Straight Talk on Machine Learning -- What the Marketing Department Doesn’t Want You to Know

Sven Krasser
Sven KrasserChief Scientist at CrowdStrike
STRAIGHT TALK ON MACHINE LEARNING
WHAT THE MARKETING DEPARTMENT DOESN’T WANT YOU
TO KNOW
DR. SVEN KRASSER CHIEF SCIENTIST
@SVENKRASSER
2017	CROWDSTRIKE,	INC.	ALL	RIGHTS	RESERVED.	
MACHINE LEARNING AT CROWDSTRIKE
§ ~50 billion events per day
§ ~800 thousand events per second peak
§ ~700 trillion bytes of sample data
§ Local decisions on endpoint and large scale analysis in cloud
§ Static and dynamic analysis techniques, various rich data sources
§ Analysts generating new ground truth 24/7
BRIEF ML
PRIMER
Height [mm]
Weight[10-1kg]
• What’s this?
http://tinyurl.com/MLprimer
• Two features
• Two classes
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
BETTER
FEATURES
“Buttock Circumference” [mm]
Weight[10-1kg]
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
MODEL
FIT
“Buttock Circumference” [mm]
Weight[10-1kg]
• Support Vector
Machine
• Real world:
more features
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
“Buttock Circumference” [mm]
Weight[10-1kg]
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
LET’S
CLASSIFY
“Buttock Circumference” [mm]
Weight[10-1kg]
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
LET’S
CLASSIFY
“Buttock Circumference” [mm]
Weight[10-1kg]
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
LET’S
CLASSIFY
“Buttock Circumference” [mm]
Weight[10-1kg]
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
LET’S
CLASSIFY
“Buttock Circumference” [mm]
Weight[10-1kg]
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
LET’S
CLASSIFY
• Get more “blue”
right (true positives)
• Get more “red”
wrong (false
positives)
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
RECEIVER
OPERATING
CHARACTERISTICS
CURVE
False Positive Rate
TruePositiveRate
Detect	more	by	accepting	more	false	positives
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
MORE
DIMENSIONS
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
• Some 160
dimensions
• Projected back to 2-
dimensional screen
• Perfect separation
CURSE OF DIMENSIONALITY
REDUCED
predictive performance
INCREASED
training time
SLOWER
classification
LARGER
memory footprint
Source: https://commons.wikimedia.org/w/index.php?curid=2257082
Source: https://commons.wikimedia.org/w/index.php?curid=2257082
Straight Talk on Machine Learning -- What the Marketing Department Doesn’t Want You to Know
Height (mm)
Weight[10-1kg]
DIMENSIONALITY
AND SPARSENESS
2016	CrowdStrike,	Inc.	All	rights	reserved.
Height (mm)
Weight[10-1kg]
DIMENSIONALITY
AND SPARSENESS
2017	CROWDSTRIKE,	INC.	ALL	RIGHTS	RESERVED.	
ML IN INFOSEC APPLICATIONS
§ Not a single model solving everything
§ But many models working on the data in scope
§ Endpoint vs cloud
§ Fast response vs long observation
§ Lean vs resource intensive
§ Effectiveness vs interpretability
§ Avoid ML blinders
§ The guy in your store at 2am wielding a crowbar is not a customer
FILE
ANALYSIS
AKA Static Analysis
• THE GOOD
– Relatively fast to detect malware
– Scalable
– No need to detonate (“pre-execution”)
– Platform independent, can be done at endpoint or cloud
• THE BAD
– Limited insight due to narrow view
– Different file types require different techniques
– Different subtypes need special consideration
– Packed files
– .Net
– Installers
– EXEs vs DLLs
– Obfuscations (yet good if detectable)
– Ineffective against exploitation and malware-less attacks
– Asymmetry: a fraction of a second to decide for the
defender, months to craft for the attacker
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
VIRUSTOTAL INTEGRATION
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
ENGINEERED FEATURES
FOR EXECUTABLE FILES
32/64BIT
EXECUTABLE
SUBSYSTEM
TYPE
MACHINE
INSTRUCTION
DISTRIBUTION
FILESIZE TIMESTAMP
DEBUG
INFORMATION
PRESENT
PACKERTYPE FILEENTROPY
NUMBEROF
SECTIONS
NUMBER
WRITABLE
SECTIONS
NUMBER
READABLE
SECTIONS
NUMBER
EXECUTABLE
SECTIONS
DISTRIBUTION
OFSECTION
ENTROPY
IMPORTED
DLLNAMES
IMPORTED
FUNCTION
NAMES
COMPILER
ARTIFACTS
LINKER
ARTIFACTS
RESOURCE
DATA
PROTOCOL
STRINGS
IPS/DOMAINS
PATHS
PRODUCT
METADATA
DIGITAL
SIGNATURE
ICON
CONTENT
…
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
ENGINEERED FEATURES
FOR EXECUTABLE FILES
32/64BIT
EXECUTABLE
SUBSYSTEM
TYPE
MACHINE
INSTRUCTION
DISTRIBUTION
FILESIZE TIMESTAMP
DEBUG
INFORMATION
PRESENT
PACKERTYPE FILEENTROPY
NUMBEROF
SECTIONS
NUMBER
WRITABLE
SECTIONS
NUMBER
READABLE
SECTIONS
NUMBER
EXECUTABLE
SECTIONS
DISTRIBUTION
OFSECTION
ENTROPY
IMPORTED
DLLNAMES
IMPORTED
FUNCTION
NAMES
COMPILER
ARTIFACTS
LINKER
ARTIFACTS
RESOURCE
DATA
PROTOCOL
STRINGS
IPS/DOMAINS
PATHS
PRODUCT
METADATA
DIGITAL
SIGNATURE
ICON
CONTENT
…
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
• Continuous features
• Categorical features
• n-hot encoding
• Embedding
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
LEARNED
FEATURES
• Unstructured file
content
• Algorithm uncovers
interesting
properties
• Requires a lot more
more input data
• Unlocks more
insight
String-based feature
Executablesectionsize-based
feature
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
COMBINING
FEATURES
Subspace Projection A
SubspaceProjectionB
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
COMBINING
FEATURES
CLASSIFICATION
PERFORMANCE
99%DETECTIONRATE
1%FALSEPOSITIVES
Malware?
Malware
99%DETECTIONRATE
1%FALSEPOSITIVES
99%DETECTIONRATE
1%FALSEPOSITIVES
Not	Malware
99% TRUE POSITIVE RATE
31
Chanceofatleastone
successforadversary
Number of attempts
1%
>99.3%
500
2017	CROWDSTRIKE,	INC.	ALL	RIGHTS	RESERVED.	
Training set distribution generally differs from…
DIFFERENCE IN DISTRIBUTIONS
§ Real-world distribution (customer networks)
§ Evaluations (what customers test)
§ Testing houses (various 3rd party testers with varying methodologies)
§ Community resources (e.g. user submissions to CrowdStrike scanner on
VirusTotal)
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
FIELD
DISTRIBUTIONClean Malware	
Type	A
Malware	
Type	B
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
FIELD
DISTRIBUTION
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
TEST
DISTRIBUTION
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
COMBINED DATA
• More accurate
• Fares better on test
data
• But: not as good on
field data
MALWARE
40%
THREAT
SOPHISTICATION
MALWARE
STOPPING
MALWARE
IS NOT
ENOUGH
HARDERTOPREVENT
&DETECT
LOW
HIGH
HIGH
LOW
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
THREAT
SOPHISTICATION
MALWARE
NON-MALWARE
ATTACKS
MALWARE
40%
NATION-
STATES
60%
NON-MALWARE
ATTACKS
ORGANIZED
CRIMINAL GANGS
HACKTIVISTS/
VIGILANTES
TERRORISTS CYBER-
CRIMINALS
YOU NEED COMPLETE
BREACH
PREVENTION
HARDERTOPREVENT
&DETECT
LOW
HIGH
HIGH
LOW
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Next-Generation Endpoint Protection
Cloud Delivered. Enriched by Threat Intelligence
MANAGED
HUNTING
ENDPOINT DETECTION
AND RESPONSE
NEXT-GEN
ANTIVIRUS
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
KEY
POINTS
• Machine Learning is an effective tool against
unknown threats
• Trading off true positives and false positives
• Features matter, but don’t count them
• One of many uses is static analysis
• Detecting 99% malware means an APT has a
100% chance of getting malware into your
environment
• For ML, distributions matter
• The majority of intrusions are not malware-
based
• Avoid silent failure
• Use a comprehensive array of techniques
2016 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Straight Talk on Machine Learning -- What the Marketing Department Doesn’t Want You to Know
1 of 41

