SlideShare a Scribd company logo
1 of 136
Download to read offline
Who are You?
Who am I?
Who is Anybody?
Who am I?
Who are You?
Who is Anybody?
Who am I?
I’m not ...
<a href="http://lanyrd.com/people/psd" rel="me" >Lanyrd</a>
http://tools.microformatic.com/help/xhtml/rel-lint/
http://socialgraph-resources.googlecode.com/svn/trunk/samples/findyours.html
Social Graph API
https://twitter.com/hotdogsladies/status/121634890612617216
FAIL!
http://inmaps.linkedinlabs.com/share/Paul_Downey/254787113202758123919768153472111744090
Who are you?
https://twitter.com/Jermolene/status/121537205608001536
https://twitter.com/paulmadsen/status/122271400336699392
Basic Authentication




http://en.wikipedia.org/wiki/Basic_access_authentication
Digest Authentication




http://en.wikipedia.org/wiki/Digest_access_authentication
PASSWORD
REHABILITATION
sha1
Secret URIs

•   http://farm3.static.flickr.com/2291/1806225034_50df5b8ba4_o.png

•   http://inmaps.linkedinlabs.com/share/Paul_Downey/
    254787113202758123919768153472111744090
http://en.wikipedia.org/wiki/HTTP_cookie
http://softwareas.com/signing-up-to-websites-1999-2009-a-montage
https://github.com/hanssonlarsson/express-csrf
EU Privacy Directive on Cookies
http://www.davidnaylor.co.uk/eu-cookies-directive-interactive-guide-to-25th-
                   may-and-what-it-means-for-you.html
UX
More
Secure




         Less pleasant to use
DNS Is B0rken




http://blog.icann.org/2008/11/why-the-dns-is-broken-in-plain-language/
HTTPS
$ openssl s_client -connect www.google.com:443 <
/dev/null | openssl x509 -outform DER | openssl sha1

depth=1 /C=ZA/O=Thawte Consulting (Pty) Ltd./CN=Thawte
SGC CA
verify error:num=20:unable to get local issuer
certificate
verify return:0
DONE
405062e5befde4af97e9382af16cc87c8fb7c4e2


$ dig +short
405062e5befde4af97e9382af16cc87c8fb7c4e2.certs.googled
nstest.com TXT

"14867 15062 74"



   http://googleonlinesecurity.blogspot.com/2011/04/improving-ssl-certificate-security.html
Client Certs?
http://codebutler.github.com/firesheep/
https://www.eff.org/https-everywhere
you have to opt-out ..
               .. in every browser ..
                    .. this is evil ..
                     .. and doomed to failure
http://xauth.org/
http://en.wikipedia.org/wiki/OpenID
<XRD>
    <Subject>http://blog.example.com/article/id/314</
Subject>
    <Alias>http://blog.example.com/cool_new_thing</Alias>
    <Expires>2010-01-30T09:30:00Z</Expires>
    <Type>http://blgx.example.net/ns/version/1.2</Type>
    <Type>http://blgx.example.net/ns/ext/language</Type>
    <Link>
         <Rel>author</Rel>
         <URI>http://blog.example.com/author/steve</URI>
         <MediaType>text/html</MediaType>
    </Link>
</XRD>




