SlideShare a Scribd company logo
Android Security Essentials




                                    Pragati Ogal Rai
                       Mobile Technology Evangelist
                  X.commerce (an eBay Inc. Company)














Android OS Architecture




http://developer.android.com/guide/basics/what-is-android.html



include/linux/android_aid.h


















    android.permission.VIBRATE

    com.android.alarm.permission.SET_ALARM



    android.permission.SEND_SMS

    android.permission.CALL_PHONE



    android.permission.FORCE_STOP_PACKAGES

    android.permission.INJECT_EVENTS



    android.permission.ACCESS_USB

    android.permission.SET_TIME
<permission
  android:name="com.pragati.permission.ACCESS_DETAILS"
  android:label="@string/permlab_accessDetails"
  android:description="@string/permdesc_accessDetails"
  android:permissionGroup="android.permission-
  group.COST_MONEY"
  android:protectionLevel=“signature" />
















 transact()   Binder.onTransact()














    startActivity(Intent), startBroadcast(Intent)

    <receiver android:name=“BootCompletedReceiver”>

      <intent-filter>

          <action android:name=“android.intent.action.BOOT_COMPLETED”/>

      </intent-filter>

    </receiver>








    android.intent.category.BROWSEABLE









    PendingIntent.getActivity(Context, int, Intent, int)














    –
    –


    –
    –















    –

    –

    –


    –
























Thank you!



                                   pragati@x.com
                                     @pragatiogal
             http://www.slideshare.net/pragatiogal

More Related Content

Viewers also liked

Virtual network computing ppt
Virtual network computing pptVirtual network computing ppt
Virtual network computing ppt
TheGreatLeo
 
cyber_security
cyber_securitycyber_security
cyber_security
Jana Baxter
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
Gaurav Dalvi
 
Android Security
Android SecurityAndroid Security
Android Security
Lars Jacobs
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model ppt
extraganesh
 
1.lan man wan
1.lan man wan1.lan man wan
1.lan man wan
Akshay Nagpurkar
 
Android security
Android securityAndroid security
Android security
Midhun P Gopi
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 
What is Android OS in ppt ?
What is Android OS in ppt ? What is Android OS in ppt ?
What is Android OS in ppt ?
SoonTips.com
 
Cloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN KhalidCloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN Khalid
خالد اكدمون
 
Osi model
Osi modelOsi model
Osi model
Online
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
yasir1122
 
Computer Security
Computer SecurityComputer Security
Computer Security
Frederik Questier
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
DreamMalar
 
"GPS" Global Positioning System [PDF]
"GPS" Global Positioning System  [PDF]"GPS" Global Positioning System  [PDF]
"GPS" Global Positioning System [PDF]
Course Hero
 
My presentation on Android in my college
My presentation on Android in my collegeMy presentation on Android in my college
My presentation on Android in my college
Sneha Lata
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
Bhagyashri Dhoke
 
Android seminar ppt
Android seminar pptAndroid seminar ppt
Android seminar ppt
chakrapani tripathi
 

Viewers also liked (20)

Virtual network computing ppt
Virtual network computing pptVirtual network computing ppt
Virtual network computing ppt
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Android Security
Android SecurityAndroid Security
Android Security
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
OSI Network model ppt
OSI Network model pptOSI Network model ppt
OSI Network model ppt
 
1.lan man wan
1.lan man wan1.lan man wan
1.lan man wan
 
Android security
Android securityAndroid security
Android security
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
What is Android OS in ppt ?
What is Android OS in ppt ? What is Android OS in ppt ?
What is Android OS in ppt ?
 
Cloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN KhalidCloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN Khalid
 
Osi model
Osi modelOsi model
Osi model
 
Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
NetworkSecurity.ppt
NetworkSecurity.pptNetworkSecurity.ppt
NetworkSecurity.ppt
 
"GPS" Global Positioning System [PDF]
"GPS" Global Positioning System  [PDF]"GPS" Global Positioning System  [PDF]
"GPS" Global Positioning System [PDF]
 
My presentation on Android in my college
My presentation on Android in my collegeMy presentation on Android in my college
My presentation on Android in my college
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Android seminar ppt
Android seminar pptAndroid seminar ppt
Android seminar ppt
 

Similar to Android Security Essentials Presentation

Amphion Forum: Understanding Android Secuity
Amphion Forum: Understanding Android SecuityAmphion Forum: Understanding Android Secuity
Amphion Forum: Understanding Android Secuity
Pragati Rai
 
Android securitybyexample
Android securitybyexampleAndroid securitybyexample
Android securitybyexample
Pragati Rai
 
Android in practice
Android in practiceAndroid in practice
Android in practice
Jose Manuel Ortega Candel
 
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Skills Matter
 
Permissions
PermissionsPermissions
Permissions
A Selim Salman
 
Securing android applications
Securing android applicationsSecuring android applications
Securing android applications
Jose Manuel Ortega Candel
 
Android: Intent, Intent Filter, Broadcast Receivers
Android: Intent, Intent Filter, Broadcast ReceiversAndroid: Intent, Intent Filter, Broadcast Receivers
Android: Intent, Intent Filter, Broadcast Receivers
CodeAndroid
 
