SlideShare a Scribd company logo
March 9, 2014
The darknet emerges

hugeinc.com
info@hugeinc.com
45 Main St. #220 Brooklyn, NY 11201
+1 718 625 4843
Darknet: The spaces and
technologies used avoid
personal identification on the
internet.
Components of the current darknet
•  Tor / Onion routing
•  VPNs of all types
•  PGP and encryption: Email, chat, whole disk, etc.
•  Bitcoin et al: pseudonymous crypto-currencies
•  Secure hardware environments: Linux and open source
software, non Intel / AMD processors
•  Encrypted, distributed virtual hosting (think Pirate Bay)
•  Generally speaking: Distributed, P2P, non-centralized
software infrastructure
•  Real-world OpSec: Keeping quiet
The Darknet in the news.
•  Drugs (Silk Road)
•  Wikileaks
•  Anonymous / Hacktivism
•  Civil disobedience
•  Murder / extortion for hire
•  Weapons
•  Personal / private information
•  Software, botnet, or exploit marketplaces
So why would anybody want to
be there?
“A mill for grinding rouges honest”
-Jeremy Bentham
The decline of physical privacy.
Generally speaking decent people.
The opportunities for abuse of the
panopticon are immense.
“Power corrupts. Absolute power
corrupts absolutely.”
-­‐Lord	
  Acton,	
  1887	
  
Blackmail.
Trading on personal information.
Exposure of unpopular / private
beliefs or activities.
As ‘real world’
privacy
disappears, digital
privacy will grow.
The birth of digital
schizophrenia.
SecDent
End-to-end encryption is just an app
away.
Commercializing privacy.

•  Silent Circle
•  Anonyme
•  Snapchat
•  Secret
•  Meshnet hardware / software
•  Anonymous local area networks
Emerging darknet capabilities.
•  Distributed platforms to enable contracts between
anonymous SecDents
•  Anonymous multi-signature escrow accounts to
allow for bonded transactions
•  SecDent ownership of real-world assets
•  Anonymous, multi-hop delivery services and
dropboxes
•  Encrypted
communications
•  Secure computing
environment
•  Bitcoin wallets
•  Whole-disk encryption
•  SecDents / handles
•  Low-risk political and
social speech
"The Personal is Political”
-Carol Hanisch
Defense of critical
institutions and
democratic processes
will require adoption of
darknet elements.
Questions…
hugeinc.com
info@hugeinc.com
45 Main St. #220 Brooklyn, NY 11201
+1 718 625 4843

More Related Content

What's hot

What's hot (20)

Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Darknet
DarknetDarknet
Darknet
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Darknet
DarknetDarknet
Darknet
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
 
Dark wed
Dark wedDark wed
Dark wed
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The dark web
The dark webThe dark web
The dark web
 

Viewers also liked

Coaching performance
Coaching performanceCoaching performance
Coaching performanceLinh Coach
 
Coaching for Performance - @Ei4Change
Coaching for Performance - @Ei4ChangeCoaching for Performance - @Ei4Change
Coaching for Performance - @Ei4ChangeEi4Change
 
Coaching Philosophy
Coaching PhilosophyCoaching Philosophy
Coaching PhilosophyRewazie
 
How To Use The GROW Coaching Model
How To Use The GROW Coaching ModelHow To Use The GROW Coaching Model
How To Use The GROW Coaching ModelSean McPheat
 
Mentoring & coaching for optimal performance
Mentoring & coaching for optimal performanceMentoring & coaching for optimal performance
Mentoring & coaching for optimal performanceFaakor Agyekum
 

Viewers also liked (8)

Coaching performance
Coaching performanceCoaching performance
Coaching performance
 
InsideOut Coaching
InsideOut CoachingInsideOut Coaching
InsideOut Coaching
 
Coaching for Performance - @Ei4Change
Coaching for Performance - @Ei4ChangeCoaching for Performance - @Ei4Change
Coaching for Performance - @Ei4Change
 
Coaching Philosophy
Coaching PhilosophyCoaching Philosophy
Coaching Philosophy
 
Grow model ppt
Grow model pptGrow model ppt
Grow model ppt
 
Coaching skills
Coaching skillsCoaching skills
Coaching skills
 
How To Use The GROW Coaching Model
How To Use The GROW Coaching ModelHow To Use The GROW Coaching Model
How To Use The GROW Coaching Model
 
Mentoring & coaching for optimal performance
Mentoring & coaching for optimal performanceMentoring & coaching for optimal performance
Mentoring & coaching for optimal performance
 

Similar to The Darknet Emerges

The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?hackdemocracy
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileraevenroxas
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous CommunicationFabio Pietrosanti
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leonDarwin de Leon
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchismq3XKFc5XR
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Gabor Szathmari
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 

Similar to The Darknet Emerges (20)

The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
 
Dark net
Dark netDark net
Dark net
 
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
 
Dark Net
Dark NetDark Net
Dark Net
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Dark web
Dark webDark web
Dark web
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
 
Dark Web
Dark WebDark Web
Dark Web
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 

More from Andrew Delamarter

Geeking out on AdWords paid search tactics - Internet Summit 2013
Geeking out on AdWords paid search tactics - Internet Summit 2013Geeking out on AdWords paid search tactics - Internet Summit 2013
Geeking out on AdWords paid search tactics - Internet Summit 2013Andrew Delamarter
 
Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...
Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...
Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...Andrew Delamarter
 
Recent Developments in SEO and Paid Search
Recent Developments in SEO and Paid SearchRecent Developments in SEO and Paid Search
Recent Developments in SEO and Paid SearchAndrew Delamarter
 
Creating an inbound marketing services capacity
Creating an inbound marketing services capacityCreating an inbound marketing services capacity
Creating an inbound marketing services capacityAndrew Delamarter
 
Coordinating agencies aligning campaigns
Coordinating agencies aligning campaignsCoordinating agencies aligning campaigns
Coordinating agencies aligning campaignsAndrew Delamarter
 
Creating and running a homeschool collective / coop / alternative school
Creating and running a homeschool collective / coop / alternative schoolCreating and running a homeschool collective / coop / alternative school
Creating and running a homeschool collective / coop / alternative schoolAndrew Delamarter
 

More from Andrew Delamarter (9)

Scoop on converged media
Scoop on converged mediaScoop on converged media
Scoop on converged media
 
Geeking out on AdWords paid search tactics - Internet Summit 2013
Geeking out on AdWords paid search tactics - Internet Summit 2013Geeking out on AdWords paid search tactics - Internet Summit 2013
Geeking out on AdWords paid search tactics - Internet Summit 2013
 
Metadata Roundup for SEO
Metadata Roundup for SEOMetadata Roundup for SEO
Metadata Roundup for SEO
 
The Inbound Marketing Audit
The Inbound Marketing AuditThe Inbound Marketing Audit
The Inbound Marketing Audit
 
Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...
Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...
Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...
 
Recent Developments in SEO and Paid Search
Recent Developments in SEO and Paid SearchRecent Developments in SEO and Paid Search
Recent Developments in SEO and Paid Search
 
Creating an inbound marketing services capacity
Creating an inbound marketing services capacityCreating an inbound marketing services capacity
Creating an inbound marketing services capacity
 
Coordinating agencies aligning campaigns
Coordinating agencies aligning campaignsCoordinating agencies aligning campaigns
Coordinating agencies aligning campaigns
 
Creating and running a homeschool collective / coop / alternative school
Creating and running a homeschool collective / coop / alternative schoolCreating and running a homeschool collective / coop / alternative school
Creating and running a homeschool collective / coop / alternative school
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...QADay
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

The Darknet Emerges