SlideShare a Scribd company logo
beyond the technology
privacy, trust and security in the cloud
disclaimers
about me
age of the cloud
FORBES
BLOOMBERG
BAIN AND COMPANY
the other side of the coin
beyond the technology
ZDNET
FORTUNE
beyond the technology
WIRED
MASHABLE
concerns
concerns - data security
BAIN AND COMPANY
concerns - corporations
ARSTECHNICA
iCLOUD
BBC
REUTERS
concerns - government
WIKIPEDIA
concerns - trust
INTEL SECURITY
INTEL SECURITY
WHICH TYPE OF CLOUD ARCHITECTURE IS YOUR ORGANIZATION CURRENTLY
USING?
TO WHAT EXTENT DO YOU TRUST THE FOLLOWING TO KEEP YOUR ORGANISATIONS’ SENSITIVE DATA
SECURE?
concerns DENTONS
1. Jurisdictional complexity that mires
accountability and remedy;
2. Loss of data sovereignty for public
bodies through foreign cloud providers
- including data mining and access by
foreign law enforcement authorities;
3. Compromise of meaningful consent
through lack of transparency;
4. Challenge to safeguards from transfer
of information across the Internet
data security
LLOYDS
WIRED
data security
REUTERS
ZDNET ARSTECHNICA
ZDNET
data security
FORBES
ZDNET
SECURITYLEDGER.COM
corporations
corporations v. the people
ARSTECHNICA | WIRED | ZDNET
PBS FRONTLINE
ARSTECHNICA | ARSTECHNICA | ENGADGET
GOOGLE
WIRED | ARSTECHNICA
WIRED | ENGADGET | ARSTECHNICA
corporations v. state
WIRED
REUTERS
corporations & the people
MIT TECHNOLOGY REVIEW
governments
ZDNET
WIRED
justification
MICHAELGEIST.CA
state v. corporations
NEW YORK TIMES | REUTERS ARSTECHNICA | ZDNET | TECHCRUNCH
TORONTO STAR
ENGADGET | WIRED | ARSTECHNICA
state v. the people
SANTA CLARA LAW REVIEW | COMPUTER WEEKLY
ENGADGET
state v. logic
state & the people
ARSTECHNICA
OFFICE OF THE PRIVACY COMMISSIONER OF CANADA
EUROPEAN COMMISSION
solutions
policy
THE ECONOMIST
ARSTECHNICA
THE GLOBE AND MAIL
Electronic Frontier Foundation
ZDNET
ISO.ORG
transparency
ARSTECHNICA
ZDNET
collaboration
ARSTECHNICA
activism
WIRED
ZDNET
ZDNET
technology
ZDNET
WIRED
technology v. politicians
WIRED
WIRED
tin foil hat CVDAZZLE
does it matter?
FORBES
FORBES
we are the problem
ZDNET
we are the problem
WIRED
PEW RESEARCH CENTRE
why privacy matters
WIRED
ZDNET
ARSTECHNICA
why it matters to corporations
Why it matters to individuals
VANISH FILMS | ENGADGET
ARSTECHNICA
THE CHRONICLE REVIEW
Why it matters to us all
REUTERS
CNN
ZDNET
ARSTECHNICA
Why it matters to us all
We have to do what we’re told. Some
fights you just can’t win. The powerful
control the lives of the powerless.
That’s the way the world works. It’s
unjust and it’s unfair but that’s just too
bad. We have to shut up and accept it.
Viggo Mortensen in Captain Fantastic
well, f#@k that.
• Data dump of sources researched
• Contains very rough notes
• https://goo.gl/qYJ6dU
references

More Related Content

What's hot

Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Arm Igf
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
Glenn McKnight
 
Who Runs the Internet?
Who Runs the Internet?Who Runs the Internet?
Who Runs the Internet?
ICANN
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
Electronic Quiz in Empowerment Technology
Electronic Quiz in Empowerment TechnologyElectronic Quiz in Empowerment Technology
Electronic Quiz in Empowerment Technology
1107Shaineth
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
James Nesbitt
 

What's hot (7)

Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
Who Runs the Internet?
Who Runs the Internet?Who Runs the Internet?
Who Runs the Internet?
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Electronic Quiz in Empowerment Technology
Electronic Quiz in Empowerment TechnologyElectronic Quiz in Empowerment Technology
Electronic Quiz in Empowerment Technology
 
Industrial Control Cybersecurity USA Cyber Senate conference
 Industrial Control Cybersecurity USA Cyber Senate conference Industrial Control Cybersecurity USA Cyber Senate conference
Industrial Control Cybersecurity USA Cyber Senate conference
 

Similar to beyond the technology: privacy, trust and security in the cloud

Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09
vafopoulos
 
Nightmare on Connected Street
Nightmare on Connected StreetNightmare on Connected Street
Nightmare on Connected Street
gvanderh
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Carlos Valderrama
 
Riseptis report 1
Riseptis report 1Riseptis report 1
Riseptis report 1
vafopoulos
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
Ericsson
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT Workshop
Haider Iqbal
 
Sss14green Iotic Labs
Sss14green Iotic LabsSss14green Iotic Labs
Sss14green Iotic Labs
Justin Hayward
 
Techorama 2014, the Real Deal
Techorama 2014, the Real DealTechorama 2014, the Real Deal
Techorama 2014, the Real Deal
Bruno Segers
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
ijtsrd
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
Sean Whalen
 
Lecture7
Lecture7Lecture7
Lecture7
gueste3b985e
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
Kundan Kumar
 
