SlideShare a Scribd company logo
1 of 49
Download to read offline
Client-side password
Encryption

Pedro Fortuny & Carlos Amieva
(& Rafael Casado “in absentia”)
Client-side password
Encryption

No worries, James, let the sysadmin deal with the problem.
Client-side password
Encryption
Honestly:
Client-side password
Encryption
Honestly:

Can you trust your sysadmin?
Client-side password
Encryption
Honestly:

Can you trust your sysadmin?

I mean
Client-side password
Encryption
Honestly:

Can you trust your sysadmin?
Client-side password
Encryption
Honestly:

Can you trust your sysadmin?

really?
Client-side password
Encryption

I said really
Client-side password
Encryption
We need
Client-side password
Encryption
We need
Ways to minimize data exposure to the
sysadmin
Client-side password
Encryption
We need
Ways to minimize data exposure to the
sysadmin
One step
Client-side password
Encryption
We need
Ways to minimize data exposure to the
sysadmin
One step
Protecting passwords from local access /
MITM
Client-side password
Encryption

The Sibyl v2.0
Client-side password
Encryption
State of affairs 2013 - blind trust

Client
Server
Client-side password
Encryption
State of affairs 2013 - blind trust
TLS/SS
L
Client

, this i

s SAFE

, oooo
hh!

Server
Client-side password
Encryption
State of affairs 2013 - blind trust
TLS/SS
L
Client

, this i

s SAFE

, oooo
hh!

I

se
u

r yp
sc

I’m
t,

Server

no

ol
fo
Client-side password
Encryption
State of affairs 2013 - blind trust
TLS/SS
L
Client

, this i

s SAFE

, oooo
hh!

I

se
u

r yp
sc

I’m
t,

no

ol
fo

Server

zorg:~# a=`pidof mysql`
zorg:~# strace -p $a -e crypt -f
Client-side password
Encryption
State of affairs 2013 - blind trust
TLS/SS
L
Client

, this i

s SAFE

, oooo
hh!

I

se
u

r yp
sc

I’m
t,

no

ol
fo

Server

zorg:~# a=`pidof mysql`
zorg:~# strace -p $a -e crypt -f
[pregnant silence]
Client-side password
Encryption
State of affairs 2013 - blind trust
TLS/SS
L
Client

, this i

s SAFE

, oooo
hh!

I

se
u

r yp
sc

I’m
t,

no

ol
fo

Server

zorg:~# a=`pidof mysql`
zorg:~# strace -p $a -e crypt -f
[pregnant silence]

[pid 9] crypt(“patata”,“$7$21212104040SaLt.$”)
Client-side password
Encryption

?

Do you
really
think
hackers
do NOT
use
strace
Client-side password
Encryption

BUT
Your sysadmin is
good
(tm)

[assumming you have not been rooted]
Client-side password
Encryption

BUT
Your sysadmin is
good
(tm)

[assumming you have not been rooted]

Trust in me...
Client-side password
Encryption

Can do better
Client-side password
Encryption
TLS/SS
L
Client

- but “
trust

in me.

..”

Server
Client-side password
Encryption
TLS/SS
L
Client

- but “
trust

in me.

..”

Store “RSA(scrypt(pwd))”
on the server

Server
Client-side password
Encryption
TLS/SS
L
Client

- but “
trust

in me.

..”

Store “RSA(scrypt(pwd))”
on the server

Server

RSA channel
Sibyl

Use a hardware
module to authenticate
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]

- but “
trust

in me.

..”

Server

Sibyl
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]

- but “
trust

in me.

..”

Server

Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]

- but “
trust

in me.

..”

only stores
PUB0(hash)
Server

Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]
hash=scrypt(pwd) is run
on the client side

- but “
trust

in me.

..”

only stores
PUB0(hash)
Server

Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]
hash=scrypt(pwd) is run
on the client side

- but “
trust

in me.

..”

only stores
PUB0(hash)
Server

msg=PUBi(hash)
Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption
TLS/SS
L
Client
[Pub key]
hash=scrypt(pwd) is run
on the client side
msg=PUBi(hash)

- but “
trust

in me.

..”

only stores
PUB0(hash)

Server
Priv(PUB0(hash))
==
Login?
Priv(PUBi(hash))
Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption
TLS/SS
L

- but “
trust

Client
[Pub key]
hash=scrypt(pwd) is run
on the client side
msg=PUBi(hash)

in me.

..”

only stores
PUB0(hash)

Server
Priv(PUB0(hash))
==
Login?
Priv(PUBi(hash))

Only the Sibly can answer this

Sibyl
[Priv, Pub] RSA pair
Client-side password
Encryption

There is no encryption
performed
on the server
Client-side password
Encryption

The Sibyl can be
completely dumb
[not yet implemented]
no access to the priv. key
Client-side password
Encryption

The sysadmin has no
way to MITM or whatever
Trustless pwd management
Client-side password
Encryption
Isn’t it better to trust
people, Charlie Brown?
Client-side password
Encryption
Isn’t it better to trust
people, Charlie Brown?

