SlideShare a Scribd company logo
RoomWare/AnyWhere
    in Action
      Reboot11, 2009

 Alexander Zeh, Peter Kaptein
This presentation is the supportive “movie” durin the talk

Take 3 to 5 seconds for each slide, then move on to the next




   http://roomwareproject.org/
http://roomwareproject.org/
Thanks:
Thomas Madsen-Mygdal
       Claus Dahl
  Mathias Holzman
       TouchaTag
 http://roomwareproject.org/
http://roomwareproject.org/
RoomWare?




http://roomwareproject.org/
Open Source
 For Free

http://roomwareproject.org/
An umbrella
  concept

http://roomwareproject.org/
“A movement”


http://roomwareproject.org/
http://roomwareproject.org/
Start


2006, Amsterdam



http://roomwareproject.org/
RoomWare people:
Tijs     Robert James
Teulings    Gaal Burke
Tom
Burger   Me
2008: RW Pause

    Startups
    Projects
     Work
Basis #1




        Your data
        cloud

You
Venue



  Interaction
                Your data
                cloud

     You
Ambient
       Service



Venue
                Ambient
                 Service




  Interaction
                           Your data
                           cloud

     You
Basis #3



 PULL
NOT PUSH!
Hitting 2 recievers


You
Phone: Seeing 2 services
Hitting more recievers



            You
Phone: Seeing more services
And more services
Acessing a service


   Location Based
    Service Info
     Lorum ipsum
               Use >
Using it in real space
Basis:
1.Your favorite music
2.Your ambiance preferences
3.Connecting you to -
 –People you should meet
 –Places you could go
4.At home (media player/light ..)
Ambient
      Service
                                     Basic Setup
                            “Open ID”         Online
    DataCloud
                            connector        services



Server          Server

reciever        reciever




     item ID


      You                  item ID
                                         Feed back
      Web                               from venue
   connection
33
Layar
37
38
39
40
Reboot11
Sun, June 21:
        hi peter & alexander,
     sorry for this late response.
 would love to have the both of you
present your proposal at reboot - and
wire/augment up the venue if possible.
       can we make it happen?
Claus Dahl
Mathias Holzman
3 computers
10 RFID readers
 150 Tiki Tags
A lot of 2-day hacking
     + requests
       + mails
2 possible applications
1) Where the fuck is
    [anyone]?
2) Interactive Schedule
Event =
        People
+ Events / talks / whatvr
      + Locations
RoomWare =
Connecting people to
      spaces
demo
Basis
Interactions with objects and
           spaces
Buildings and places as
conscious and living entities
In practice
Connecting to a space
RFID cards
Touchatag
Bookmarking spots
Mobile phones
Mini PC’s
Enabling the room
Servers
ZigBee networks
RFID readers
Touch screens/tables
Lighting
Projectors
Flat screens
Interacting with the space
Giving you status
Offering interfaces
Feeding back
Adapting to your taste
Or to your mood
Or to your mood
Showing you
options to link people
our photos
RoomWare
 Concepts
Proximity
Proximity



  You   Proximity levels
        Close    Around the   Around the block
                   corner
Proximity



  You   Proximity levels
        Close    Around the   Around the block
                   corner
Proximity
                                                                   Location
                         Location
Service




    You       Proximity levels
              Close      Around the   Around the block
                           corner



                                                         Service

              Location




          Service
Feedback
                                                                 Location
                       Location
Service




    You       Proximity levels
              Close    Around the   Around the block
                         corner



                                                       Service

              Event




          Service
Usage
Finding people




   Me
Finding stuff
Making stuff happen
Privacy
Pirates go to parliement

Rick Falkvinge
Post Privacy Era
Privacy is dead
Police state
Fear?
New laws?
Rights!
Privacy
RoomWare/AnyWhere
    in Action
    Reboot11, 2009




   http://roomwareproject.org/
Conclusion
Location / time based Bookmarks
  Location based Applications
  Location based Interactions
Bookmarks - AnyWhere Server
 Applications - Any provider
  Interactions - RoomWare
Basis

   Recording the moment
     Enrich the present
     Connect to others
Connect to your environment
      Re-live the past
    Discover the future
Basic Any Where Reboot short

More Related Content

Similar to Basic Any Where Reboot short

RoomWare August Workshop Presentation
RoomWare August Workshop PresentationRoomWare August Workshop Presentation
RoomWare August Workshop Presentation
Peter Kaptein
 
Roomware: Adobe User Group komt hard
Roomware: Adobe User Group komt hardRoomware: Adobe User Group komt hard
Roomware: Adobe User Group komt hard
Peter Kaptein
 
Dns and irc
Dns and ircDns and irc
Dns and irc
ZekriaMuzafar
 
Remote Research at IxD10
Remote Research at IxD10Remote Research at IxD10
Remote Research at IxD10
bolt peters
 
Pervasive nation
Pervasive nationPervasive nation
Pervasive nation
lizard4444
 
DDoS mitigation in the real world
DDoS mitigation in the real worldDDoS mitigation in the real world
DDoS mitigation in the real world
Michael Renner
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
ecarrow
 
Bonjour protocol
Bonjour protocolBonjour protocol
Bonjour protocol
Salah Amean
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Phreebird Suite 1.0:  Introducing the Domain Key InfrastructurePhreebird Suite 1.0:  Introducing the Domain Key Infrastructure
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Dan Kaminsky
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
OpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform TechnologyOpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform Technology
Courtland Smith
 
Design Reviewing The Web
Design Reviewing The WebDesign Reviewing The Web
Design Reviewing The Web
amiable_indian
 
Dmk Bo2 K7 Web
Dmk Bo2 K7 WebDmk Bo2 K7 Web
Dmk Bo2 K7 Web
royans
 
JmDNS : Service Discovery for the 21st Century
 JmDNS : Service Discovery for the 21st Century JmDNS : Service Discovery for the 21st Century
JmDNS : Service Discovery for the 21st CenturyGnu Alsonative
 
JmDNS : Service Discovery for the 21st Century
 JmDNS : Service Discovery for the 21st Century JmDNS : Service Discovery for the 21st Century
JmDNS : Service Discovery for the 21st CenturyGnu Alsonative
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
Dan Kaminsky
 
Geneva Hackerspace
Geneva HackerspaceGeneva Hackerspace
Geneva Hackerspace
Paul Bristow
 
Celebrating 31 Years Of The Domain Name System (DNS) This Month!
Celebrating 31 Years Of The Domain Name System (DNS) This Month!Celebrating 31 Years Of The Domain Name System (DNS) This Month!
Celebrating 31 Years Of The Domain Name System (DNS) This Month!
Marie Moore
 

Similar to Basic Any Where Reboot short (20)

RoomWare August Workshop Presentation
RoomWare August Workshop PresentationRoomWare August Workshop Presentation
RoomWare August Workshop Presentation
 
Roomware: Adobe User Group komt hard
Roomware: Adobe User Group komt hardRoomware: Adobe User Group komt hard
Roomware: Adobe User Group komt hard
 
Dns and irc
Dns and ircDns and irc
Dns and irc
 
Remote Research at IxD10
Remote Research at IxD10Remote Research at IxD10
Remote Research at IxD10
 
Pervasive nation
Pervasive nationPervasive nation
Pervasive nation
 
DDoS mitigation in the real world
DDoS mitigation in the real worldDDoS mitigation in the real world
DDoS mitigation in the real world
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
 
Bonjour protocol
Bonjour protocolBonjour protocol
Bonjour protocol
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
Phreebird Suite 1.0:  Introducing the Domain Key InfrastructurePhreebird Suite 1.0:  Introducing the Domain Key Infrastructure
Phreebird Suite 1.0: Introducing the Domain Key Infrastructure
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
OpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform TechnologyOpenDNS Whitepaper: Platform Technology
OpenDNS Whitepaper: Platform Technology
 
Design Reviewing The Web
Design Reviewing The WebDesign Reviewing The Web
Design Reviewing The Web
 
Dmk Bo2 K7 Web
Dmk Bo2 K7 WebDmk Bo2 K7 Web
Dmk Bo2 K7 Web
 
JmDNS : Service Discovery for the 21st Century
 JmDNS : Service Discovery for the 21st Century JmDNS : Service Discovery for the 21st Century
JmDNS : Service Discovery for the 21st Century
 
JmDNS : Service Discovery for the 21st Century
 JmDNS : Service Discovery for the 21st Century JmDNS : Service Discovery for the 21st Century
JmDNS : Service Discovery for the 21st Century
 
Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017Wo defensive trickery_13mar2017
Wo defensive trickery_13mar2017
 
Geneva Hackerspace
Geneva HackerspaceGeneva Hackerspace
Geneva Hackerspace
 
Celebrating 31 Years Of The Domain Name System (DNS) This Month!
Celebrating 31 Years Of The Domain Name System (DNS) This Month!Celebrating 31 Years Of The Domain Name System (DNS) This Month!
Celebrating 31 Years Of The Domain Name System (DNS) This Month!
 

More from Peter Kaptein

Tnw tiny funding_clean2
Tnw tiny funding_clean2Tnw tiny funding_clean2
Tnw tiny funding_clean2
Peter Kaptein
 
Room ware next_slideshare
Room ware next_slideshareRoom ware next_slideshare
Room ware next_slidesharePeter Kaptein
 
Roomware Server
Roomware ServerRoomware Server
Roomware Server
Peter Kaptein
 
Post Privacy Era
Post Privacy EraPost Privacy Era
Post Privacy Era
Peter Kaptein
 
Roomware and the Web of things
Roomware and the Web of thingsRoomware and the Web of things
Roomware and the Web of thingsPeter Kaptein
 
Roomware Main Concepts
Roomware Main ConceptsRoomware Main Concepts
Roomware Main ConceptsPeter Kaptein
 
The phone as a Remote Control
The phone as a Remote ControlThe phone as a Remote Control
The phone as a Remote Control
Peter Kaptein
 
RoomWare server 2009
RoomWare server 2009RoomWare server 2009
RoomWare server 2009
Peter Kaptein
 
2009 RoomWare server basics
2009 RoomWare server basics2009 RoomWare server basics
2009 RoomWare server basics
Peter Kaptein
 

More from Peter Kaptein (9)

Tnw tiny funding_clean2
Tnw tiny funding_clean2Tnw tiny funding_clean2
Tnw tiny funding_clean2
 
Room ware next_slideshare
Room ware next_slideshareRoom ware next_slideshare
Room ware next_slideshare
 
Roomware Server
Roomware ServerRoomware Server
Roomware Server
 
Post Privacy Era
Post Privacy EraPost Privacy Era
Post Privacy Era
 
Roomware and the Web of things
Roomware and the Web of thingsRoomware and the Web of things
Roomware and the Web of things
 
Roomware Main Concepts
Roomware Main ConceptsRoomware Main Concepts
Roomware Main Concepts
 
The phone as a Remote Control
The phone as a Remote ControlThe phone as a Remote Control
The phone as a Remote Control
 
RoomWare server 2009
RoomWare server 2009RoomWare server 2009
RoomWare server 2009
 
2009 RoomWare server basics
2009 RoomWare server basics2009 RoomWare server basics
2009 RoomWare server basics
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Basic Any Where Reboot short