SlideShare una empresa de Scribd logo
1 de 27
Aestetix, Jeff Katz- May 2013
Who’s Looking atYou, Kid?
Exploring digital tracking technology and social implications.
Imagine a future...
http://dcclothesline.com/wp-content/uploads/2013/05/Obama-Big-Brother.jpg
We’re heeeere!
http://i.usatoday.net/yourlife/_photos/2011/07/27/Cellphones-dont-up-cancer-risk-in-kids-4F8GU96-x-large.jpg
Examples ofTracking






✤ Nearbuy
Examples ofTracking






✤ Euclid Analytics
✤ You are not your data.
✤ The more data there is, the more power
there may be.
✤ How much is this power worth?
I feel uneasy...
FromVillage to City
Several privacy concerns:
✤ Who gets to see where I am 

and when I’m there?
✤ Who owns my data?
✤ What can they do with my data?
✤ Can I opt-out?
This got us thinking...
✤ “They who can give up essential liberty
to obtain a little temporary safety,
deserve neither liberty nor safety.”

Benjamin Franklin

✤ Let’s find out what happens!
http://thehistoryjunkie.com/wp-content/uploads/2011/08/benjamin-franklin1.jpg
Introduce OpenBeacon
✤ Started as CCC Sputnik in 2006 

by Milosch and Brita Meriac
✤ Real-time location tracking

using active RFID
✤ Deployed at CCC, HOPE, 

Brucon, and other conferences
Hardware specs
✤ 2.4ghz ISM band
✤ Hardware is free, open source,
Creative Commons licensed
✤ Nordic semiconductor nRF24L01P
✤ Low cost hardware
From 24c3: Leica’s Dream


✤ Visual for 24c3 (2007)
✤ Written by Benjamin Maus
✤ http://old.allesblinkt.com/project/leicas-dream
Leica’s Dream
The Last HOPE (2008)
✤ Introduced “The AMD Project”
✤ Attendee Meta-Data - social network 
✤ Data mining wet dream
✤ (HOPE is still alive, thanks 

to the bad economy)
http://www.thelasthope.org/pressrel_badge.png
TLHVisuals: Leica 2.0
TLHVisuals: Social Network
TLHVisuals: Zones
TLHVisuals:Ajax
TLHVisuals: Rooms
TLHVisuals:Avatars
TLHVisual: Statistics
Other deployments
✤ The Next HOPE (2010)
✤ Brucon 2011
✤ Disease tracking (sociopatterns.org)
✤ Possible use cases:
✤ Conferences
✤ Art installations
✤ Museums
✤ Trade shows
✤ Access control systems
✤ Search and rescue
✤ Health care
Some other ideas:
✤ Good reasons for being tracked: 911
emergency services, health care,
law enforcement
✤ Bad reasons: misplaced
accountability, lack of agency
✤ Key point: how are you able to
consent, if at all?
Is tracking evil?
✤ The attribution challenge
Why track at all?
✤ The myth of "universally persistent
identity"
✤ IDESG/NSTIC (from the Obama
Administration)
Modern attribution efforts
Questions?
✤ aestetix
✤ aestetix@aestetix.com, @aestetix
✤ Jeff Katz
✤ kraln@kraln.com, @kraln

Más contenido relacionado

Destacado

What are actuaries good for?
What are actuaries good for?What are actuaries good for?
What are actuaries good for?Henry Tapper
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101Wil Rickards
 
Be An Actuary In London
Be An Actuary   In LondonBe An Actuary   In London
Be An Actuary In Londonkylemrotek
 
Teaching Your Teens Money Management
Teaching Your Teens Money ManagementTeaching Your Teens Money Management
Teaching Your Teens Money Managementwendyullman
 
a Career as an Actuary
a Career as an Actuarya Career as an Actuary
a Career as an Actuaryguest5393d
 
A career as an actuary
A career as an actuaryA career as an actuary
A career as an actuaryHenry Tapper
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101Barry Caplin
 
Web presentation 10162014 understanding your actuaries
Web presentation 10162014 understanding your actuariesWeb presentation 10162014 understanding your actuaries
Web presentation 10162014 understanding your actuariesCarol Buckmann
 
