SlideShare a Scribd company logo
How to build a mass
notification service for
disaster recovery
www.databarracks.com | 2www.databarracks.com | 2
INTRO &
AGENDA
Duration: 30 mins
(including Q&A)
Type questions on
the right
Q
• What do I need from a mass notification
service?
• Overview of the tools needed to build your own
• Step-by-step guide of how to build the service
• Further/custom development
*Slides will be made available and sent out following this session
www.databarracks.com | 3www.databarracks.com | 3
WHAT IS
MASS
NOTIFICATION
SERVICE?
Communicating
at Scale
Separate from
normal
communications
For staff, suppliers,
customers
www.databarracks.com | 4www.databarracks.com | 4
WHAT IS MASS NOTIFICATION SERVICE?
• Letter
• Email
• Group SMS, WhatsApp (or other
OTT messaging service)
• Reply-all
• Correct contact information
• Notifications enabled?
When you need to communicate with a
group, what method do you use?
What limitations do they have?
www.databarracks.com | 5www.databarracks.com | 5
WHAT IS MASS NOTIFICATION SERVICE?
What can small businesses use?
A call tree Contact card & recorded messages
www.databarracks.com | 6www.databarracks.com | 6
WHAT CAN I USE FOR A MASS
NOTIFICATION SERVICE?
An enterprise - standard Mass Notification tool:
Features include:
• Team management including department and GIS location
• Multiple communications channels
• Confirmed of delivery and receipt
http://www.cirmagazine.com/cir/reports/EMergencyandMassNotificationSoftwareReport2016-17.pdf
http://bciworld2017.com
What do big businesses need?
www.databarracks.com | 7www.databarracks.com | 7
WHAT DO I NEED FROM A MASS
NOTIFICATION SERVICE?
“Good” communication fulfils two basic
criteria:
• Relevancy
• Consistency
Considerations:
• How many different messages need to be
delivered?
• What kind of communication will be needed
throughout the incident?
• What is the consequence of failure?
What does my organisation need?
www.databarracks.com | 8www.databarracks.com | 8
WHAT DO I NEED FROM A MASS
NOTIFICATION SERVICE?
Scenario 1:
• You have a disaster and the recovery
process is effective, but you
communication with staff, customers
and suppliers is poor
Scenario 2:
• You have a disaster and the recovery
process isn’t smooth, but
communication with all parties
throughout is effective.
What would you prefer?
How to build your
own mass
notification service
www.databarracks.com | 10www.databarracks.com | 10
WHAT TOOLS DO I NEED?
A Twilio account from which
to push notifications via SMS
or voice.
Excel or Google Sheets to
manage and organise your
list of contacts.
A Zapier account to connect
your recipient list to your
Twilio account.
www.databarracks.com | 11www.databarracks.com | 11
STEP 1 - CREATING THE CONTACT LIST
• Give your spreadsheet a sensible
name
• Add your own contact details to
test
www.databarracks.com | 12www.databarracks.com | 12
STEP 1 - CREATE SUB-GROUPS
www.databarracks.com | 13www.databarracks.com | 13
STEP 1 - CREATE FULL LIST
www.databarracks.com | 14www.databarracks.com | 14
STEP 1 - PRE-PREPARE YOUR MESSAGES
www.databarracks.com | 15www.databarracks.com | 15
STEP 2 - SETUP A TWILIO ACCOUNT
https://www.twilio.com/
www.databarracks.com | 16www.databarracks.com | 16
STEP 3 – CREATE ZAPIER ACCOUNT TO
CONNECT CONTACT LIST TO TWILIO
https://zapier.com/
www.databarracks.com | 17www.databarracks.com | 17
STEP 3 – CREATE THE ‘ACTION’ IN TWILIO
www.databarracks.com | 18www.databarracks.com | 18
STEP 3 – CREATE THE MESSAGE
www.databarracks.com | 19www.databarracks.com | 19
STEP 3 – NAME THE ZAP
www.databarracks.com | 20www.databarracks.com | 20
STEP 3 – DONE
www.databarracks.com | 21www.databarracks.com | 21
DISASTER INVOCATION AND
NOTIFICATION PROCESS
Disaster
invocation
Open
spreadsheet for
pre-prepared
statement
Copy and update
statement into
Zapier
Copy contacts
into correct tab
Messages sent Users notified
www.databarracks.com | 22www.databarracks.com | 22
LIMITATIONS
• Free Zapier package (currently):
– Updates every 15 minutes. Paid plans reduce this to 5
mins.
– 5 Zaps
– 100 tasks per month
– Autoreplay of tasks not included
Free packages are subject to change!
www.databarracks.com | 23
FURTHER/CUSTOM DEVELOPMENT
• Connect to an internal CRM
• Fire off a webhook
• Send a message in Slack
• Add an email to personal email
address
• Use the Twilio API to connect with
internal applications
Use Zapier to connect to other apps Connect Twilio to internal systems
www.databarracks.com | 24www.databarracks.com | 24
SUMMARY
• Good communication is relevant and consistent
• Use a communication channel that will be received/checked
immediately
• Pre-prepare messages to save time during a disaster
• Build a solution that is fit for your needs
www.databarracks.com | 25
RESOURCES
• Using WhatsApp for mass
notifications:
– http://www.computerweekly.com/
news/450415007/CIO-interview-
Jon-Cheyne-IT-director-National-
Theatre
• Emergency and mass notification
software report 2016 – 2017
– http://www.cirmagazine.com/cir/r
eports/EMergencyandMassNotific
ationSoftwareReport2016-17.pdf
• BCI World
– http://bciworld2017.com
• The Business Continuity Podcast
– http://www.thebcpcast.com/
• The Cost of IT Downtime
– http://costofitdowntime.com/
www.databarracks.com | 26www.databarracks.com | 26
THE BCPCAST
http://www.thebcpcast.com/
Thank you