Recommended

Of Search Lights and Blind Spots: Machine Learning in Cybersecurity by
Of Search Lights and Blind Spots: Machine Learning in CybersecurityOf Search Lights and Blind Spots: Machine Learning in Cybersecurity
Of Search Lights and Blind Spots: Machine Learning in CybersecuritySven Krasser
561 views30 slides
A Sober Look at Machine Learning by
A Sober Look at Machine LearningA Sober Look at Machine Learning
A Sober Look at Machine LearningSven Krasser
1.1K views54 slides
Fundamentals of Machine Learning: Perspectives from a Data Scientist (ISC Wes... by
Fundamentals of Machine Learning: Perspectives from a Data Scientist (ISC Wes...Fundamentals of Machine Learning: Perspectives from a Data Scientist (ISC Wes...
Fundamentals of Machine Learning: Perspectives from a Data Scientist (ISC Wes...Sven Krasser
1K views51 slides
Practical Machine Learning in Information Security by
Practical Machine Learning in Information SecurityPractical Machine Learning in Information Security
Practical Machine Learning in Information SecuritySven Krasser
3.6K views31 slides
IJCNN 2017 by
IJCNN 2017IJCNN 2017
IJCNN 2017Sven Krasser
1.7K views9 slides
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices by
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based DevicesIoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devices
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based Devicessaeid ghasemshirazi
59 views11 slides

More Related Content

What's hot

Threat Hunting for Command and Control Activity by
Threat Hunting for Command and Control ActivityThreat Hunting for Command and Control Activity
Threat Hunting for Command and Control ActivitySqrrl
669 views31 slides
Episode IV: A New Scope by
Episode IV: A New ScopeEpisode IV: A New Scope
Episode IV: A New ScopeThreatConnect
290 views20 slides
The Art and Science of Alert Triage by
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert TriageSqrrl
1.2K views21 slides
Elastic Stack Roadmap by
Elastic Stack RoadmapElastic Stack Roadmap
Elastic Stack RoadmapImma Valls Bernaus
96 views72 slides
O'Reilly Security New York - Predicting Exploitability Final by
O'Reilly Security New York - Predicting Exploitability FinalO'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability FinalMichael Roytman
1.4K views36 slides
Troubleshooting your elasticsearch cluster like a support engineer by
Troubleshooting your elasticsearch cluster like a support engineerTroubleshooting your elasticsearch cluster like a support engineer
Troubleshooting your elasticsearch cluster like a support engineerImma Valls Bernaus
68 views41 slides

What's hot(16)

Threat Hunting for Command and Control Activity by Sqrrl
Threat Hunting for Command and Control ActivityThreat Hunting for Command and Control Activity
Threat Hunting for Command and Control Activity
Sqrrl669 views
The Art and Science of Alert Triage by Sqrrl
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
Sqrrl1.2K views
O'Reilly Security New York - Predicting Exploitability Final by Michael Roytman
O'Reilly Security New York - Predicting Exploitability FinalO'Reilly Security New York - Predicting Exploitability Final
O'Reilly Security New York - Predicting Exploitability Final
Michael Roytman1.4K views
Troubleshooting your elasticsearch cluster like a support engineer by Imma Valls Bernaus
Troubleshooting your elasticsearch cluster like a support engineerTroubleshooting your elasticsearch cluster like a support engineer
Troubleshooting your elasticsearch cluster like a support engineer
Abstract Tools for Effective Threat Hunting by chrissanders88
Abstract Tools for Effective Threat HuntingAbstract Tools for Effective Threat Hunting
Abstract Tools for Effective Threat Hunting
chrissanders881.7K views
Art into Science 2017 - Investigation Theory: A Cognitive Approach by chrissanders88
Art into Science 2017 - Investigation Theory: A Cognitive ApproachArt into Science 2017 - Investigation Theory: A Cognitive Approach
Art into Science 2017 - Investigation Theory: A Cognitive Approach
chrissanders881.1K views
Modernizing Your SOC: A CISO-led Training by Sqrrl
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
Sqrrl347 views
Threat Hunting Platforms (Collaboration with SANS Institute) by Sqrrl
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
Sqrrl1.4K views
Au cœur de la roadmap de la Suite Elastic by Elasticsearch
Au cœur de la roadmap de la Suite ElasticAu cœur de la roadmap de la Suite Elastic
Au cœur de la roadmap de la Suite Elastic
Elasticsearch611 views
The Security Industry is Suffering from Fragmentation, What Can Your Organiza... by ThreatConnect
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
ThreatConnect301 views
Machine Learning for Incident Detection: Getting Started by Sqrrl
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting Started
Sqrrl972 views
Threat Hunting 102: Beyond the Basics by Cybereason
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the Basics
Cybereason833 views
Managing Indicator Deprecation in ThreatConnect by ThreatConnect
Managing Indicator Deprecation in ThreatConnectManaging Indicator Deprecation in ThreatConnect
Managing Indicator Deprecation in ThreatConnect
ThreatConnect414 views

Similar to Straight Talk on Machine Learning -- What the Marketing Department Doesn’t Want You to Know

