SlideShare a Scribd company logo
Smartphone Antivirus Protection:
Why you need it
Brian Gongol
InlandEcon.com
March 20, 2014
Why have antivirus protection
on your smartphone?
1. Photos
If someone hacks or
steals your phone,
they can take all of
your pictures and videos
2. Omnipresence
Other computers don't follow you
into the bathroom,
the doctor's office,
and to bed at night
3. Financial security
Phones are rapidly becoming
full-fledged digital wallets
4. E-mail security
E-mail is the
"key to the kingdom"
for an identity thief
5.Apps
You can't be sure that
every app is safe
Other good reasons to have
antivirus protection on your smartphone
Locate/Kill Switch
Locate your phone
if it gets lost.
Wipe it clear
if it's stolen.
Insurance
It's cheap insurance
Beyond antivirus
Viruses
Trojan horses
keystroke loggers
spyware
phishing sites

More Related Content

What's hot

Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
guestc03f28
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Jimmy Shah
 
16 tips to thwart mobile security threats
16 tips to thwart mobile security threats16 tips to thwart mobile security threats
16 tips to thwart mobile security threats
John Gibson
 
AMMU
AMMUAMMU
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
RandyBett
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
preetpatel72
 
Internet security
Internet securityInternet security
Internet security
Carmen Gorda
 
Him
HimHim
Safety And Security Of Data 2
Safety And Security Of Data 2Safety And Security Of Data 2
Safety And Security Of Data 2
Wynthorpe
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómez
SergioGmezOrtiz
 
identity theft
identity theftidentity theft
identity theft
HARICHANDRA MANDREKAR
 
Grooming. x2
Grooming. x2Grooming. x2
Grooming. x2
RodrigoSantis3
 
Aejay
AejayAejay
Aejay
aejay_neri
 
Comslide 3
Comslide 3Comslide 3
Comslide 3
Josh Mathew
 
Yassa edt finalproject
Yassa edt finalprojectYassa edt finalproject
Yassa edt finalproject
Yassa Washington
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet
Lingua Net
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
Jay Nagar
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
Saurav Jha
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
Patten John
 

What's hot (19)

Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
16 tips to thwart mobile security threats
16 tips to thwart mobile security threats16 tips to thwart mobile security threats
16 tips to thwart mobile security threats
 
AMMU
AMMUAMMU
AMMU
 
Your smartphone can help protect itself – and
Your smartphone can help protect itself – andYour smartphone can help protect itself – and
Your smartphone can help protect itself – and
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Internet security
Internet securityInternet security
Internet security
 
Him
HimHim
Him
 
Safety And Security Of Data 2
Safety And Security Of Data 2Safety And Security Of Data 2
Safety And Security Of Data 2
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómez
 
identity theft
identity theftidentity theft
identity theft
 
Grooming. x2
Grooming. x2Grooming. x2
Grooming. x2
 
Aejay
AejayAejay
Aejay
 
Comslide 3
Comslide 3Comslide 3
Comslide 3
 
Yassa edt finalproject
Yassa edt finalprojectYassa edt finalproject
Yassa edt finalproject
 
C Senior Presentation: The Internet
C Senior Presentation: The Internet C Senior Presentation: The Internet
C Senior Presentation: The Internet
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
20 Tips on Data Protection for Personal, Financial, Mobile And Network Security
 

Viewers also liked

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
ControlCase
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
Ajay Dhamija
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 

Viewers also liked (6)

Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Why you need antivirus protection on your smartphone

MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
KakshaPatel3
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
vrandmandora1
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
Lookout
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Heimdal Security
 
Mobile security
Mobile security Mobile security
Mobile security
Himmatsingh Rajpurohit
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
Commonwealth Telecommunications Organisation
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
McAlester Army Ammunition Plant
 
Is My Android Spying on Me?
Is My Android Spying on Me?Is My Android Spying on Me?
Is My Android Spying on Me?
Trading Atlas
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
Quick Heal Technologies Ltd.
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
Quick Heal Technologies Ltd.
 
Cell phone hacking
Cell phone hackingCell phone hacking
Cell phone hacking
darkwebhackers
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
iYogi
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
Emil Tan
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
Kevin Lee
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
MarketingArrowECS_CZ
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
VISTA InfoSec
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
AVG Technologies AU
 

Similar to Why you need antivirus protection on your smartphone (20)

MOBILE SECURITY.pptx
MOBILE SECURITY.pptxMOBILE SECURITY.pptx
MOBILE SECURITY.pptx
 
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptxmobile or cellphones attacked by viruses,phishing,swishing-1.pptx
mobile or cellphones attacked by viruses,phishing,swishing-1.pptx
 
Mobile Security 101
Mobile Security 101Mobile Security 101
Mobile Security 101
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
Mobile security
Mobile security Mobile security
Mobile security
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
CTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David TurahiCTO Cybersecurity Forum 2013 David Turahi
CTO Cybersecurity Forum 2013 David Turahi
 
Mobile security
Mobile securityMobile security
Mobile security
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
Is My Android Spying on Me?
Is My Android Spying on Me?Is My Android Spying on Me?
Is My Android Spying on Me?
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Cell phone hacking
Cell phone hackingCell phone hacking
Cell phone hacking
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Computing on the Move - Mobile Security
Computing on the Move - Mobile SecurityComputing on the Move - Mobile Security
Computing on the Move - Mobile Security
 

More from Brian Gongol

Lift Station Buyer's Guide for Municipal Utilities - v.13
Lift Station Buyer's Guide for Municipal Utilities - v.13Lift Station Buyer's Guide for Municipal Utilities - v.13
Lift Station Buyer's Guide for Municipal Utilities - v.13
Brian Gongol
 
Energy Policy is Water Policy - v08 (March 2024)
Energy Policy is Water Policy - v08 (March 2024)Energy Policy is Water Policy - v08 (March 2024)
Energy Policy is Water Policy - v08 (March 2024)
Brian Gongol
 
Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024
Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024
Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024
Brian Gongol
 
Preserving Institutional Memory in a Utility - v.25
Preserving Institutional Memory in a Utility - v.25Preserving Institutional Memory in a Utility - v.25
Preserving Institutional Memory in a Utility - v.25
Brian Gongol
 
Aeration from Afar - v.16
Aeration from Afar - v.16Aeration from Afar - v.16
Aeration from Afar - v.16
Brian Gongol
 
Energy policy is water policy - v.04
Energy policy is water policy - v.04Energy policy is water policy - v.04
Energy policy is water policy - v.04
Brian Gongol
 
Introduction to Pump Hydraulics - v.15
Introduction to Pump Hydraulics - v.15Introduction to Pump Hydraulics - v.15
Introduction to Pump Hydraulics - v.15
Brian Gongol
 
How to Communicate with Boards and Councils
How to Communicate with Boards and CouncilsHow to Communicate with Boards and Councils
How to Communicate with Boards and Councils
Brian Gongol
 
CLAWS of Pump Maintenance - v.11
CLAWS of Pump Maintenance - v.11CLAWS of Pump Maintenance - v.11
CLAWS of Pump Maintenance - v.11
Brian Gongol
 
CLAWS of Pump Maintenance - v.10
CLAWS of Pump Maintenance - v.10CLAWS of Pump Maintenance - v.10
CLAWS of Pump Maintenance - v.10
Brian Gongol
 
Getting Your CLAWS into Pump Maintenance
Getting Your CLAWS into Pump MaintenanceGetting Your CLAWS into Pump Maintenance
Getting Your CLAWS into Pump Maintenance
Brian Gongol
 
Aeration from afar - v.13
Aeration from afar - v.13Aeration from afar - v.13
Aeration from afar - v.13
Brian Gongol
 
Dealing with Mother Nature's Attitude Problem - v.19
Dealing with Mother Nature's Attitude Problem - v.19Dealing with Mother Nature's Attitude Problem - v.19
Dealing with Mother Nature's Attitude Problem - v.19
Brian Gongol
 
25 Ways to Screw Up a Lift Station Design - v.10
25 Ways to Screw Up a Lift Station Design - v.1025 Ways to Screw Up a Lift Station Design - v.10
25 Ways to Screw Up a Lift Station Design - v.10
Brian Gongol
 
Media relations for the water industry - v.20
Media relations for the water industry - v.20Media relations for the water industry - v.20
Media relations for the water industry - v.20
Brian Gongol
 
Breaking the conveyor-belt myth - v.09
Breaking the conveyor-belt myth - v.09Breaking the conveyor-belt myth - v.09
Breaking the conveyor-belt myth - v.09
Brian Gongol
 
Aeration from afar - v.03
Aeration from afar - v.03Aeration from afar - v.03
Aeration from afar - v.03
Brian Gongol
 
Schoolkids now, customers later - v.14
Schoolkids now, customers later - v.14Schoolkids now, customers later - v.14
Schoolkids now, customers later - v.14
Brian Gongol
 
The maintenance you don't have to touch - v.07
The maintenance you don't have to touch - v.07The maintenance you don't have to touch - v.07
The maintenance you don't have to touch - v.07
Brian Gongol
 
Ten steps to building a 21st Century water workforce - v.18
Ten steps to building a 21st Century water workforce - v.18Ten steps to building a 21st Century water workforce - v.18
Ten steps to building a 21st Century water workforce - v.18
Brian Gongol
 

More from Brian Gongol (20)

Lift Station Buyer's Guide for Municipal Utilities - v.13
Lift Station Buyer's Guide for Municipal Utilities - v.13Lift Station Buyer's Guide for Municipal Utilities - v.13
Lift Station Buyer's Guide for Municipal Utilities - v.13
 
Energy Policy is Water Policy - v08 (March 2024)
Energy Policy is Water Policy - v08 (March 2024)Energy Policy is Water Policy - v08 (March 2024)
Energy Policy is Water Policy - v08 (March 2024)
 
Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024
Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024
Controlling Your Surges - v.21 - Iowa AWWA Short Course 2024
 
Preserving Institutional Memory in a Utility - v.25
Preserving Institutional Memory in a Utility - v.25Preserving Institutional Memory in a Utility - v.25
Preserving Institutional Memory in a Utility - v.25
 
Aeration from Afar - v.16
Aeration from Afar - v.16Aeration from Afar - v.16
Aeration from Afar - v.16
 
Energy policy is water policy - v.04
Energy policy is water policy - v.04Energy policy is water policy - v.04
Energy policy is water policy - v.04
 
Introduction to Pump Hydraulics - v.15
Introduction to Pump Hydraulics - v.15Introduction to Pump Hydraulics - v.15
Introduction to Pump Hydraulics - v.15
 
How to Communicate with Boards and Councils
How to Communicate with Boards and CouncilsHow to Communicate with Boards and Councils
How to Communicate with Boards and Councils
 
CLAWS of Pump Maintenance - v.11
CLAWS of Pump Maintenance - v.11CLAWS of Pump Maintenance - v.11
CLAWS of Pump Maintenance - v.11
 
CLAWS of Pump Maintenance - v.10
CLAWS of Pump Maintenance - v.10CLAWS of Pump Maintenance - v.10
CLAWS of Pump Maintenance - v.10
 
Getting Your CLAWS into Pump Maintenance
Getting Your CLAWS into Pump MaintenanceGetting Your CLAWS into Pump Maintenance
Getting Your CLAWS into Pump Maintenance
 
Aeration from afar - v.13
Aeration from afar - v.13Aeration from afar - v.13
Aeration from afar - v.13
 
Dealing with Mother Nature's Attitude Problem - v.19
Dealing with Mother Nature's Attitude Problem - v.19Dealing with Mother Nature's Attitude Problem - v.19
Dealing with Mother Nature's Attitude Problem - v.19
 
25 Ways to Screw Up a Lift Station Design - v.10
25 Ways to Screw Up a Lift Station Design - v.1025 Ways to Screw Up a Lift Station Design - v.10
25 Ways to Screw Up a Lift Station Design - v.10
 
Media relations for the water industry - v.20
Media relations for the water industry - v.20Media relations for the water industry - v.20
Media relations for the water industry - v.20
 
Breaking the conveyor-belt myth - v.09
Breaking the conveyor-belt myth - v.09Breaking the conveyor-belt myth - v.09
Breaking the conveyor-belt myth - v.09
 
Aeration from afar - v.03
Aeration from afar - v.03Aeration from afar - v.03
Aeration from afar - v.03
 
Schoolkids now, customers later - v.14
Schoolkids now, customers later - v.14Schoolkids now, customers later - v.14
Schoolkids now, customers later - v.14
 
The maintenance you don't have to touch - v.07
The maintenance you don't have to touch - v.07The maintenance you don't have to touch - v.07
The maintenance you don't have to touch - v.07
 
Ten steps to building a 21st Century water workforce - v.18
Ten steps to building a 21st Century water workforce - v.18Ten steps to building a 21st Century water workforce - v.18
Ten steps to building a 21st Century water workforce - v.18
 

Recently uploaded

"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 

Recently uploaded (20)

"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 

Why you need antivirus protection on your smartphone