SlideShare a Scribd company logo
1 of 54
Planning for Outdoor
Video Surveillance Projects
Today’s
Moderator
David Martin
Physical Security
Specialist
LENSEC
Webinar
Sponsor
About LENSEC
• Based in Houston, TX
• Since 1998
• IP Video Management Solutions
• System Design
• Installation & Project
Management
Perspective Video Management Software (VMS) ™
LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks.
We want to help protect people and assets as well as improve operations through our evolutionary and
intuitive technology. We can do this by providing expertise in security and software development.
Our Mission
Webinar
Logistics
• Q&A at the end
• Questions for the panelist
• Audio from attendees muted
• Poll questions
• Survey
Keith Harris
Marketing Manager
LENSEC
Today’s
Panelist
• Degree in Broadcasting & Photojournalism
• 27 Years Working in Photography & Video Production
• 6 Years in Physical Security Market
• Expertise in Training Techniques for Video Surveillance
Training
Goal
Planning for Outdoor Video Surveillance Projects
Our goals are …
Environmental Concerns
Transmission of Video & Data
Rugged Edge Devices
Power Considerations
Remote Camera Locations
Site Survey
The site survey is most important for properly
evaluating needs at a project location
Pay attention to the big picture, but think about the
small details
Try to picture the entirety of the project
You may not get easy access to the site again
Understanding the projects puzzle pieces early on will
determine the success of the entire process
Outdoor Video Surveillance Projects
Poll
Question
Poll Question #1
What are the two most important
factors in determining an outdoor
camera position?
Remote Camera Locations
Site Survey – Design
Thinking about site design starts
with the initial customer
conversation
Google Earth is a good tool for
outdoor projects
IPVM Camera Calculator
Take Pictures
Camera Views
Installation Views
Outdoor Video Surveillance Projects
IPVM Camera Calculator: http://ipvm.com/calculator (members only)
Remote Camera Locations
Site Survey
Scenario 1 – No Infrastructure
Scenario 2 – Limited Infrastructure (pavilion/maintenance shed/bathroom)
Scenario 3 – Solid Infrastructure (office/recreation center/fleet garage)
Outdoor Video Surveillance Projects
Remote Camera Locations
Scenario #1 – No Infrastructure
Edge Device Position
Network
Transmission
Outdoor Video Surveillance Projects
Remote Camera Locations
Scenario #2 – Limited Infrastructure
Edge Device Position
Network
Transmission
Outdoor Video Surveillance Projects
Remote Camera Locations
Scenario #3 – Solid Infrastructure
Edge Device Position
Network
Transmission
Outdoor Video Surveillance Projects
Remote Camera Locations
Site Survey – Poles
Existing Pole Survey
New Pole Positions
Proper Hardware
Cherry Picker
Outdoor Video Surveillance Projects
Remote Camera Locations
Wired Transmission
Existing Trench/Conduit
New Trenches
Outdoor Video Surveillance Projects
http://www.homewyse.com/services/cost_to_dig_trench.html
Remote Camera Locations
Site Survey – Poles
Number of Cameras per pole – four maximum
NEMA enclosure with Rugged Equipment
POE Power Supply
Network Switch
Transmission path (wired or wireless)
Auxiliary adapters (fiber, network bridge, cellular
transmission, etc.)
Edge Recording
Outdoor Video Surveillance Projects
Remote Camera Locations
Wired Transmission
Outdoor Rated Cable
Conduit
Outdoor Video Surveillance Projects
Poll
Question
Poll Question #2
Why is Line of Sight important in a
wireless transmission?
Remote Data Transmission
Wireless Transmission
Line Of Sight
Fresnel Zone
Outdoor Video Surveillance Projects
http://www.proxim.com/products/knowledge-center/calculations/calculations-fresnel-clearance-zone
Remote Data Transmission
Wireless Transmission
RF Environment
Outdoor Video Surveillance Projects
Remote Data Transmission
Wireless Point To Point Transmission (P2P)
Outdoor Video Surveillance Projects
Remote Data Transmission
Wireless Point to MultiPoint Transmission (P2MP)
Outdoor Video Surveillance Projects
Remote Data Transmission
Wireless Mesh Transmission
Outdoor Video Surveillance Projects
Remote Data Transmission
Wireless Mesh Transmission
Outdoor Video Surveillance Projects
Remote Power
Power – AC Power
Power at Device
POE Injectors
Test it – Don’t trust it
Scheduled Power
Voltage Drop
Outdoor Video Surveillance Projects
http://www.calculator.net/voltage-drop-calculator.html
Remote Power
Power – Battery
Plan To Recharge
Long Term Maintenance
Outdoor Video Surveillance Projects
Remote Power
Power – Solar
Temporary or Permanent
Geographic Location
Good Solar Exposure
Power Draw
Battery Bank
Outdoor Video Surveillance Projects
http://energy.gov/maps/solar-energy-potential
Camera Placement
Layers of Security
Outdoor Video Surveillance Projects
Camera Placement
Choke Point
Driveway
Gate
Outdoor Video Surveillance Projects
Poll
Question
Poll Question #3
Why does distance between the
camera and target area matter?
Camera Placement
Wide Shot / Tight Shot
Wide = Large Area of Coverage / Limited Detail
Tight = Limited Area of Coverage / Higher Detail
Outdoor Video Surveillance Projects
Camera Placement
Field of View
Distance To Target
Width Of Target Area
Outdoor Video Surveillance Projects
http://www.lensec.com/tutorial/calculator.html
Camera Placement
Blind Spots
No Coverage
Future Phase
Outdoor Video Surveillance Projects
Camera Placement
Entrances / Exits
Cover Them All?
Set Your Priorities (e.g. – Main Entrance vs.
Loading Dock)
Outdoor Video Surveillance Projects
Camera Placement
Building Mounting Positions
Soffits
Corners
Wall Penetration
Mounting Hardware
Outdoor Video Surveillance Projects
Camera Placement
Pole Mounting Positions
Mounting Hardware
Lighting (avoid glare)
Pole Position (existing vs. new)
Outdoor Video Surveillance Projects
Equipment Choices
Camera Types
PTZ
MP Cameras
180 Degree Cameras
Outdoor Video Surveillance Projects
Equipment Choices
Camera Types
Pixels Per Foot
Resolution vs. Coverage Area
Outdoor Video Surveillance Projects
http://www.iqeye.com/sites/all/themes/iqinvision/calc/pixels_per_foot/
General Detail
Forensic Detail
High Detail
Equipment Choices
Camera Features
Weatherproof
Vandalproof
Infrared
Outdoor Video Surveillance Projects
Environmental Considerations
Crime Prevention Through Environmental Design
Outdoor Video Surveillance Projects
Outdoor Video Surveillance Projects
Environmental Considerations
Lighting
Outdoor Video Surveillance Projects
Training
Goal
Planning for Outdoor Video Surveillance Projects
Our goals are …
Environmental Concerns
Transmission of Video & Data
Rugged Edge Devices
Power Considerations
Questions
Q&A
Contacts
David Martin
LENSEC
(512) 318-3829
dmartin@lensec.com
Keith Harris
LENSEC
(512) 913-3907
kharris@lensec.com
Thanks for Attending
Today’s Webinar