All Kids: Healthcare for Kids Marketing Overview, Illinois
All Kids: Healthcare for Kids Marketing Overview, IllinoisAll Kids: Healthcare for Kids Marketing Overview, Illinois
All Kids: Healthcare for Kids Marketing Overview, Illinoisnashp
 
Kid president presentation 2
Kid president presentation 2Kid president presentation 2
Kid president presentation 2OM3283
 
Becoming an actuary
Becoming an actuaryBecoming an actuary
Becoming an actuaryYang Lee
 
Role of acturies in insurance
Role of acturies in insuranceRole of acturies in insurance
Role of acturies in insurancemorwinjohans
 
Risk Management and Insurance
Risk Management and InsuranceRisk Management and Insurance
Risk Management and InsuranceJohn Daniel
 

Destacado (16)

Risk 101
Risk 101Risk 101
Risk 101
 
How To Keep Kids Safe
How To Keep Kids SafeHow To Keep Kids Safe
How To Keep Kids Safe
 
What are actuaries good for?
What are actuaries good for?What are actuaries good for?
What are actuaries good for?
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
Be An Actuary In London
Be An Actuary   In LondonBe An Actuary   In London
Be An Actuary In London
 
Teaching Your Teens Money Management
Teaching Your Teens Money ManagementTeaching Your Teens Money Management
Teaching Your Teens Money Management
 
a Career as an Actuary
a Career as an Actuarya Career as an Actuary
a Career as an Actuary
 
A career as an actuary
A career as an actuaryA career as an actuary
A career as an actuary
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
Why become an actuary
Why become an actuaryWhy become an actuary
Why become an actuary
 
Web presentation 10162014 understanding your actuaries
Web presentation 10162014 understanding your actuariesWeb presentation 10162014 understanding your actuaries
Web presentation 10162014 understanding your actuaries
 
All Kids: Healthcare for Kids Marketing Overview, Illinois
All Kids: Healthcare for Kids Marketing Overview, IllinoisAll Kids: Healthcare for Kids Marketing Overview, Illinois
All Kids: Healthcare for Kids Marketing Overview, Illinois
 
Kid president presentation 2
Kid president presentation 2Kid president presentation 2
Kid president presentation 2
 
Becoming an actuary
Becoming an actuaryBecoming an actuary
Becoming an actuary
 
Role of acturies in insurance
Role of acturies in insuranceRole of acturies in insurance
Role of acturies in insurance
 
Risk Management and Insurance
Risk Management and InsuranceRisk Management and Insurance
Risk Management and Insurance
 

Similar a Jeff Katz. Who's Looking at You, Kid?

Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.Sandra Bermúdez
 
Future of education late 2016
Future of education late 2016Future of education late 2016
Future of education late 2016Bryan Alexander
 
The Consequences of Living and Breathing with Hyperconnectedness
The Consequences of Living and Breathing with HyperconnectednessThe Consequences of Living and Breathing with Hyperconnectedness
The Consequences of Living and Breathing with HyperconnectednessFoCAS Initiative
 
APIdays Paris 2018 - Bots on the 'Net: The Good, the Bad, and the Future, Mik...
APIdays Paris 2018 - Bots on the 'Net: The Good, the Bad, and the Future, Mik...APIdays Paris 2018 - Bots on the 'Net: The Good, the Bad, and the Future, Mik...
APIdays Paris 2018 - Bots on the 'Net: The Good, the Bad, and the Future, Mik...apidays
 
TDWI Keynote: Outside In - The Future of Business Intelligence innovation
TDWI Keynote: Outside In - The Future of Business Intelligence innovationTDWI Keynote: Outside In - The Future of Business Intelligence innovation
TDWI Keynote: Outside In - The Future of Business Intelligence innovationmark madsen
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Jim Adler
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 
Books2Byte – 2003
Books2Byte – 2003Books2Byte – 2003
Books2Byte – 2003D Murali ☆
 
