SlideShare a Scribd company logo
1 of 50
Introduction to Artificial Immune Systems (AIS) BIC 2005:  International Symposium on Bio-Inspired Computing Johor, MY, 5-7 September 2005 Dr. Leandro Nunes de Castro [email_address] Catholic University of Santos - UniSantos/Brazil
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline
Part I Brief Introduction to the Immune System
Brief Introduction to the Immune System: Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Immune System (I) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],The Immune System (II)
[object Object],The Immune System (III)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Immune System (IV)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Immune System (V)
[object Object],The Immune System (VI)
[object Object],The Immune System (VII)
The Immune System (VIII) after Nosssal, 1993 ,[object Object]
[object Object],The Immune System (IX) after Oprea & Forrest, 1998
[object Object],The Immune System (X)
[object Object],The Immune System (XI)
[object Object],[object Object],[object Object],The Immune System (XII)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Immune System (XIII)
[object Object],The Immune System (XIV)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Immune System (XV)
[object Object],The Immune System (XVI) after Jerne, 1974
The Immune System (XVII) ,[object Object],after Matzinger, 1994
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Immune System — Summary —
Part II Artificial Immune Systems
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems: Outline
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems (I)
[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems (II)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems (III)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems (IV)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Artificial Immune Systems (V)
The Early Events
Part III A Framework to Engineer AIS
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Framework for AIS (I)
[object Object],[object Object],A Framework for AIS (II) after Perelson, 1989
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Framework for AIS (III)
A Framework for AIS (IV) ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],A Framework for AIS (V) Hamming  r -contiguous bit  Affinity measure  distance    rule   of Hunt Flipping one string
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A Framework for AIS (VI)
[object Object],A Framework for AIS (VII) after Perelson et al., 1996
[object Object],[object Object],A Framework for AIS (VIII) Censoring Monitoring phase   phase after Forrest et al., 1994
[object Object],A Framework for AIS (IX) after  de Castro & Von Zuben, 2001a
[object Object],[object Object],[object Object],A Framework for AIS (X)
[object Object],A Framework for AIS (XI) after de Castro & Von Zuben, 2001a after Kepler & Perelson, 1993
[object Object],A Framework for AIS (XII)
[object Object],A Framework for AIS (XIII)
Part IV Discussion and Main Trends
Discussion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Main Trends
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],References (I)
References (II) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[email_address] Thank You! Questions?  Comments?

More Related Content

What's hot

What's hot (20)

Genetic Algorithms - Artificial Intelligence
Genetic Algorithms - Artificial IntelligenceGenetic Algorithms - Artificial Intelligence
Genetic Algorithms - Artificial Intelligence
 
Feedforward neural network
Feedforward neural networkFeedforward neural network
Feedforward neural network
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithms
 
Anomaly Detection Using Generative Adversarial Network(GAN)
Anomaly Detection Using Generative Adversarial Network(GAN)Anomaly Detection Using Generative Adversarial Network(GAN)
Anomaly Detection Using Generative Adversarial Network(GAN)
 
Feed forward ,back propagation,gradient descent
Feed forward ,back propagation,gradient descentFeed forward ,back propagation,gradient descent
Feed forward ,back propagation,gradient descent
 
Machine Learning and Data Mining: 16 Classifiers Ensembles
Machine Learning and Data Mining: 16 Classifiers EnsemblesMachine Learning and Data Mining: 16 Classifiers Ensembles
Machine Learning and Data Mining: 16 Classifiers Ensembles
 
Perceptron in ANN
Perceptron in ANNPerceptron in ANN
Perceptron in ANN
 
Neural network final NWU 4.3 Graphics Course
Neural network final NWU 4.3 Graphics CourseNeural network final NWU 4.3 Graphics Course
Neural network final NWU 4.3 Graphics Course
 
Metaheuristics
MetaheuristicsMetaheuristics
Metaheuristics
 
Fuzzy expert system
Fuzzy expert systemFuzzy expert system
Fuzzy expert system
 
Kmeans
KmeansKmeans
Kmeans
 
Hidden markov model ppt
Hidden markov model pptHidden markov model ppt
Hidden markov model ppt
 
5.3 mining sequential patterns
5.3 mining sequential patterns5.3 mining sequential patterns
5.3 mining sequential patterns
 