More Related Content

Similar to Databarracks webinar how to build a mass notification service for disaster recovery

Tech on a Budget 2.0
Tech on a Budget 2.0Tech on a Budget 2.0
Tech on a Budget 2.0
Matt Quinn
 
Data Management & Warehousing (David Walker, ex-World Pay) 2019 Confluent Str...
Data Management & Warehousing (David Walker, ex-World Pay) 2019 Confluent Str...Data Management & Warehousing (David Walker, ex-World Pay) 2019 Confluent Str...
Data Management & Warehousing (David Walker, ex-World Pay) 2019 Confluent Str...
confluent
 
How to Take a Proactive Approach to Increasing Marketing Database Integrity
How to Take a Proactive Approach to Increasing Marketing Database IntegrityHow to Take a Proactive Approach to Increasing Marketing Database Integrity
How to Take a Proactive Approach to Increasing Marketing Database Integrity
Integrate
 
Webinar - Office Productivity in the Cloud - 2016-08-18
Webinar - Office Productivity in the Cloud - 2016-08-18Webinar - Office Productivity in the Cloud - 2016-08-18
Webinar - Office Productivity in the Cloud - 2016-08-18
TechSoup
 
Enhancing and Automating Construction Operations with M365
Enhancing and Automating Construction Operations with M365Enhancing and Automating Construction Operations with M365
Enhancing and Automating Construction Operations with M365
Withum
 
A Path to Progress Part Two_ 2010_Q3
A Path to Progress Part Two_ 2010_Q3A Path to Progress Part Two_ 2010_Q3
A Path to Progress Part Two_ 2010_Q3DynamicDave
 
Healthcare Payer and Provider Webinar
Healthcare Payer and Provider WebinarHealthcare Payer and Provider Webinar
Healthcare Payer and Provider Webinar
Informatica Cloud
 
Cloud books presentation(2)
Cloud books presentation(2)Cloud books presentation(2)
Cloud books presentation(2)
Suraj Kumar
 
Community Systems Presents: Four Ways To Market Your Community's Commercial ...
Community Systems Presents:  Four Ways To Market Your Community's Commercial ...Community Systems Presents:  Four Ways To Market Your Community's Commercial ...
Community Systems Presents: Four Ways To Market Your Community's Commercial ...
Ben Wright
 