How to Replace Your Legacy Antivirus Solution with CrowdStrike by
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeCrowdStrike
2.8K views28 slides
How to Replace Your Legacy Antivirus Solution with CrowdStrike by
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeAdam Barrera
547 views27 slides
Security TechTalk | AWS Public Sector Summit 2016 by
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016Amazon Web Services
528 views42 slides
Cloud-Enabled: The Future of Endpoint Security by
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint SecurityCrowdStrike
2.7K views36 slides
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ... by
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike
1.1K views38 slides
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud by
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudMark Hinkle
1K views26 slides

Similar to Straight Talk on Machine Learning -- What the Marketing Department Doesn’t Want You to Know(20)

How to Replace Your Legacy Antivirus Solution with CrowdStrike by CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
CrowdStrike2.8K views
How to Replace Your Legacy Antivirus Solution with CrowdStrike by Adam Barrera
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
Adam Barrera547 views
Security TechTalk | AWS Public Sector Summit 2016 by Amazon Web Services
Security TechTalk | AWS Public Sector Summit 2016Security TechTalk | AWS Public Sector Summit 2016
Security TechTalk | AWS Public Sector Summit 2016
Cloud-Enabled: The Future of Endpoint Security by CrowdStrike
Cloud-Enabled: The Future of Endpoint SecurityCloud-Enabled: The Future of Endpoint Security
Cloud-Enabled: The Future of Endpoint Security
CrowdStrike2.7K views
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ... by CrowdStrike
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike1.1K views
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud by Mark Hinkle
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
Mark Hinkle1K views
Battery Ventures: Simulating and Visualizing Large Scale Cassandra Deployments by DataStax Academy
Battery Ventures: Simulating and Visualizing Large Scale Cassandra DeploymentsBattery Ventures: Simulating and Visualizing Large Scale Cassandra Deployments
Battery Ventures: Simulating and Visualizing Large Scale Cassandra Deployments
DataStax Academy1K views
Internet of Things: Government Keynote, Randy Garrett by GovLoop
Internet of Things: Government Keynote, Randy GarrettInternet of Things: Government Keynote, Randy Garrett
Internet of Things: Government Keynote, Randy Garrett
GovLoop1.8K views
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM by CrowdStrike
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORMDEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
CrowdStrike1.2K views
Discovering Flaws in Security-Focused Static Analysis Tools for Android using... by Kevin Moran
Discovering Flaws in Security-Focused Static Analysis Tools for Android using...Discovering Flaws in Security-Focused Static Analysis Tools for Android using...
Discovering Flaws in Security-Focused Static Analysis Tools for Android using...
Kevin Moran276 views
Microservices Architecture For Conversational Intelligence Platform by Rafael Casuso Romate
Microservices Architecture For Conversational Intelligence PlatformMicroservices Architecture For Conversational Intelligence Platform
Microservices Architecture For Conversational Intelligence Platform
Avoiding Disasters by Embracing Chaos by OK2OK
Avoiding Disasters by Embracing ChaosAvoiding Disasters by Embracing Chaos
Avoiding Disasters by Embracing Chaos
OK2OK150 views
Chaos Engineering: Why the World Needs More Resilient Systems by C4Media
Chaos Engineering: Why the World Needs More Resilient SystemsChaos Engineering: Why the World Needs More Resilient Systems
Chaos Engineering: Why the World Needs More Resilient Systems
C4Media546 views
New Era of Software with modern Application Security v1.0 by Dinis Cruz
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
Dinis Cruz3.4K views
Analytical Driven Security - Chip Copper by scoopnewsgroup
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
scoopnewsgroup580 views
System Security on Cloud by Tu Pham
System Security on CloudSystem Security on Cloud
System Security on Cloud
Tu Pham936 views
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls by Amazon Web Services
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
Amazon Web Services1.9K views
JavaOne 2016 "Java, Microservices, Cloud and Containers" by Daniel Bryant
JavaOne 2016 "Java, Microservices, Cloud and Containers"JavaOne 2016 "Java, Microservices, Cloud and Containers"
JavaOne 2016 "Java, Microservices, Cloud and Containers"
Daniel Bryant1.1K views
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an... by Keith Kraus
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus1.1K views

Recently uploaded

Kyo - Functional Scala 2023.pdf by
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
368 views92 slides
AMAZON PRODUCT RESEARCH.pdf by
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdfJerikkLaureta
26 views13 slides
Mini-Track: Challenges to Network Automation Adoption by
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation AdoptionNetwork Automation Forum
12 views27 slides
The Research Portal of Catalonia: Growing more (information) & more (services) by
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
80 views25 slides
Case Study Copenhagen Energy and Business Central.pdf by
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdfAitana
16 views3 slides

Recently uploaded(20)

AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta26 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma39 views
Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst478 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely21 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views

Straight Talk on Machine Learning -- What the Marketing Department Doesn’t Want You to Know