No, Lucy, no...
Client-side password
Encryption

Details
[...]
skip if necessary
Client-side password
Encryption
client

server

sibyl
Client-side password
Encryption
client

V1=RSAi(pwd)

server

sibyl
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server

sibyl
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)

sibyl
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)
[V1,V2]

sibyl
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)

sibyl

[V1,V2]
decrypt(v1)
==?
decrypt(v2)
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)

sibyl

[V1,V2]

yes/no

decrypt(v1)
==?
decrypt(v2)
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)

sibyl

[V1,V2]

yes/no
grant/deny

decrypt(v1)
==?
decrypt(v2)
Client-side password
Encryption
client

V1=RSAi(pwd)
[login,V1]

server V2=RSA0(pass)
(stored)

sibyl

[V1,V2]

yes/no
grant/deny

much gorier
(already
done)

decrypt(v1)
==?
decrypt(v2)
Client-side password
Encryption

Thank you

??

And don’t forget to
have a nice meal

More Related Content

Similar to The Sibyl: NoConName 2013

SQL Server Security And Encryption
SQL Server Security And EncryptionSQL Server Security And Encryption
SQL Server Security And EncryptionHamid J. Fard
 
ExpertsLiveEurope The New Era Of Endpoint Security
ExpertsLiveEurope The New Era Of Endpoint SecurityExpertsLiveEurope The New Era Of Endpoint Security
ExpertsLiveEurope The New Era Of Endpoint SecurityAlexander Benoit
 
Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)Abhishek Kumar
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Chris Gates
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With RailsTony Amoyal
 
Introduction To Encryption in Lasso 8.5
Introduction To Encryption in Lasso 8.5Introduction To Encryption in Lasso 8.5
Introduction To Encryption in Lasso 8.5bilcorry
 
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Stanfy
 
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)JonathanGMCraymer
 
What is SSL/TLS, 1-way and 2-way SSL?
What is SSL/TLS, 1-way and 2-way SSL?What is SSL/TLS, 1-way and 2-way SSL?
What is SSL/TLS, 1-way and 2-way SSL?pqrs1234
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In LinuxAhmed Mekkawy
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layerBU
 
Security and Real-time Communications – a maze of twisty little passages, tha...
Security and Real-time Communications – a maze of twisty little passages, tha...Security and Real-time Communications – a maze of twisty little passages, tha...
Security and Real-time Communications – a maze of twisty little passages, tha...Alan Quayle
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS SummitAmazon Web Services
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudAmazon Web Services
 
Pre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionPre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionMatt Dawdy
 
In headers / Padlocks / Certificate authorities / site seals we trust
In headers / Padlocks / Certificate authorities / site seals we trustIn headers / Padlocks / Certificate authorities / site seals we trust
In headers / Padlocks / Certificate authorities / site seals we trustpipasnacave
 
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF Loft
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF LoftIntro to Threat Detection & Remediation on AWS: AWS Security Week at the SF Loft
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF LoftAmazon Web Services
 

Similar to The Sibyl: NoConName 2013 (20)

SQL Server Security And Encryption
SQL Server Security And EncryptionSQL Server Security And Encryption
SQL Server Security And Encryption
 
ExpertsLiveEurope The New Era Of Endpoint Security
ExpertsLiveEurope The New Era Of Endpoint SecurityExpertsLiveEurope The New Era Of Endpoint Security
ExpertsLiveEurope The New Era Of Endpoint Security
 
Wi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu ExploitationWi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu Exploitation
 
Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)Insecurity-In-Security version.2 (2011)
Insecurity-In-Security version.2 (2011)
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With Rails
 
Introduction To Encryption in Lasso 8.5
Introduction To Encryption in Lasso 8.5Introduction To Encryption in Lasso 8.5
Introduction To Encryption in Lasso 8.5
 
Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...Avoiding damage, shame and regrets data protection for mobile client-server a...
Avoiding damage, shame and regrets data protection for mobile client-server a...
 
Breaking ssl
Breaking sslBreaking ssl
Breaking ssl
 
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)
Gr I Dsure Enterprise Remote Access (Jc 25 Apr09)
 
What is SSL/TLS, 1-way and 2-way SSL?
What is SSL/TLS, 1-way and 2-way SSL?What is SSL/TLS, 1-way and 2-way SSL?
What is SSL/TLS, 1-way and 2-way SSL?
 
Security & Cryptography In Linux
Security & Cryptography In LinuxSecurity & Cryptography In Linux
Security & Cryptography In Linux
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
Security and Real-time Communications – a maze of twisty little passages, tha...
Security and Real-time Communications – a maze of twisty little passages, tha...Security and Real-time Communications – a maze of twisty little passages, tha...
Security and Real-time Communications – a maze of twisty little passages, tha...
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Toronto AWS Summit
 
Best Practices of IoT Security in the Cloud
Best Practices of IoT Security in the CloudBest Practices of IoT Security in the Cloud
Best Practices of IoT Security in the Cloud
 
Pre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionPre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint Encryption
 
In headers / Padlocks / Certificate authorities / site seals we trust
In headers / Padlocks / Certificate authorities / site seals we trustIn headers / Padlocks / Certificate authorities / site seals we trust
In headers / Padlocks / Certificate authorities / site seals we trust
 
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF Loft
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF LoftIntro to Threat Detection & Remediation on AWS: AWS Security Week at the SF Loft
Intro to Threat Detection & Remediation on AWS: AWS Security Week at the SF Loft
 

Recently uploaded

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

The Sibyl: NoConName 2013