SlideShare a Scribd company logo
3 Steps to Safe  Bring Your Own Devices (BYOD) September 28, 2011 Host and Moderator:  David Krebs, VDC Research Sponsors;
[object Object]
Panelist Introductions
BYOD market trends
Motorola Solutions
Cloudpath Networks
Bradford Networks
Question and Answers
Wrap up
Motorola XOOM and Apple iPad2 giveawayMust be present to win! Agenda
How many users are on your network?
How many different device types and OS do you expect to support?
How important is it to distinguish between corporate-owned and employee-owned devices?
What are your concerns about supporting BYOD?
[object Object]
Mobile workers demanding access to critical (corporate) information to enable real time distributed decision making and transaction processing.
Consumerization driving shift in balance of power from corporate IT to the employee/consumer.
Consequence is influx of personal devices and multiple OS platforms infiltrating enterprise environments.
Large amounts of sensitive corporate data is and will be accessed on these mobile devices.
With growing corporate support of personal devices critical to ensure key enterprise management and support policies that span the device lifecycle. BYOD : Key Takeaways
Enterprise Mobility Challenges and Opportunities Benefits &  Business Drivers Empower employees to be more productive  Improved customer service Fast, reliable wireless communications Improved decision making capabilities Mobilization of business processes and line of business applications Multiple platform support Security and device management concerns BYOD Application and platform fragmentation Lifecycle management Applications deployment and management Challenges PRIORITY RANKING
Over 50% of organizations provide some level of support for personal/individual devices Enterprises Introducing BYOD Policies Source: 2011 VDC Research survey of 864 mobile decision makers
Mobile & Wireless Solution Requirements Will Differ by Worker Type Mobile  Worker Preferred  Device Target  Applications Technical  Requirements Mobile Worker Population ,[object Object]
Dashboards
BI/CI
Mobile CRM
Approvals
Expense Reporting
Workflow Management
Mobile browser

More Related Content

What's hot

MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
William John Todd
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
Lai Yoong Seng
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
Ron Favali
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
Chris Pepin
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Nuno Alves
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
Lai Yoong Seng
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
BlackBerry
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
Md Yousup Faruqu
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
C/D/H Technology Consultants
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
Citrix
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
David J Rosenthal
 
WWT Intelligent WAN Presentation
WWT Intelligent WAN PresentationWWT Intelligent WAN Presentation
WWT Intelligent WAN Presentation
World Wide Technology
 
Byod
ByodByod
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 

What's hot (19)

MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
 
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst PresentationIBM Announce Intent to Acquire Fiberlink Analyst Presentation
IBM Announce Intent to Acquire Fiberlink Analyst Presentation
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Blackberry in Government
Blackberry in GovernmentBlackberry in Government
Blackberry in Government
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Comparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspacesComparing traditional workspaces to digital workspaces
Comparing traditional workspaces to digital workspaces
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
WWT Intelligent WAN Presentation
WWT Intelligent WAN PresentationWWT Intelligent WAN Presentation
WWT Intelligent WAN Presentation
 
Byod
ByodByod
Byod
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 

Viewers also liked

Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions
 
Herramientas para la creación de scorm
Herramientas para la creación de scormHerramientas para la creación de scorm
Herramientas para la creación de scorm
juanmariagallardo
 
Fixing up Your House to Sell - Session 2
Fixing up Your House to Sell - Session 2Fixing up Your House to Sell - Session 2
Fixing up Your House to Sell - Session 2
The Model Home Look
 
Motorola APX Accessory Audio Demo
Motorola APX Accessory Audio DemoMotorola APX Accessory Audio Demo
Motorola APX Accessory Audio Demo
Motorola Solutions
 
Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillMotorola Solutions
 
Acecourseinvestorsession1
Acecourseinvestorsession1Acecourseinvestorsession1
Acecourseinvestorsession1
The Model Home Look
 
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaCase Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaMotorola Solutions
 
RESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITYRESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITY
Motorola Solutions
 
Pelatihan 5 s
Pelatihan 5 sPelatihan 5 s
Pelatihan 5 s
Khartikha Chandra
 
Motorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer CitiesMotorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
Motorola Solutions
 

Viewers also liked (18)

Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
Motorola Solutions: Enterprise Mobile Computing Evolution 4.0
 
Herramientas para la creación de scorm
Herramientas para la creación de scormHerramientas para la creación de scorm
Herramientas para la creación de scorm
 