MACHINE LEARNING - GENETIC ALGORITHM
MACHINE LEARNING - GENETIC ALGORITHMMACHINE LEARNING - GENETIC ALGORITHM
MACHINE LEARNING - GENETIC ALGORITHM
 
Introduction to Genetic Algorithms
Introduction to Genetic AlgorithmsIntroduction to Genetic Algorithms
Introduction to Genetic Algorithms
 
bat algorithm
bat algorithmbat algorithm
bat algorithm
 
Adaline and Madaline.ppt
Adaline and Madaline.pptAdaline and Madaline.ppt
Adaline and Madaline.ppt
 
Recurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: TheoryRecurrent Neural Networks. Part 1: Theory
Recurrent Neural Networks. Part 1: Theory
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
 
Gravitational search algorithm
Gravitational search algorithmGravitational search algorithm
Gravitational search algorithm
 

Viewers also liked

Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attack
UltraUploader
 
Using uml to model immune system
Using uml to model immune systemUsing uml to model immune system
Using uml to model immune system
Ayi Purbasari
 
2004: Engineering Applications of Artificial Immune Systems
2004: Engineering Applications of Artificial Immune Systems2004: Engineering Applications of Artificial Immune Systems
2004: Engineering Applications of Artificial Immune Systems
Leandro de Castro
 
2004: Computação Natural (Cybertecnica)
2004: Computação Natural (Cybertecnica)2004: Computação Natural (Cybertecnica)
2004: Computação Natural (Cybertecnica)
Leandro de Castro
 
2012: LCoN Aplicações em Big Data
2012: LCoN Aplicações em Big Data2012: LCoN Aplicações em Big Data
2012: LCoN Aplicações em Big Data
Leandro de Castro
 

Viewers also liked (20)

Negative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly DetectionNegative Selection for Algorithm for Anomaly Detection
Negative Selection for Algorithm for Anomaly Detection
 
2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?2006: Artificial Immune Systems - The Past, The Present, And The Future?
2006: Artificial Immune Systems - The Past, The Present, And The Future?
 
2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications2000: Artificial Immune Systems - Theory and Applications
2000: Artificial Immune Systems - Theory and Applications
 
Artificial immune system against viral attack
Artificial immune system against viral attackArtificial immune system against viral attack
Artificial immune system against viral attack
 
Using uml to model immune system
Using uml to model immune systemUsing uml to model immune system
Using uml to model immune system
 
2004: Engineering Applications of Artificial Immune Systems
2004: Engineering Applications of Artificial Immune Systems2004: Engineering Applications of Artificial Immune Systems
2004: Engineering Applications of Artificial Immune Systems
 
2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes
2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes
2011: Na Nova Geração do Ecommerce os Produtos Encontrarão os Clientes
 
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
2008: Applied AIS - A Roadmap of AIS Research in Brazil and Sample Applications
 
2002: Comparing Immune and Neural Networks
2002: Comparing Immune and Neural Networks2002: Comparing Immune and Neural Networks
2002: Comparing Immune and Neural Networks
 
2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...
2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...
2011: Usando Ferramentas de Recomendação Inteligente para Aumento da Taxa de ...
 
2004: Computação Natural (Cybertecnica)
2004: Computação Natural (Cybertecnica)2004: Computação Natural (Cybertecnica)
2004: Computação Natural (Cybertecnica)
 
2011: TUILUX_FC
2011: TUILUX_FC2011: TUILUX_FC
2011: TUILUX_FC
 
2011: Empreendedorismo Digital - Como Dados Viram Negócios
2011: Empreendedorismo Digital - Como Dados Viram Negócios2011: Empreendedorismo Digital - Como Dados Viram Negócios
2011: Empreendedorismo Digital - Como Dados Viram Negócios
 
2010: Computação Natural e Aplicações
2010: Computação Natural e Aplicações2010: Computação Natural e Aplicações
2010: Computação Natural e Aplicações
 
2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications
2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications
2008: Natural Computing: The Virtual Laboratory and Two Real-World Applications
 
2005: Natural Computing - Concepts and Applications
2005: Natural Computing - Concepts and Applications2005: Natural Computing - Concepts and Applications
2005: Natural Computing - Concepts and Applications
 