               http://hueniverse.com/2009/03/xrd-sneak-peek/
https://dev.twitter.com/docs/auth/oauth
Delegation UX
The “F” Word
Federated
https://twitter.com/hipsterhacker/status/77716476873801728
https://twitter.com/jtauber/status/60586912196460544
Transport Independence
ww  .w3.org/
                                                                                                  ss >http://w le.org/
                                                                                      <w sa:Addre ttp://examp
                                                                         dd ressing"> ustomer="h
                                                          .org/2 005/08/a ers xmlns:c                     </
                                                                                                 merKey> wsdl/">
                                                      .w3                et                  sto
                                          tt p://www eferenceParam </customer :Cu mlsoap.org/                            /
                            mln s:wsa="h ss><wsa:R                    56789              m as.x              rg /2006/01
                 eference x </wsa:Addre                 y>K  ey#1234 lns="http://sche ttp://www.w3.o ce>
< wsa:E ndpointR essing/none           r :Cus  tomerKe efinitions xm                       "h
                                                                                 n xmlns= sa:EndpointRefe
                                                                                                            ren
                 r                 me                    d                   tio
    200  5/08/add tomer"><custo <wsa:Metada>< itions><descrip adata></w
                cus                  >                     n                  et
                         Par ameters          re! --></defi iption></wsa:M
          wsa:R eference of WSDL 1.1 he ! --></descr
                                               e
                 <!-- load WSDL 2.0 her
                            e
            wsdl"> <!-- mor
<?xml version="1.0" encoding="UTF-8"?>
<SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ns1="http://sdk.bt.com/2007/01/WhiteLabelAuthentication"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/" xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing" xmlns:wsse="http://docs.oasis-
open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-




                         HEADERS?
utility-1.0.xsd" xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
   <SOAP-ENV:Header>
      <wsse:Security>
         <ds:Signature>
            <ds:SignedInfo>
               <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
               <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
               <ds:Reference URI="#ac016ffe-a6e9-23d4-ebd1-ccef7ea31db7">
                   <ds:Transforms>
                      <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                   </ds:Transforms>
                   <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
                   <ds:DigestValue>bwlAKau7KQAubgGNJzysZoEEF8o=</ds:DigestValue>
               </ds:Reference>
               <ds:Reference URI="#78223460-ef68-5501-83d6-a5edb6d452b6">
                   <ds:Transforms>
