SlideShare a Scribd company logo
1 of 103
Download to read offline
www.nr.no
Repairing Trust in Our
Toasters
Trenton Schulz

Senior Research Scientist

Norwegian Computing Center
2014-10-20
Advertisement
2
3
About NR
4
Statistics
Technology
5
6
6
Information Security
6
Information Security
e-Inclusion
Smart Information Systems
6
Information Security
e-Inclusion
7
How many devices are connected to
the Internet at home?
8
How many devices are connected to
the Internet at home?
8
How many talk to each other over Bluetooth, NFC, etc.?
Internet of Things?
9
12
Many small networks…
11
12
Speaking together…
12
A force for good…
13
14
Meet David
15
Meet Paul
16
17
A force for bad…
18
19
20
SALE
21
SALE
21
Sale
SALE
21
Sale
Sale
SALE
21
Sale
Sale
Sale
SALE
21
Sale
Sale
Sale
Sale
12
Many small networks…
22
12
Speaking together…
23
14
Can We Trust These Networks?
24
15
How can we find out?
25
26
10
What is trust?
27
In information security?
28
…the correct function of a technical
component that is important for the
system security.
29
—Quirin,	
  Fritsch,	
  Husseiki,	
  and	
  Samson
In social sciences…
30
Interpersonal trust and risk
31
A user’s confidence in an entity’s
reliability, including that user’s
acceptance of vulnerability in a
potentially risky situation.
32
—Döbelt,	
  Busch,	
  and	
  Hochleitner
Universal Design
33
Two Aspects
34
1. The process
35
2. The result
36
Guidelines are not enough…
37
Use a user-centered design process…
38
ISO 9241-210:2010
39
40
40
Understand and
specify context
40
Understand and
specify context
Specify user
requirements
40
Understand and
specify context
Specify user
requirements
Produce Design
Solutions
40
Understand and
specify context
Specify user
requirements
Produce Design
Solutions
Evaluate against
requirements
40
Understand and
specify context
Specify user
requirements
Produce Design
Solutions
Evaluate against
requirements
Specify user requirements
41
42
43
44
Produce Design Solutions
45
46
47
48
Evaluate against requirements
49
Vi
50
Virtual Reality Testing…
51
51
52
52
The Final Result
53
The Security Assistant
54
55
55
Layer	
  1
55
Layer	
  1
Layer	
  2
55
Layer	
  1
Layer	
  2
Layer	
  3
55
Layer	
  1
Layer	
  2
Layer	
  3
Layer	
  4
56
56
56
1. 2. 3. 4.
56
56
Security Level 1 of 4,
low security
Findings from the project
57
Accepted the advice
58
But… why should I trust this?
59
Changing the security level
60
Changing the security level
60
Accessibility Issues
61
62
62
62
62
TalkBack
63
Future Work
64
65
Add trust to the security assistant
66
What about when I don’t have a
smartphone?
67
Guidelines
68
69
Have we fixed our toasters?
Contact
70
Trenton Schulz

Senior Research Scientist

Norwegian Computing Center

trenton.schulz@nr.no

+47 22 85 25 68

http://ict.nr.no
Image Credits
71
Slide 2, Untillde

!
Slides 4–7, 15–17, 19, 24–25, 43–44, 50, 69 Copyright 2014,
thinkstockphotos.ca, a division of Getty Images

!
Slide 20, EMVCo

!
Slide 52, Copyright 2013, aftenposten.no (http://www.aftenposten.no/nyheter/
iriks/Ville-du-bodd-i-et-hus-hvor-alt-er-koblet-til-Internett--7192204.html)

!
All other images, Norsk Regnesentral or uTRUSTit

More Related Content

Similar to Trenton Schulz: Repairing Trust in Our Toasters + Trust to the Internet of Things.

Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowCapgemini
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMRick Bouter
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
The Secure laptop - intro BXL
The Secure laptop - intro BXLThe Secure laptop - intro BXL
The Secure laptop - intro BXLSectricity
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceDale Butler
 
Computer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyComputer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyJennifer York
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016Omer Coskun
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptxXyzAnc
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Kayisa Herman Dube
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 

Similar to Trenton Schulz: Repairing Trust in Our Toasters + Trust to the Internet of Things. (20)

Staying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters NowStaying Ahead in the Cybersecurity Game: What Matters Now
Staying Ahead in the Cybersecurity Game: What Matters Now
 
TNO cyber security perspectives 2013
TNO cyber security perspectives 2013TNO cyber security perspectives 2013
TNO cyber security perspectives 2013
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
 
The Secure laptop - intro BXL
The Secure laptop - intro BXLThe Secure laptop - intro BXL
The Secure laptop - intro BXL
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
SMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conferenceSMi Group's 5th annual European Smart Grid Cyber Security conference
SMi Group's 5th annual European Smart Grid Cyber Security conference
 
