SlideShare a Scribd company logo
1 of 30
Download to read offline
Censoring the Net Rob Faris Berkman Center for Internet & Society June 26, 2008
Today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Today Toronto Oxford Cambridge Harvard
Today Restricting Speech on the Net
Today ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Restricting Speech on the Net
 
 
 
 
Tunisia China UAE Myanmar Saudi Arabia Iran Syria Yemen Uzbekistan Ethiopia South Korea Bahrain Pakistan Jordan India Azerbaijan Singapore Political  Filtering Social  Filtering Security/Conflict  Filtering Morocco Oman Thailand Vietnam Sudan Tajikistan
The problem of regulating speech on the net
 
 
 
 
The problem of regulating speech on the net ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The problem of not regulating speech on the net
[object Object],[object Object],[object Object],[object Object]
[object Object]
Social media and content mingling
 
 
Today
Today Promoting freedom of expression:  short-term & long-term
Distributed research ,[object Object],[object Object]
Herdict ,[object Object],[object Object]
 
 
http://herdict.org/ http://herdict.org
[email_address] Rob Faris Berkman Center for Internet & Society June 25, 2008

More Related Content

What's hot

Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++Roxanne St Ives
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Jeremy Pesner
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Internet governance and the filtering problems
Internet governance and the filtering problemsInternet governance and the filtering problems
Internet governance and the filtering problemsTan Tran
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State FilterAndrew Davies
 
Freedom of Assembly and Association Online 
in Taiwan
Freedom of Assembly and Association Online 
in TaiwanFreedom of Assembly and Association Online 
in Taiwan
Freedom of Assembly and Association Online 
in TaiwanAudrey Tang
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internetJeffrey Hart
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Tissue Chowtszyan
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarExcel Asama
 
POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedomroypong
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynBoston Global Forum
 
About Internet
About InternetAbout Internet
About Internetjanetcc
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Internet Safety Technical Task Force Final Report
Internet Safety Technical Task Force Final ReportInternet Safety Technical Task Force Final Report
Internet Safety Technical Task Force Final ReportChris White
 
Liberty-Search Strategy Analysis
Liberty-Search Strategy AnalysisLiberty-Search Strategy Analysis
Liberty-Search Strategy AnalysisToni Liberty
 
Internet, Politics, Policy 2010: An Impact Assessment
Internet, Politics, Policy 2010: An Impact AssessmentInternet, Politics, Policy 2010: An Impact Assessment
Internet, Politics, Policy 2010: An Impact AssessmentPaul Reilly
 

What's hot (20)

Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Internet governance and the filtering problems
Internet governance and the filtering problemsInternet governance and the filtering problems
Internet governance and the filtering problems
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
The Internet State Filter
The Internet State FilterThe Internet State Filter
The Internet State Filter
 
Freedom of Assembly and Association Online 
in Taiwan
Freedom of Assembly and Association Online 
in TaiwanFreedom of Assembly and Association Online 
in Taiwan
Freedom of Assembly and Association Online 
in Taiwan
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
 
Internet freedom
Internet freedomInternet freedom
Internet freedom
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
POLS 3620 Internet freedom
POLS 3620 Internet freedomPOLS 3620 Internet freedom
POLS 3620 Internet freedom
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
About Internet
About InternetAbout Internet
About Internet
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Isa12b
Isa12bIsa12b
Isa12b
 
Internet Safety Technical Task Force Final Report
Internet Safety Technical Task Force Final ReportInternet Safety Technical Task Force Final Report
Internet Safety Technical Task Force Final Report
 
Liberty-Search Strategy Analysis
Liberty-Search Strategy AnalysisLiberty-Search Strategy Analysis
Liberty-Search Strategy Analysis
 
Internet, Politics, Policy 2010: An Impact Assessment
Internet, Politics, Policy 2010: An Impact AssessmentInternet, Politics, Policy 2010: An Impact Assessment
Internet, Politics, Policy 2010: An Impact Assessment
 

Viewers also liked

Research Paper
Research PaperResearch Paper
Research Papermdhughley
 
Is censorship a good or bad idea?
Is censorship a good or bad idea?Is censorship a good or bad idea?
Is censorship a good or bad idea?cloestead
 
Internet censorship power point
Internet censorship power pointInternet censorship power point
Internet censorship power pointJonathan Milner
 
Censorship essay
Censorship essayCensorship essay
Censorship essayOliviaBolt
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpointmmentis117
 

Viewers also liked (6)

Research Paper
Research PaperResearch Paper
Research Paper
 
Is censorship a good or bad idea?
Is censorship a good or bad idea?Is censorship a good or bad idea?
Is censorship a good or bad idea?
 
