SlideShare a Scribd company logo
1 of 35
Download to read offline
www.axis.com
Enhancing
Defence-in-Depth using
automated systems
Jeffrey Lam
Senior Manager, End-customers, APAC
www.axis.com
USD**
Total sales 2020
1.2B
3,805
employees* in more
than countries
50
Axis at a glance
*Q4 2020 **Full year 2020, SEK 11.6 B, EUR 1.1 B
Video surveillance I audio |
intercom I access control I
training, service & support
Distributors
Customers
Resellers System integrators
Axis
Local presence around the world
through our extensive partner network
HQ and
founded
in Sweden,
part of
Canon group
Committed to
UN Global
Compact
75,000
partners worldwide
www.axis.com
Jeffrey Lam
Senior Program Manager
Defence in depth
(DiD)
www.axis.com
"Hohenzollern Castle - Stuttgart, Germany" by Trodel is licensed under CC BY-SA 2.0
outer walls
Inner walls
keep
Hill
www.axis.com
Datacenter
Defence in Depth
Perimeter
Premises
Building
Critical Spaces / Asset
www.axis.com
Defence in Depth in critical facilities
Perimeter
Premises Critical Spaces
Buildings
www.axis.com
Jeffrey Lam
Senior Program Manager
Automation &
Integration
www.axis.com
Deter
Detect
Delay
Response
Perimeter
Premises
Building
Critical spaces
Electronic
Systems
Automated
Environmental
Design
DiD INTENT
Manguards
www.axis.com
Objectives
• Reduce response time by reducing human inputs
• Increase effectiveness by using technology
• Facilitate human supervision & intervention
Approach
• Leverage on technology to automate tasks
• Integrate different systems to automate response
• Redesign processes to incorporate both human & tech.
www.axis.com
Automated Systems
INTERFACE
INTEGRATION
INTELLIGENCE
• Information & controls
• User dashboard / interface
• Manguards Communication
• Video images vs meta-data
• Interoperablity
• High level vs low level integration
• Detect & response
• Rules based/Machine Learning
• EDGE / server /cloud
www.axis.com
Jeffrey Lam
Senior Program Manager
Automated Systems
www.axis.com
Defence in Depth - typical systems
Security Cameras
Access control
Analytics & other
applications
Audio
Visitor entry
Control & Command
software
www.axis.com
Response
"Siren Light" by paurian is licensed under CC BY 2.0
"Floodlight Moon" by DOS82 is licensed under CC BY-NC-ND 2.0
"Garage Doors Long Panel Pebble Stone Color" by carywaynepeterson is
licensed under CC BY-ND 2.0
www.axis.com
Perimeter
Detect and verify potential
intrusion incidents at your
perimeter in real time.
www.axis.com
Perimeter Protection
Thermal
Camera
Detect
PTZ
Verify
Network
Horn
Speaker
Network
I/O
controlle
r
Siren
www.axis.com
Drones & Vehicles • Perimeter
Deter
Speakers
Detect
Fixed & PTZ cameras
Access
Vehicle recognition
& Door controller
Detect
Drone detection
system
www.axis.com
Premises & Site
Detect and track
people & objects
across multiple
sites.
www.axis.com
Site and lot management • Premises
Verify
PTZ cameras
Deter
Speakers
Detect
Thermal Cameras
/Radar detectors
Deter /
Detect
Bodyworn system /
Robotic Patrol
www.axis.com
Layer 2: Radar / Robot Guards
Reponse
Speakers
Detect
Multisensor cameras
Radar detectors
www.axis.com
Building
Control entrances
& exits to ensure
only authorized
personnel can
enter or leave the
space.
www.axis.com
Access control • Building exterior and interiors
Grant
access
Door controller
Identify
Card readers
Visitors
Door station
www.axis.com
Crossline and zone intrusion • Building interiors & Server rooms
Deter
Speakers
Detect
Fixed cameras
Verify
PTZ cameras
www.axis.com
Audio Analytics • Building exterior and interiors
Detect
Fixed cameras
Deter
Speakers
www.axis.com
Server rooms & server racks
Smart cameras and sensors
to protect people and assets
in the white space.
www.axis.com
White Space • Server rooms
Deter
Speakers
Multidirectional cameras
Verify
Detect
www.axis.com
Security-based operations
Cabinet, door and rack entry • Server racks
Deny
Rack based
access control
Post-event images
Pre-event images
Modular & PTZ camera
Detect
www.axis.com
Jeffrey Lam
Senior Program Manager
Systems
Considerations
www.axis.com
• Devices vs Applications
• Visibility, Flexibilty and Scalability
Level of
integration
• Comprehensive API
• Open Systems or Proprietary systems
Interoperability
• Supports current & future devices/systems
• Firmware upgrade - LTS track vs Active track
Backward
compatibility
Integrating systems
www.axis.com
IDENTIFY
/
DESIGN
Internal Policies
Regulatory
Compliance
Governance
ISO 27001
GDPR
FIPS 140-2
PCI-DSS
Secure by Default
Devices Inventory
PROTECT
/
DETECT
Hardening Guide
Signed Firmware
Secure Boot
LTS/firmware update
CVE Advisory
Vulnerability
Scanning
Encryption(certificates)
N/W Segmentation
TPM
RESPONSE/
RECOVER
SYS Log /
RemoteSys Log
Backup/Restore
SEIM/SOAR
(automation
&response)
Business Continuity
IT Security
www.axis.com
Jeffrey Lam
Senior Program Manager
Design
Considerations
www.axis.com
Environment considerations
• Lighting levels
• Shadows/ Reflections /Glare
• Dirt / dust/ Rain
• Temperature
• Strong winds / Vibration
• Electro-magnetic Interference
• Others
• Obstruction
• Theft, vandalism
"Hidden Camera" by miskan is licensed under CC BY-NC 2.0
"rain | window | reflection" by waferboard is licensed under CC BY 2.0
www.axis.com
Video considerations - lighting conditions
Lighting conditions are never right!
www.axis.com
Video considerations
Normal transmission: 2881 kbit/s
Without
Zipstream
Zipstream compression : 1433 kbit/s
With
Zipstream
www.axis.com
Cabling considerations
Cabling : major time & costs component
• Trenching, cable runways, grounding
• Surge protection, waterproofing, firestopping
Reduce cabling complexity
• Multi-sensor cameras = 1 cable / switch port
• PoE extenders: Transmitting UTP >100m
Reuse cables :
• UTP couplers/cables repair kit
• Cabling Testing/ Warranty
• Using existing coaxial cables for IP devices
www.axis.com