Computer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our SocietyComputer Networking Is Revolutionizing Our Society
Computer Networking Is Revolutionizing Our Society
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptx
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
eForensics_17_2013_KMOKER
eForensics_17_2013_KMOKEReForensics_17_2013_KMOKER
eForensics_17_2013_KMOKER
 
Privacy in an interconnected world
Privacy in an interconnected worldPrivacy in an interconnected world
Privacy in an interconnected world
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 

More from ifi8106tlu

2016-05-30 Venia Legendi (CEITER): Minna Huotilainen
2016-05-30 Venia Legendi (CEITER): Minna Huotilainen2016-05-30 Venia Legendi (CEITER): Minna Huotilainen
2016-05-30 Venia Legendi (CEITER): Minna Huotilainenifi8106tlu
 
2016-05-31 Venia Legendi (CEITER): Adolfo Ruiz Calleja
2016-05-31 Venia Legendi (CEITER): Adolfo Ruiz Calleja2016-05-31 Venia Legendi (CEITER): Adolfo Ruiz Calleja
2016-05-31 Venia Legendi (CEITER): Adolfo Ruiz Callejaifi8106tlu
 
2016-05-31 Venia Legendi (CEITER): Sergey Sosnovsky
2016-05-31 Venia Legendi (CEITER): Sergey Sosnovsky2016-05-31 Venia Legendi (CEITER): Sergey Sosnovsky
2016-05-31 Venia Legendi (CEITER): Sergey Sosnovskyifi8106tlu
 
2016-05-30 Venia Legendi (CEITER): Luis Pablo Prieto
2016-05-30 Venia Legendi (CEITER): Luis Pablo Prieto2016-05-30 Venia Legendi (CEITER): Luis Pablo Prieto
2016-05-30 Venia Legendi (CEITER): Luis Pablo Prietoifi8106tlu
 
2016-05-30 Venia Legendi (CEITER): Maria Jesus Rodriguez Triana
2016-05-30 Venia Legendi (CEITER): Maria Jesus Rodriguez Triana2016-05-30 Venia Legendi (CEITER): Maria Jesus Rodriguez Triana
2016-05-30 Venia Legendi (CEITER): Maria Jesus Rodriguez Trianaifi8106tlu
 
2016-05-27 Venia Legendi (CEITER): Paul Seitlinger
2016-05-27 Venia Legendi (CEITER): Paul Seitlinger2016-05-27 Venia Legendi (CEITER): Paul Seitlinger
2016-05-27 Venia Legendi (CEITER): Paul Seitlingerifi8106tlu
 
2016-05-27 Venia Legendi (CEITER): Terje Väljataga
2016-05-27 Venia Legendi (CEITER): Terje Väljataga2016-05-27 Venia Legendi (CEITER): Terje Väljataga
2016-05-27 Venia Legendi (CEITER): Terje Väljatagaifi8106tlu
 
2016-05-11 research seminar
2016-05-11 research seminar2016-05-11 research seminar
2016-05-11 research seminarifi8106tlu
 
2016-05-04 research seminar
2016-05-04 research seminar2016-05-04 research seminar
2016-05-04 research seminarifi8106tlu
 
Venia Legendi 2016: Pille Eslon
Venia Legendi 2016: Pille EslonVenia Legendi 2016: Pille Eslon
Venia Legendi 2016: Pille Eslonifi8106tlu
 
Venia Legendi 2016: Maria Zeltser
Venia Legendi 2016: Maria ZeltserVenia Legendi 2016: Maria Zeltser
Venia Legendi 2016: Maria Zeltserifi8106tlu
 
Venia legendi 2016 Andi Kivinukk
Venia legendi 2016 Andi KivinukkVenia legendi 2016 Andi Kivinukk
Venia legendi 2016 Andi Kivinukkifi8106tlu
 
2016-04-27 research seminar, 2nd presenter
2016-04-27 research seminar, 2nd presenter2016-04-27 research seminar, 2nd presenter
2016-04-27 research seminar, 2nd presenterifi8106tlu
 
2016-04-27 research seminar
2016-04-27 research seminar2016-04-27 research seminar
2016-04-27 research seminarifi8106tlu
 
EstCORE veebinar
EstCORE veebinarEstCORE veebinar
EstCORE veebinarifi8106tlu
 
2016-04-20 research seminar
2016-04-20 research seminar2016-04-20 research seminar
2016-04-20 research seminarifi8106tlu
 
2016-04-13 research seminar appendix
2016-04-13 research seminar appendix2016-04-13 research seminar appendix
2016-04-13 research seminar appendixifi8106tlu
 
2016-04-13 research seminar presentation
2016-04-13 research seminar presentation2016-04-13 research seminar presentation
2016-04-13 research seminar presentationifi8106tlu
 
2016-04-06 research seminar
2016-04-06 research seminar2016-04-06 research seminar
2016-04-06 research seminarifi8106tlu
 
2016 03-16 research seminar
2016 03-16 research seminar2016 03-16 research seminar
2016 03-16 research seminarifi8106tlu
 

More from ifi8106tlu (20)

2016-05-30 Venia Legendi (CEITER): Minna Huotilainen
2016-05-30 Venia Legendi (CEITER): Minna Huotilainen2016-05-30 Venia Legendi (CEITER): Minna Huotilainen
2016-05-30 Venia Legendi (CEITER): Minna Huotilainen
 
2016-05-31 Venia Legendi (CEITER): Adolfo Ruiz Calleja
2016-05-31 Venia Legendi (CEITER): Adolfo Ruiz Calleja2016-05-31 Venia Legendi (CEITER): Adolfo Ruiz Calleja
2016-05-31 Venia Legendi (CEITER): Adolfo Ruiz Calleja
 
2016-05-31 Venia Legendi (CEITER): Sergey Sosnovsky
2016-05-31 Venia Legendi (CEITER): Sergey Sosnovsky2016-05-31 Venia Legendi (CEITER): Sergey Sosnovsky
2016-05-31 Venia Legendi (CEITER): Sergey Sosnovsky
 
2016-05-30 Venia Legendi (CEITER): Luis Pablo Prieto
2016-05-30 Venia Legendi (CEITER): Luis Pablo Prieto2016-05-30 Venia Legendi (CEITER): Luis Pablo Prieto
2016-05-30 Venia Legendi (CEITER): Luis Pablo Prieto
 
2016-05-30 Venia Legendi (CEITER): Maria Jesus Rodriguez Triana
2016-05-30 Venia Legendi (CEITER): Maria Jesus Rodriguez Triana2016-05-30 Venia Legendi (CEITER): Maria Jesus Rodriguez Triana
2016-05-30 Venia Legendi (CEITER): Maria Jesus Rodriguez Triana
 
2016-05-27 Venia Legendi (CEITER): Paul Seitlinger
2016-05-27 Venia Legendi (CEITER): Paul Seitlinger2016-05-27 Venia Legendi (CEITER): Paul Seitlinger
2016-05-27 Venia Legendi (CEITER): Paul Seitlinger
 
2016-05-27 Venia Legendi (CEITER): Terje Väljataga
2016-05-27 Venia Legendi (CEITER): Terje Väljataga2016-05-27 Venia Legendi (CEITER): Terje Väljataga
2016-05-27 Venia Legendi (CEITER): Terje Väljataga
 
2016-05-11 research seminar
2016-05-11 research seminar2016-05-11 research seminar
2016-05-11 research seminar
 
2016-05-04 research seminar
2016-05-04 research seminar2016-05-04 research seminar
2016-05-04 research seminar
 
Venia Legendi 2016: Pille Eslon
Venia Legendi 2016: Pille EslonVenia Legendi 2016: Pille Eslon
Venia Legendi 2016: Pille Eslon
 
Venia Legendi 2016: Maria Zeltser
Venia Legendi 2016: Maria ZeltserVenia Legendi 2016: Maria Zeltser
Venia Legendi 2016: Maria Zeltser
 
Venia legendi 2016 Andi Kivinukk
Venia legendi 2016 Andi KivinukkVenia legendi 2016 Andi Kivinukk
Venia legendi 2016 Andi Kivinukk
 
2016-04-27 research seminar, 2nd presenter
2016-04-27 research seminar, 2nd presenter2016-04-27 research seminar, 2nd presenter
2016-04-27 research seminar, 2nd presenter
 
2016-04-27 research seminar
2016-04-27 research seminar2016-04-27 research seminar
2016-04-27 research seminar
 
EstCORE veebinar
EstCORE veebinarEstCORE veebinar
EstCORE veebinar
 
2016-04-20 research seminar
2016-04-20 research seminar2016-04-20 research seminar
2016-04-20 research seminar
 
2016-04-13 research seminar appendix
2016-04-13 research seminar appendix2016-04-13 research seminar appendix
2016-04-13 research seminar appendix
 
2016-04-13 research seminar presentation
2016-04-13 research seminar presentation2016-04-13 research seminar presentation
2016-04-13 research seminar presentation
 
2016-04-06 research seminar
2016-04-06 research seminar2016-04-06 research seminar
2016-04-06 research seminar
 
2016 03-16 research seminar
2016 03-16 research seminar2016 03-16 research seminar
2016 03-16 research seminar
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Trenton Schulz: Repairing Trust in Our Toasters + Trust to the Internet of Things.