SlideShare a Scribd company logo
Bitdefender Android
Security
Secured your Mobile Network
Types of
Malicious
Software
(Malware) for
Mobile
1.Adware
2.Risktool
3.Rootkit
4.Trojan
5.Trojan-SMS
6.Trojan-Spy
7.Trojan-Downloader
8.Trojan-Banker
9.Trojan-Ransomware
10.Backdoor
11.Monitor
12.Others.
• ## 3,626,458 malicious installation
packages;
• ## 27,403 mobile banker Trojans
(installation packages);
• ## 83,048 mobile ransomware
Trojans (installation packages).
TOP 10 Counties Attacked by Mobile Malware
in 2016
(Ranked by %of Users Attacked)
1.Bangladesh 35.57
%
2.Nepal 31.5
%
3.Iran 31.38
%
4.China 26.95
%
5.Pakistan 26.83
%
Bangladesh scored
35.57%
being Attacked
Become No.
# 1
Kazi Sawar Hossain Sagar
Asst. Manager-Business Development
Bitdefender Bangladesh
http://www.bitdefender.com.bd
Please Subscribe for Regular Update…
Thank You
For Watching Us…

More Related Content

What's hot

What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
Lookout
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
skowshik
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
NoNameCon
 
Hacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire networkHacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire network
Matt Boddy
 
Cybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments SystemsCybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments Systems
Tony Chew
 
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationBiometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Tony Chew
 
Q4 Threat Report 2016
Q4 Threat Report 2016Q4 Threat Report 2016
Q4 Threat Report 2016
Fortinet
 
Infographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportInfographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape Report
Fortinet
 
Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...
Andrew Clark
 
Presentatie Kaspersky over Malware trends en statistieken, 26062015
Presentatie Kaspersky over Malware trends en statistieken, 26062015Presentatie Kaspersky over Malware trends en statistieken, 26062015
Presentatie Kaspersky over Malware trends en statistieken, 26062015
SLBdiensten
 
Sophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos introduces the Threat Landscape
Sophos introduces the Threat Landscape
Sophos Benelux
 
Biometrics - Future of Authentication
Biometrics - Future of AuthenticationBiometrics - Future of Authentication
Biometrics - Future of Authentication
Tony Chew
 
Threat Report - 2013
Threat Report - 2013Threat Report - 2013
Threat Report - 2013
- Mark - Fullbright
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
MicroWorld Software Services Pvt Ltd
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
chauhananand17
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to know
NowSecure
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
Jawhar Ali
 
Cyber security
Cyber securityCyber security
Cyber security
SanthoshKumar2614
 
Biometrics Accuracy - Realities and Fallacies
Biometrics Accuracy - Realities and FallaciesBiometrics Accuracy - Realities and Fallacies
Biometrics Accuracy - Realities and Fallacies
Tony Chew
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 

What's hot (20)

What is a Mobile Threat?
What is a Mobile Threat?What is a Mobile Threat?
What is a Mobile Threat?
 
Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578Malicious android-applications-risks-exploitation 33578
Malicious android-applications-risks-exploitation 33578
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
Hacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire networkHacking Android - How a BYOD device can take down your entire network
Hacking Android - How a BYOD device can take down your entire network
 
Cybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments SystemsCybersecurity for Banking & Payments Systems
Cybersecurity for Banking & Payments Systems
 
Biometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of AuthenticationBiometrics & AI (Artificial Intelligence) is the future of Authentication
Biometrics & AI (Artificial Intelligence) is the future of Authentication
 
Q4 Threat Report 2016
Q4 Threat Report 2016Q4 Threat Report 2016
Q4 Threat Report 2016
 
Infographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape ReportInfographic: Fortinet Q1 2017 Threat Landscape Report
Infographic: Fortinet Q1 2017 Threat Landscape Report
 
Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...Why do you need the advanced protection of the Internet Security Product / Ma...
Why do you need the advanced protection of the Internet Security Product / Ma...
 
Presentatie Kaspersky over Malware trends en statistieken, 26062015
Presentatie Kaspersky over Malware trends en statistieken, 26062015Presentatie Kaspersky over Malware trends en statistieken, 26062015
Presentatie Kaspersky over Malware trends en statistieken, 26062015
 
Sophos introduces the Threat Landscape
Sophos introduces the Threat LandscapeSophos introduces the Threat Landscape
Sophos introduces the Threat Landscape
 
Biometrics - Future of Authentication
Biometrics - Future of AuthenticationBiometrics - Future of Authentication
Biometrics - Future of Authentication
 
Threat Report - 2013
Threat Report - 2013Threat Report - 2013
Threat Report - 2013
 
Spy android malware - eScan
Spy android malware - eScanSpy android malware - eScan
Spy android malware - eScan
 
NewsByte Mumbai October 2017
NewsByte Mumbai October 2017NewsByte Mumbai October 2017
NewsByte Mumbai October 2017
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to know
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Biometrics Accuracy - Realities and Fallacies
Biometrics Accuracy - Realities and FallaciesBiometrics Accuracy - Realities and Fallacies
Biometrics Accuracy - Realities and Fallacies
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 

