SlideShare a Scribd company logo
CIC 2014 China Social Media Landscape

More Related Content

Viewers also liked

Deve se substituir um solenóide sempre que o código de falhas acusar defeito ...
Deve se substituir um solenóide sempre que o código de falhas acusar defeito ...Deve se substituir um solenóide sempre que o código de falhas acusar defeito ...
Deve se substituir um solenóide sempre que o código de falhas acusar defeito ...
fabio
 
Establishing Your Digital Presence In China
Establishing Your Digital Presence In ChinaEstablishing Your Digital Presence In China
Establishing Your Digital Presence In ChinaBurson-Marsteller China
 
2014 from social business to big data white paper insights from cic's 2013-20...
2014 from social business to big data white paper insights from cic's 2013-20...2014 from social business to big data white paper insights from cic's 2013-20...
2014 from social business to big data white paper insights from cic's 2013-20...
Kantar Media CIC
 
China Internet Influencers - Nov 2011 [Edith Yeung]
China Internet Influencers - Nov 2011 [Edith Yeung]China Internet Influencers - Nov 2011 [Edith Yeung]
China Internet Influencers - Nov 2011 [Edith Yeung]RightVentures
 
Digital Jungle Credentials - Cross Cultural Digital Marketing Agency
Digital Jungle Credentials - Cross Cultural Digital Marketing AgencyDigital Jungle Credentials - Cross Cultural Digital Marketing Agency
Digital Jungle Credentials - Cross Cultural Digital Marketing Agency
Reach China Holdings Limited
 
Cross cultural communication in business world
Cross cultural communication in business worldCross cultural communication in business world
Cross cultural communication in business worldonlyvvek
 
Cross cultural communication ppt
Cross cultural communication pptCross cultural communication ppt
Cross cultural communication pptSRI GANESH
 
Digital in 2017: Eastern Asia
Digital in 2017: Eastern AsiaDigital in 2017: Eastern Asia
Digital in 2017: Eastern Asia
We Are Social Singapore
 
Digital in 2017: Southern Europe
Digital in 2017: Southern EuropeDigital in 2017: Southern Europe
Digital in 2017: Southern Europe
We Are Social Singapore
 
2016 Digital Yearbook
2016 Digital Yearbook2016 Digital Yearbook
2016 Digital Yearbook
We Are Social Singapore
 
2017 Digital Yearbook
2017 Digital Yearbook2017 Digital Yearbook
2017 Digital Yearbook
We Are Social Singapore
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
We Are Social Singapore
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
We Are Social Singapore
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung
Edith Yeung
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
a16z
 

Viewers also liked (15)

Deve se substituir um solenóide sempre que o código de falhas acusar defeito ...
Deve se substituir um solenóide sempre que o código de falhas acusar defeito ...Deve se substituir um solenóide sempre que o código de falhas acusar defeito ...
Deve se substituir um solenóide sempre que o código de falhas acusar defeito ...
 
Establishing Your Digital Presence In China
Establishing Your Digital Presence In ChinaEstablishing Your Digital Presence In China
Establishing Your Digital Presence In China
 
2014 from social business to big data white paper insights from cic's 2013-20...
2014 from social business to big data white paper insights from cic's 2013-20...2014 from social business to big data white paper insights from cic's 2013-20...
2014 from social business to big data white paper insights from cic's 2013-20...
 
China Internet Influencers - Nov 2011 [Edith Yeung]
China Internet Influencers - Nov 2011 [Edith Yeung]China Internet Influencers - Nov 2011 [Edith Yeung]
China Internet Influencers - Nov 2011 [Edith Yeung]
 
Digital Jungle Credentials - Cross Cultural Digital Marketing Agency
Digital Jungle Credentials - Cross Cultural Digital Marketing AgencyDigital Jungle Credentials - Cross Cultural Digital Marketing Agency
Digital Jungle Credentials - Cross Cultural Digital Marketing Agency
 
Cross cultural communication in business world
Cross cultural communication in business worldCross cultural communication in business world
Cross cultural communication in business world
 
Cross cultural communication ppt
Cross cultural communication pptCross cultural communication ppt
Cross cultural communication ppt
 
Digital in 2017: Eastern Asia
Digital in 2017: Eastern AsiaDigital in 2017: Eastern Asia
Digital in 2017: Eastern Asia
 
Digital in 2017: Southern Europe
Digital in 2017: Southern EuropeDigital in 2017: Southern Europe
Digital in 2017: Southern Europe
 
