SlideShare a Scribd company logo
1 of 204
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Microsoft® Windows®, Internet Explorer®, Microsoft Office® ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Learn what a Wildcard certificate is and how it potentially saves your organization money and maintenance hassle.
Learn the difference between self-certifying and using a 3 rd  Party certificate authority and why you'd want to pay for the 3 rd  Party.
Learn how to send and receive encrypted email for secure communications.
Learn the step-by-step process of setting up all of these certificate types in your Domino environment. ,[object Object],[object Object]
[object Object],[object Object]
You have “Create Database” privileges in your Domino environment.
You have at least Editor access to the Domino Directory with NetCreator and UserCreator roles.
Your Notes Client “Location Document” must be set for server based mail, not local, otherwise you will receive errors when creating or modifying certificates. ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Using 3rd Party Certificate Authorities ,[object Object]
Multi Host with “Wildcard” SSL Certificate ,[object Object],[object Object]
Adding a Internet Certifier to the Domino CA ,[object Object]
Q & A
Don't forget your evaluations ,[object Object],[object Object]
[object Object],[object Object],[object Object]
Certificates validate identity.  Like a company badge to get into your office or a driver's license or passport to get through security at the airport. ,[object Object],[object Object]
If someone intercepts traffic, there is nothing to prevent reading all the content of that communication. ,[object Object]
Certificates provide the keys in the encryption process. ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Using 3rd Party Certificate Authorities ,[object Object]
Multi Host with “Wildcard” SSL Certificate ,[object Object],[object Object]
Adding a Internet Certifier to the Domino CA ,[object Object]
Q & A
Don't forget your evaluations ,[object Object],[object Object]
[object Object],[object Object]
Public Key Infrastructure (PKI)
Certificate Authority (CA)
Certificate Signing Request (CSR)
X.509 Digital Certificate or Public Key Certificate (PKC)  ,[object Object],[object Object]
[object Object],[object Object]
SSL, originally developed by Netscape, is widely used to do two things: ,[object Object]
Encrypt the connection for sending personal data over the internet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
The server returns “Use this algorithm” it's random number and digital certificate.
The browser verifies that it trust's the server's certificate and extracts the server's public key. It then uses that public key to encrypt a pre-master key and sends it to the server.
Both client and server use the pre-master key and exchanged random numbers to generate the secret keys for the rest of the session and exchange checksums. ,[object Object]
[object Object],[object Object]
The base of a PKI is the Certificate Authority (CA) that issues digital certificates to authenticate the identity of servers and individuals.
PKIs are based on the public/private key pair of the CA's Root Key.
The  subject's public key, known to everyone, is used to encrypt data.
The private or secret key is used to decrypt received data.
If the private key of the CA's Root Key is ever compromised,  all the digital certificates created by that CA are vulnerable.
The Key Size defines how hard the private key is to decode.  The higher the key size the harder it is to break the code. ,[object Object],[object Object],[object Object]
[object Object],[object Object]
There are two types of CAs: ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Most browsers already trust these authorities, so end user configuration is not required.
If the certifier is pre-configured as trusted in the email system, external mail client configuration is reduced.
Overall, the cost of supporting a 3 rd  Party System can be less than that of a Closed System.
Examples of 3 rd  Party CAs: ,[object Object]
Go Daddy has grown rapidly over the last few years due to their aggressive pricing model and holds the number two position per netcraft.com
Many other Trusted 3 rd  Party CAs are listed at the site below ,[object Object],[object Object]
[object Object],[object Object]
You control who you issue certificates to. ,[object Object],[object Object]
The major problem with a Closed CA, is it requires equipment and personnel to manage the process and configure end user workstations. ,[object Object],[object Object]
[object Object],[object Object]
The request includes information identifying the applicant and the public key that is generated from a public/private key pair. ,[object Object]
[object Object],[object Object]
X.509 is an International Telecommunications Union Transmission (ITU-T) standard for public key infrastructure (PKI). It specifies standard formats for public key certificates, certificate validation and certificate revocation lists.
Digital Certificates are issued by a CA after the CA has verified that the public key belongs to a specific subject.
A Digital Certificate contains both CA and subject information including the subject's public key.  The CA signs the certificate by creating a digest of all the fields in the certificate and then encrypts the digest with it's private key.
The encrypted digest is called a “digital signature”, and when placed into the  X.509 certificate, the certificate is said to be signed.
It's the digital equivalent of your ID card, driver's license or passport.  ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multi Host with “Wildcard” SSL Certificate ,[object Object],[object Object]
Adding a Internet Certifier to the Domino CA ,[object Object]
Q & A
Don't forget your evaluations ,[object Object],[object Object]
[object Object],[object Object]
Create a KeyRing file
Creating a Certificate Signing Request (CSR)
Retrieve SSL Certificate from Vendor
Trusted Root and Intermediate Certificates
Install Server SSL Certificate
Setup Domino Server for SSL ,[object Object]
[object Object],[object Object]
Things to consider when selecting you 3 rd  Party CA are: ,[object Object],[object Object]
In-house, training and utility servers might be able to use a less costly certificate. ,[object Object]
SSL Certificate Warranty
Website Security Seals
Customer Support ,[object Object],[object Object]
[object Object],[object Object],[object Object]
Creating a Certificate Signing Request (CSR)
Retrieve SSL Certificate from Vendor
Trusted Root and Intermediate Certificates
Install Server SSL Certificate
Setup Domino Server for SSL ,[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Open
Lotus Notes Application LS11 Windows 7.jpg LS11 Windows 7-1.jpg ,[object Object],[object Object]
Select “Server Certificate Admin” (certsrv.nsf)
Click “Open”  Certificate Admin – 3. Click Open
[object Object],[object Object],[object Object]
[object Object],[object Object]
Input and confirm the password.
Click on the “Key Size” drop down. LS11 Windows 7-2.jpg ,[object Object]
[object Object],[object Object]
Given the advances in computing power, some believe that it will be possible to break a 1024-bit key in the near future.
Some 3 rd  Party CAs will not accept a CSR with less than 2048 key size any longer, and others are currently in the process of phasing out their lower sized certificates.
Keep in mind this could cause issues when you try to renew existing certificates of lower key strength, in which case you will be required to create a new Key Ring file and CSR for your servers.
The National Institute of Standards and Technology (NIST) of the US Government recommends certificates after 2010 should be of at least 2048 bit key length. ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Organization and  Optional fields
NO ABBREVIATIONS in “State or Province” field,
2 character country code
Click “Create Key Ring” LS11 Windows 7-4.jpg ,[object Object],[object Object]
[object Object],[object Object]
Write down the password of the KeyRing.kyr file, put it in a “sealed envelope” and store it in a safe place.  You are going to need the password again when it comes time to renew the certificate.
If you are getting a single server certificate the Common Name is the URL name to which the server responds.  A simple 1 character mistake will cause an invalid name prompt when the certificate is presented to the browser.
The Organization (and optional Organization Unit) fields must be completed as accurately as possible with the legal name of the company.
Use the City and State of the Organization’s address and NO ABBREVIATIONS in the State or Province name.
Enter the standard 2 Character Country code for your country.
This information will be verified by your CA, is included in the Digital Certificate and will be presented to every browser that contacts your server, so it's important to have it correct when you create your KeyRing.kyr file. ,[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
You need to purchase an SSL Certificate and know your vendor's procedures for submitting a CSR. ,[object Object]
[object Object],[object Object]
Create a KeyRing file ,[object Object]
Retrieve SSL Certificate from Vendor
Trusted Root and Intermediate Certificates
Install Server SSL Certificate
Setup Domino Server for SSL ,[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object]
Select “Paste into form on CA's site”
Click “Create Certificate Request” LS11 Windows 7-5.jpg ,[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Ctrl +C to copy into your paste buffer. ,[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Follow the instructions for requesting a certificate for your 3 rd  Party CA ,[object Object]
[object Object],[object Object]
Create a KeyRing file
Creating a Certificate Signing Request (CSR) ,[object Object]
Trusted Root and Intermediate Certificates
Install Server SSL Certificate
Setup Domino Server for SSL ,[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Create a KeyRing file
Creating a Certificate Signing Request (CSR)
Retrieve SSL Certificate from Vendor ,[object Object]
Install Server SSL Certificate
Setup Domino Server for SSL ,[object Object]
[object Object],[object Object]
If your CA is not included in the list, their Trusted Root Certificate will need to be imported.
Note: There is a VeriSign Intermediate CA included. It may or may not be the correct one for your certificate.
Many CAs will now require an Intermediate Certificate as well as their Trusted Root.
Check your 3 rd  Party CA documentation for Intermediate Certificate requirements. ,[object Object]
[object Object],[object Object]
If they are not, include follow the vendor's instructions and download them.
Place them in your C:SL subdirectory. ,[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object]
Type the Certificate Label that will appear when you choose “View & Edit Key Ring” (why I keep it open on the desktop).
Select File or Clipboard as Source. ,[object Object]
If Clipboard, paste into provided field. ,[object Object]
Click “Merge Trusted Root Certificate into Key Ring”. ,[object Object],LS11 Windows 7-4-1.jpg
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Of course you would use a different Certificate Label and file name. ,[object Object],LS11 Windows 7-7.jpg ,[object Object]
[object Object],[object Object]
Create a KeyRing file
Creating a Certificate Signing Request (CSR)
Retrieve SSL Certificate from Vendor
Trusted Root and Intermediate Certificates ,[object Object]
Setup Domino Server for SSL ,[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object]
Select File or Clipboard as Certificate Source as appropriate.
Depending on you choice. ,[object Object]
If Clipboard, paste into provided field. ,[object Object],[object Object],LS11 Windows 7.jpg
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object]
Create a KeyRing file
Creating a Certificate Signing Request (CSR)
Retrieve SSL Certificate from Vendor
Trusted Root and Intermediate Certificates
Install Server SSL Certificate ,[object Object],[object Object]
[object Object],[object Object]
Browse to the C:SL subdirectory and copy BOTH the .kyr and .sth files. ,[object Object]
[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
Server – Current Server Document
Edit Server
Note: Load Internet configuration from Servernternet Sites documents = Disabled ,[object Object]
Using Internet Sites documents will be explained in the Wildcard SSL section. ,[object Object]

More Related Content

What's hot

Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyJayHicks
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPSachi Sawamura
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 
SplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service IntelligenceSplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service IntelligenceGabrielle Knowles
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Comodo code signing certificates
Comodo code signing certificatesComodo code signing certificates
Comodo code signing certificatesKayra Obrain
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 

What's hot (9)

Comodo Overview Presentation Read Only
Comodo Overview Presentation Read OnlyComodo Overview Presentation Read Only
Comodo Overview Presentation Read Only
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WP
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
SplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service IntelligenceSplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service Intelligence
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Comodo code signing certificates
Comodo code signing certificatesComodo code signing certificates
Comodo code signing certificates
 
Password Manager: Detailed presentation
Password Manager: Detailed presentationPassword Manager: Detailed presentation
Password Manager: Detailed presentation
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 

Similar to Lotusphere 2011 SHOW104

Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of TrustYousof Alsatom
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applicationsArash Ramez
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
COMODO Certificate Manager
COMODO Certificate ManagerCOMODO Certificate Manager
COMODO Certificate ManagerAnita Benett
 
Microsoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to knowMicrosoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to knowCheapSSLsecurity
 
120019_top5_security
120019_top5_security120019_top5_security
120019_top5_securityJessica Hirst
 
Slide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate AuthoritySlide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate Authoritywebhostingguy
 
Powerpoint Presentation
Powerpoint PresentationPowerpoint Presentation
Powerpoint Presentationwebhostingguy
 
Powerpoint Presentation
Powerpoint PresentationPowerpoint Presentation
Powerpoint Presentationwebhostingguy
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfJUSTSTYLISH3B2MOHALI
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ONOWASP EEE
 
Learn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdfLearn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdfReliqusConsulting
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerCheapSSLUSA
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates RapidSSLOnline.com
 
The Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL CertificatesThe Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL CertificatesCheapSSLsecurity
 

Similar to Lotusphere 2011 SHOW104 (20)

Understanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdfUnderstanding The World Of SSL Certificates.pdf
Understanding The World Of SSL Certificates.pdf
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Certificates and Web of Trust
Certificates and Web of TrustCertificates and Web of Trust
Certificates and Web of Trust
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
All About SSL/TLS
All About SSL/TLSAll About SSL/TLS
All About SSL/TLS
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
COMODO Certificate Manager
COMODO Certificate ManagerCOMODO Certificate Manager
COMODO Certificate Manager
 
Microsoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to knowMicrosoft Exchange Server & SSL Certificates: Everything you need to know
Microsoft Exchange Server & SSL Certificates: Everything you need to know
 
120019_top5_security
120019_top5_security120019_top5_security
120019_top5_security
 
Slide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate AuthoritySlide 1 - Authenticated Reseller SSL Certificate Authority
Slide 1 - Authenticated Reseller SSL Certificate Authority
 
Powerpoint Presentation
Powerpoint PresentationPowerpoint Presentation
Powerpoint Presentation
 
Powerpoint Presentation
Powerpoint PresentationPowerpoint Presentation
Powerpoint Presentation
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdfI would appreciate help with these 4 questions. Thank You.1) Expla.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
 
Learn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdfLearn to Add an SSL Certificate Boost Your Site's Security.pdf
Learn to Add an SSL Certificate Boost Your Site's Security.pdf
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
Code Signing Certificate
Code Signing CertificateCode Signing Certificate
Code Signing Certificate
 
The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates The Hidden Costs of SelfSigned SSL Certificates
The Hidden Costs of SelfSigned SSL Certificates
 
The Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL CertificatesThe Hidden Costs of Self-Signed SSL Certificates
The Hidden Costs of Self-Signed SSL Certificates
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Lotusphere 2011 SHOW104