Internet censorship power point
Internet censorship power pointInternet censorship power point
Internet censorship power point
 
Censorship
CensorshipCensorship
Censorship
 
Censorship essay
Censorship essayCensorship essay
Censorship essay
 
Censorship Powerpoint
Censorship PowerpointCensorship Powerpoint
Censorship Powerpoint
 

Similar to Budapest Gv July08

Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwarivpnmentor
 
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...ictseserv
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Privacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital SocietyPrivacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital SocietyThai Netizen Network
 
Presentation slides
Presentation slidesPresentation slides
Presentation slidesandrewdyoung
 
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from hu...
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from hu...Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from hu...
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from hu...Priyanka Aash
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityFreedom House
 
The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]Videoguy
 
Peer To Patent Presentation To Ce Bit Conference 3 Nov 2010 2010v2ppt
Peer To Patent Presentation To Ce Bit Conference 3 Nov 2010 2010v2pptPeer To Patent Presentation To Ce Bit Conference 3 Nov 2010 2010v2ppt
Peer To Patent Presentation To Ce Bit Conference 3 Nov 2010 2010v2pptPaulettePaterson
 
Internet ecosystem and the internet
Internet ecosystem and the internetInternet ecosystem and the internet
Internet ecosystem and the internetShreedeep Rayamajhi
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
Governing Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - MadisonGoverning Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - Madisonprofessormadison
 
UNESCO’s Division for Freedom of Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of  Expression, Democracy and Peace ReportUNESCO’s Division for Freedom of  Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of Expression, Democracy and Peace ReportAnax Fotopoulos
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastMOTC Qatar
 
Internet Rights are Human Rights Case Booklet
Internet Rights are Human Rights Case BookletInternet Rights are Human Rights Case Booklet
Internet Rights are Human Rights Case BookletRajat Kumar
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology AlyssaSingleterry
 

Similar to Budapest Gv July08 (20)

Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
Freedom of Connection – Freedom of Expression: The Future Internet in the Lar...
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Freedom unesco-2011
Freedom unesco-2011Freedom unesco-2011
Freedom unesco-2011
 
Privacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital SocietyPrivacy and Civil Rights Protection in the Digital Society
Privacy and Civil Rights Protection in the Digital Society
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from hu...
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from hu...Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from hu...
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from hu...
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]The EDUCAUSE Security Professionals Experience [ppt]
The EDUCAUSE Security Professionals Experience [ppt]
 
Peer To Patent Presentation To Ce Bit Conference 3 Nov 2010 2010v2ppt
Peer To Patent Presentation To Ce Bit Conference 3 Nov 2010 2010v2pptPeer To Patent Presentation To Ce Bit Conference 3 Nov 2010 2010v2ppt
Peer To Patent Presentation To Ce Bit Conference 3 Nov 2010 2010v2ppt
 
Internet ecosystem and the internet
Internet ecosystem and the internetInternet ecosystem and the internet
Internet ecosystem and the internet
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Governing Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - MadisonGoverning Privacy Commons at Pitt Science 2017 - Madison
Governing Privacy Commons at Pitt Science 2017 - Madison
 
UNESCO’s Division for Freedom of Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of  Expression, Democracy and Peace ReportUNESCO’s Division for Freedom of  Expression, Democracy and Peace Report
UNESCO’s Division for Freedom of Expression, Democracy and Peace Report
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle East
 
Internet Rights are Human Rights Case Booklet
Internet Rights are Human Rights Case BookletInternet Rights are Human Rights Case Booklet
Internet Rights are Human Rights Case Booklet
 
Techno research
Techno researchTechno research
Techno research
 
Legal Issues in Applied Technology
Legal Issues in Applied Technology Legal Issues in Applied Technology
Legal Issues in Applied Technology
 

Recently uploaded

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Recently uploaded (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Budapest Gv July08