SlideShare a Scribd company logo
1 of 36
Download to read offline
2.0
Hacking a Bird in the Sky
Exploiting Satellite Trust Relationship
    Jim Geovedi                         Raditya Iryandi
  jim.geovedi@bellua.com               raditya.iryandi@bellua.com


                     Anthony Zboralski
                     anthony.zboralski@bellua.com
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                                           Disclaimer
This presentation is intended to demonstrate the inherent security, 
design and configuration flaws in publicly accessible satellite 
communication networks and promote the use of safer satellite 
communication systems. Viewers and readers are responsible for their 
own actions and strongly encourage to behave themselves. 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                       Slanguage Dictionary
   ‣ Bird: a variety term for satellite; quot;The proposed 
     channel would be carried by an Asian bird to be 
     launched next spring.quot;
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                                               Satellite
   ‣ A satellite is any object that orbits another object 
     (which known as its primary).
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship     Hack In The Box Security Conference 2008




                               Artificial Satellite
   ‣ It was the English sci‐fi writer 
     Arthur C. Clarke who 
     conceived the possibility of 
     artificial communication 
     satellites in 1945. Clarke 
     examined the logistics of 
     satellite launch, possible 
     orbits and other aspects.
                                                                     Arthur C. Clarke, science fiction author, meeting with 
                                                                        fans, at his home office in Colombo, Sri Lanka.
                                                                     source: http://en.wikipedia.org/wiki/Arthur_C._Clarke
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                              Hack In The Box Security Conference 2008




                                    Artificial Satellite
   ‣ The first artificial satellite 
     was Sputnik 1 launched 
     by Soviet Union on 
     4 October 1957.

       In 1957, the Soviet Union launched Sputnik, a basketball‐size capsule that became the Earth’s first man‐made satellite. Sputnik’s radio signals 
      were a “raspberry” from the Soviets, fumed one U.S. pundit. The next year, the United States created NASA, and the space race was under way.
                          source: http://magma.nationalgeographic.com/ngm/2007‐10/space‐travel/space‐travel‐photography.html
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008



                Satellite Internet Services
   ‣ One‐way multicast: used for IP multicast‐based data, 
     audio and video distribution. 
        ‣ Most Internet protocols will not work correctly over 
          one‐way access, since they require a return channel. 
   ‣ One‐way with terrestrial return: used with traditional 
     dial‐up access to the Internet, but downloads are sent via 
     satellite at a speed near that of broadband Internet  
     access.
   ‣ Two‐way satellite access: allows upload and download 
     data communications. 
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




         Very Small Aperture Terminal
   ‣ A one or two‐way terminal used in 
     a star, mesh or point to point network 
     with. Antenna size is restricted to 
     being less than or equal to 3.8 m at 
     Ku band and 7.8 m at C band.
   ‣ It consists of a large high performance 
     hub earth station (with an antenna of 
     up to 9 m in diameter) and a large 
     number of smaller, lower performance 
     terminals. These small terminals can 
     be receive only, transmit only or 
     transmit/receive.                                                            A 2.5m parabolic dish antenna for 
                                                                             bidirectional high‐speed satellite Internet.
                                                                             source: http://en.wikipedia.org/wiki/VSAT
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                   Hack In The Box Security Conference 2008




        Frequency Band Designations
                                                                                                            3 GHz
                                               300 MHz

                                                                              UHF
                              VHF
                                                                     1 GHz




                                                                   UHF                            L         S
                             VHF



           3 GHz                                                                              30 GHz

                                                SHF                                                     EHF
                             8 GHz              12 GHz               18 GHz                        40 GHz   75 GHz




                      C                                    Ku                   K                           V
                                        X                                                     Ka




                                        source: http://www.satcom‐services.com/sat_freq.htm
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                            Hack In The Box Security Conference 2008




