SlideShare a Scribd company logo
1 of 39
Disaster Social Computing Crowds, Clouds and Crisis Gísli Ólafsson Disaster Management – Technical Advisor Microsoft Corporation Email: gislio@microsoft.com Blog:http://blogs.msdn.com/disaster/ Twitter: @gislio
Introduction The Crowds The Clouds Way Forward Agenda
Port-au-Prince Haiti – January 12, 2010
Social Media
Facebook – Hotel Montana
Open Street Maps
Project 4636
CrisisCamp Haiti
CrisisCamp Haiti
Information Management
Coordination on the ground
Information Management – on the ground
Big World – Small World
The Crowds
What are the issues and limitations? Information silos Time zone differences Organizational boundaries Information capture/persistence Lack of efficiency/delays Version control issues Security violations Access issues Etc. Consumersocialnetworks Phone How People Work Together Now E-mail Fax Face-to-face Messaging File shares Paper-based
Organizations 2.0
Mobilizing
Facilitated Knowledge Management Collaborative Workgroups Social Networks Evolution
Discussion Boards Comments Podcasting Shared Calendars Microblogging Versioning Profiles Document Libraries Team Sites Tags Blogs Task Lists Wikis Surveys Ratings EnterpriseCollaboration Capabilities SocialComputing Technologies DisasterCommunities The Need for Communities
[object Object]
Blogs, Wikis, Podcasts
Tag Profile PagesSHARE CREATE ,[object Object]
Enterprise Wikis
Mobile Access
Rich Media Support
SharePoint Workspace Offline access
Team Sites
Outlook Synch & Social Connector
Ratings
External Access
Note Board
Office Web AppsSharePoint 2010 Communities Platform ,[object Object]
Ask Me About, Colleague & Expertise Suggestions
Microblogging Status Updates
People & Expertise Search
Organization BrowserNETWORK FIND ,[object Object]
My Network, My Profile
Activity Feeds
Photos, Contact Card, Presence everywhere

More Related Content

What's hot

Integrating Social Media Into Crisis Planning
Integrating Social Media Into Crisis PlanningIntegrating Social Media Into Crisis Planning
Integrating Social Media Into Crisis PlanningKami Watson Huyse, APR
 
Powerpoint meds 1101[1]
Powerpoint meds 1101[1]Powerpoint meds 1101[1]
Powerpoint meds 1101[1]Halien_17
 
Pecha kachka powerpoint meds 1101
Pecha kachka powerpoint meds 1101Pecha kachka powerpoint meds 1101
Pecha kachka powerpoint meds 1101Robert Rose
 
NEFLIN: New Technology - Where the Web is Headed - Digital Trends
NEFLIN: New Technology  - Where the Web is Headed  - Digital TrendsNEFLIN: New Technology  - Where the Web is Headed  - Digital Trends
NEFLIN: New Technology - Where the Web is Headed - Digital TrendsDawn Raquel Jensen, EMBA
 
government in the 2.0 era [2008 IACA Conference]
government in the 2.0 era [2008 IACA Conference]government in the 2.0 era [2008 IACA Conference]
government in the 2.0 era [2008 IACA Conference]Hillary Hartley
 
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...AIIM International
 
Web 2.0 Challenges & Opportunities
Web 2.0 Challenges & OpportunitiesWeb 2.0 Challenges & Opportunities
Web 2.0 Challenges & Opportunitiesbbutler
 
What Ict Can Do For Development
What Ict Can Do For DevelopmentWhat Ict Can Do For Development
What Ict Can Do For Developmentict4ngo
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentInternet Law Center
 
Government & Social Media: Relationship 2.0
Government & Social Media: Relationship 2.0Government & Social Media: Relationship 2.0
Government & Social Media: Relationship 2.0Amy Senger
 
Web 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterWeb 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterHillary Hartley
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?John Mancini
 
milSuite and Open Source
milSuite and Open SourcemilSuite and Open Source
milSuite and Open SourcemilSuite
 
Instedd: Mobile Collaboration for Disaster Response
Instedd: Mobile Collaboration for Disaster ResponseInstedd: Mobile Collaboration for Disaster Response
Instedd: Mobile Collaboration for Disaster ResponseRobert Kirkpatrick
 

What's hot (16)

Integrating Social Media Into Crisis Planning
Integrating Social Media Into Crisis PlanningIntegrating Social Media Into Crisis Planning
Integrating Social Media Into Crisis Planning
 
Powerpoint meds 1101[1]
Powerpoint meds 1101[1]Powerpoint meds 1101[1]
Powerpoint meds 1101[1]
 
Pecha kachka powerpoint meds 1101
Pecha kachka powerpoint meds 1101Pecha kachka powerpoint meds 1101
Pecha kachka powerpoint meds 1101
 
NEFLIN: New Technology - Where the Web is Headed - Digital Trends
NEFLIN: New Technology  - Where the Web is Headed  - Digital TrendsNEFLIN: New Technology  - Where the Web is Headed  - Digital Trends
NEFLIN: New Technology - Where the Web is Headed - Digital Trends
 
government in the 2.0 era [2008 IACA Conference]
government in the 2.0 era [2008 IACA Conference]government in the 2.0 era [2008 IACA Conference]
government in the 2.0 era [2008 IACA Conference]
 
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
[Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Complian...
 