Algorithmic and technological transparency
Algorithmic and technological transparencyAlgorithmic and technological transparency
Algorithmic and technological transparencyBozhidar Bozhanov
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityClare Nelson, CISSP, CIPP-E
 
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data Driven Innovation
 
Codes, Clouds & Constellations: Open Science in the Data Decade
Codes, Clouds & Constellations: Open Science in the Data DecadeCodes, Clouds & Constellations: Open Science in the Data Decade
Codes, Clouds & Constellations: Open Science in the Data DecadeLizLyon
 
Bigger than Any One: Solving Large Scale Data Problems with People and Machines
Bigger than Any One: Solving Large Scale Data Problems with People and MachinesBigger than Any One: Solving Large Scale Data Problems with People and Machines
Bigger than Any One: Solving Large Scale Data Problems with People and MachinesTyler Bell
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleSai Janakiram Penumuru
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
Internet-wide Scanning
Internet-wide ScanningInternet-wide Scanning
Internet-wide ScanningJamie O'Hare
 
Have we poisoned the internet for good?
Have we poisoned the internet for good?Have we poisoned the internet for good?
Have we poisoned the internet for good?Yoav Aviram
 
AI and its Effects on the Global World Order
AI and its Effects on the Global World OrderAI and its Effects on the Global World Order
AI and its Effects on the Global World OrderThe Future Society
 

Similar a Jeff Katz. Who's Looking at You, Kid? (20)

Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.Algocracy and the state of AI in public administrations.
Algocracy and the state of AI in public administrations.
 
Future of education late 2016
Future of education late 2016Future of education late 2016
Future of education late 2016
 
The Consequences of Living and Breathing with Hyperconnectedness
The Consequences of Living and Breathing with HyperconnectednessThe Consequences of Living and Breathing with Hyperconnectedness
The Consequences of Living and Breathing with Hyperconnectedness
 
APIdays Paris 2018 - Bots on the 'Net: The Good, the Bad, and the Future, Mik...
APIdays Paris 2018 - Bots on the 'Net: The Good, the Bad, and the Future, Mik...APIdays Paris 2018 - Bots on the 'Net: The Good, the Bad, and the Future, Mik...
APIdays Paris 2018 - Bots on the 'Net: The Good, the Bad, and the Future, Mik...
 
TDWI Keynote: Outside In - The Future of Business Intelligence innovation
TDWI Keynote: Outside In - The Future of Business Intelligence innovationTDWI Keynote: Outside In - The Future of Business Intelligence innovation
TDWI Keynote: Outside In - The Future of Business Intelligence innovation
 
Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud Drexel University: Business and Privacy in the Cloud
Drexel University: Business and Privacy in the Cloud
 
Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
Books2Byte – 2003
Books2Byte – 2003Books2Byte – 2003
Books2Byte – 2003
 
Algorithmic and technological transparency
Algorithmic and technological transparencyAlgorithmic and technological transparency
Algorithmic and technological transparency
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
 
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
 
Codes, Clouds & Constellations: Open Science in the Data Decade
Codes, Clouds & Constellations: Open Science in the Data DecadeCodes, Clouds & Constellations: Open Science in the Data Decade
Codes, Clouds & Constellations: Open Science in the Data Decade
 
Big data: understanding the present
Big data: understanding the presentBig data: understanding the present
Big data: understanding the present
 
Bigger than Any One: Solving Large Scale Data Problems with People and Machines
Bigger than Any One: Solving Large Scale Data Problems with People and MachinesBigger than Any One: Solving Large Scale Data Problems with People and Machines
Bigger than Any One: Solving Large Scale Data Problems with People and Machines
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Internet-wide Scanning
Internet-wide ScanningInternet-wide Scanning
Internet-wide Scanning
 
Have we poisoned the internet for good?
Have we poisoned the internet for good?Have we poisoned the internet for good?
Have we poisoned the internet for good?
 
AI and its Effects on the Global World Order
AI and its Effects on the Global World OrderAI and its Effects on the Global World Order
AI and its Effects on the Global World Order
 

Más de Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikPositive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQubePositive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityPositive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 

Más de Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Jeff Katz. Who's Looking at You, Kid?