2016 Digital Yearbook
2016 Digital Yearbook2016 Digital Yearbook
2016 Digital Yearbook
 
2017 Digital Yearbook
2017 Digital Yearbook2017 Digital Yearbook
2017 Digital Yearbook
 
Digital in 2017 Global Overview
Digital in 2017 Global OverviewDigital in 2017 Global Overview
Digital in 2017 Global Overview
 
Digital in 2016
Digital in 2016Digital in 2016
Digital in 2016
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung
 
Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)Mobile Is Eating the World (2016)
Mobile Is Eating the World (2016)
 

More from Kantar Media CIC

2014 从社会化商业迈向大数据白皮书 来自2013-2014中国企业社会化商业调研的洞察
2014 从社会化商业迈向大数据白皮书 来自2013-2014中国企业社会化商业调研的洞察2014 从社会化商业迈向大数据白皮书 来自2013-2014中国企业社会化商业调研的洞察
2014 从社会化商业迈向大数据白皮书 来自2013-2014中国企业社会化商业调研的洞察
Kantar Media CIC
 
Viral video cinema vol.23:content is king in video marketing
Viral video cinema vol.23:content is king in video marketingViral video cinema vol.23:content is king in video marketing
Viral video cinema vol.23:content is king in video marketingKantar Media CIC
 
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
Kantar Media CIC
 
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
Kantar Media CIC
 
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
Kantar Media CIC
 
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
Kantar Media CIC
 
Viral Video Cinema vol.20:Stop Motion Animation Collection
Viral Video Cinema vol.20:Stop Motion Animation CollectionViral Video Cinema vol.20:Stop Motion Animation Collection
Viral Video Cinema vol.20:Stop Motion Animation Collection
Kantar Media CIC
 
CIC - 新浪微博美妆行业白皮书
CIC - 新浪微博美妆行业白皮书CIC - 新浪微博美妆行业白皮书
CIC - 新浪微博美妆行业白皮书Kantar Media CIC
 
CIC中国社会化媒体格局概览图2013
CIC中国社会化媒体格局概览图2013CIC中国社会化媒体格局概览图2013
CIC中国社会化媒体格局概览图2013
Kantar Media CIC
 
CIC China Social Media Landscape 2013
CIC China Social Media Landscape 2013CIC China Social Media Landscape 2013
CIC China Social Media Landscape 2013
Kantar Media CIC
 
Viral video cinema v15:the enthusiasm of scent
Viral video cinema v15:the enthusiasm of scentViral video cinema v15:the enthusiasm of scent
Viral video cinema v15:the enthusiasm of scentKantar Media CIC
 
Viral Video Cinema v14(20130211 20130308)
Viral Video Cinema v14(20130211 20130308)Viral Video Cinema v14(20130211 20130308)
Viral Video Cinema v14(20130211 20130308)Kantar Media CIC
 
IWOM watch 2012 compilation_technology (Part 8)
IWOM watch 2012 compilation_technology (Part 8)IWOM watch 2012 compilation_technology (Part 8)
IWOM watch 2012 compilation_technology (Part 8)Kantar Media CIC
 
IWOM watch 2012 compilation_crisis (Part 6)
IWOM watch 2012 compilation_crisis (Part 6)IWOM watch 2012 compilation_crisis (Part 6)
IWOM watch 2012 compilation_crisis (Part 6)Kantar Media CIC
 
IWOM watch 2012 compilation_weibo development (Part 5)
IWOM watch 2012 compilation_weibo development (Part 5)IWOM watch 2012 compilation_weibo development (Part 5)
IWOM watch 2012 compilation_weibo development (Part 5)Kantar Media CIC
 
IWOM watch 2012 compilation_wechat development (Part 4)
IWOM watch 2012 compilation_wechat development (Part 4)IWOM watch 2012 compilation_wechat development (Part 4)
IWOM watch 2012 compilation_wechat development (Part 4)Kantar Media CIC
 
IWOM watch 2012 compilation_viral video (Part 3)
IWOM watch 2012 compilation_viral video (Part 3)IWOM watch 2012 compilation_viral video (Part 3)
IWOM watch 2012 compilation_viral video (Part 3)Kantar Media CIC
 
IWOM watch 2012 compilation_social marketing (Part 9)
IWOM watch 2012 compilation_social marketing (Part 9)IWOM watch 2012 compilation_social marketing (Part 9)
IWOM watch 2012 compilation_social marketing (Part 9)Kantar Media CIC
 