More Related Content

What's hot

7_16_BrivoOnAir_Datasheet
7_16_BrivoOnAir_Datasheet7_16_BrivoOnAir_Datasheet
7_16_BrivoOnAir_DatasheetAgnes Sokol
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom SolutionMatrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom SolutionMatrix Comsec
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure Corporation
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityPrecisely
 
Video IQ in a Nutshell
Video IQ in a NutshellVideo IQ in a Nutshell
Video IQ in a NutshellPieter Cloete
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityPrecisely
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecGENIANS, INC.
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview GENIANS, INC.
 
Lco Axxon Introductory 2010 Sales
Lco Axxon Introductory 2010 SalesLco Axxon Introductory 2010 Sales
Lco Axxon Introductory 2010 Salesluiscoello
 
It security
It securityIt security
It securityavi2607
 
Key Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety NetworksKey Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety NetworksDesign World
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamFelipe Prado
 
CyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID ExploitationsCyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID ExploitationsChad Bowerman
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 

What's hot (20)

7_16_BrivoOnAir_Datasheet
7_16_BrivoOnAir_Datasheet7_16_BrivoOnAir_Datasheet
7_16_BrivoOnAir_Datasheet
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom SolutionMatrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
Essential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access SecurityEssential Layers of IBM i Security: System-Access Security
Essential Layers of IBM i Security: System-Access Security
 
Video IQ in a Nutshell
Video IQ in a NutshellVideo IQ in a Nutshell
Video IQ in a Nutshell
 
Atlas brochure
Atlas brochureAtlas brochure
Atlas brochure
 
Essential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network SecurityEssential Layers of IBM i Security Series – Network Security
Essential Layers of IBM i Security Series – Network Security
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
Lco Axxon Introductory 2010 Sales
Lco Axxon Introductory 2010 SalesLco Axxon Introductory 2010 Sales
Lco Axxon Introductory 2010 Sales
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
It security
It securityIt security
It security
 
Key Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety NetworksKey Tips for Using and Operating Safety Networks
Key Tips for Using and Operating Safety Networks
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
 
CyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID ExploitationsCyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID Exploitations
 
System 6000
System 6000System 6000
System 6000
 
Complete Security
Complete SecurityComplete Security
Complete Security
 

Similar to Enhancing Defence in depth with automated systems (SII Physical meets Cyber Security Conference)

Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxJeffrey Lam
 
Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfMusicGramOfficial
 
Samsung Security cameras
Samsung Security camerasSamsung Security cameras
Samsung Security camerasHaitham Youssef
 
4. Innovative Products & Solutions by AXIS.pdf
4. Innovative Products & Solutions by AXIS.pdf4. Innovative Products & Solutions by AXIS.pdf
4. Innovative Products & Solutions by AXIS.pdfPawachMetharattanara
 
Smart hotel solution
Smart hotel solutionSmart hotel solution
Smart hotel solutionPaul Maina
 
Blaze automation jntu
Blaze automation jntuBlaze automation jntu
Blaze automation jntuBlaze_Hyd
 
Wireless World
Wireless World Wireless World
Wireless World bhattsipl
 
Presentation dahua 2019.04.29
Presentation dahua 2019.04.29Presentation dahua 2019.04.29
Presentation dahua 2019.04.29Ghomsi Adrien
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Niraj Kumar
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phonemoxreview
 
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Sumo Logic
 
About BEA Americas
About BEA AmericasAbout BEA Americas
About BEA AmericasBEA, Inc.
 
Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2MIDIH_EU
 
FS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxFS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxPawachMetharattanara
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentationmaitretester
 
FS Presentation CCTV solution.pptx
FS Presentation CCTV solution.pptxFS Presentation CCTV solution.pptx
FS Presentation CCTV solution.pptxPawachMetharattanara
 

Similar to Enhancing Defence in depth with automated systems (SII Physical meets Cyber Security Conference) (20)

Employing automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptxEmploying automated security systems in critical facilities.pptx
Employing automated security systems in critical facilities.pptx
 
Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdf
 
Samsung Techwin Hanwha
Samsung Techwin HanwhaSamsung Techwin Hanwha
Samsung Techwin Hanwha
 
Samsung Security cameras
Samsung Security camerasSamsung Security cameras
Samsung Security cameras
 
4. Innovative Products & Solutions by AXIS.pdf
4. Innovative Products & Solutions by AXIS.pdf4. Innovative Products & Solutions by AXIS.pdf
4. Innovative Products & Solutions by AXIS.pdf
 
BASS Company profile
BASS Company profileBASS Company profile
BASS Company profile
 
Smart hotel solution
Smart hotel solutionSmart hotel solution
Smart hotel solution
 
Blaze automation jntu
Blaze automation jntuBlaze automation jntu
Blaze automation jntu
 
Wireless World
Wireless World Wireless World
Wireless World
 
Presentation dahua 2019.04.29
Presentation dahua 2019.04.29Presentation dahua 2019.04.29
Presentation dahua 2019.04.29
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
MOX IRIS Video Door Phone
MOX IRIS Video Door PhoneMOX IRIS Video Door Phone
MOX IRIS Video Door Phone
 
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
 
About BEA Americas
About BEA AmericasAbout BEA Americas
About BEA Americas
 
Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2Vibro box sitel midih-presentation oc2
Vibro box sitel midih-presentation oc2
 
Vivotek Apresentação
Vivotek ApresentaçãoVivotek Apresentação
Vivotek Apresentação
 
Ravij profic
Ravij proficRavij profic
Ravij profic
 
FS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptxFS Presentation CCTV solution rev1 (1).pptx
FS Presentation CCTV solution rev1 (1).pptx
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
 
FS Presentation CCTV solution.pptx
FS Presentation CCTV solution.pptxFS Presentation CCTV solution.pptx
FS Presentation CCTV solution.pptx
 

More from Jeffrey Lam

Securing your DC JLBK (DSC).ppt
Securing your DC JLBK (DSC).pptSecuring your DC JLBK (DSC).ppt
Securing your DC JLBK (DSC).pptJeffrey Lam
 
Bringing IT to the factory floor.ppt
Bringing IT to the factory floor.pptBringing IT to the factory floor.ppt
Bringing IT to the factory floor.pptJeffrey Lam
 
Applying Audio to Security (Sep 2021)
Applying Audio to Security (Sep 2021)Applying Audio to Security (Sep 2021)
Applying Audio to Security (Sep 2021)Jeffrey Lam
 
Comparison USA/China datacenters standards
Comparison USA/China datacenters standardsComparison USA/China datacenters standards
Comparison USA/China datacenters standardsJeffrey Lam
 
Breaking the rules! bicsi
Breaking the rules! bicsi  Breaking the rules! bicsi
Breaking the rules! bicsi Jeffrey Lam
 
Green datacenter jeff lam 2008
Green datacenter jeff lam 2008Green datacenter jeff lam 2008
Green datacenter jeff lam 2008Jeffrey Lam
 
Datacenter space planning(old)
Datacenter space planning(old)Datacenter space planning(old)
Datacenter space planning(old)Jeffrey Lam
 
Redundancy Datacenter Design
Redundancy Datacenter DesignRedundancy Datacenter Design
Redundancy Datacenter DesignJeffrey Lam
 

More from Jeffrey Lam (8)

Securing your DC JLBK (DSC).ppt
Securing your DC JLBK (DSC).pptSecuring your DC JLBK (DSC).ppt
Securing your DC JLBK (DSC).ppt
 
Bringing IT to the factory floor.ppt
Bringing IT to the factory floor.pptBringing IT to the factory floor.ppt
Bringing IT to the factory floor.ppt
 
Applying Audio to Security (Sep 2021)
Applying Audio to Security (Sep 2021)Applying Audio to Security (Sep 2021)
Applying Audio to Security (Sep 2021)
 
Comparison USA/China datacenters standards
Comparison USA/China datacenters standardsComparison USA/China datacenters standards
Comparison USA/China datacenters standards
 
Breaking the rules! bicsi
Breaking the rules! bicsi  Breaking the rules! bicsi
Breaking the rules! bicsi
 
Green datacenter jeff lam 2008
Green datacenter jeff lam 2008Green datacenter jeff lam 2008
Green datacenter jeff lam 2008
 
Datacenter space planning(old)
Datacenter space planning(old)Datacenter space planning(old)
Datacenter space planning(old)
 
Redundancy Datacenter Design
Redundancy Datacenter DesignRedundancy Datacenter Design
Redundancy Datacenter Design
 

Recently uploaded

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Enhancing Defence in depth with automated systems (SII Physical meets Cyber Security Conference)