Power 3
Power 3Power 3
Power 3
 
Fixing up Your House to Sell - Session 2
Fixing up Your House to Sell - Session 2Fixing up Your House to Sell - Session 2
Fixing up Your House to Sell - Session 2
 
Manage the Complexity
Manage the ComplexityManage the Complexity
Manage the Complexity
 
Motorola APX Accessory Audio Demo
Motorola APX Accessory Audio DemoMotorola APX Accessory Audio Demo
Motorola APX Accessory Audio Demo
 
Proceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands StillProceed with Intelligence: The Street Never Stands Still
Proceed with Intelligence: The Street Never Stands Still
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Acecourseinvestorsession1
Acecourseinvestorsession1Acecourseinvestorsession1
Acecourseinvestorsession1
 
acecoursefixinguptosell
acecoursefixinguptosellacecoursefixinguptosell
acecoursefixinguptosell
 
Websitebeta4
Websitebeta4Websitebeta4
Websitebeta4
 
CostvsValuewashingtondc
CostvsValuewashingtondcCostvsValuewashingtondc
CostvsValuewashingtondc
 
Case Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova ScotiaCase Study: Motorola Brings Rural Broadband to Nova Scotia
Case Study: Motorola Brings Rural Broadband to Nova Scotia
 
RESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITYRESPONDING TO THE NEW COMMUNICATIONS REALITY
RESPONDING TO THE NEW COMMUNICATIONS REALITY
 
Pelatihan 5 s
Pelatihan 5 sPelatihan 5 s
Pelatihan 5 s
 
renovaterightbrochure
renovaterightbrochurerenovaterightbrochure
renovaterightbrochure
 
Motorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer CitiesMotorola Solutions: Using Your Data to Create Safer Cities
Motorola Solutions: Using Your Data to Create Safer Cities
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 

Similar to 3 Steps to Safely Bringing Your Own Devices (BYOD)

System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
John Rhoton
 
View Slides
View SlidesView Slides
View SlidesVideoguy
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
John Rhoton
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
jasonlan
 
Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29
evancmiller
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
Jorge Sebastiao
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
Jürgen Ambrosi
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Wheatstone
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
Pete Wassell
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003jasonlan
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
Tony Fish
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
TAKE Supply Chain
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
HaekalAufar1
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
ForgeRock
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
Logicalis Australia
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
ksholes
 
Mobile Opportunity Outsourcing In The Mobile Communication
Mobile Opportunity Outsourcing In The Mobile CommunicationMobile Opportunity Outsourcing In The Mobile Communication
Mobile Opportunity Outsourcing In The Mobile CommunicationDeepak Pareek
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT InfrastructureChris Pepin
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013
Steven Williams
 

Similar to 3 Steps to Safely Bringing Your Own Devices (BYOD) (20)

System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
View Slides
View SlidesView Slides
View Slides
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29Ti Mobility Gartner 2007 1 29
Ti Mobility Gartner 2007 1 29
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
Get The Facts Comparing Windows Mobile And Blackberry 2003
Get The Facts  Comparing Windows Mobile And Blackberry 2003Get The Facts  Comparing Windows Mobile And Blackberry 2003
Get The Facts Comparing Windows Mobile And Blackberry 2003
 
Amf Ventures Survey Results
Amf Ventures   Survey ResultsAmf Ventures   Survey Results
Amf Ventures Survey Results
 
Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
 
RISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLDRISE OF THE MACHINES: IRM IN AN IOT WORLD
RISE OF THE MACHINES: IRM IN AN IOT WORLD
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
Net Motion Mobility Overview - Field Service
Net Motion Mobility Overview  - Field ServiceNet Motion Mobility Overview  - Field Service
Net Motion Mobility Overview - Field Service
 
Mobile Opportunity Outsourcing In The Mobile Communication
Mobile Opportunity Outsourcing In The Mobile CommunicationMobile Opportunity Outsourcing In The Mobile Communication
Mobile Opportunity Outsourcing In The Mobile Communication
 
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 -  Institute a MobileFirst IT InfrastructureIBM InterConnect 2103 -  Institute a MobileFirst IT Infrastructure
IBM InterConnect 2103 - Institute a MobileFirst IT Infrastructure
 
Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013Sunisle Technology Solutions Sales programs version 2013
Sunisle Technology Solutions Sales programs version 2013
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 

3 Steps to Safely Bringing Your Own Devices (BYOD)