Viewers also liked

Channapatana Toys
Channapatana ToysChannapatana Toys
Channapatana Toys
R V Institute of Management
 
Robin McNeill: The Role of Volunteers
Robin McNeill: The Role of VolunteersRobin McNeill: The Role of Volunteers
Robin McNeill: The Role of Volunteers
Sustainable Summits Initiative
 
10 Things Renters Want In Their Next-Gen Apartment | Part 4
10 Things Renters Want In Their Next-Gen Apartment | Part 410 Things Renters Want In Their Next-Gen Apartment | Part 4
10 Things Renters Want In Their Next-Gen Apartment | Part 4
Ivan Kaufman
 
10 Things Renters Want In Their Next-Gen Apartment | Part 7
10 Things Renters Want In Their Next-Gen Apartment | Part 710 Things Renters Want In Their Next-Gen Apartment | Part 7
10 Things Renters Want In Their Next-Gen Apartment | Part 7
Ivan Kaufman
 
Motivation
MotivationMotivation
The Books "AR" Alive-Augmented Reality in Books
The Books "AR" Alive-Augmented Reality in BooksThe Books "AR" Alive-Augmented Reality in Books
The Books "AR" Alive-Augmented Reality in Books
Cindy Wright
 
Equity Research Report 14 March 2017 Ways2Capital
Equity Research Report 14 March 2017 Ways2CapitalEquity Research Report 14 March 2017 Ways2Capital
Equity Research Report 14 March 2017 Ways2Capital
Ways2Capital | Investment Advisor
 
Hafıza Teknolojileri
Hafıza TeknolojileriHafıza Teknolojileri
Hafıza Teknolojileri
Celal Karaca
 
Future of Designing Collaboration Experiences in Office 365 #sptechcon
Future of Designing Collaboration Experiences in Office 365 #sptechconFuture of Designing Collaboration Experiences in Office 365 #sptechcon
Future of Designing Collaboration Experiences in Office 365 #sptechcon
Kanwal Khipple
 
Nervous System
Nervous SystemNervous System
Nervous System
Ling Ting Ting
 
Designing a framework for making use of MOOCs
Designing a framework for making use of MOOCsDesigning a framework for making use of MOOCs
Designing a framework for making use of MOOCs
Open Education Global (OEGlobal)
 
Economía de la Empresa 2º Bachillerato - UD8. Análisis económico y financiero
Economía de la Empresa 2º Bachillerato - UD8. Análisis económico y financieroEconomía de la Empresa 2º Bachillerato - UD8. Análisis económico y financiero
Economía de la Empresa 2º Bachillerato - UD8. Análisis económico y financiero
Bea Hervella
 
abordaje del tabaquismo
abordaje del tabaquismo abordaje del tabaquismo
abordaje del tabaquismo
Andreu Estela Mantolan
 
APExampleAnalysis
APExampleAnalysisAPExampleAnalysis
APExampleAnalysis
Timo Nurminiemi
 
Food safety along informal pork value chains in Vietnam: Success and challeng...
Food safety along informal pork value chains in Vietnam: Success and challeng...Food safety along informal pork value chains in Vietnam: Success and challeng...
Food safety along informal pork value chains in Vietnam: Success and challeng...
ILRI
 
...Redes sociales
...Redes sociales...Redes sociales
...Redes sociales
Jesús Velasco
 
Letter "Ww" pictures
Letter "Ww" picturesLetter "Ww" pictures
Letter "Ww" pictures
nilda castro
 
Negociacion 17
Negociacion 17Negociacion 17
Transformación de receta de Donuts
Transformación de receta de DonutsTransformación de receta de Donuts
Transformación de receta de Donuts
Yolanda Escribano
 
Future of Coaching
Future of CoachingFuture of Coaching
Future of Coaching
Fernando Celis
 

Viewers also liked (20)

Channapatana Toys
Channapatana ToysChannapatana Toys
Channapatana Toys
 
Robin McNeill: The Role of Volunteers
Robin McNeill: The Role of VolunteersRobin McNeill: The Role of Volunteers
Robin McNeill: The Role of Volunteers
 
10 Things Renters Want In Their Next-Gen Apartment | Part 4
10 Things Renters Want In Their Next-Gen Apartment | Part 410 Things Renters Want In Their Next-Gen Apartment | Part 4
10 Things Renters Want In Their Next-Gen Apartment | Part 4
 
10 Things Renters Want In Their Next-Gen Apartment | Part 7
10 Things Renters Want In Their Next-Gen Apartment | Part 710 Things Renters Want In Their Next-Gen Apartment | Part 7
10 Things Renters Want In Their Next-Gen Apartment | Part 7
 
Motivation
MotivationMotivation
Motivation
 
The Books "AR" Alive-Augmented Reality in Books
The Books "AR" Alive-Augmented Reality in BooksThe Books "AR" Alive-Augmented Reality in Books
The Books "AR" Alive-Augmented Reality in Books
 
