social Machines
Ulysses in Cyberspace: Distraction and Self-Regulation in Social Machines
 
SoLiD co operating.systems
SoLiD co operating.systemsSoLiD co operating.systems
SoLiD co operating.systems
 
Sociagrams: How to design a social machine
Sociagrams: How to design a social machineSociagrams: How to design a social machine
Sociagrams: How to design a social machine
 
Safe Haven in a Box, Petros Papapanagiotou
Safe Haven in a Box, Petros PapapanagiotouSafe Haven in a Box, Petros Papapanagiotou
Safe Haven in a Box, Petros Papapanagiotou
 
App Observatory
App ObservatoryApp Observatory
App Observatory
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria Gascon
 
A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social Machines
 
SOCIAM Book: The Theory and Practice of Social Machines
SOCIAM Book: The Theory and Practice of Social MachinesSOCIAM Book: The Theory and Practice of Social Machines
SOCIAM Book: The Theory and Practice of Social Machines
 
Provenance and Analytics for Social Machines, Trung Dong Huynh
Provenance and Analytics for Social Machines, Trung Dong HuynhProvenance and Analytics for Social Machines, Trung Dong Huynh
Provenance and Analytics for Social Machines, Trung Dong Huynh
 

Último

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Data sharing in the age of the Social Machine