SlideShare a Scribd company logo
Cookies and more...




                      By,
                      Vinay Shriyan
It all started from a ...




             ...shopping cart at Netscape
Wikipedia says...




                 ...a cookie is used for an origin
website to send state information to a user's
browser and for the browser to return the state
information to the origin site
Typical flow

             Go to URL


            Read Cookie


                          Yes
              Is Cookie         Write new Cookie
    No         Empty?



 Use Cookie info




Update Cookie info
Unique Cookies


                             47,908
    382,576


13,489        12,246                     11,219




   10,580         9,895                  4,372

                          Source: Feb 2012 statistics by cookielaw.org
Cookies is used by 49.7% of all the websites.
Cookies cannot...
Automatically access to personal information

Read or write data to hard disk

Read or write information in cookies placed by
 other sites

Run programs on your computer
Cookies can...

Store any information you explicitly provide to a
site



Track your interaction with parent site such as
  pages visited, time of visits, number of visits
Max 4Kb in size




                                            3 imp Attributes: Name,Value,Expiry




300 cookies per browser
Cookies are used for...
User Tracking                     Session Management




                Personalization
Ad server




            Web server
Social widgets are
collaborative but act as homing
devices for online advertisers...
Facebook Case study




I window shop at
Yes I Love
Audience profiling


It knows who you are

        +              =   Better Targeting

  What you like
It knows you, before you even login...
Cookies and UK
  26th May 2011, the Cookie law


  Obtain informed consent from visitors




82% of digital marketers think the EU cookie law is bad for the web
                                                - eConsultancy.com
The ICO case




           “Websites face £500k fine for
           breaching ‘cookie’ law“
Cookies and Privacy
Opt-out of targeting
Opt-out of targeting
RTB – Ecosystem, remember?
What about Chitika??
Thank you...

More Related Content

What's hot

Introduction to Human Computer Interaction
Introduction to Human Computer InteractionIntroduction to Human Computer Interaction
Introduction to Human Computer Interaction
International Institute of Information Technology (I²IT)
 
Human computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solvingHuman computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solving
N.Jagadish Kumar
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
sai anjaneya
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
Introduction to Electronic Commerce
Introduction to Electronic CommerceIntroduction to Electronic Commerce
Introduction to Electronic Commerce
Er. Nawaraj Bhandari
 
[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology
Sukanya Ben
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
Quick Heal Technologies Ltd.
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
Mazni Salleh
 
Chapter 5 tech in e commerce
Chapter 5 tech in e commerceChapter 5 tech in e commerce
Chapter 5 tech in e commerce
Marya Sholevar
 
Phishing
PhishingPhishing
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
Yäsh Chaudhary
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
shindept123
 
Internet as network infrastructure & ecommerce business model
Internet as network infrastructure & ecommerce business modelInternet as network infrastructure & ecommerce business model
Internet as network infrastructure & ecommerce business model
Sandesh Jonchhe
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
abdullah roomi
 
Internet Basics Notes Class 10 CBSE.pptx
Internet Basics Notes Class 10 CBSE.pptxInternet Basics Notes Class 10 CBSE.pptx
Internet Basics Notes Class 10 CBSE.pptx
Sumit Kumar
 
internet ppt
internet pptinternet ppt
internet ppt
Saransh Modgil
 
Digital marketing Small Concept
Digital marketing Small ConceptDigital marketing Small Concept
Digital marketing Small Concept
Hari Haran
 
Internet issues
Internet issuesInternet issues
Internet issuesCJ900
 
All About Internet Services
All About Internet ServicesAll About Internet Services
All About Internet Services
Varun
 
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Habib Ullah Qamar
 

What's hot (20)

Introduction to Human Computer Interaction
Introduction to Human Computer InteractionIntroduction to Human Computer Interaction
Introduction to Human Computer Interaction
 
Human computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solvingHuman computer interaction-Memory, Reasoning and Problem solving
Human computer interaction-Memory, Reasoning and Problem solving
 
Human computer interaction
Human computer interactionHuman computer interaction
Human computer interaction
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Introduction to Electronic Commerce
Introduction to Electronic CommerceIntroduction to Electronic Commerce
Introduction to Electronic Commerce
 
[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
Internet ethics and rules
Internet ethics and rulesInternet ethics and rules
Internet ethics and rules
 
Chapter 5 tech in e commerce
Chapter 5 tech in e commerceChapter 5 tech in e commerce
Chapter 5 tech in e commerce
 
Phishing
PhishingPhishing
Phishing
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Internet as network infrastructure & ecommerce business model
Internet as network infrastructure & ecommerce business modelInternet as network infrastructure & ecommerce business model
Internet as network infrastructure & ecommerce business model
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Internet Basics Notes Class 10 CBSE.pptx
Internet Basics Notes Class 10 CBSE.pptxInternet Basics Notes Class 10 CBSE.pptx
Internet Basics Notes Class 10 CBSE.pptx
 
internet ppt
internet pptinternet ppt
internet ppt
 
Digital marketing Small Concept
Digital marketing Small ConceptDigital marketing Small Concept
Digital marketing Small Concept
 