2012: LCoN Aplicações em Big Data
2012: LCoN Aplicações em Big Data2012: LCoN Aplicações em Big Data
2012: LCoN Aplicações em Big Data
 
2016: Notas sobre Liderança
2016: Notas sobre Liderança2016: Notas sobre Liderança
2016: Notas sobre Liderança
 
2012: The Grand Challenges in Natural Computing Research
2012: The Grand Challenges in Natural Computing Research2012: The Grand Challenges in Natural Computing Research
2012: The Grand Challenges in Natural Computing Research
 
2016: Applying AI Innovation in Business
2016: Applying AI Innovation in Business2016: Applying AI Innovation in Business
2016: Applying AI Innovation in Business
 

Similar to 2005: An Introduction to Artificial Immune Systems

Applications of immune system computing
Applications of immune system computingApplications of immune system computing
Applications of immune system computing
UltraUploader
 
Microsoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONASMicrosoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONAS
butest
 
A retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationA retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimization
UltraUploader
 
Computer immunology
Computer immunologyComputer immunology
Computer immunology
Rohan Ahmed
 

Similar to 2005: An Introduction to Artificial Immune Systems (20)

Applications of artificial immune system a review
Applications of artificial immune system  a reviewApplications of artificial immune system  a review
Applications of artificial immune system a review
 
50120130406047
5012013040604750120130406047
50120130406047
 
cec2001-tutorial.ppt
cec2001-tutorial.pptcec2001-tutorial.ppt
cec2001-tutorial.ppt
 
Ijmet 10 01_169
Ijmet 10 01_169Ijmet 10 01_169
Ijmet 10 01_169
 
B410054
B410054B410054
B410054
 
An immune agents system for
An immune agents system forAn immune agents system for
An immune agents system for
 
Applications of immune system computing
Applications of immune system computingApplications of immune system computing
Applications of immune system computing
 
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
Navigation Control and Path Mapping of a Mobile Robot using Artificial Immune...
 
Microsoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONASMicrosoft Word - Welcome to Universiti Teknologi PETRONAS
Microsoft Word - Welcome to Universiti Teknologi PETRONAS
 
A retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimizationA retrovirus inspired algorithm for virus detection & optimization
A retrovirus inspired algorithm for virus detection & optimization
 
Presentation cybernetics immunology-ver1.0 (for-criticism) - copy
Presentation cybernetics immunology-ver1.0 (for-criticism) - copyPresentation cybernetics immunology-ver1.0 (for-criticism) - copy
Presentation cybernetics immunology-ver1.0 (for-criticism) - copy
 
Presentation cybernetics immunology-ver1.02 (for-criticism)
Presentation cybernetics immunology-ver1.02 (for-criticism)Presentation cybernetics immunology-ver1.02 (for-criticism)
Presentation cybernetics immunology-ver1.02 (for-criticism)
 
Computer immunology
Computer immunologyComputer immunology
Computer immunology
 
Swiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devicesSwiss knife security kit for implantable medical devices
Swiss knife security kit for implantable medical devices
 
CDAC 2018 Mishra immune system part b
CDAC 2018 Mishra immune system part bCDAC 2018 Mishra immune system part b
CDAC 2018 Mishra immune system part b
 
Introduction To Information Systems And Informatics
Introduction To Information Systems And InformaticsIntroduction To Information Systems And Informatics
Introduction To Information Systems And Informatics
 
Bioinformatics Lecture 1
Bioinformatics  Lecture 1Bioinformatics  Lecture 1
Bioinformatics Lecture 1
 
Bioinformatics lecture 1
Bioinformatics lecture 1Bioinformatics lecture 1
Bioinformatics lecture 1
 
Common languages in genomic epidemiology: from ontologies to algorithms
Common languages in genomic epidemiology: from ontologies to algorithmsCommon languages in genomic epidemiology: from ontologies to algorithms
Common languages in genomic epidemiology: from ontologies to algorithms
 
New Research Articles 2019 July Issue International Journal of Artificial Int...
New Research Articles 2019 July Issue International Journal of Artificial Int...New Research Articles 2019 July Issue International Journal of Artificial Int...
New Research Articles 2019 July Issue International Journal of Artificial Int...
 

More from Leandro de Castro

2021: An Illustrated Journey into Natural Computing
2021: An Illustrated Journey into Natural Computing2021: An Illustrated Journey into Natural Computing
2021: An Illustrated Journey into Natural Computing
Leandro de Castro
 

More from Leandro de Castro (20)

2021: An Illustrated Journey into Natural Computing
2021: An Illustrated Journey into Natural Computing2021: An Illustrated Journey into Natural Computing
2021: An Illustrated Journey into Natural Computing
 
2019: Folder do LCoN
2019: Folder do LCoN2019: Folder do LCoN
2019: Folder do LCoN
 
2019: LCoN - Centro de Excelência em Inteligência Artificial
2019: LCoN - Centro de Excelência em Inteligência Artificial2019: LCoN - Centro de Excelência em Inteligência Artificial
2019: LCoN - Centro de Excelência em Inteligência Artificial
 
2018: What did I learn about Innovation and Entrepreneurship in Israel
2018: What did I learn about Innovation and Entrepreneurship in Israel2018: What did I learn about Innovation and Entrepreneurship in Israel
2018: What did I learn about Innovation and Entrepreneurship in Israel
 
2018 Academic Innovation Opportunities in Brazil
2018 Academic Innovation Opportunities in Brazil2018 Academic Innovation Opportunities in Brazil
2018 Academic Innovation Opportunities in Brazil
 
2017: Tópicos em Educação Financeira
2017: Tópicos em Educação Financeira2017: Tópicos em Educação Financeira
2017: Tópicos em Educação Financeira
 
2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...
2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...
2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...
 
2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...
2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...
2016: A Tríade da Persona Virtual - O Que as Mídias Sociais Podem Revelar sob...
 
2016: Fundamentos Matemáticos para Inteligência Artificial
2016: Fundamentos Matemáticos para Inteligência Artificial2016: Fundamentos Matemáticos para Inteligência Artificial
2016: Fundamentos Matemáticos para Inteligência Artificial
 
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...
 
2015: Análise de Mercado e Plano de Marketing
2015: Análise de Mercado e Plano de Marketing2015: Análise de Mercado e Plano de Marketing
2015: Análise de Mercado e Plano de Marketing
 
2016 (Updated): Introdução à Mineração de Dados
2016 (Updated): Introdução à Mineração de Dados2016 (Updated): Introdução à Mineração de Dados
2016 (Updated): Introdução à Mineração de Dados
 
2016: Metodologia da Pesquisa em Computação
2016: Metodologia da Pesquisa em Computação2016: Metodologia da Pesquisa em Computação
2016: Metodologia da Pesquisa em Computação
 
2015: Fundamentos Teóricos da Computação
2015: Fundamentos Teóricos da Computação2015: Fundamentos Teóricos da Computação
2015: Fundamentos Teóricos da Computação
 
2012: Tutorial sobre Sistemas de Recomendação para E-commerce
2012: Tutorial sobre Sistemas de Recomendação para E-commerce2012: Tutorial sobre Sistemas de Recomendação para E-commerce
2012: Tutorial sobre Sistemas de Recomendação para E-commerce
 
2012: Natural Computing - The Grand Challenges and Two Case Studies
2012: Natural Computing - The Grand Challenges and Two Case Studies2012: Natural Computing - The Grand Challenges and Two Case Studies
2012: Natural Computing - The Grand Challenges and Two Case Studies
 
2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica
2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica
2010: Plano de Negócios e Incubação de Empresas de Base Tecnológica
 
2014: Introdução às Redes Neurais Artificiais
2014: Introdução às Redes Neurais Artificiais2014: Introdução às Redes Neurais Artificiais
2014: Introdução às Redes Neurais Artificiais
 
2013: Empreendedorismo: Slides do Curso
2013: Empreendedorismo: Slides do Curso2013: Empreendedorismo: Slides do Curso
2013: Empreendedorismo: Slides do Curso
 
2012: Computação Natural - Slides do Curso
2012: Computação Natural - Slides do Curso2012: Computação Natural - Slides do Curso
2012: Computação Natural - Slides do Curso
 

Recently uploaded

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

2005: An Introduction to Artificial Immune Systems