More Related Content

What's hot

Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)Jeffrey Lam
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance InstallationShein Myint Aung
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
 
Campus Technology Day Campus Security Review
Campus Technology Day Campus Security ReviewCampus Technology Day Campus Security Review
Campus Technology Day Campus Security Reviewwebhostingguy
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateAlex Kwan
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleEnergySec
 
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply ChainIdentity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply Chaintomkat58
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration EasyIntelePeer
 
Secure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishSecure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishAskozia
 
redwire video verification
redwire video verificationredwire video verification
redwire video verificationnokelley
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 

What's hot (20)

Defending our datacenters (BICSI 2016 ASEAN conference)
Defending our datacenters  (BICSI 2016 ASEAN  conference)Defending our datacenters  (BICSI 2016 ASEAN  conference)
Defending our datacenters (BICSI 2016 ASEAN conference)
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
 
Campus Technology Day Campus Security Review
Campus Technology Day Campus Security ReviewCampus Technology Day Campus Security Review
Campus Technology Day Campus Security Review
 
Adaptive Trust for Strong Network Security
Adaptive Trust for Strong Network SecurityAdaptive Trust for Strong Network Security
Adaptive Trust for Strong Network Security
 
Whitepaper perimeter protection
Whitepaper perimeter protectionWhitepaper perimeter protection
Whitepaper perimeter protection
 
SQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone UpdateSQX Solution Day 2013 Q2 - Milestone Update
SQX Solution Day 2013 Q2 - Milestone Update
 
OTT for Mobile Devices
OTT for Mobile DevicesOTT for Mobile Devices
OTT for Mobile Devices
 
IoT13: Electric Imp showcase
IoT13: Electric Imp showcaseIoT13: Electric Imp showcase
IoT13: Electric Imp showcase
 
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s RoleNERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
NERC CIP Version 5 and Beyond – Compliance and the Vendor’s Role
 
Et software brochure
Et software brochureEt software brochure
Et software brochure
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply ChainIdentity Based Lifecycle Management for a Trusted IoT Supply Chain
Identity Based Lifecycle Management for a Trusted IoT Supply Chain
 
Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration Easy
 
checkpoint
checkpointcheckpoint
checkpoint
 
Secure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, EnglishSecure calling for IP telephony - webinar 2016, English
Secure calling for IP telephony - webinar 2016, English
 
redwire video verification
redwire video verificationredwire video verification
redwire video verification
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Adaptive Trust Security
Adaptive Trust SecurityAdaptive Trust Security
Adaptive Trust Security
 