               Data communication service using satellite access media with Time Division Multiplex (TDM) / Time Division Multiple 
                                           Access (TDMA) technology based on Internet‐protocol.
                         source: http://www.lintasarta.net/PRODUKLAYANAN/Satelit/VsatIP/tabid/85/Default.aspx
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship                          Hack In The Box Security Conference 2008




                        Data communication service using satellite access media with Single Channel per Carrier (SCPC) 
                                             connecting point‐to‐point and point‐to‐multipoint.
                         source: http://www.lintasarta.net/PRODUKLAYANAN/Satelit/VsatLink/tabid/86/Default.aspx
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




   Attacks against Satellite Systems
   ‣ Hypothetical Attacks
        ‣      Denial of services (uplink/downlink jamming, overpower uplink), orbital 
               positioning attacks (raging transponder spoofing, direct commanding, 
               command replay, insertion after confirmation but prior to execution)

   ‣ Practical Attacks
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




               Abusing Satellite Systems


                         quot;Satellite Piggyjackingquot;
               (Exploiting Satellite Trust Relationship on VSAT Network)
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                       Satellite Piggyjacking
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                       Satellite Piggyjacking
   ‣ Selecting target
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                       Satellite Piggyjacking
   ‣ Selecting target
   ‣ Pointing antenna
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                       Satellite Piggyjacking
   ‣ Selecting target
   ‣ Pointing antenna
   ‣ Find quot;freequot; frequency
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                       Satellite Piggyjacking
   ‣ Selecting target
   ‣ Pointing antenna
   ‣ Find quot;freequot; frequency
   ‣ Transmit and receive
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                       Satellite Piggyjacking
   ‣ Selecting target
   ‣ Pointing antenna
   ‣ Find quot;freequot; frequency
   ‣ Transmit and receive
   ‣ Detection evasion
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                                                   Demo
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion




                                               Allocated Frequency
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion




                                               Allocated Frequency


                                        Real User
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion




                                               Allocated Frequency


                                        Real User
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion




                                               Allocated Frequency


                                        Real User                    Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion




                                               Allocated Frequency


                                                                     Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion




                                               Allocated Frequency


                                                                     Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship        Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion




                                               Allocated Frequency


                                                                     Us
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




   Rogue Carrier Detection Evasion




                                               Allocated Frequency
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                                Detection Issues
   ‣ Require at least another satellite and satellite 
      operator to detect rogue carrier (similar to GPS 
      mechanism).
     ‣ Satellite operator alliance co‐operation.
        ‣ Specialised company detecting rogue carrier.
   ‣ Hard to detect if rogue carrier has ability to 
     switch frequency automatically prior detection.
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                                               The End
   ‣ Last year, we managed to present how to 
     compromise data link layer.
   ‣ Today, we present how to compromise network 
     layer.
Hacking a Bird in the Sky: Exploiting Satellite Trust Relationship   Hack In The Box Security Conference 2008




                                               The End
   ‣ Last year, we managed to present how to 
     compromise data link layer.
   ‣ Today, we present how to compromise network 
     layer.


                      Data Link + Network = ?

More Related Content

Similar to Hacking a Bird in the Sky

A Gigabit in Every Home—The Emergence of True Broadband
A Gigabit in Every Home—The Emergence of True BroadbandA Gigabit in Every Home—The Emergence of True Broadband
A Gigabit in Every Home—The Emergence of True BroadbandLarry Smarr
 
Wireless Network Technology
Wireless Network TechnologyWireless Network Technology
Wireless Network Technologykp12 buniel
 
The Coming Revolution in Environmental Awareness
The Coming Revolution in Environmental AwarenessThe Coming Revolution in Environmental Awareness
The Coming Revolution in Environmental AwarenessLarry Smarr
 
just_beacuse_you_are_paranoid
just_beacuse_you_are_paranoidjust_beacuse_you_are_paranoid
just_beacuse_you_are_paranoidfunkz
 
IRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater CommunicationIRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater CommunicationIRJET Journal
 
Shared networks to support VNF high availability across OpenStack multi-regio...
Shared networks to support VNF high availability across OpenStack multi-regio...Shared networks to support VNF high availability across OpenStack multi-regio...
Shared networks to support VNF high availability across OpenStack multi-regio...Joe Huang
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Matthew McCullough
 
High Performance Collaboration – The Jump to Light Speed
High Performance Collaboration – The Jump to Light SpeedHigh Performance Collaboration – The Jump to Light Speed
High Performance Collaboration – The Jump to Light SpeedLarry Smarr
 
Vsat 13195195319744-phpapp02-111025002146-phpapp02
Vsat 13195195319744-phpapp02-111025002146-phpapp02Vsat 13195195319744-phpapp02-111025002146-phpapp02
Vsat 13195195319744-phpapp02-111025002146-phpapp02Surojit Bera
 
Introduction to OpenStack.
Introduction to OpenStack.Introduction to OpenStack.
Introduction to OpenStack.Eggy Cheng
 
IRJET- Underwater Drone
IRJET- Underwater DroneIRJET- Underwater Drone
IRJET- Underwater DroneIRJET Journal
 
Bringing Mexico Into the Global LambdaGrid
Bringing Mexico Into the Global LambdaGridBringing Mexico Into the Global LambdaGrid
Bringing Mexico Into the Global LambdaGridLarry Smarr
 
LambdaGrids--Earth and Planetary Sciences Driving High Performance Networks a...
LambdaGrids--Earth and Planetary Sciences Driving High Performance Networks a...LambdaGrids--Earth and Planetary Sciences Driving High Performance Networks a...
LambdaGrids--Earth and Planetary Sciences Driving High Performance Networks a...Larry Smarr
 
Next-Generation Wireless Overview & Outlook Update 7/25/20
Next-Generation Wireless Overview & Outlook Update 7/25/20Next-Generation Wireless Overview & Outlook Update 7/25/20
Next-Generation Wireless Overview & Outlook Update 7/25/20Mark Goldstein
 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolIRJET Journal
 
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific ApplicationsOptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific ApplicationsLarry Smarr
 
iSkyTracker (Executive Summary)
iSkyTracker (Executive Summary)iSkyTracker (Executive Summary)
iSkyTracker (Executive Summary)Maxim Shuralev
 
Ocean Optics: Fundamentals & Naval Applications Technical Training Short Cour...
Ocean Optics: Fundamentals & Naval Applications Technical Training Short Cour...Ocean Optics: Fundamentals & Naval Applications Technical Training Short Cour...
Ocean Optics: Fundamentals & Naval Applications Technical Training Short Cour...Jim Jenkins
 

Similar to Hacking a Bird in the Sky (20)

A Gigabit in Every Home—The Emergence of True Broadband
A Gigabit in Every Home—The Emergence of True BroadbandA Gigabit in Every Home—The Emergence of True Broadband
A Gigabit in Every Home—The Emergence of True Broadband
 
Vsat
VsatVsat
Vsat
 
Wireless Network Technology
Wireless Network TechnologyWireless Network Technology
Wireless Network Technology
 
The Coming Revolution in Environmental Awareness
The Coming Revolution in Environmental AwarenessThe Coming Revolution in Environmental Awareness
The Coming Revolution in Environmental Awareness
 
just_beacuse_you_are_paranoid
just_beacuse_you_are_paranoidjust_beacuse_you_are_paranoid
just_beacuse_you_are_paranoid
 
IRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater CommunicationIRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater Communication
 
Shared networks to support VNF high availability across OpenStack multi-regio...
Shared networks to support VNF high availability across OpenStack multi-regio...Shared networks to support VNF high availability across OpenStack multi-regio...
Shared networks to support VNF high availability across OpenStack multi-regio...
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
 