                      <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                   </ds:Transforms>
                   <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
                   <ds:DigestValue>kyBw9fnMjhi2I39+wfBIklyk8g4=</ds:DigestValue>
               </ds:Reference>
            </ds:SignedInfo>
            <ds:SignatureValue>XW2FqP9o/A1J+NOg6Kv3ncn3PvSg5lzr2V4H/AQpRycXUSk7bzWK8kzhtMrlXUwkykrJ2AyEzw+xrRtSBIeaId1Iveme2KO02p21MTglr73cPCft/
GHvEvAHZ4B6N6gSaX7NcGFrYnsYKP0nX5vT7jBh7WZ7Euqn0PyjCHyYxbU=</ds:SignatureValue>
            <ds:KeyInfo>
               <wsse:SecurityTokenReference>
                   <wsse:Reference URI="#CERTID"/>
               </wsse:SecurityTokenReference>
            </ds:KeyInfo>
         </ds:Signature>
         <wsu:Timestamp wsu:Id="ac016ffe-a6e9-23d4-ebd1-ccef7ea31db7">
            <wsu:Created>2007-02-23T07:47:01Z</wsu:Created>
            <wsu:Expires>2007-02-23T08:47:01Z</wsu:Expires>
         </wsu:Timestamp>
         <wsse:BinarySecurityToken EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary"
ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"
wsu:Id="CERTID">MIICdzCCAeCgAwIBAgICAX0wDQYJKoZIhvcNAQEEBQAwezEnMCUGA1UEChMeQnJpdGlzaCBUZWxlY29tbXVuaWNhdGlvbnMgUExDMR4wHAYDVQQLExVDZXJ0aWZpY2F0ZSBBdXRob3
JpdHkxDzANBgNVBAcTBkxmRvbjELMAkGA1UEBhMCR0IxEjAQBgNVBTCUJUIFNESyBDQTAiFxEwNzAxMDMxNTE5MjIrMDAwMBcNMDgwMTA0MTUxOTIyWjCBgjELMAkGA1UEBhMCR0IxDzANBgNVBAgTBkxv
bmRvbjEPMA0GA1UEBxMGTG9uZG9uMQ8wDQYDVQQKEwZCVCBTREsxLTArBgNVBAsTJDM0ZDU0NTkwLTRkZTEtNGJmNi04ZGMxLWZjODQzNzM1MmM4MjERMA8GA1UEAxMIcGhvbmVib3gwgZ8wDQYJKoZIhv
cNAQEBBQADgY0AMIGJAoGBANKIQf+DOAKNZqs+HvCBYJ7+Q/wdCQBfFslIOGMnKN5zxpCuwB/pPW4DjLnqcWkIIVIH4A7RlWRemIO5e5caTW9bwvz0Fl1ZM6e2Mx9XKT0ZkxvXq8Dxn0abqWzoKyD3IJ2/
tUhqriWveFR+6PY3PSBcj7NpJaqr7yH3z6RtEGNlAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAmabZVFeAXfXcBKR6NUK7kYqHhtX7YdNtxZcULRMMpFEkCMGERWCH5bK6/xnFtNXG09RkwkSTGs2dhM6/
jQNvd1jJhLR6E2ejYrYWWf6Sap0Etok7sJqrS9awdbFmQGenFZKRUAEeyHeZhdFil8trzyJv1VzgPIjDRZmhnpItzQ8=</wsse:BinarySecurityToken>
      </wsse:Security>
      <wsa:Action>http://sdk.bt.com/2007/01/WhiteLabelAuthentication#login</wsa:Action>
      <wsa:MessageID>urn:uuid:e12edac3-f87d-3e0a-b621-04fa4d0b8cda</wsa:MessageID>
   </SOAP-ENV:Header>
   <SOAP-ENV:Body wsu:Id="78223460-ef68-5501-83d6-a5edb6d452b6">
      <ns1:login>
         <ns1:userName>paul.downey@bt.com</ns1:userName>
         <ns1:password>2344324t</ns1:password>
      </ns1:login>
   </SOAP-ENV:Body>
</SOAP-ENV:Envelope>
http://www.xmlgrrl.com/blog/2007/03/28/the-venn-of-identity/
http://www.xmlgrrl.com/blog/2007/03/28/the-venn-of-identity/
http://connectid.blogspot.com
http://www.xmlgrrl.com/blog/2008/09/04/venn-and-the-art-of-data-sharing/
http://kantarainitiative.org
http://en.wikipedia.org/wiki/OpenID
http://www.bbc.co.uk/news/technology-13749010
https://twitter.com/IdentityWoman/status/110622242127364096
https://twitter.com/robinberjon/status/109611765435875329
very cool!
http://www.w3.org/wiki/WebID
http://webfinger.org/
correct
 horse
battery
 staple
http://nigelparry.com/news/guardian-david-leigh-cablegate.shtml
.. but .. wait!
https://twitter.com/rem/status/123392299320344579
Verified by Visa not only protects your card against unauthorised use, it
 also means you can have confidence that the online retailer you’re
 buying from has made your security a priority.




