SlideShare una empresa de Scribd logo
1 de 127
Descargar para leer sin conexión
Leveling the Playing
Field
Aaron Bedra
Chief Security Officer, Eligible
@abedra
keybase.io/abedra
Right now, your web
applications are being
attacked
And it will happen again,
and again, and again
As you grow so will
the target on you
Keeping up with
security is difficult
Actually, it’s unfair
Things you have to get right Things the attacker has to get right
Time the attacker has to focus on you Time you have to focus on the attacker
It’s asymmetric
warfare
There’s no way to
manually keep up
Manual
Automated
Intelligent
Scaling your defenses
means strategic
automation
STOP!
Let’s talk about the
problem we are solving
for a minute
Problems
• We don’t know what people are doing
• We don’t know how often they are doing it
• We don’t know how effective we are
• We are don’t have enough resources to keep up
Goals
• Reduce noise
• Generate better signal
• Reduce operational overhead
• Build better business cases
• Spend energy on the really important stuff
Reducing Noise
It starts with really
simple stuff
Tie up the loose ends
with static configuration
Static configuration checklist
At least a B+ rating on SSL Labs*
Reject extensions that you don’t want to accept
Reject known bad user agents
Reject specific known bad actors
Custom error pages that fit your application
Basic secure headers
You’ll be surprised
how well this works
It has a fringe benefit of
creating better
awareness
You can feed this back
to your intelligence
Reducing Operational
Overhead
Dealing with malicious
actors has to be easy
It shouldn’t require
deploys, reloads, or any
potential forward impact
Let’s talk about how to
create something that will
help
Step 1
Put everything in one place!
Centralization of
events is critical
If you can’t see it, it
didn’t happen
There are options
Log aggregation and
a query engine
The query engine can
serve as your discovery
agent
A nice first step
But it will eventually fall over
That’s when you reach
for a messaging system
Log to topics in a
queue
Create processors to
understand events
Step 2
Process Events
For every event type you
will need to understand
how to process it
Structured logging can
help, but it doesn’t fit
everywhere
The goal is to accept an
event and return
consumable details
type logEntry struct {
Address string
Method string
Uri string
ResponseCode string
}
func processEntry(entry string) logEntry {
parts := strings.Split(entry, " ")
event := logEntry{
Address: parts[0],
Method: strings.Replace(parts[5], """, "", 1),
Uri: parts[6],
ResponseCode: parts[8],
}
return event;
}
You will likely have
multiple processors
Split topics by event
type or application
Once you have the data
accessible, figure out
what happened
Track everything!
• HTTP Method
• Time since last request/average requests per sec
• Failed responses
• Failure of intended action (e.g. login, add credit card, edit, etc)
• Anything noteworthy
type Actor struct {
Methods map[string]int
FailedLogins int
FailedResponses map[string]int
}
func updateEvents(event logEntry, counts *map[string]Actor) {
counts[event.Address].Methods[event.Method] += 1
if event.ResponseCode != "200" || event.ResponseCode != "302" {
counts[event.Address].FailedResponses[ResponseCode] += 1
}
if event.Method == "POST" && event.ResponseCode == "200" {
counts[event.Address].FailedLogins += 1
}
}
Once you have things in one
place, it’s all about counting
Simple counts with
thresholds go a long way
Step 3
Thresholds, Patterns, and Deviations
Exceeding a count is a
signal that something
needs to be done
There are a lot of signals
that could be malicious
You can start with simple
thresholds
• Too many failed logins
• Too many bad response codes (4xx, 5xx)
• Request volume too high
These provide a lot of
signal
But they don’t get you
all the way there
There are patterns of
behavior that signal
malicious intent
Example
10.20.253.8 - - [23/Apr/2013:14:20:21 +0000]
"POST /login HTTP/1.1" 200 267"-" "Mozilla/
5.0 (Windows NT 6.1; WOW64; rv:8.0) Gecko/
20100101 Firefox/8.0" "77.77.165.233"
10.20.253.8 - - [23/Apr/2013:14:20:22 +0000]
"POST /users/king-roland/credit_cards HTTP/
1.1" 302 2085 "-" "Mozilla/5.0 (Windows NT
6.1; WOW64; rv:8.0) Gecko/20100101 Firefox/
8.0" "77.77.165.233"
10.20.253.8 - - [23/Apr/2013:14:20:23 +0000]
"POST /users/king-roland/credit_cards HTTP/
1.1" 302 2083 "-" "Mozilla/5.0 (Windows NT
6.1; WOW64; rv:8.0) Gecko/20100101 Firefox/
8.0" "77.77.165.233"
10.20.253.8 - - [23/Apr/2013:14:20:24 +0000]
"POST /users/king-roland/credit_cards HTTP/
1.1" 302 2085 "-" "Mozilla/5.0 (Windows NT
6.1; WOW64; rv:8.0) Gecko/20100101 Firefox/
8.0" "77.77.165.233"
That was a carding
attack
As you dig in, you will
find many patterns like
these
But again it doesn’t
cover everything
There will also be
interesting deviations
5%
5%
4%
27%
59%
GET POST HEAD PUT DELETE
Deviations in normal flow
are interesting but not
necessarily malicious
You will have to build more
intelligent processing to
understand them
Example
A password reset request
comes from a new
location
Is it a harmless request
or an account takeover?
Your processors will have to
make complicated choices
based on lots of information
Nailing deviation requires
the largest amount of
effort
Step 4
Act
Once you have enough
information to make a
decision, you must act
There are multiple ways to act
• Blacklist
• Whitelist
• Mark
• Do nothing
Blacklist and whitelist are
pretty straight forward
Blacklist when thresholds
are exceeded or
patterns/deviation fit
Whiltelist things you
never want to be
blacklisted
Marking is more
interesting
Marking allows you to tag
actors as potentially
malicious
This allows you to
dynamically modify your
responses
And choose how you
react
“Of course machines can't think as
people do. A machine is different from
a person. Hence, they think differently.”
-- Alan Turing, The Imitation Game
You can often render bots
useless with small
changes
Which exposes them
as bots
And gives you the
confidence you need to
blacklist them
Marking also helps you
lower the rate of false
positives
Step 5
Visualize
Visualization is
incredibly helpful
You need a window into your
automation
Spending a few minutes
a day looking at what
happened is vital
You can pretty easily
catch bugs this way
Architecture &
Peformance
There are three main ideas
• The thing that acts on actors
• The shared cache
• The event processors
Acting on actors
should be fast
Fast in a web request is
single digit milliseconds
You can choose to embed
this in your applications
or your web servers
Data locality is
important
It usually involves
replicating the global cache
to each decision point
The cache should hold
everything needed to act
on actors
The web server asks
the cache what to do
The event processors
work out of band
Their sole purpose is
to populate the cache
Processors tend to be
more custom
But the cache and the
acting logic is common
github.com/repsheet
Pitfalls
Things to consider
• False positives
• Decision latency
• Incorrect modeling
• Bad data
• Monitoring
There’s a good chance
you will block incorrectly
Make use of
whitelisting
Mobile carriers will be
a problem
So will NATed IP
addresses
Time to decision
should be monitored
Create a solid
regression suite
Run all your models
through it when you make
even a single change
Understand where bad
data can impact you
Build tolerance of bad
data so you don’t make
incorrect decisions
Monitor everything!
This type of automation
deserves every monitor
and metric you can get
Questions?

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Keynote - Cloudy Vision: How Cloud Integration Complicates Security
Keynote - Cloudy Vision: How Cloud Integration Complicates SecurityKeynote - Cloudy Vision: How Cloud Integration Complicates Security
Keynote - Cloudy Vision: How Cloud Integration Complicates Security
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
 
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid
Exploiting IAM in the google cloud platform - dani_goland_mohsan_faridExploiting IAM in the google cloud platform - dani_goland_mohsan_farid
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Data Driven DevOps: from Culture to Gamification
Data Driven DevOps: from Culture to GamificationData Driven DevOps: from Culture to Gamification
Data Driven DevOps: from Culture to Gamification
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
Scaling Security in the Cloud With Open Source
Scaling Security in the Cloud With Open SourceScaling Security in the Cloud With Open Source
Scaling Security in the Cloud With Open Source
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Inspector
InspectorInspector
Inspector
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Security automation simplified: an intro to DIY security automation
Security automation simplified: an intro to DIY security automationSecurity automation simplified: an intro to DIY security automation
Security automation simplified: an intro to DIY security automation
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 
Voice of the Customer: Moving to a secure house in the cloud with cutting-edg...
Voice of the Customer: Moving to a secure house in the cloud with cutting-edg...Voice of the Customer: Moving to a secure house in the cloud with cutting-edg...
Voice of the Customer: Moving to a secure house in the cloud with cutting-edg...
 
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
ECMDay2015 - Nico Sienaert – Enterprise Mobility Suite – What it’s all about?
 
Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack Vector
 
Azure Security Fundamentals
Azure Security FundamentalsAzure Security Fundamentals
Azure Security Fundamentals
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Rugged DevOps at Scale with Rich Mogull
Rugged DevOps at Scale with Rich MogullRugged DevOps at Scale with Rich Mogull
Rugged DevOps at Scale with Rich Mogull
 
MozDef Workshop slide
MozDef Workshop slideMozDef Workshop slide
MozDef Workshop slide
 

Destacado

Gaceta 40151 supresion ministerio del ministerio de planificacion y finanzas ...
Gaceta 40151 supresion ministerio del ministerio de planificacion y finanzas ...Gaceta 40151 supresion ministerio del ministerio de planificacion y finanzas ...
Gaceta 40151 supresion ministerio del ministerio de planificacion y finanzas ...
Aura Palermo
 
Damian Trevor - Introduction of Construction
Damian Trevor - Introduction of ConstructionDamian Trevor - Introduction of Construction
Damian Trevor - Introduction of Construction
Damian Trevor USA | Damian Trevor CEO
 
EMI 스케쥴_ 2012년 상반기
EMI 스케쥴_ 2012년 상반기EMI 스케쥴_ 2012년 상반기
EMI 스케쥴_ 2012년 상반기
Soonhan Kwon
 

Destacado (20)

Teresa_Sahawneh_Profile
Teresa_Sahawneh_ProfileTeresa_Sahawneh_Profile
Teresa_Sahawneh_Profile
 
Sistema genesis y portal institucional
Sistema genesis y portal institucionalSistema genesis y portal institucional
Sistema genesis y portal institucional
 
Build Windows Applications Fast | Delphi Features Matrix
Build Windows Applications Fast | Delphi Features MatrixBuild Windows Applications Fast | Delphi Features Matrix
Build Windows Applications Fast | Delphi Features Matrix
 
Gaceta 40151 supresion ministerio del ministerio de planificacion y finanzas ...
Gaceta 40151 supresion ministerio del ministerio de planificacion y finanzas ...Gaceta 40151 supresion ministerio del ministerio de planificacion y finanzas ...
Gaceta 40151 supresion ministerio del ministerio de planificacion y finanzas ...
 
Damian Trevor - Introduction of Construction
Damian Trevor - Introduction of ConstructionDamian Trevor - Introduction of Construction
Damian Trevor - Introduction of Construction
 
Estudio de impacto ambiental
Estudio de impacto ambientalEstudio de impacto ambiental
Estudio de impacto ambiental
 
EMI 스케쥴_ 2012년 상반기
EMI 스케쥴_ 2012년 상반기EMI 스케쥴_ 2012년 상반기
EMI 스케쥴_ 2012년 상반기
 
Ingles
InglesIngles
Ingles
 
Manual y protocolo para la atención y servicio al ciudad
Manual y protocolo para la atención y servicio al ciudadManual y protocolo para la atención y servicio al ciudad
Manual y protocolo para la atención y servicio al ciudad
 
ROADS_MAINTAIN
ROADS_MAINTAINROADS_MAINTAIN
ROADS_MAINTAIN
 
Marketing (versão pública) - Gestão em Comunicação
Marketing  (versão pública) - Gestão em ComunicaçãoMarketing  (versão pública) - Gestão em Comunicação
Marketing (versão pública) - Gestão em Comunicação
 
Rafael lima dns04_s1_exercicio5
Rafael lima dns04_s1_exercicio5Rafael lima dns04_s1_exercicio5
Rafael lima dns04_s1_exercicio5
 
pwnd.sh
pwnd.shpwnd.sh
pwnd.sh
 
Análise SWOT - Faturamento Direto
Análise SWOT - Faturamento DiretoAnálise SWOT - Faturamento Direto
Análise SWOT - Faturamento Direto
 
Los ciudadanos y la gestión de residuos. Barreras y resistencias
Los ciudadanos y la gestión de residuos. Barreras y resistenciasLos ciudadanos y la gestión de residuos. Barreras y resistencias
Los ciudadanos y la gestión de residuos. Barreras y resistencias
 
Estudio Responsabilidad Social Corporativa en ANEPMA
Estudio Responsabilidad Social Corporativa en ANEPMAEstudio Responsabilidad Social Corporativa en ANEPMA
Estudio Responsabilidad Social Corporativa en ANEPMA
 
Marketing 3.0 - versão pública - prof Erika Zuza - UFRN - Gestão em Comunicação
Marketing 3.0 - versão pública - prof Erika Zuza - UFRN - Gestão em ComunicaçãoMarketing 3.0 - versão pública - prof Erika Zuza - UFRN - Gestão em Comunicação
Marketing 3.0 - versão pública - prof Erika Zuza - UFRN - Gestão em Comunicação
 
Frederick taylor and scientific management
Frederick taylor and scientific managementFrederick taylor and scientific management
Frederick taylor and scientific management
 
Estrategia de campaña, Método 5x4
Estrategia de campaña, Método 5x4Estrategia de campaña, Método 5x4
Estrategia de campaña, Método 5x4
 
Presentacion La Liga Reciclope (EMULSA)
Presentacion La Liga Reciclope (EMULSA)Presentacion La Liga Reciclope (EMULSA)
Presentacion La Liga Reciclope (EMULSA)
 

Similar a Leveling the playing field

Similar a Leveling the playing field (20)

Evolution of Monitoring and Prometheus (Dublin 2018)
Evolution of Monitoring and Prometheus (Dublin 2018)Evolution of Monitoring and Prometheus (Dublin 2018)
Evolution of Monitoring and Prometheus (Dublin 2018)
 
What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)
 
An Introduction to Prometheus (GrafanaCon 2016)
An Introduction to Prometheus (GrafanaCon 2016)An Introduction to Prometheus (GrafanaCon 2016)
An Introduction to Prometheus (GrafanaCon 2016)
 
Start Up Austin 2017: Manual vs Automation - When to Start Automating your Pr...
Start Up Austin 2017: Manual vs Automation - When to Start Automating your Pr...Start Up Austin 2017: Manual vs Automation - When to Start Automating your Pr...
Start Up Austin 2017: Manual vs Automation - When to Start Automating your Pr...
 
Monitoring your Python with Prometheus (Python Ireland April 2015)
Monitoring your Python with Prometheus (Python Ireland April 2015)Monitoring your Python with Prometheus (Python Ireland April 2015)
Monitoring your Python with Prometheus (Python Ireland April 2015)
 
When Security Tools Fail You
When Security Tools Fail YouWhen Security Tools Fail You
When Security Tools Fail You
 
Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...
Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...
Monitoring What Matters: The Prometheus Approach to Whitebox Monitoring (Berl...
 
Fluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data ConclaveFluturas presentation @ Big Data Conclave
Fluturas presentation @ Big Data Conclave
 
Application Logging Good Bad Ugly ... Beautiful?
Application Logging Good Bad Ugly ... Beautiful?Application Logging Good Bad Ugly ... Beautiful?
Application Logging Good Bad Ugly ... Beautiful?
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log Analysis
 
Application Performance Troubleshooting 1x1 - Part 2 - Noch mehr Schweine und...
Application Performance Troubleshooting 1x1 - Part 2 - Noch mehr Schweine und...Application Performance Troubleshooting 1x1 - Part 2 - Noch mehr Schweine und...
Application Performance Troubleshooting 1x1 - Part 2 - Noch mehr Schweine und...
 
Realtime search at Yammer
Realtime search at YammerRealtime search at Yammer
Realtime search at Yammer
 
Real-time Search at Yammer - By Aleksandrovsky Boris
Real-time Search at Yammer - By Aleksandrovsky BorisReal-time Search at Yammer - By Aleksandrovsky Boris
Real-time Search at Yammer - By Aleksandrovsky Boris
 
Real Time Search at Yammer
Real Time Search at YammerReal Time Search at Yammer
Real Time Search at Yammer
 
Is your Automation Infrastructure ‘Well Architected’?
Is your Automation Infrastructure ‘Well Architected’?Is your Automation Infrastructure ‘Well Architected’?
Is your Automation Infrastructure ‘Well Architected’?
 
Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008
 
Rise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetupRise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetup
 
Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_Filar seymour oreilly_bot_story_
Filar seymour oreilly_bot_story_
 
Overview of Site Reliability Engineering (SRE) & best practices
Overview of Site Reliability Engineering (SRE) & best practicesOverview of Site Reliability Engineering (SRE) & best practices
Overview of Site Reliability Engineering (SRE) & best practices
 

Más de Aaron Bedra (8)

The Cost of Complexity
The Cost of ComplexityThe Cost of Complexity
The Cost of Complexity
 
AWS Security Essentials
AWS Security EssentialsAWS Security Essentials
AWS Security Essentials
 
Windy City Rails - Layered Security
Windy City Rails - Layered SecurityWindy City Rails - Layered Security
Windy City Rails - Layered Security
 
Focus, SCNA 2011
Focus, SCNA 2011Focus, SCNA 2011
Focus, SCNA 2011
 
Repsheet: A Behavior Based Approach to Web Application Security
Repsheet: A Behavior Based Approach to Web Application SecurityRepsheet: A Behavior Based Approach to Web Application Security
Repsheet: A Behavior Based Approach to Web Application Security
 
Pontificating quantification
Pontificating quantificationPontificating quantification
Pontificating quantification
 
Clojure in the Field
Clojure in the FieldClojure in the Field
Clojure in the Field
 
The Art of the Spike
The Art of the SpikeThe Art of the Spike
The Art of the Spike
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Leveling the playing field