Ten realities of the internet of things - ​Alexandra Deschamps-Sonsino
Ten realities of the internet of things -  ​Alexandra Deschamps-SonsinoTen realities of the internet of things -  ​Alexandra Deschamps-Sonsino
Ten realities of the internet of things - ​Alexandra Deschamps-Sonsino
webdagene
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event Report
Ramona Kohrs
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
ethanBrownusa
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
W. David Stephenson
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Charles Mok
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
Real-Time Innovations (RTI)
 
Insights from SXSW
Insights from SXSWInsights from SXSW
Insights from SXSW
Bristol Media
 
Blockchain for Business - The Ledger - ARENA
Blockchain for Business - The Ledger - ARENABlockchain for Business - The Ledger - ARENA
Blockchain for Business - The Ledger - ARENA
Knight Moves
 

Similar to beyond the technology: privacy, trust and security in the cloud (20)

Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09
 
Nightmare on Connected Street
Nightmare on Connected StreetNightmare on Connected Street
Nightmare on Connected Street
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Riseptis report 1
Riseptis report 1Riseptis report 1
Riseptis report 1
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
 
Middle East IoT Workshop
Middle East IoT WorkshopMiddle East IoT Workshop
Middle East IoT Workshop
 
Sss14green Iotic Labs
Sss14green Iotic LabsSss14green Iotic Labs
Sss14green Iotic Labs
 
Techorama 2014, the Real Deal
Techorama 2014, the Real DealTechorama 2014, the Real Deal
Techorama 2014, the Real Deal
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Lecture7
Lecture7Lecture7
Lecture7
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
Ten realities of the internet of things - ​Alexandra Deschamps-Sonsino
Ten realities of the internet of things -  ​Alexandra Deschamps-SonsinoTen realities of the internet of things -  ​Alexandra Deschamps-Sonsino
Ten realities of the internet of things - ​Alexandra Deschamps-Sonsino
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event Report
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
 
Insights from SXSW
Insights from SXSWInsights from SXSW
Insights from SXSW
 
Blockchain for Business - The Ledger - ARENA
Blockchain for Business - The Ledger - ARENABlockchain for Business - The Ledger - ARENA
Blockchain for Business - The Ledger - ARENA
 

More from Gordon Chung

Storing metrics at scale with Gnocchi
Storing metrics at scale with GnocchiStoring metrics at scale with Gnocchi
Storing metrics at scale with Gnocchi
Gordon Chung
 
Gnocchi v4 - past and present
Gnocchi v4 - past and presentGnocchi v4 - past and present
Gnocchi v4 - past and present
Gordon Chung
 
Gnocchi v4 (preview)
Gnocchi v4 (preview)Gnocchi v4 (preview)
Gnocchi v4 (preview)
Gordon Chung
 
Gnocchi v3 brownbag
Gnocchi v3 brownbagGnocchi v3 brownbag
Gnocchi v3 brownbag
Gordon Chung
 
Gnocchi v3
Gnocchi v3Gnocchi v3
Gnocchi v3
Gordon Chung
 
Gnocchi Profiling v2
Gnocchi Profiling v2Gnocchi Profiling v2
Gnocchi Profiling v2
Gordon Chung
 
The Gnocchi Experiment
The Gnocchi ExperimentThe Gnocchi Experiment
The Gnocchi Experiment
Gordon Chung
 
Gnocchi Profiling 2.1.x
Gnocchi Profiling 2.1.xGnocchi Profiling 2.1.x
Gnocchi Profiling 2.1.x
Gordon Chung
 
Ceilometer to Gnocchi
Ceilometer to GnocchiCeilometer to Gnocchi
Ceilometer to Gnocchi
Gordon Chung
 
Anatomy of an action
Anatomy of an actionAnatomy of an action
Anatomy of an action
Gordon Chung
 
Stabilising the jenga tower
Stabilising the jenga towerStabilising the jenga tower
Stabilising the jenga tower
Gordon Chung
 

More from Gordon Chung (11)

Storing metrics at scale with Gnocchi
Storing metrics at scale with GnocchiStoring metrics at scale with Gnocchi
Storing metrics at scale with Gnocchi
 
Gnocchi v4 - past and present
Gnocchi v4 - past and presentGnocchi v4 - past and present
Gnocchi v4 - past and present
 
Gnocchi v4 (preview)
Gnocchi v4 (preview)Gnocchi v4 (preview)
Gnocchi v4 (preview)
 
Gnocchi v3 brownbag
Gnocchi v3 brownbagGnocchi v3 brownbag
Gnocchi v3 brownbag
 
Gnocchi v3
Gnocchi v3Gnocchi v3
Gnocchi v3
 
Gnocchi Profiling v2
Gnocchi Profiling v2Gnocchi Profiling v2
Gnocchi Profiling v2
 
The Gnocchi Experiment
The Gnocchi ExperimentThe Gnocchi Experiment
The Gnocchi Experiment
 
Gnocchi Profiling 2.1.x
Gnocchi Profiling 2.1.xGnocchi Profiling 2.1.x
Gnocchi Profiling 2.1.x
 
Ceilometer to Gnocchi
Ceilometer to GnocchiCeilometer to Gnocchi
Ceilometer to Gnocchi
 
Anatomy of an action
Anatomy of an actionAnatomy of an action
Anatomy of an action
 
Stabilising the jenga tower
Stabilising the jenga towerStabilising the jenga tower
Stabilising the jenga tower
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 

beyond the technology: privacy, trust and security in the cloud