http://www.visaeurope.com/en/cardholders/verified_by_visa.aspx
http://cyberelk.net/tim/2008/11/20/chip-and-pin/
http://krebsonsecurity.com/2011/09/gang-used-3d-printers-for-atm-skimmers/
http://berglondon.com/blog/2009/10/12/the-ghost-in-the-field/
http://gizmodo.com/5366022/sniff-the-rfid-dog-likes-to-smell-your-credit-cards
http://www.chromaroma.com/
http://www.bijlmereuro.net/
http://www.cerealbits.com/
http://en.wikipedia.org/wiki/Blue_box_(phreaking)
https://bitcointalk.org/index.php?topic=9047.0
http://en.aureatechnology.net/
http://cs-exhibitions.uni-klu.ac.at/index.php?id=258
Bio-meh-trics
http://www.flickr.com/photos/jeff-barnes/76948611
Something you have

 Something you are

Something you know
The Mobile
    is
The Dongle
             ™




         not really
http://www.duosecurity.com/
Who is anybody?
http://isaach.com/2011/07/mention-constellations.html
BUTTON SLUTS
https://twitter.com/beng/status/118026274148073472
https://twitter.com/monkchips/status/117246164839043072
http://www.ghostery.com/
Yikes!
http://collusion.toolness.org/
•   Standard HTTP Cookies
              •   Flash Local Shared Objects
              •   Silverlight Isolated Storage
              •   auto-generated force-cached RGB values
              •   PNG/HTML5 Canvas tag to read pixels
              •   Web History
              •   HTTP ETags
              •   Web cache
evercookies   •   window.name caching
              •   Internet Explorer userData storage
              •   HTML5 Session Storage
              •   HTML5 Local Storage
              •   HTML5 Global Storage
              •   HTML5 Database Storage (SQLite)
              •   HTTP Authentication
              •   Java NIC based unique key
https://panopticlick.eff.org/
https://twitter.com/9600/status/117309784130199553
“The thing that makes newspapers so
fundamentally fascinating — that serendipity
— can be calculated now.
We can actually produce it electronically.
The power of individual targeting — the
technology will be so good it will be very hard
for people to watch or consume something
that has not in some sense been tailored for
them”
                           — Eric Schmidt


http://googlesystem.blogspot.com/2010/08/eric-schmidt-on-future-of-search.html
Privacy Window
four legs good,
two legs better ...
https://twitter.com/danbri/status/114241481346252801
Test Driven Development

    Behaviour Driven Development

Jenga Driven Development

             Domain Driven Design

Development Driven Development

             Design Driven Driving
Investor Driven
 Development
Confusion
Conclusion
Who am I?
 — someone who treasures linking

Who are you?
 — someone who deserves grokable
 security

Who is Anybody?
 — mind your own bloomin’ business!

More Related Content

Similar to Who am I? Who are you? Who is anybody?

Sample data and other ur ls
Sample data and other ur lsSample data and other ur ls
Sample data and other ur ls
Mark Wilkinson
 
Microsoft Accademic Cloud Tour Genova
Microsoft Accademic Cloud Tour GenovaMicrosoft Accademic Cloud Tour Genova
Microsoft Accademic Cloud Tour Genova
antimo musone
 
Microformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and TechnologyMicroformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and Technology
Nishikant Taksande
 
Rails 3 overview
Rails 3 overviewRails 3 overview
Rails 3 overview
Yehuda Katz
 
Makanan halal-haram-2970785
Makanan halal-haram-2970785Makanan halal-haram-2970785
Makanan halal-haram-2970785
khairulamar
 
SHARE & the Semantic Web — This Time it's Personal
SHARE & the Semantic Web — This Time it's PersonalSHARE & the Semantic Web — This Time it's Personal
SHARE & the Semantic Web — This Time it's Personal
Luke McCarthy
 

Similar to Who am I? Who are you? Who is anybody? (20)

OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)
OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)
OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)
 
Dorothea orem-theory
Dorothea orem-theoryDorothea orem-theory
Dorothea orem-theory
 
OpenWeb Discovery
OpenWeb DiscoveryOpenWeb Discovery
OpenWeb Discovery
 
WSO2Con USA 2015: Securing your APIs: Patterns and More
WSO2Con USA 2015: Securing your APIs: Patterns and MoreWSO2Con USA 2015: Securing your APIs: Patterns and More
WSO2Con USA 2015: Securing your APIs: Patterns and More
 
REST teori og praksis; REST in theory and practice
REST teori og praksis; REST in theory and practiceREST teori og praksis; REST in theory and practice
REST teori og praksis; REST in theory and practice
 
Sample data and other ur ls
Sample data and other ur lsSample data and other ur ls
Sample data and other ur ls
 
Microsoft Accademic Cloud Tour Genova
Microsoft Accademic Cloud Tour GenovaMicrosoft Accademic Cloud Tour Genova
Microsoft Accademic Cloud Tour Genova
 
Enterprise integration options with Smallworld
Enterprise integration options with SmallworldEnterprise integration options with Smallworld
Enterprise integration options with Smallworld
 
Enterprise integration options with Smallworld
Enterprise integration options with SmallworldEnterprise integration options with Smallworld
Enterprise integration options with Smallworld
 
Microformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and TechnologyMicroformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and Technology
 
About REST. Архитектурные семинары Softengi
About REST. Архитектурные семинары SoftengiAbout REST. Архитектурные семинары Softengi
About REST. Архитектурные семинары Softengi
 
SOAP-based Web Services
SOAP-based Web ServicesSOAP-based Web Services
SOAP-based Web Services
 
Rails 3 overview
Rails 3 overviewRails 3 overview
Rails 3 overview
 
Makanan halal-haram-2970785
Makanan halal-haram-2970785Makanan halal-haram-2970785
Makanan halal-haram-2970785
 
Guia de-estudio-2
Guia de-estudio-2Guia de-estudio-2
Guia de-estudio-2
 
Create WSDL
Create WSDLCreate WSDL
Create WSDL
 
Java Web Programming [5/9] : EL, JSTL and Custom Tags
Java Web Programming [5/9] : EL, JSTL and Custom TagsJava Web Programming [5/9] : EL, JSTL and Custom Tags
Java Web Programming [5/9] : EL, JSTL and Custom Tags
 
SAPS - Semantic AtomPub-based Services
SAPS - Semantic AtomPub-based ServicesSAPS - Semantic AtomPub-based Services
SAPS - Semantic AtomPub-based Services
 
SHARE & the Semantic Web — This Time it's Personal
SHARE & the Semantic Web — This Time it's PersonalSHARE & the Semantic Web — This Time it's Personal
SHARE & the Semantic Web — This Time it's Personal
 
Idoc script beginner guide
Idoc script beginner guide Idoc script beginner guide
Idoc script beginner guide
 

More from Paul Downey

The Web Is Agreement Opentech2008
The Web Is Agreement   Opentech2008The Web Is Agreement   Opentech2008
The Web Is Agreement Opentech2008
Paul Downey
 
Open Source, Agile, Life-Style
Open Source, Agile, Life-StyleOpen Source, Agile, Life-Style
Open Source, Agile, Life-Style
Paul Downey
 
Extensibility And Versioning
Extensibility And VersioningExtensibility And Versioning
Extensibility And Versioning
Paul Downey
 

More from Paul Downey (14)

ODI Lunchtime Talk, Creating an open register – what it takes and why
ODI Lunchtime Talk, Creating an open register – what it takes and whyODI Lunchtime Talk, Creating an open register – what it takes and why
ODI Lunchtime Talk, Creating an open register – what it takes and why
 
Building systems with integrity
Building systems with integrityBuilding systems with integrity
Building systems with integrity
 
Registers
RegistersRegisters
Registers
 
ETSI Hell's Kitchen Debate, Nice 2009
ETSI Hell's Kitchen Debate, Nice 2009ETSI Hell's Kitchen Debate, Nice 2009
ETSI Hell's Kitchen Debate, Nice 2009
 
Denver
DenverDenver
Denver
 
XML Schema Patterns for Databinding
XML Schema Patterns for DatabindingXML Schema Patterns for Databinding
XML Schema Patterns for Databinding
 
The Best Web APIs are Web Sites
The Best Web APIs are Web SitesThe Best Web APIs are Web Sites
The Best Web APIs are Web Sites
 
Publishing Web Services Policies
Publishing Web Services PoliciesPublishing Web Services Policies
Publishing Web Services Policies
 
The Web Is Agreement Opentech2008
The Web Is Agreement   Opentech2008The Web Is Agreement   Opentech2008
The Web Is Agreement Opentech2008
 
Vrm Wedding
Vrm WeddingVrm Wedding
Vrm Wedding
 
Versioning XML and Open Source Tools
Versioning XML and Open Source ToolsVersioning XML and Open Source Tools
Versioning XML and Open Source Tools
 
Open Source, Agile, Life-Style
Open Source, Agile, Life-StyleOpen Source, Agile, Life-Style
Open Source, Agile, Life-Style
 
Extensibility And Versioning
Extensibility And VersioningExtensibility And Versioning
Extensibility And Versioning
 
Mashing up The Mobile
Mashing up The MobileMashing up The Mobile
Mashing up The Mobile
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

Who am I? Who are you? Who is anybody?