Android Froyo
Android FroyoAndroid Froyo
Android Froyo
Robert Cooper
 
Invading the home screen
Invading the home screenInvading the home screen
Invading the home screen
Matteo Bonifazi
 
android level 3
android level 3android level 3
android level 3
DevMix
 
Android app development basics
Android app development basicsAndroid app development basics
Android app development basics
Anton Narusberg
 
Slightly Advanced Android Wear ;)
Slightly Advanced Android Wear ;)Slightly Advanced Android Wear ;)
Slightly Advanced Android Wear ;)
Alfredo Morresi
 
Acessibilidade - o Novo Modo Deus no Android
Acessibilidade - o Novo Modo Deus no AndroidAcessibilidade - o Novo Modo Deus no Android
Acessibilidade - o Novo Modo Deus no Android
Gustavo Monteiro
 
Uninstall opera
Uninstall operaUninstall opera
Uninstall opera
Przemek Jakubczyk
 
Android dev
Android devAndroid dev
Android dev
yincan sheng
 
Gradle for Android Developers
Gradle for Android DevelopersGradle for Android Developers
Gradle for Android Developers
Josiah Renaudin
 
Android Sunumu
Android SunumuAndroid Sunumu
Android Sunumu
Burak Aydın
 
Native Android Development Practices
Native Android Development PracticesNative Android Development Practices
Native Android Development Practices
Roy Clarkson
 
Ruby conf2012
Ruby conf2012Ruby conf2012
Ruby conf2012
Chandan Jog
 
GKAC 2014 Nov. - 안드로이드 5.0의 새로운 기능
GKAC 2014 Nov. - 안드로이드 5.0의 새로운 기능GKAC 2014 Nov. - 안드로이드 5.0의 새로운 기능
GKAC 2014 Nov. - 안드로이드 5.0의 새로운 기능
GDG Korea
 

Similar to Android Security Essentials Presentation (20)

Amphion Forum: Understanding Android Secuity
Amphion Forum: Understanding Android SecuityAmphion Forum: Understanding Android Secuity
Amphion Forum: Understanding Android Secuity
 
Android securitybyexample
Android securitybyexampleAndroid securitybyexample
Android securitybyexample
 
Android in practice
Android in practiceAndroid in practice
Android in practice
 
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
Droidcon: Sean Owen: Driving Downloads via Intents- 29/10/2010
 
Permissions
PermissionsPermissions
Permissions
 
Securing android applications
Securing android applicationsSecuring android applications
Securing android applications
 
Android: Intent, Intent Filter, Broadcast Receivers
Android: Intent, Intent Filter, Broadcast ReceiversAndroid: Intent, Intent Filter, Broadcast Receivers
Android: Intent, Intent Filter, Broadcast Receivers
 
Android Froyo
Android FroyoAndroid Froyo
Android Froyo
 
Invading the home screen
Invading the home screenInvading the home screen
Invading the home screen
 
android level 3
android level 3android level 3
android level 3
 
Android app development basics
Android app development basicsAndroid app development basics
Android app development basics
 
Slightly Advanced Android Wear ;)
Slightly Advanced Android Wear ;)Slightly Advanced Android Wear ;)
Slightly Advanced Android Wear ;)
 
Acessibilidade - o Novo Modo Deus no Android
Acessibilidade - o Novo Modo Deus no AndroidAcessibilidade - o Novo Modo Deus no Android
Acessibilidade - o Novo Modo Deus no Android
 
Uninstall opera
Uninstall operaUninstall opera
Uninstall opera
 
Android dev
Android devAndroid dev
Android dev
 
Gradle for Android Developers
Gradle for Android DevelopersGradle for Android Developers
Gradle for Android Developers
 
Android Sunumu
Android SunumuAndroid Sunumu
Android Sunumu
 
Native Android Development Practices
Native Android Development PracticesNative Android Development Practices
Native Android Development Practices
 
Ruby conf2012
Ruby conf2012Ruby conf2012
Ruby conf2012
 
GKAC 2014 Nov. - 안드로이드 5.0의 새로운 기능
GKAC 2014 Nov. - 안드로이드 5.0의 새로운 기능GKAC 2014 Nov. - 안드로이드 5.0의 새로운 기능
GKAC 2014 Nov. - 안드로이드 5.0의 새로운 기능
 

More from Andrew Wong

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
Andrew Wong
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
Andrew Wong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
Andrew Wong
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
Andrew Wong
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
Andrew Wong
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
Andrew Wong
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
Andrew Wong
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
Andrew Wong
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
Andrew Wong
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
Andrew Wong
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
Andrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
Andrew Wong
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
Andrew Wong
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
Andrew Wong
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
Andrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
Andrew Wong
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
Andrew Wong
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
Andrew Wong
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
Andrew Wong
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
Andrew Wong
 

More from Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Enterprise it consumerization survey
Enterprise it consumerization surveyEnterprise it consumerization survey
Enterprise it consumerization survey
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 

Recently uploaded

AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 

Recently uploaded (20)

AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 

Android Security Essentials Presentation