SlideShare una empresa de Scribd logo
1 de 59
U   C   L (daniele quercia)
I’m finishing my PhD @
U niversity C ollege L ondon
<My Research>
Ratings on ...
Ratings on phones
MobiRate:  how mobiles  collect  &  store  ratings
Why   ratings on mobiles?
Daniele Quercia Situation : People exchange digital content
drowning user (content overload) help! who will come to the rescue?
Proposal: Accept content only from reputable people
how mobiles  collect  &  store  ratings
collect >  store  > use
Ignorant   Forgers   Liars   collect >  store  > use
Ignorant   Forgers   Liars   [Suspected]
Ignorant   Forgers   Liars   [Suspected] [Exposed]
Ignorant   Forgers   Liars   [Suspected] [Exposed] [Filtered Out]
Ignorant   Forgers   Liars   [Suspected] [Exposed] [Filtered Out] Work done:    AAAI,KDD,   ICDM,...
Ignorant   Forgers   Liars   [Suspected] [Exposed] [Filtered Out] Work done:    AAAI,KDD,   ICDM,... ~ø ~ø
Ignorant   Forgers   Liars   [Exposed] [Filtered Out] Work done:    AAAI,KDD,   ICDM,... MobiRate collect >  store
How to  collect  &  store  ratings?
1.Log (credentials) 2. Gossip (to check each credential)
1.Log (credentials) 2. Gossip (to check each credential)   Impractical 
Idea behind MobiRate
Let’s make it practical...
1.Sealed Log (of credentials) 2. Gossip (to check seals only)
1.Sealed Log (of credentials) 2. Gossip (to check seals only)    Practical
1.Sealed Log (of credentials) entry (rating) “ seal” (for the entry)
1.Sealed Log (of credentials) entry (rating) “ seal” (for the entry) “ hash chain” binding whole table
Assumption  ID is a  unique  public key
Gossiping:   To whom?
To witnesses [slow down]
Audit!  [slow down] What  witnesses do
Audit!  [slow down] What  witnesses do Why?
If one is ignorant   If one is a forger   [Suspected] [Exposed]
Who  are my witnesses Those who will share  content with me
. Who  are my witnesses Like-minded   familiar strangers
1.Sealed Log (of credentials) 2. Gossip (to check seals only)    Practical
Does MobiRate work?
Mobility Traces  AND  Social Networks Reality Mining
Does MobiRate work?
Does MobiRate work?  <1> Is it  robust  to malicious individuals? <2> Does it  run  on phones?
<1>  robust The  f  factor
 
 
MobiRate Oracle
MobiRate reduces  f!!!
<2>  run
“ heaviest” protocol runs < 2sec
“ longest” protocol completed in 2.5ms   (if Bluetooth 100kb/s)
MobiRate works    robust     runs on phones
Ignorant   Forgers   is a step towards...
…  rescuing drowning user help!
Daniele Quercia All this on … mobblog mobirate
 
Assumption   ID is  unique  public key
If not unique    Sybil attacks!
Ignorant   Forgers   Liars [Exposed] MobiRate (eg, Sybils) collect >  store  > use
Ignorant   Forgers   Liars [Exposed] Filtered Out  by [ICDM07] MobiRate (eg, Sybils) collect >  store  > use [ICDM07]  Lightweight Distributed Trust Propagation

Más contenido relacionado

Similar a MobiRate [Ubicomp 2008]

Selecting Trustworthy Content Using Tags
Selecting Trustworthy Content Using TagsSelecting Trustworthy Content Using Tags
Selecting Trustworthy Content Using TagsDaniele Quercia
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James EC-Council
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for ActivistsGreg Stromire
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemskhalavak
 
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Positive Hack Days
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Kenneth Carnesi, JD
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngI am Cipher
 
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Santhosh Tuppad
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
PSCR 2019 - ICAM Standards
PSCR 2019 - ICAM StandardsPSCR 2019 - ICAM Standards
PSCR 2019 - ICAM StandardsAdam Lewis
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Identity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityIdentity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityMartin Strandbygaard
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 

Similar a MobiRate [Ubicomp 2008] (20)

Selecting Trustworthy Content Using Tags
Selecting Trustworthy Content Using TagsSelecting Trustworthy Content Using Tags
Selecting Trustworthy Content Using Tags
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systemsHacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
 
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
 
Phd final
Phd finalPhd final
Phd final
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Intro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web DesigninngIntro to Android, IOT, Hacking & Web Designinng
Intro to Android, IOT, Hacking & Web Designinng
 
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
Testing IoT Security shouldn't fear you if you have got a hacker mindset - By...
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
PSCR 2019 - ICAM Standards
PSCR 2019 - ICAM StandardsPSCR 2019 - ICAM Standards
PSCR 2019 - ICAM Standards
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Identity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric IdentityIdentity 2.0 - OpenID And User Centric Identity
Identity 2.0 - OpenID And User Centric Identity
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 

Más de Daniele Quercia

10 urban intangible properties
10 urban intangible properties10 urban intangible properties
10 urban intangible propertiesDaniele Quercia
 
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...Daniele Quercia
 
Trend Makers and Trend Spotters in a Mobile Application
Trend Makers and Trend Spotters in a Mobile ApplicationTrend Makers and Trend Spotters in a Mobile Application
Trend Makers and Trend Spotters in a Mobile ApplicationDaniele Quercia
 
Unleashing the potential of spatial data
Unleashing the potential of spatial dataUnleashing the potential of spatial data
Unleashing the potential of spatial dataDaniele Quercia
 
Loosing "Friends" on Facebook
Loosing "Friends" on FacebookLoosing "Friends" on Facebook
Loosing "Friends" on FacebookDaniele Quercia
 