Web 2.0 Challenges & Opportunities
Web 2.0 Challenges & OpportunitiesWeb 2.0 Challenges & Opportunities
Web 2.0 Challenges & Opportunities
 
What Ict Can Do For Development
What Ict Can Do For DevelopmentWhat Ict Can Do For Development
What Ict Can Do For Development
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
Government & Social Media: Relationship 2.0
Government & Social Media: Relationship 2.0Government & Social Media: Relationship 2.0
Government & Social Media: Relationship 2.0
 
Web 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutterWeb 2.0 - cutting through the clutter
Web 2.0 - cutting through the clutter
 
Gov 1.0 vs. Gov 2.0
Gov 1.0 vs. Gov 2.0Gov 1.0 vs. Gov 2.0
Gov 1.0 vs. Gov 2.0
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
 
2009 GMIS - Web 2.0
2009 GMIS - Web 2.02009 GMIS - Web 2.0
2009 GMIS - Web 2.0
 
milSuite and Open Source
milSuite and Open SourcemilSuite and Open Source
milSuite and Open Source
 
Instedd: Mobile Collaboration for Disaster Response
Instedd: Mobile Collaboration for Disaster ResponseInstedd: Mobile Collaboration for Disaster Response
Instedd: Mobile Collaboration for Disaster Response
 

Similar to Crowds, Clouds & Crisis

Digital Disaster Responders
Digital Disaster RespondersDigital Disaster Responders
Digital Disaster RespondersGisli Olafsson
 
Cloud computing opportunity and challenge for european foundations and gran...
Cloud computing   opportunity and challenge for european foundations and gran...Cloud computing   opportunity and challenge for european foundations and gran...
Cloud computing opportunity and challenge for european foundations and gran...TechSoup
 
Thinking about VC themes
Thinking about VC themesThinking about VC themes
Thinking about VC themesGil Dibner
 
Emergent Learning Networks: Collaboration 2005 Q
Emergent Learning Networks: Collaboration 2005 QEmergent Learning Networks: Collaboration 2005 Q
Emergent Learning Networks: Collaboration 2005 QVideoguy
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChaptemariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxvrickens
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...Mark Skilton
 
Cloud Computing for Adult Literacy
Cloud Computing for Adult LiteracyCloud Computing for Adult Literacy
Cloud Computing for Adult LiteracyRoryMcGreal
 
Big Data
Big DataBig Data
Big DataBBDO
 
141900791 big-data
141900791 big-data141900791 big-data
141900791 big-dataglittaz
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013Brian Crotty
 
The cloud and higher education: a health warning
The cloud and higher education: a health warningThe cloud and higher education: a health warning
The cloud and higher education: a health warningRichard Hall
 

Similar to Crowds, Clouds & Crisis (20)

Digital Disaster Responders
Digital Disaster RespondersDigital Disaster Responders
Digital Disaster Responders
 
Cloud computing opportunity and challenge for european foundations and gran...
Cloud computing   opportunity and challenge for european foundations and gran...Cloud computing   opportunity and challenge for european foundations and gran...
Cloud computing opportunity and challenge for european foundations and gran...
 
SOME-day
SOME-daySOME-day
SOME-day
 
Thinking about VC themes
Thinking about VC themesThinking about VC themes
Thinking about VC themes
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Emergent Learning Networks: Collaboration 2005 Q
Emergent Learning Networks: Collaboration 2005 QEmergent Learning Networks: Collaboration 2005 Q
Emergent Learning Networks: Collaboration 2005 Q
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
Digital transformation and the role of cloud computing   Capgemini Mark Skilt...Digital transformation and the role of cloud computing   Capgemini Mark Skilt...
Digital transformation and the role of cloud computing Capgemini Mark Skilt...
 