Internet issues
Internet issuesInternet issues
Internet issues
 
All About Internet Services
All About Internet ServicesAll About Internet Services
All About Internet Services
 
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
 

Viewers also liked

Google Adwords - Marketing Analysis
Google Adwords - Marketing AnalysisGoogle Adwords - Marketing Analysis
Google Adwords - Marketing Analysis
Aniket Kalaskar
 
Amazon hidden empire
Amazon hidden empireAmazon hidden empire
Amazon hidden empirejuthanik
 
Introduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the PixelIntroduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the Pixel
Wishpond
 
Online_Offline_infographic
Online_Offline_infographicOnline_Offline_infographic
Online_Offline_infographicJohn Haake
 
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
Unified
 
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
Intracto digital agency
 
MMA Forum D2 Track 04 - Privacidade
MMA Forum D2 Track 04 - PrivacidadeMMA Forum D2 Track 04 - Privacidade
MMA Forum D2 Track 04 - Privacidade
Mobile Marketing Association
 
Knowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertisingKnowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertising
Lode Lauwers
 
The Cookie--Digital Story
The Cookie--Digital StoryThe Cookie--Digital Story
The Cookie--Digital Story
Rob Jacklin
 
UK Cookie Law Compliance: Implications & Answers
 UK Cookie Law Compliance: Implications & Answers  UK Cookie Law Compliance: Implications & Answers
UK Cookie Law Compliance: Implications & Answers
Ensighten
 
WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?
World Federation of Advertisers (WFA)
 
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Invest Northern Ireland
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party Cookies
Will Clayton
 
LUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the People
LUMA Partners
 
What is Retargeting?
What is Retargeting?What is Retargeting?
What is Retargeting?
Rebecca Daneault
 
The History of Advertising Technology
The History of Advertising TechnologyThe History of Advertising Technology
The History of Advertising Technology
Clearcode
 

Viewers also liked (16)

Google Adwords - Marketing Analysis
Google Adwords - Marketing AnalysisGoogle Adwords - Marketing Analysis
Google Adwords - Marketing Analysis
 
Amazon hidden empire
Amazon hidden empireAmazon hidden empire
Amazon hidden empire
 
Introduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the PixelIntroduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the Pixel
 
Online_Offline_infographic
Online_Offline_infographicOnline_Offline_infographic
Online_Offline_infographic
 
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
 
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
 
MMA Forum D2 Track 04 - Privacidade
MMA Forum D2 Track 04 - PrivacidadeMMA Forum D2 Track 04 - Privacidade
MMA Forum D2 Track 04 - Privacidade
 
Knowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertisingKnowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertising
 
The Cookie--Digital Story
The Cookie--Digital StoryThe Cookie--Digital Story
The Cookie--Digital Story
 
UK Cookie Law Compliance: Implications & Answers
 UK Cookie Law Compliance: Implications & Answers  UK Cookie Law Compliance: Implications & Answers
UK Cookie Law Compliance: Implications & Answers
 
WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?
 
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party Cookies
 
LUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the People
 
What is Retargeting?
What is Retargeting?What is Retargeting?
What is Retargeting?
 
The History of Advertising Technology
The History of Advertising TechnologyThe History of Advertising Technology
The History of Advertising Technology
 

Similar to Cookies (in Online Advertising)

Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
EricZhuZhengyi
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
Abhi Bhardwaj
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
Abhi Bhardwaj
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
Archana Dwivedi
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
anita gouda
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
HTS Hosting
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
Piwik PRO
 
Cookies
CookiesCookies
Cookies
Mansour027
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to know
Crafted
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanismJivan Nepali
 
Cookies in php lecture 1
Cookies in php lecture 1Cookies in php lecture 1
Cookies in php lecture 1
Mudasir Syed
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]
yvonneschnurr
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentationNilu Desai
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessionsSukrit Gupta
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
MIsmail73
 
Cookie Policy Verfication Framework
Cookie Policy Verfication FrameworkCookie Policy Verfication Framework
Cookie Policy Verfication Framework
sitemorse
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookies
Similarweb
 
What are cookies and what is changing
What are cookies and what is changingWhat are cookies and what is changing
What are cookies and what is changing
DCRB
 

Similar to Cookies (in Online Advertising) (20)

Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
 
Cookies
CookiesCookies
Cookies
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to know
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanism
 
Cookies in php lecture 1
Cookies in php lecture 1Cookies in php lecture 1
Cookies in php lecture 1
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessions
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 
Cookies
CookiesCookies
Cookies
 
Cookie Policy Verfication Framework
Cookie Policy Verfication FrameworkCookie Policy Verfication Framework
Cookie Policy Verfication Framework
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookies
 
What are cookies and what is changing
What are cookies and what is changingWhat are cookies and what is changing
What are cookies and what is changing
 

More from Vinay Shriyan, Certified ScrumMaster® (CSM)

Biography of a giant - Amazon.com
Biography of a giant - Amazon.comBiography of a giant - Amazon.com
Biography of a giant - Amazon.com
Vinay Shriyan, Certified ScrumMaster® (CSM)
 
Giving Feedbacks (Management)
Giving Feedbacks (Management)Giving Feedbacks (Management)
Giving Feedbacks (Management)
Vinay Shriyan, Certified ScrumMaster® (CSM)
 
HNI Selling - The Rolls Royce Case
HNI Selling  - The Rolls Royce CaseHNI Selling  - The Rolls Royce Case
HNI Selling - The Rolls Royce Case
Vinay Shriyan, Certified ScrumMaster® (CSM)
 
Google Ad - Parisian Love
Google Ad - Parisian LoveGoogle Ad - Parisian Love
Brand management Apple inc.
Brand management Apple inc.Brand management Apple inc.
Brand management ICICI Bank
Brand management ICICI BankBrand management ICICI Bank
MIS and BPO (Avaya's solution)
MIS and BPO (Avaya's solution)MIS and BPO (Avaya's solution)
MIS and BPO (Avaya's solution)
Vinay Shriyan, Certified ScrumMaster® (CSM)
 
Personality not included (Book concise)
Personality not included (Book concise)Personality not included (Book concise)
Personality not included (Book concise)
Vinay Shriyan, Certified ScrumMaster® (CSM)
 
Personality not included (Book concise)
Personality not included (Book concise)Personality not included (Book concise)
Personality not included (Book concise)
Vinay Shriyan, Certified ScrumMaster® (CSM)
 
Environment reporting (Starbucks case)
Environment reporting (Starbucks case)Environment reporting (Starbucks case)
Environment reporting (Starbucks case)
Vinay Shriyan, Certified ScrumMaster® (CSM)
 
Snowball Sampling Using Social Networks to Research Non heterosexual Women
Snowball Sampling Using Social Networks to Research Non heterosexual WomenSnowball Sampling Using Social Networks to Research Non heterosexual Women
Snowball Sampling Using Social Networks to Research Non heterosexual Women
Vinay Shriyan, Certified ScrumMaster® (CSM)
 
Environment ethics (brief)
Environment ethics (brief)Environment ethics (brief)
Search engines, SEO and SEM
Search engines, SEO and SEMSearch engines, SEO and SEM
Intro to Web Development
Intro to Web DevelopmentIntro to Web Development

More from Vinay Shriyan, Certified ScrumMaster® (CSM) (17)

How to sell anything to anybody - Joe Girard
How to sell anything to anybody - Joe GirardHow to sell anything to anybody - Joe Girard
How to sell anything to anybody - Joe Girard
 
Biography of a giant - Amazon.com
Biography of a giant - Amazon.comBiography of a giant - Amazon.com
Biography of a giant - Amazon.com
 
Giving Feedbacks (Management)
Giving Feedbacks (Management)Giving Feedbacks (Management)
Giving Feedbacks (Management)
 
HNI Selling - The Rolls Royce Case
HNI Selling  - The Rolls Royce CaseHNI Selling  - The Rolls Royce Case
HNI Selling - The Rolls Royce Case
 
Google Ad - Parisian Love
Google Ad - Parisian LoveGoogle Ad - Parisian Love
Google Ad - Parisian Love
 
Brand management Apple inc.
Brand management Apple inc.Brand management Apple inc.
Brand management Apple inc.
 
Brand management ICICI Bank
Brand management ICICI BankBrand management ICICI Bank
Brand management ICICI Bank
 
MIS and BPO (Avaya's solution)
MIS and BPO (Avaya's solution)MIS and BPO (Avaya's solution)
MIS and BPO (Avaya's solution)
 
Personality not included (Book concise)
Personality not included (Book concise)Personality not included (Book concise)
Personality not included (Book concise)
 
Personality not included (Book concise)
Personality not included (Book concise)Personality not included (Book concise)
Personality not included (Book concise)
 
Environment reporting (Starbucks case)
Environment reporting (Starbucks case)Environment reporting (Starbucks case)
Environment reporting (Starbucks case)
 
Snowball Sampling Using Social Networks to Research Non heterosexual Women
Snowball Sampling Using Social Networks to Research Non heterosexual WomenSnowball Sampling Using Social Networks to Research Non heterosexual Women
Snowball Sampling Using Social Networks to Research Non heterosexual Women
 
Environment ethics (brief)
Environment ethics (brief)Environment ethics (brief)
Environment ethics (brief)
 
Making a business(or any other ) presentation worth it
Making a business(or any other ) presentation worth itMaking a business(or any other ) presentation worth it
Making a business(or any other ) presentation worth it
 
Effect of demographics on consumer behavior
Effect of demographics on consumer behaviorEffect of demographics on consumer behavior
Effect of demographics on consumer behavior
 
Search engines, SEO and SEM
Search engines, SEO and SEMSearch engines, SEO and SEM
Search engines, SEO and SEM
 
Intro to Web Development
Intro to Web DevelopmentIntro to Web Development
Intro to Web Development
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Cookies (in Online Advertising)