Equity Research Report 14 March 2017 Ways2Capital
Equity Research Report 14 March 2017 Ways2CapitalEquity Research Report 14 March 2017 Ways2Capital
Equity Research Report 14 March 2017 Ways2Capital
 
Hafıza Teknolojileri
Hafıza TeknolojileriHafıza Teknolojileri
Hafıza Teknolojileri
 
Future of Designing Collaboration Experiences in Office 365 #sptechcon
Future of Designing Collaboration Experiences in Office 365 #sptechconFuture of Designing Collaboration Experiences in Office 365 #sptechcon
Future of Designing Collaboration Experiences in Office 365 #sptechcon
 
Nervous System
Nervous SystemNervous System
Nervous System
 
Designing a framework for making use of MOOCs
Designing a framework for making use of MOOCsDesigning a framework for making use of MOOCs
Designing a framework for making use of MOOCs
 
Economía de la Empresa 2º Bachillerato - UD8. Análisis económico y financiero
Economía de la Empresa 2º Bachillerato - UD8. Análisis económico y financieroEconomía de la Empresa 2º Bachillerato - UD8. Análisis económico y financiero
Economía de la Empresa 2º Bachillerato - UD8. Análisis económico y financiero
 
abordaje del tabaquismo
abordaje del tabaquismo abordaje del tabaquismo
abordaje del tabaquismo
 
APExampleAnalysis
APExampleAnalysisAPExampleAnalysis
APExampleAnalysis
 
Food safety along informal pork value chains in Vietnam: Success and challeng...
Food safety along informal pork value chains in Vietnam: Success and challeng...Food safety along informal pork value chains in Vietnam: Success and challeng...
Food safety along informal pork value chains in Vietnam: Success and challeng...
 
...Redes sociales
...Redes sociales...Redes sociales
...Redes sociales
 
Letter "Ww" pictures
Letter "Ww" picturesLetter "Ww" pictures
Letter "Ww" pictures
 
Negociacion 17
Negociacion 17Negociacion 17
Negociacion 17
 
Transformación de receta de Donuts
Transformación de receta de DonutsTransformación de receta de Donuts
Transformación de receta de Donuts
 
Future of Coaching
Future of CoachingFuture of Coaching
Future of Coaching
 

Similar to Bitdefender Android/Mobile Security

quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
QUICK HEAL TECHNOLOGIES LIMITED
 
quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
QUICK HEAL TECHNOLOGIES LIMITED
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
IJECEIAES
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
Комсс Файквэе
 
Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.
DATA SECURITY SOLUTIONS
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
ijdpsjournal
 
Avast Antivirus
Avast AntivirusAvast Antivirus
Avast Antivirus
Mizamk
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET Journal
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
csandit
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
Quick Heal Technologies Ltd.
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
IRJET Journal
 
Malware Applications Development.pptx
Malware Applications Development.pptxMalware Applications Development.pptx
Malware Applications Development.pptx
FullstackSRM
 
How do I activate my McAfee product key?
How do I activate my McAfee product key?How do I activate my McAfee product key?
How do I activate my McAfee product key?
NovellaJohns
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
MarketingArrowECS_CZ
 
Avtest Kasım 2011 Bedava Android Antivirüs Araştırması
Avtest Kasım 2011 Bedava Android Antivirüs AraştırmasıAvtest Kasım 2011 Bedava Android Antivirüs Araştırması
Avtest Kasım 2011 Bedava Android Antivirüs Araştırması
Erol Dizdar
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
DevOps Indonesia
 
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way ForwardCoordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
APNIC
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
Trend Micro
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
IBM Security
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
Zimperium
 

Similar to Bitdefender Android/Mobile Security (20)

quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
 
quick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdfquick-heal-threat-report-q2-2023.pdf
quick-heal-threat-report-q2-2023.pdf
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
 
Rp threat-predictions-2013
Rp threat-predictions-2013Rp threat-predictions-2013
Rp threat-predictions-2013
 
Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.Let's hack your mobile device. Yes we can. And many other do.
Let's hack your mobile device. Yes we can. And many other do.
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Avast Antivirus
Avast AntivirusAvast Antivirus
Avast Antivirus
 
IRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection MethodsIRJET- A Survey on Android Ransomware and its Detection Methods
IRJET- A Survey on Android Ransomware and its Detection Methods
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
 
Malware Applications Development.pptx
Malware Applications Development.pptxMalware Applications Development.pptx
Malware Applications Development.pptx
 
How do I activate my McAfee product key?
How do I activate my McAfee product key?How do I activate my McAfee product key?
How do I activate my McAfee product key?
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
 
Avtest Kasım 2011 Bedava Android Antivirüs Araştırması
Avtest Kasım 2011 Bedava Android Antivirüs AraştırmasıAvtest Kasım 2011 Bedava Android Antivirüs Araştırması
Avtest Kasım 2011 Bedava Android Antivirüs Araştırması
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
 
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way ForwardCoordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
Coordinated Malware Eradication & Remediation Project (CMERP) - The Way Forward
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 

Recently uploaded

E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 

Recently uploaded (20)

E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 

Bitdefender Android/Mobile Security