IWOM Watch Compilation 2012
IWOM Watch Compilation 2012IWOM Watch Compilation 2012
IWOM Watch Compilation 2012Kantar Media CIC
 
From Social Media to Social Business white paper series topic 3 :China‘s Soci...
From Social Media to Social Business white paper series topic 3 :China‘s Soci...From Social Media to Social Business white paper series topic 3 :China‘s Soci...
From Social Media to Social Business white paper series topic 3 :China‘s Soci...Kantar Media CIC
 

More from Kantar Media CIC (20)

2014 从社会化商业迈向大数据白皮书 来自2013-2014中国企业社会化商业调研的洞察
2014 从社会化商业迈向大数据白皮书 来自2013-2014中国企业社会化商业调研的洞察2014 从社会化商业迈向大数据白皮书 来自2013-2014中国企业社会化商业调研的洞察
2014 从社会化商业迈向大数据白皮书 来自2013-2014中国企业社会化商业调研的洞察
 
Viral video cinema vol.23:content is king in video marketing
Viral video cinema vol.23:content is king in video marketingViral video cinema vol.23:content is king in video marketing
Viral video cinema vol.23:content is king in video marketing
 
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
 
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
 
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
CIC与群邑智库联合发布2013旅游行业白皮书《社会化旅游的崛起》
 
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
CIC and GroupM China released 2013 White Paper on Travellers - The Rise of So...
 
Viral Video Cinema vol.20:Stop Motion Animation Collection
Viral Video Cinema vol.20:Stop Motion Animation CollectionViral Video Cinema vol.20:Stop Motion Animation Collection
Viral Video Cinema vol.20:Stop Motion Animation Collection
 
CIC - 新浪微博美妆行业白皮书
CIC - 新浪微博美妆行业白皮书CIC - 新浪微博美妆行业白皮书
CIC - 新浪微博美妆行业白皮书
 
CIC中国社会化媒体格局概览图2013
CIC中国社会化媒体格局概览图2013CIC中国社会化媒体格局概览图2013
CIC中国社会化媒体格局概览图2013
 
CIC China Social Media Landscape 2013
CIC China Social Media Landscape 2013CIC China Social Media Landscape 2013
CIC China Social Media Landscape 2013
 
Viral video cinema v15:the enthusiasm of scent
Viral video cinema v15:the enthusiasm of scentViral video cinema v15:the enthusiasm of scent
Viral video cinema v15:the enthusiasm of scent
 
Viral Video Cinema v14(20130211 20130308)
Viral Video Cinema v14(20130211 20130308)Viral Video Cinema v14(20130211 20130308)
Viral Video Cinema v14(20130211 20130308)
 
IWOM watch 2012 compilation_technology (Part 8)
IWOM watch 2012 compilation_technology (Part 8)IWOM watch 2012 compilation_technology (Part 8)
IWOM watch 2012 compilation_technology (Part 8)
 
IWOM watch 2012 compilation_crisis (Part 6)
IWOM watch 2012 compilation_crisis (Part 6)IWOM watch 2012 compilation_crisis (Part 6)
IWOM watch 2012 compilation_crisis (Part 6)
 
IWOM watch 2012 compilation_weibo development (Part 5)
IWOM watch 2012 compilation_weibo development (Part 5)IWOM watch 2012 compilation_weibo development (Part 5)
IWOM watch 2012 compilation_weibo development (Part 5)
 
IWOM watch 2012 compilation_wechat development (Part 4)
IWOM watch 2012 compilation_wechat development (Part 4)IWOM watch 2012 compilation_wechat development (Part 4)
IWOM watch 2012 compilation_wechat development (Part 4)
 
IWOM watch 2012 compilation_viral video (Part 3)
IWOM watch 2012 compilation_viral video (Part 3)IWOM watch 2012 compilation_viral video (Part 3)
IWOM watch 2012 compilation_viral video (Part 3)
 
IWOM watch 2012 compilation_social marketing (Part 9)
IWOM watch 2012 compilation_social marketing (Part 9)IWOM watch 2012 compilation_social marketing (Part 9)
IWOM watch 2012 compilation_social marketing (Part 9)
 
IWOM Watch Compilation 2012
IWOM Watch Compilation 2012IWOM Watch Compilation 2012
IWOM Watch Compilation 2012
 
From Social Media to Social Business white paper series topic 3 :China‘s Soci...
From Social Media to Social Business white paper series topic 3 :China‘s Soci...From Social Media to Social Business white paper series topic 3 :China‘s Soci...
From Social Media to Social Business white paper series topic 3 :China‘s Soci...
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx