SlideShare a Scribd company logo
Consent,
Crypto and
Information
Infrastructures
What this talk is about?
Introduction to Digital
Infrastructure. (5 Minutes)
Use of Crypto in Digital
Infrastructures (20 Minutes).
Relationship between Crypto and
Consent. (15 Minutes)
Introduction to
Digital
Infrastructure
Physical
Infrastructure
Financial Infrastructure
Digital Infrastructure
 Infrastructure as a Service (IaaS)
 Software as a Service (SaaS)
 Platform as a Service (PaaS)
“
”
Digital Infrastructures are
Information processing
Infrastructures.
Atomic Operations in Data-Verse
Store
AnalyseCreate
Use of Crypto
in Digital
Infrastructures
First came the Data Storage
Then came the Processing
And then you bring your data
Atomic Operations in Data-Verse
Store
AnalyseCreate
S3EBS
EC2 Compute
AWS Revenues
Year Revenue Loss
2006 $20M $13M
2008 $60M $8M
Bring Your Own Keys
*5 Years later after S3
EBS Encryption
*6 Years later after EBS Announcement
Full Fledged Key Management
Bring your own Keys
Atomic Operations in Data-Verse
Crypto
Analyse
StoreCreate
Why is Crypto important?
Whoever controls the data is
the owner of the data.
1
Where data is stored is
irrelevant if control is yours.
2
Unlike “physical things, in
information infrastructures,
control, storage and
ownership are “different
things”
3
Dis-trust is an Emergent Property
Distrust
Control
StorageOwnership
Crypto Can mediate Trust
CRYPTO
Control
StorageOwnership
Crypto Key
management
used to be hard
problem
But not anymore
Everyone manages their own Keys
And 100s of
them every
single day
OSS and Information Infra-Stacks
 Crypto Protocols are OSS.
 Storage Protocols are OSS. (S3, Block Storage, NFS, Ceph, Gluster FS, ZFS, LVM)
 Storage Services (DynamoDB, Cassandra etc.)
 So how do Digital infrastructures make money? – Efficiency, Optionality and Trust
(provided by Crypto)
Public Locker
But I want to
”Share
Information”
Sharing Information means you “lose control” of it
technically.
The fiction of consent is then created by Legal
principles and through policy.
Multiple schemes exist that allow Limited sharing
but with Bring your own Cryptography algorithms
and Bring your own keys approach.
Property Preserving
Encryption
 If Plain Text (A) < Plain Text (B), then
 Encrypted (A) < Encrypted (B).
 If Plain Text(A) OPERATOR Plain Text (B)
 Encrypted (A) OPERATOR Encrypted (B)
 Leaks some information and is vulnerable to
repeated queries.
 Combined with transformation to apply
anonymization offers better protection
PPE Applicability
 A Document (X) can be thought of to have “N” Fields
 Secret ID
 Name
 Date of Birth
 Address
 Different PPE algorithms can be applied to different fields based on what the “Sharer”
wants to.
 Secret ID (Full encryption)
 Name (No Encryption)
 Date of Birth (PPE that transforms into Age number and then applies algorithm that preserves
< and > operations)
 Address (Encrypt everything)
What PPE
offers
Informational self-
determination.
I share not just
fields but can also
determine the PPE
on some fields.
Composable with
Other
Anonymization
functions –
PPE(T(X))
Allows T(X) to be
built for fields
which can be
normalized to PPE
fields
Extraction attacks on PPE
Extraction attacks on PPE
Differential Privacy
 Strong Mathematical foundation that allows balancing
utility and privacy and guarantees
 No access to raw data.
 Resilience to post-processing.
 Resilience to de-anonymization techniques via constant
querying.
 Allows aggregation but evades statistical inference.
ε-differential privacy
 An inference is released from a statistical database and it
should not compromise the individual’s privacy.
 A perfect privacy score would only be possible when the
individual’s data is not in the DB.
 Goal of Differential Privacy = Roughly same privacy to
individual as if their data is not in the DB.
Multiple
successful
real-world
cases
Windows Telemetry
Linked-in Advertiser queries
US Census for commuting
patterns.
Case Study: US Census Bureau
Privacy Pie
Crypto Key
Management
Storage
Management
Privacy Services
Utility Layers
Why is
Consent
broken?
How not to
break
Consent?

More Related Content

What's hot

Encriptacion
EncriptacionEncriptacion
Encriptacion
naniix21_3
 
Encriptacion
EncriptacionEncriptacion
Encriptacion
naniix21_3
 
Smart-m3 Security Demo (k. yudenok)
Smart-m3 Security Demo (k. yudenok)Smart-m3 Security Demo (k. yudenok)
Smart-m3 Security Demo (k. yudenok)
OSLL
 
IBM Cloud & Helix Nebula
IBM Cloud & Helix NebulaIBM Cloud & Helix Nebula
IBM Cloud & Helix Nebula
Helix Nebula The Science Cloud
 
Hybrid cloud for science
Hybrid cloud for science Hybrid cloud for science
Hybrid cloud for science
Helix Nebula The Science Cloud
 
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” ArchitecturesFIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures
FIWARE
 
HNSciCloud Phase 1 Award
HNSciCloud Phase 1 AwardHNSciCloud Phase 1 Award
HNSciCloud Phase 1 Award
Helix Nebula The Science Cloud
 
Google's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT ServicesGoogle's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT Services
Intel® Software
 
Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post event
ICT Economic Impact
 
2017 Hackathon Scality & 42 School
2017 Hackathon Scality & 42 School2017 Hackathon Scality & 42 School
2017 Hackathon Scality & 42 School
Scality
 
Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...
Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...
Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...
InfluxData
 
Zenko: Enabling Data Control in a Multi-cloud World
Zenko: Enabling Data Control in a Multi-cloud WorldZenko: Enabling Data Control in a Multi-cloud World
Zenko: Enabling Data Control in a Multi-cloud World
Scality
 
IoT with Google ecosystem
IoT with Google ecosystemIoT with Google ecosystem
IoT with Google ecosystem
Umair Vatao
 
HNSciCloud PILOT PLATFORM OVERVIEW
HNSciCloud PILOT PLATFORM OVERVIEWHNSciCloud PILOT PLATFORM OVERVIEW
HNSciCloud PILOT PLATFORM OVERVIEW
Helix Nebula The Science Cloud
 
Elastic South Africa Meetup July 2020
Elastic South Africa Meetup July 2020Elastic South Africa Meetup July 2020
Elastic South Africa Meetup July 2020
Anna Ossowski
 
Google cloud Study Essentials
Google cloud Study EssentialsGoogle cloud Study Essentials
Google cloud Study Essentials
GDSCKYAMBOGO
 
SecureCloud Project
SecureCloud ProjectSecureCloud Project
SecureCloud Project
EUBrasilCloudFORUM .
 
Replay Attack Network Project Help
Replay Attack Network Project HelpReplay Attack Network Project Help
Replay Attack Network Project Help
Network Simulation Tools
 
IEEE CSE Projects 2017 2018
IEEE CSE Projects 2017 2018IEEE CSE Projects 2017 2018
IEEE CSE Projects 2017 2018
CloudTechnologies
 
Xanadu Big Data Platform Technology BMT@ Rackspace Cloud
Xanadu Big Data Platform Technology BMT@ Rackspace Cloud Xanadu Big Data Platform Technology BMT@ Rackspace Cloud
Xanadu Big Data Platform Technology BMT@ Rackspace Cloud
Alex G. Lee, Ph.D. Esq. CLP
 

What's hot (20)

Encriptacion
EncriptacionEncriptacion
Encriptacion
 
Encriptacion
EncriptacionEncriptacion
Encriptacion
 
Smart-m3 Security Demo (k. yudenok)
Smart-m3 Security Demo (k. yudenok)Smart-m3 Security Demo (k. yudenok)
Smart-m3 Security Demo (k. yudenok)
 
IBM Cloud & Helix Nebula
IBM Cloud & Helix NebulaIBM Cloud & Helix Nebula
IBM Cloud & Helix Nebula
 
Hybrid cloud for science
Hybrid cloud for science Hybrid cloud for science
Hybrid cloud for science
 
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” ArchitecturesFIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures
FIWARE Global Summit - Edge/Fog Computing in “Powered by FIWARE” Architectures
 
HNSciCloud Phase 1 Award
HNSciCloud Phase 1 AwardHNSciCloud Phase 1 Award
HNSciCloud Phase 1 Award
 
Google's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT ServicesGoogle's Infrastructure and Specific IoT Services
Google's Infrastructure and Specific IoT Services
 
Isse 2014 homomorphic encryption and porticor post event
Isse 2014 homomorphic encryption and porticor   post eventIsse 2014 homomorphic encryption and porticor   post event
Isse 2014 homomorphic encryption and porticor post event
 
2017 Hackathon Scality & 42 School
2017 Hackathon Scality & 42 School2017 Hackathon Scality & 42 School
2017 Hackathon Scality & 42 School
 
Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...
Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...
Steve Litras [Cribl] | The Power of Infinite Choice | InfluxDays Virtual Expe...
 
Zenko: Enabling Data Control in a Multi-cloud World
Zenko: Enabling Data Control in a Multi-cloud WorldZenko: Enabling Data Control in a Multi-cloud World
Zenko: Enabling Data Control in a Multi-cloud World
 
IoT with Google ecosystem
IoT with Google ecosystemIoT with Google ecosystem
IoT with Google ecosystem
 
HNSciCloud PILOT PLATFORM OVERVIEW
HNSciCloud PILOT PLATFORM OVERVIEWHNSciCloud PILOT PLATFORM OVERVIEW
HNSciCloud PILOT PLATFORM OVERVIEW
 
Elastic South Africa Meetup July 2020
Elastic South Africa Meetup July 2020Elastic South Africa Meetup July 2020
Elastic South Africa Meetup July 2020
 
Google cloud Study Essentials
Google cloud Study EssentialsGoogle cloud Study Essentials
Google cloud Study Essentials
 
SecureCloud Project
SecureCloud ProjectSecureCloud Project
SecureCloud Project
 
Replay Attack Network Project Help
Replay Attack Network Project HelpReplay Attack Network Project Help
Replay Attack Network Project Help
 
IEEE CSE Projects 2017 2018
IEEE CSE Projects 2017 2018IEEE CSE Projects 2017 2018
IEEE CSE Projects 2017 2018
 
Xanadu Big Data Platform Technology BMT@ Rackspace Cloud
Xanadu Big Data Platform Technology BMT@ Rackspace Cloud Xanadu Big Data Platform Technology BMT@ Rackspace Cloud
Xanadu Big Data Platform Technology BMT@ Rackspace Cloud
 

Similar to Consent , crypto and information infrastructure systems

What Is Openstack And Its Importance
What Is Openstack And Its ImportanceWhat Is Openstack And Its Importance
What Is Openstack And Its Importance
Lorie Harris
 
Glue con2011 future_of_net_systems
Glue con2011 future_of_net_systemsGlue con2011 future_of_net_systems
Glue con2011 future_of_net_systems
James Urquhart
 
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Amazon Web Services
 
AWS IoT & ML Recap - 20180423
AWS IoT & ML Recap - 20180423AWS IoT & ML Recap - 20180423
AWS IoT & ML Recap - 20180423
Jamie (Taka) Wang
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
Amazon Web Services
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
Evident.io
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
Cloud Legal Project
 
Teradata and Cisco integrated journey to IoT and Smart city
Teradata and Cisco integrated journey to IoT and Smart cityTeradata and Cisco integrated journey to IoT and Smart city
Teradata and Cisco integrated journey to IoT and Smart city
Artur Borycki
 
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...
Amazon Web Services
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD
 
Enancing Threat Detection with Big Data and AI
Enancing Threat Detection with Big Data and AIEnancing Threat Detection with Big Data and AI
Enancing Threat Detection with Big Data and AI
Databricks
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
Nahan Rahman
 
Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...
Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...
Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...
Amazon Web Services
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
Nur Shiqim Chok
 
Cisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data centerCisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data center
NetworkCollaborators
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center
NetworkCollaborators
 
Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?
Guido Schmutz
 

Similar to Consent , crypto and information infrastructure systems (20)

What Is Openstack And Its Importance
What Is Openstack And Its ImportanceWhat Is Openstack And Its Importance
What Is Openstack And Its Importance
 
Glue con2011 future_of_net_systems
Glue con2011 future_of_net_systemsGlue con2011 future_of_net_systems
Glue con2011 future_of_net_systems
 
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
Integrate the AWS Cloud with Responsive Xilinx Machine Learning at the Edge (...
 
AWS IoT & ML Recap - 20180423
AWS IoT & ML Recap - 20180423AWS IoT & ML Recap - 20180423
AWS IoT & ML Recap - 20180423
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
Teradata and Cisco integrated journey to IoT and Smart city
Teradata and Cisco integrated journey to IoT and Smart cityTeradata and Cisco integrated journey to IoT and Smart city
Teradata and Cisco integrated journey to IoT and Smart city
 
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...
IoT Building Blocks: From Edge Devices to Analytics in the Cloud - SRV204 - T...
 
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
 
Enancing Threat Detection with Big Data and AI
Enancing Threat Detection with Big Data and AIEnancing Threat Detection with Big Data and AI
Enancing Threat Detection with Big Data and AI
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...
Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...
Industrial IoT Applications: Making the Connection and Extracting Value (IOT3...
 
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
 
Cisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data centerCisco Connect 2018 Vietnam - building a secure data center
Cisco Connect 2018 Vietnam - building a secure data center
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center Cisco Connect 2018 Indonesia - Building a secure data center
Cisco Connect 2018 Indonesia - Building a secure data center
 
Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?Internet of Things (IoT) - in the cloud or rather on-premises?
Internet of Things (IoT) - in the cloud or rather on-premises?
 

Recently uploaded

Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 

Recently uploaded (20)

Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 

Consent , crypto and information infrastructure systems