High Performance Collaboration – The Jump to Light Speed
High Performance Collaboration – The Jump to Light SpeedHigh Performance Collaboration – The Jump to Light Speed
High Performance Collaboration – The Jump to Light Speed
 
Vsat 13195195319744-phpapp02-111025002146-phpapp02
Vsat 13195195319744-phpapp02-111025002146-phpapp02Vsat 13195195319744-phpapp02-111025002146-phpapp02
Vsat 13195195319744-phpapp02-111025002146-phpapp02
 
Introduction to OpenStack.
Introduction to OpenStack.Introduction to OpenStack.
Introduction to OpenStack.
 
STARLINK.pptx
STARLINK.pptxSTARLINK.pptx
STARLINK.pptx
 
IRJET- Underwater Drone
IRJET- Underwater DroneIRJET- Underwater Drone
IRJET- Underwater Drone
 
Bringing Mexico Into the Global LambdaGrid
Bringing Mexico Into the Global LambdaGridBringing Mexico Into the Global LambdaGrid
Bringing Mexico Into the Global LambdaGrid
 
LambdaGrids--Earth and Planetary Sciences Driving High Performance Networks a...
LambdaGrids--Earth and Planetary Sciences Driving High Performance Networks a...LambdaGrids--Earth and Planetary Sciences Driving High Performance Networks a...
LambdaGrids--Earth and Planetary Sciences Driving High Performance Networks a...
 
Next-Generation Wireless Overview & Outlook Update 7/25/20
Next-Generation Wireless Overview & Outlook Update 7/25/20Next-Generation Wireless Overview & Outlook Update 7/25/20
Next-Generation Wireless Overview & Outlook Update 7/25/20
 
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution ProtocolComprehensive Study of BB84, A Quantum Key Distribution Protocol
Comprehensive Study of BB84, A Quantum Key Distribution Protocol
 
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific ApplicationsOptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
OptIPuter-A High Performance SOA LambdaGrid Enabling Scientific Applications
 
iSkyTracker (Executive Summary)
iSkyTracker (Executive Summary)iSkyTracker (Executive Summary)
iSkyTracker (Executive Summary)
 
Ocean Optics: Fundamentals & Naval Applications Technical Training Short Cour...
Ocean Optics: Fundamentals & Naval Applications Technical Training Short Cour...Ocean Optics: Fundamentals & Naval Applications Technical Training Short Cour...
Ocean Optics: Fundamentals & Naval Applications Technical Training Short Cour...
 

More from shizhao

重庆市信息安全技术中心
重庆市信息安全技术中心重庆市信息安全技术中心
重庆市信息安全技术中心shizhao
 
Hierarchical Network of Concepts
Hierarchical Network of ConceptsHierarchical Network of Concepts
Hierarchical Network of Conceptsshizhao
 
chinese wikipedia
chinese wikipediachinese wikipedia
chinese wikipediashizhao
 
Creative Commons and free copyright
Creative Commons and free copyrightCreative Commons and free copyright
Creative Commons and free copyrightshizhao
 
chinese wikimedia
chinese wikimediachinese wikimedia
chinese wikimediashizhao
 
wiki use
wiki usewiki use
wiki useshizhao
 

More from shizhao (6)

重庆市信息安全技术中心
重庆市信息安全技术中心重庆市信息安全技术中心
重庆市信息安全技术中心
 
Hierarchical Network of Concepts
Hierarchical Network of ConceptsHierarchical Network of Concepts
Hierarchical Network of Concepts
 
chinese wikipedia
chinese wikipediachinese wikipedia
chinese wikipedia
 
Creative Commons and free copyright
Creative Commons and free copyrightCreative Commons and free copyright
Creative Commons and free copyright
 
chinese wikimedia
chinese wikimediachinese wikimedia
chinese wikimedia
 
wiki use
wiki usewiki use
wiki use
 

Recently uploaded

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Hacking a Bird in the Sky