Mega-trends
Mega-trendsMega-trends
Mega-trends
 
Megatrends
MegatrendsMegatrends
Megatrends
 
Cloud Computing for Adult Literacy
Cloud Computing for Adult LiteracyCloud Computing for Adult Literacy
Cloud Computing for Adult Literacy
 
Big Data
Big DataBig Data
Big Data
 
141900791 big-data
141900791 big-data141900791 big-data
141900791 big-data
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013
 
Cloud culture
Cloud cultureCloud culture
Cloud culture
 
The cloud and higher education: a health warning
The cloud and higher education: a health warningThe cloud and higher education: a health warning
The cloud and higher education: a health warning
 

More from Gisli Olafsson

Disrupting Humanitarian Response
Disrupting Humanitarian ResponseDisrupting Humanitarian Response
Disrupting Humanitarian ResponseGisli Olafsson
 
Haiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel PresentationHaiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel PresentationGisli Olafsson
 
How Technology is Changing Disaster Management
How Technology is Changing Disaster ManagementHow Technology is Changing Disaster Management
How Technology is Changing Disaster ManagementGisli Olafsson
 
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle Gisli Olafsson
 
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour versionThe Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour versionGisli Olafsson
 
Humanitarian Innovation
Humanitarian InnovationHumanitarian Innovation
Humanitarian InnovationGisli Olafsson
 
Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013Gisli Olafsson
 
Open Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 PlanOpen Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 PlanGisli Olafsson
 
Open Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 updateOpen Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 updateGisli Olafsson
 
Open Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationOpen Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationGisli Olafsson
 
Use of Digital Volunteer Groups
Use of Digital Volunteer GroupsUse of Digital Volunteer Groups
Use of Digital Volunteer GroupsGisli Olafsson
 
Humanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked IntelligenceHumanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked IntelligenceGisli Olafsson
 
Use of Social Media in Disasters
Use of Social Media in DisastersUse of Social Media in Disasters
Use of Social Media in DisastersGisli Olafsson
 
The importance of adding value
The importance of adding valueThe importance of adding value
The importance of adding valueGisli Olafsson
 
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...Gisli Olafsson
 
HumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information ManagementHumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information ManagementGisli Olafsson
 
Information Management Course - Reporting
Information Management Course - ReportingInformation Management Course - Reporting
Information Management Course - ReportingGisli Olafsson
 
Information Management Course - Dissemination and Displays
Information Management Course - Dissemination and DisplaysInformation Management Course - Dissemination and Displays
Information Management Course - Dissemination and DisplaysGisli Olafsson
 

More from Gisli Olafsson (20)

Blockchain for NGOs
Blockchain for NGOsBlockchain for NGOs
Blockchain for NGOs
 
Disrupting Humanitarian Response
Disrupting Humanitarian ResponseDisrupting Humanitarian Response
Disrupting Humanitarian Response
 
Haiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel PresentationHaiyan Response - ISCRAM Panel Presentation
Haiyan Response - ISCRAM Panel Presentation
 
How Technology is Changing Disaster Management
How Technology is Changing Disaster ManagementHow Technology is Changing Disaster Management
How Technology is Changing Disaster Management
 
Lean Response
Lean ResponseLean Response
Lean Response
 
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
Great Tohoku Earthquake - 3/11 Remembrance Speech in Seattle
 
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour versionThe Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
The Crisis Leader - The Art of Leadership in Times of Crisis - 1 hour version
 
Humanitarian Innovation
Humanitarian InnovationHumanitarian Innovation
Humanitarian Innovation
 
Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013Open Humanitarian Initiative - Presentation to IASC - May 2013
Open Humanitarian Initiative - Presentation to IASC - May 2013
 
Open Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 PlanOpen Humanitarian Initiative - 2013 Plan
Open Humanitarian Initiative - 2013 Plan
 
Open Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 updateOpen Humanitarian Initiative - August 2012 update
Open Humanitarian Initiative - August 2012 update
 
Open Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference PresentationOpen Humanitarian Initiative - ESRI User Conference Presentation
Open Humanitarian Initiative - ESRI User Conference Presentation
 
Use of Digital Volunteer Groups
Use of Digital Volunteer GroupsUse of Digital Volunteer Groups
Use of Digital Volunteer Groups
 
Humanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked IntelligenceHumanitarian Response in Times of Mass Collaboration and Networked Intelligence
Humanitarian Response in Times of Mass Collaboration and Networked Intelligence
 
Use of Social Media in Disasters
Use of Social Media in DisastersUse of Social Media in Disasters
Use of Social Media in Disasters
 
The importance of adding value
The importance of adding valueThe importance of adding value
The importance of adding value
 
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
Global Platform For Disaster Risk Reduction - Disaster Response 2.0 - Ignite ...
 
HumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information ManagementHumanityRoad training - Basic Crisis Information Management
HumanityRoad training - Basic Crisis Information Management
 
Information Management Course - Reporting
Information Management Course - ReportingInformation Management Course - Reporting
Information Management Course - Reporting
 
Information Management Course - Dissemination and Displays
Information Management Course - Dissemination and DisplaysInformation Management Course - Dissemination and Displays
Information Management Course - Dissemination and Displays
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Crowds, Clouds & Crisis