Talk of the City: Londoners and Social Media
Talk of the City: Londoners and Social MediaTalk of the City: Londoners and Social Media
Talk of the City: Londoners and Social MediaDaniele Quercia
 
The Social World of Twitter: Topics, Geography, and Emotions
The Social World of Twitter: Topics, Geography, and EmotionsThe Social World of Twitter: Topics, Geography, and Emotions
The Social World of Twitter: Topics, Geography, and EmotionsDaniele Quercia
 
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...Daniele Quercia
 
Middleware for social computing: a roadmap
Middleware for social computing: a roadmap	Middleware for social computing: a roadmap
Middleware for social computing: a roadmap Daniele Quercia
 
Auralist: Introducing Serendipity into Music Recommendation
Auralist: Introducing Serendipity into Music RecommendationAuralist: Introducing Serendipity into Music Recommendation
Auralist: Introducing Serendipity into Music RecommendationDaniele Quercia
 
Personality in Twitter: influentials and popular users
Personality in Twitter: influentials and popular usersPersonality in Twitter: influentials and popular users
Personality in Twitter: influentials and popular usersDaniele Quercia
 
In the mood for being influential
In the mood for being influential In the mood for being influential
In the mood for being influential Daniele Quercia
 
Geomob London September 2011
Geomob London September 2011Geomob London September 2011
Geomob London September 2011Daniele Quercia
 
Sybil Attacks Against Mobile Users
Sybil Attacks Against Mobile UsersSybil Attacks Against Mobile Users
Sybil Attacks Against Mobile UsersDaniele Quercia
 
Promoting location privacy… one lie at a time
Promoting location privacy… one lie at a timePromoting location privacy… one lie at a time
Promoting location privacy… one lie at a timeDaniele Quercia
 
Lightweight Distributed Trust Propagation
Lightweight Distributed Trust PropagationLightweight Distributed Trust Propagation
Lightweight Distributed Trust PropagationDaniele Quercia
 
TRULLO - local trust bootstrapping
TRULLO - local trust bootstrappingTRULLO - local trust bootstrapping
TRULLO - local trust bootstrappingDaniele Quercia
 
Inter-context Trust Bootstrapping for Mobile Content Sharing
Inter-context Trust Bootstrapping for Mobile Content SharingInter-context Trust Bootstrapping for Mobile Content Sharing
Inter-context Trust Bootstrapping for Mobile Content SharingDaniele Quercia
 

Más de Daniele Quercia (20)

10 urban intangible properties
10 urban intangible properties10 urban intangible properties
10 urban intangible properties
 
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
Like Partying? Your Face Says It All. Predicting Place AMBIANCE From Profile ...
 
Trend Makers and Trend Spotters in a Mobile Application
Trend Makers and Trend Spotters in a Mobile ApplicationTrend Makers and Trend Spotters in a Mobile Application
Trend Makers and Trend Spotters in a Mobile Application
 
Ads and the City
Ads and the CityAds and the City
Ads and the City
 
Unleashing the potential of spatial data
Unleashing the potential of spatial dataUnleashing the potential of spatial data
Unleashing the potential of spatial data
 
Loosing "Friends" on Facebook
Loosing "Friends" on FacebookLoosing "Friends" on Facebook
Loosing "Friends" on Facebook
 
Talk of the City: Londoners and Social Media
Talk of the City: Londoners and Social MediaTalk of the City: Londoners and Social Media
Talk of the City: Londoners and Social Media
 
The Social World of Twitter: Topics, Geography, and Emotions
The Social World of Twitter: Topics, Geography, and EmotionsThe Social World of Twitter: Topics, Geography, and Emotions
The Social World of Twitter: Topics, Geography, and Emotions
 
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
Facebook and Privacy: The Balancing Act of Personality, Gender, and Relations...
 
Middleware for social computing: a roadmap
Middleware for social computing: a roadmap	Middleware for social computing: a roadmap
Middleware for social computing: a roadmap
 
Auralist: Introducing Serendipity into Music Recommendation
Auralist: Introducing Serendipity into Music RecommendationAuralist: Introducing Serendipity into Music Recommendation
Auralist: Introducing Serendipity into Music Recommendation
 
Personality in Twitter: influentials and popular users
Personality in Twitter: influentials and popular usersPersonality in Twitter: influentials and popular users
Personality in Twitter: influentials and popular users
 
In the mood for being influential
In the mood for being influential In the mood for being influential
In the mood for being influential
 
Geomob London September 2011
Geomob London September 2011Geomob London September 2011
Geomob London September 2011
 
FriendSensing
FriendSensingFriendSensing
FriendSensing
 
Sybil Attacks Against Mobile Users
Sybil Attacks Against Mobile UsersSybil Attacks Against Mobile Users
Sybil Attacks Against Mobile Users
 
Promoting location privacy… one lie at a time
Promoting location privacy… one lie at a timePromoting location privacy… one lie at a time
Promoting location privacy… one lie at a time
 
Lightweight Distributed Trust Propagation
Lightweight Distributed Trust PropagationLightweight Distributed Trust Propagation
Lightweight Distributed Trust Propagation
 
TRULLO - local trust bootstrapping
TRULLO - local trust bootstrappingTRULLO - local trust bootstrapping
TRULLO - local trust bootstrapping
 
Inter-context Trust Bootstrapping for Mobile Content Sharing
Inter-context Trust Bootstrapping for Mobile Content SharingInter-context Trust Bootstrapping for Mobile Content Sharing
Inter-context Trust Bootstrapping for Mobile Content Sharing
 

Último

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Último (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

MobiRate [Ubicomp 2008]