Similar to Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects

Wearable Photogrammetry - What to Wear for Work #COMIT2017
Wearable Photogrammetry - What to Wear for Work #COMIT2017Wearable Photogrammetry - What to Wear for Work #COMIT2017
Wearable Photogrammetry - What to Wear for Work #COMIT2017Comit Projects Ltd
 
Gem iCon Provides Campus Wide Security & Wi Fi
Gem iCon Provides Campus Wide Security & Wi FiGem iCon Provides Campus Wide Security & Wi Fi
Gem iCon Provides Campus Wide Security & Wi Fitycollc
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecityAndrea Sorri
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecityAxis Communications
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Keith Harris
 
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-Emmanuel Anim
 
Ip Based distributed surveillance system
Ip Based distributed surveillance systemIp Based distributed surveillance system
Ip Based distributed surveillance systemKamal Lamichhane
 
Internship report - Copy1
Internship report - Copy1Internship report - Copy1
Internship report - Copy1Riya Dashoriya
 
Samsung Security cameras
Samsung Security camerasSamsung Security cameras
Samsung Security camerasHaitham Youssef
 
CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals  CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals IJECEIAES
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation
 
COMIT Community Day Autumnn 2018 - Trellisworks ipcctv
COMIT Community Day Autumnn 2018 - Trellisworks ipcctvCOMIT Community Day Autumnn 2018 - Trellisworks ipcctv
COMIT Community Day Autumnn 2018 - Trellisworks ipcctvComit Projects Ltd
 
Video Surveillance Report
Video Surveillance ReportVideo Surveillance Report
Video Surveillance ReportMihika Shah
 
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen..."Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...Edge AI and Vision Alliance
 
Lijin thomas security project manager
Lijin thomas security project managerLijin thomas security project manager
Lijin thomas security project managerlijin thomas
 

Similar to Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects (20)

Wearable Photogrammetry - What to Wear for Work #COMIT2017
Wearable Photogrammetry - What to Wear for Work #COMIT2017Wearable Photogrammetry - What to Wear for Work #COMIT2017
Wearable Photogrammetry - What to Wear for Work #COMIT2017
 
Gem iCon Provides Campus Wide Security & Wi Fi
Gem iCon Provides Campus Wide Security & Wi FiGem iCon Provides Campus Wide Security & Wi Fi
Gem iCon Provides Campus Wide Security & Wi Fi
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
Siva_resume
Siva_resumeSiva_resume
Siva_resume
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
 
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
FDA - ELECTRONIC SECURITY- AFWEST INT. SECURITY - EMMANUEL ANIM-
 
Ip Based distributed surveillance system
Ip Based distributed surveillance systemIp Based distributed surveillance system
Ip Based distributed surveillance system
 
#FiaComit ibeacons
#FiaComit ibeacons#FiaComit ibeacons
#FiaComit ibeacons
 
Internship report - Copy1
Internship report - Copy1Internship report - Copy1
Internship report - Copy1
 
Samsung Security cameras
Samsung Security camerasSamsung Security cameras
Samsung Security cameras
 
Samsung Techwin Hanwha
Samsung Techwin HanwhaSamsung Techwin Hanwha
Samsung Techwin Hanwha
 
CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals  CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals
 
Blaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera SolutionsBlaze Automation Cisco Security And Cctv Camera Solutions
Blaze Automation Cisco Security And Cctv Camera Solutions
 
COMIT Community Day Autumnn 2018 - Trellisworks ipcctv
COMIT Community Day Autumnn 2018 - Trellisworks ipcctvCOMIT Community Day Autumnn 2018 - Trellisworks ipcctv
COMIT Community Day Autumnn 2018 - Trellisworks ipcctv
 
DVO FAQ - Streaming Video
DVO FAQ - Streaming VideoDVO FAQ - Streaming Video
DVO FAQ - Streaming Video
 
Video Surveillance Report
Video Surveillance ReportVideo Surveillance Report
Video Surveillance Report
 
bc_techguide_33334_en_0811_lo.pdf
bc_techguide_33334_en_0811_lo.pdfbc_techguide_33334_en_0811_lo.pdf
bc_techguide_33334_en_0811_lo.pdf
 
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen..."Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
"Using Deep Learning for Video Event Detection on a Compute Budget," a Presen...
 
Lijin thomas security project manager
Lijin thomas security project managerLijin thomas security project manager
Lijin thomas security project manager
 

More from Keith Harris

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesKeith Harris
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Keith Harris
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsKeith Harris
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsKeith Harris
 
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Keith Harris
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Keith Harris
 

More from Keith Harris (6)

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in Schools
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
 
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects