SlideShare a Scribd company logo
Concept of TCP/IP
KHNOG 25 January, 2017
Presented by: Mom Sothea
IP Core Network Planning & Design Engineer @ Ezecom Limited &
AEU Cisco Instructor
Email: sotheamom518@gmail.com/ Skype:npic.sothea
Agenda
v The Purpose of the OSI model
v The Physical Layer of the OSI model
v The Data Link Layer of the OSI model
v The Network Layer of the OSI model
v The Transport Layer of the OSI model
v The Session Layer of the OSI model
v The Presentation Layer of the OSI model
v The Application Layer of the OSI model
v The Purpose of TCP/IP stack
v Compares the TCP/IP stack to the OSI model
v Describe Protocol data units
v Encapsulation
v De-Encapsulation
v Encapsulation and De-Encapsulation Across a Network
Why a Layered Network Model?
v Reduces complexity
v Standardizes interfaces
v Facilitates modular engineering
v Ensures interoperable technology
v Accelerates evolution
v Simplifies teaching and learning
Appication
Presentation
Session
Transport
Network
Data Link
Physical
PDU Names
Layer 1: The Physical Layer
Binary Transmission:
Layer 2: The Data Link Layer
Layer 3: The Network Layer
Layer 4: The Transport Layer
Layer 5: The Session Layer
Layer 6: The Presentation Layer
Layer 7: The Application Layer
TCP/IP Stack
TCP/IP Stack vs the OSI Model
Protocol Data Units
Encapsulation
De-Encapsulation
Encapsulation and
De-Encapsulation Across a Network
Core Concept of TCP/IP

More Related Content

Viewers also liked

Network Security-Honeypot
Network Security-HoneypotNetwork Security-Honeypot
Network Security-Honeypot
KHNOG
 
Hotspot on Mikrotik Router
Hotspot on Mikrotik RouterHotspot on Mikrotik Router
Hotspot on Mikrotik Router
KHNOG
 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User Manager
KHNOG
 
Network Attack Counter
Network Attack CounterNetwork Attack Counter
Network Attack Counter
KHNOG
 
Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on Linux
KHNOG
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
KHNOG
 
Network Exploitation
Network ExploitationNetwork Exploitation
Network Exploitation
KHNOG
 
Hot Spot Network Manager
Hot Spot Network ManagerHot Spot Network Manager
Hot Spot Network Manager
HS NETWORK MANAGER
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)
KHNOG
 
Best Practices Fiber and SFP Inspection
Best Practices Fiber and SFP InspectionBest Practices Fiber and SFP Inspection
Best Practices Fiber and SFP Inspection
KHNOG
 
BGP
BGPBGP
BGP
KHNOG
 
Terminal Access Controller
Terminal Access ControllerTerminal Access Controller
Terminal Access Controller
KHNOG
 
Interior Routing Protocols
Interior Routing ProtocolsInterior Routing Protocols
Interior Routing Protocols
KHNOG
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)
KHNOG
 
Introduction to BRAS
Introduction to BRASIntroduction to BRAS
Introduction to BRAS
KHNOG
 
Mikrotik. ( hotspot )
Mikrotik. ( hotspot )Mikrotik. ( hotspot )
Mikrotik. ( hotspot )
Agus Setyawan
 
PPPoE With Mikrotik and Radius
PPPoE With Mikrotik and RadiusPPPoE With Mikrotik and Radius
PPPoE With Mikrotik and Radius
Dashamir Hoxha
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
KHNOG
 
Mikrotik API
Mikrotik APIMikrotik API
Mikrotik API
Achmad Mardiansyah
 
Mikrotik firewall raw table
Mikrotik firewall raw tableMikrotik firewall raw table
Mikrotik firewall raw table
Achmad Mardiansyah
 

Viewers also liked (20)

Network Security-Honeypot
Network Security-HoneypotNetwork Security-Honeypot
Network Security-Honeypot
 
Hotspot on Mikrotik Router
Hotspot on Mikrotik RouterHotspot on Mikrotik Router
Hotspot on Mikrotik Router
 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User Manager
 
Network Attack Counter
Network Attack CounterNetwork Attack Counter
Network Attack Counter
 
Bandwidth Management on Linux
Bandwidth Management on LinuxBandwidth Management on Linux
Bandwidth Management on Linux
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
Network Exploitation
Network ExploitationNetwork Exploitation
Network Exploitation
 
Hot Spot Network Manager
Hot Spot Network ManagerHot Spot Network Manager
Hot Spot Network Manager
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)
 
Best Practices Fiber and SFP Inspection
Best Practices Fiber and SFP InspectionBest Practices Fiber and SFP Inspection
Best Practices Fiber and SFP Inspection
 
BGP
BGPBGP
BGP
 
Terminal Access Controller
Terminal Access ControllerTerminal Access Controller
Terminal Access Controller
 
Interior Routing Protocols
Interior Routing ProtocolsInterior Routing Protocols
Interior Routing Protocols
 
Network Mapper (NMAP)
Network Mapper (NMAP)Network Mapper (NMAP)
Network Mapper (NMAP)
 
Introduction to BRAS
Introduction to BRASIntroduction to BRAS
Introduction to BRAS
 
Mikrotik. ( hotspot )
Mikrotik. ( hotspot )Mikrotik. ( hotspot )
Mikrotik. ( hotspot )
 
PPPoE With Mikrotik and Radius
PPPoE With Mikrotik and RadiusPPPoE With Mikrotik and Radius
PPPoE With Mikrotik and Radius
 
Policy Based Routing (PBR)
Policy Based Routing (PBR)Policy Based Routing (PBR)
Policy Based Routing (PBR)
 
Mikrotik API
Mikrotik APIMikrotik API
Mikrotik API
 
Mikrotik firewall raw table
Mikrotik firewall raw tableMikrotik firewall raw table
Mikrotik firewall raw table
 

Similar to Core Concept of TCP/IP

OSI Model VS TCP/IP Model|| Difference Between them
OSI Model VS TCP/IP Model|| Difference Between themOSI Model VS TCP/IP Model|| Difference Between them
OSI Model VS TCP/IP Model|| Difference Between them
Suman Mia
 
OSI & TCP/IP Model
OSI & TCP/IP ModelOSI & TCP/IP Model
OSI & TCP/IP Model
ShohanaakterKakon
 
computer communication networks MCQs
 computer communication networks MCQs   computer communication networks MCQs
computer communication networks MCQs
raghad mejeed
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
MrMuneeb2
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxCSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
Muhammad Sohail
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
EnterpriseGRC Solutions, Inc.
 
O’ level
O’ levelO’ level
O’ level
Monika Tiwari
 
Computer Network - Introduction to Networks
Computer Network - Introduction to NetworksComputer Network - Introduction to Networks
Computer Network - Introduction to Networks
Swapnil Agrawal
 
IP_Subnet training.pptx
IP_Subnet training.pptxIP_Subnet training.pptx
IP_Subnet training.pptx
karthikvcyber
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IPMannu Khani
 
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 NotesCisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Ahmed Gad
 
1834902097 class note 3
1834902097 class note 31834902097 class note 3
1834902097 class note 3
MehediHassan468099
 
Protocols
ProtocolsProtocols
Protocols
Aashima Wadhwa
 
layering.ppt
layering.pptlayering.ppt
layering.ppt
Rashmin Tanna
 
Fundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP TechnologyFundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP Technology
softconsystem
 
Lecture5-6-7.pdf
Lecture5-6-7.pdfLecture5-6-7.pdf
Lecture5-6-7.pdf
Rachel70983
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdfCSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
BoostHub
 
Fredlug networking
Fredlug networkingFredlug networking
Fredlug networking
plarsen67
 
Ccna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | KeralaCcna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | Kerala
IndiaOptions Softwares
 

Similar to Core Concept of TCP/IP (20)

OSI Model VS TCP/IP Model|| Difference Between them
OSI Model VS TCP/IP Model|| Difference Between themOSI Model VS TCP/IP Model|| Difference Between them
OSI Model VS TCP/IP Model|| Difference Between them
 
OSI & TCP/IP Model
OSI & TCP/IP ModelOSI & TCP/IP Model
OSI & TCP/IP Model
 
computer communication networks MCQs
 computer communication networks MCQs   computer communication networks MCQs
computer communication networks MCQs
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptxCSC1202_3_The_OSI_Reference_Model_-_V2.pptx
CSC1202_3_The_OSI_Reference_Model_-_V2.pptx
 
Networking and communications security – network architecture design
Networking and communications security – network architecture designNetworking and communications security – network architecture design
Networking and communications security – network architecture design
 
O’ level
O’ levelO’ level
O’ level
 
Computer Network - Introduction to Networks
Computer Network - Introduction to NetworksComputer Network - Introduction to Networks
Computer Network - Introduction to Networks
 
IP_Subnet training.pptx
IP_Subnet training.pptxIP_Subnet training.pptx
IP_Subnet training.pptx
 
Osi model vs TCP/IP
Osi model vs TCP/IPOsi model vs TCP/IP
Osi model vs TCP/IP
 
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 NotesCisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
Cisco Certified Network Associate (CCNA) - R&S - Semester 1 Notes
 
1834902097 class note 3
1834902097 class note 31834902097 class note 3
1834902097 class note 3
 
Protocols
ProtocolsProtocols
Protocols
 
layering.ppt
layering.pptlayering.ppt
layering.ppt
 
Fundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP TechnologyFundamentals of Ethernet /IP Technology
Fundamentals of Ethernet /IP Technology
 
Lecture5-6-7.pdf
Lecture5-6-7.pdfLecture5-6-7.pdf
Lecture5-6-7.pdf
 
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdfCSC1202_3_The_OSI_Reference_Model_-_V2.pdf
CSC1202_3_The_OSI_Reference_Model_-_V2.pdf
 
Fredlug networking
Fredlug networkingFredlug networking
Fredlug networking
 
Ccna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | KeralaCcna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | Kerala
 
introduction about TCP/IP
introduction about TCP/IPintroduction about TCP/IP
introduction about TCP/IP
 

More from KHNOG

Why / How to become the Linux certified
Why / How to become the Linux certifiedWhy / How to become the Linux certified
Why / How to become the Linux certified
KHNOG
 
ElasticISP
ElasticISPElasticISP
ElasticISP
KHNOG
 
IT Service Level Agreement
IT Service Level AgreementIT Service Level Agreement
IT Service Level Agreement
KHNOG
 
Rapid Ring Protection Protocol (RRPP)
Rapid Ring Protection Protocol (RRPP)Rapid Ring Protection Protocol (RRPP)
Rapid Ring Protection Protocol (RRPP)
KHNOG
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to Python
KHNOG
 
Transmission Technologies
Transmission TechnologiesTransmission Technologies
Transmission Technologies
KHNOG
 
Testing Fiber-Optic Systems
Testing Fiber-Optic Systems Testing Fiber-Optic Systems
Testing Fiber-Optic Systems
KHNOG
 
RPM Junos-service
RPM Junos-serviceRPM Junos-service
RPM Junos-service
KHNOG
 
Incoming Outgoing Spam Filter
Incoming Outgoing Spam FilterIncoming Outgoing Spam Filter
Incoming Outgoing Spam Filter
KHNOG
 
MPLS
MPLSMPLS
MPLS
KHNOG
 
How to Prevent DHCP Spoofing
How to Prevent DHCP SpoofingHow to Prevent DHCP Spoofing
How to Prevent DHCP Spoofing
KHNOG
 
Software Define Network (SDN) and Openflow
Software Define Network (SDN) and OpenflowSoftware Define Network (SDN) and Openflow
Software Define Network (SDN) and Openflow
KHNOG
 

More from KHNOG (12)

Why / How to become the Linux certified
Why / How to become the Linux certifiedWhy / How to become the Linux certified
Why / How to become the Linux certified
 
ElasticISP
ElasticISPElasticISP
ElasticISP
 
IT Service Level Agreement
IT Service Level AgreementIT Service Level Agreement
IT Service Level Agreement
 
Rapid Ring Protection Protocol (RRPP)
Rapid Ring Protection Protocol (RRPP)Rapid Ring Protection Protocol (RRPP)
Rapid Ring Protection Protocol (RRPP)
 
Introduction to Python
Introduction to PythonIntroduction to Python
Introduction to Python
 
Transmission Technologies
Transmission TechnologiesTransmission Technologies
Transmission Technologies
 
Testing Fiber-Optic Systems
Testing Fiber-Optic Systems Testing Fiber-Optic Systems
Testing Fiber-Optic Systems
 
RPM Junos-service
RPM Junos-serviceRPM Junos-service
RPM Junos-service
 
Incoming Outgoing Spam Filter
Incoming Outgoing Spam FilterIncoming Outgoing Spam Filter
Incoming Outgoing Spam Filter
 
MPLS
MPLSMPLS
MPLS
 
How to Prevent DHCP Spoofing
How to Prevent DHCP SpoofingHow to Prevent DHCP Spoofing
How to Prevent DHCP Spoofing
 
Software Define Network (SDN) and Openflow
Software Define Network (SDN) and OpenflowSoftware Define Network (SDN) and Openflow
Software Define Network (SDN) and Openflow
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

Core Concept of TCP/IP