SlideShare a Scribd company logo
1 of 69
ONLINE PRIVACY LIS 768 – Fall 2009 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation ,[object Object],[object Object],[object Object],[object Object],[object Object]
A Brief History of Online Social Networking
What is Online Social Networking? ,[object Object],[object Object],[object Object]
1945: Memex ,[object Object],[object Object],[object Object]
1962: Advanced Research Project Agency ,[object Object],[object Object],[object Object],[object Object]
1960’s-1970’s: Electronic Mail  ,[object Object],[object Object],[object Object],[object Object]
1980’s: Bulletin Board Systems ,[object Object],[object Object],[object Object]
BBS: FidoNet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
1989 through Early 1990’s: America Online ,[object Object],[object Object],[object Object]
1997:  Sixdegrees ,[object Object],[object Object],[object Object],[object Object]
2002: Friendster ,[object Object],[object Object],[object Object]
2003: MySpace ,[object Object],[object Object],[object Object]
2003: Linkedin ,[object Object],[object Object],[object Object]
2005: YouTube ,[object Object],[object Object],[object Object]
2004: Facebook ,[object Object],[object Object],[object Object],[object Object]
2006: Twitter ,[object Object],[object Object],[object Object],[object Object]
Recent Backlash ,[object Object],[object Object],[object Object],[object Object]
Addressing Privacy Concerns ,[object Object]
Defining Online Privacy
Privacy is NOT solitude ,[object Object],[object Object]
Is privacy anonymity? ,[object Object],[object Object]
What about secrecy? ,[object Object],[object Object]
Underlying Issue: Control ,[object Object],[object Object]
Don’t I Have a  Right  to Privacy? ,[object Object]
Something to Know About… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ We know that the best way to protect children is to teach them to guard their privacy and make wise choices. “  -Former ALA President Michael Gorman
Teens and Privacy
Good news! ,[object Object],[object Object],[object Object]
However… Teens Think It’s  Always  OK to Share Publicly: Teens Think It’s  Never  OK to Share Publicly: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Teens Think It’s  Sometimes  OK to Share Publicly : ,[object Object],[object Object],[object Object],[object Object]
Bottom Line: ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networking and Privacy Risks
Why should we care about the risks? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do you want to “risk” being seen? ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is it you’re sharing? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
So, who’s paying attention anyways? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Yes, this information can be used against you! ,[object Object],[object Object],[object Object],[object Object]
Yes, this information can be used against you! ,[object Object],[object Object]
Are you being watched? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who are we affecting when we post other people’s information? ,[object Object],[object Object],[object Object],[object Object]
What happened to him? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Whose reputation are you ruining? ,[object Object],[object Object],[object Object],[object Object],[object Object]
How about our own reputation being at stake? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
So, what can happen when OUR reputation gets damaged? ,[object Object],[object Object]
“ Facebook fired” ,[object Object]
“ Don’t let Twitter get you fired in 140 characters or less” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
So what happened? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Or, people can just not take us seriously… ,[object Object]
Jon Favreau ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Employers Not Taking Us Seriously… ,[object Object],[object Object]
So…who else is paying attention? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tools and Methods for Protecting your Online Image
First, the bad news…
According to a June 2009 survey from Careerbuilder.com: ,[object Object]
Furthermore… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
President Obama… ,[object Object]
Star Wars Kid ,[object Object]
Now for the good news…
You CAN protect your online privacy and reputation with just a few simple steps
Facebook ,[object Object],[object Object],[object Object],[object Object]
flick r ,[object Object],[object Object],[object Object]
G o o g l e ,[object Object],[object Object],[object Object]
Twitter ,[object Object],[object Object],[object Object],[object Object]
And in general… ,[object Object],[object Object],[object Object]
Citations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Citations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Citations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Citations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Citations – Images  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Laura Dunkley
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social NetworksClint Hamada
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Ollie Bray
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents Jennifer Holena
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internetmerlyna
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital ParentsClint Hamada
 

What's hot (20)

Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security Parent Tips | Social Media & Internet Security
Parent Tips | Social Media & Internet Security
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Internet Safety for Educators
Internet Safety for EducatorsInternet Safety for Educators
Internet Safety for Educators
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
The social dilemma
The social dilemmaThe social dilemma
The social dilemma
 
Social Media Presentation To Parents
Social Media Presentation To Parents Social Media Presentation To Parents
Social Media Presentation To Parents
 
The Alexander Padilla Show
The Alexander Padilla ShowThe Alexander Padilla Show
The Alexander Padilla Show
 
Danger Of The Internet
Danger Of The InternetDanger Of The Internet
Danger Of The Internet
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital Parents
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 

Similar to Lis 768 Privacy Presentation

Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networkingRussetanSc
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfSheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 
Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2Richard Bush
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutJessica Vitak
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young AdultsRatan Rajpal
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group projectbulgarej
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
Facebook 4 Parents
Facebook 4 ParentsFacebook 4 Parents
Facebook 4 ParentsAaron Puley
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignKimberly Gonzalez
 
Privacy Matters
Privacy MattersPrivacy Matters
Privacy MattersJames Kane
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011larrylieb
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentationguestf8d4d6f
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 

Similar to Lis 768 Privacy Presentation (20)

Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2Social Networking What Are The Ramificationsv2
Social Networking What Are The Ramificationsv2
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word Out
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young Adults
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 
Facebook
FacebookFacebook
Facebook
 
Social networking
Social networkingSocial networking
Social networking
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Facebook 4 Parents
Facebook 4 ParentsFacebook 4 Parents
Facebook 4 Parents
 
CSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education CampaignCSUN - Youth Driven Information Privacy Education Campaign
CSUN - Youth Driven Information Privacy Education Campaign
 
Privacy Matters
Privacy MattersPrivacy Matters
Privacy Matters
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentation
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Lis 768 Privacy Presentation