Digital Transformation: How Global Organisations can use the Power of Crowdso...
Digital Transformation: How Global Organisations can use the Power of Crowdso...Digital Transformation: How Global Organisations can use the Power of Crowdso...
Digital Transformation: How Global Organisations can use the Power of Crowdso...
Anne Märtens
 
Qlinkbox: the technology at the service of the company
Qlinkbox: the technology at the service of the companyQlinkbox: the technology at the service of the company
Qlinkbox: the technology at the service of the companyqlinkbox
 
Should Businesses Move to the Cloud
Should Businesses Move to the CloudShould Businesses Move to the Cloud
Should Businesses Move to the Cloud
nhainisaini
 
SilverStripe ♥︎ Mautic
SilverStripe ♥︎ MauticSilverStripe ♥︎ Mautic
SilverStripe ♥︎ Mautic
GiancarloDiMassa1
 
GraphTour - Popular Use Cases
GraphTour - Popular Use CasesGraphTour - Popular Use Cases
GraphTour - Popular Use Cases
Neo4j
 
Provide first level remote help desk support
Provide first level remote help desk supportProvide first level remote help desk support
Provide first level remote help desk support
Gera Paulos
 
Cloud Computing 4 Accounting Firms
Cloud Computing 4 Accounting FirmsCloud Computing 4 Accounting Firms
Cloud Computing 4 Accounting Firms
David Blumentals
 
Using digital performance analytic to optimize digital user experience id av5
Using digital performance analytic to optimize digital user experience id av5Using digital performance analytic to optimize digital user experience id av5
Using digital performance analytic to optimize digital user experience id av5
Jerry Tan
 
WordPress and Business Intelligence
WordPress and Business IntelligenceWordPress and Business Intelligence
WordPress and Business Intelligence
Tech Liminal
 
How To Achieve a 30% Reply Rate on Cold Emails with Hull, Paddle, Outreach, &...
How To Achieve a 30% Reply Rate on Cold Emails with Hull, Paddle, Outreach, &...How To Achieve a 30% Reply Rate on Cold Emails with Hull, Paddle, Outreach, &...
How To Achieve a 30% Reply Rate on Cold Emails with Hull, Paddle, Outreach, &...
Angela Sun
 
provide1923.pptx
provide1923.pptxprovide1923.pptx
provide1923.pptx
TadeseBeyene
 

Similar to Databarracks webinar how to build a mass notification service for disaster recovery (20)

Tech on a Budget 2.0
Tech on a Budget 2.0Tech on a Budget 2.0
Tech on a Budget 2.0
 
Data Management & Warehousing (David Walker, ex-World Pay) 2019 Confluent Str...
Data Management & Warehousing (David Walker, ex-World Pay) 2019 Confluent Str...Data Management & Warehousing (David Walker, ex-World Pay) 2019 Confluent Str...
Data Management & Warehousing (David Walker, ex-World Pay) 2019 Confluent Str...
 
How to Take a Proactive Approach to Increasing Marketing Database Integrity
How to Take a Proactive Approach to Increasing Marketing Database IntegrityHow to Take a Proactive Approach to Increasing Marketing Database Integrity
How to Take a Proactive Approach to Increasing Marketing Database Integrity
 
Webinar - Office Productivity in the Cloud - 2016-08-18
Webinar - Office Productivity in the Cloud - 2016-08-18Webinar - Office Productivity in the Cloud - 2016-08-18
Webinar - Office Productivity in the Cloud - 2016-08-18
 
Enhancing and Automating Construction Operations with M365
Enhancing and Automating Construction Operations with M365Enhancing and Automating Construction Operations with M365
Enhancing and Automating Construction Operations with M365
 
A Path to Progress Part Two_ 2010_Q3
A Path to Progress Part Two_ 2010_Q3A Path to Progress Part Two_ 2010_Q3
A Path to Progress Part Two_ 2010_Q3
 
Healthcare Payer and Provider Webinar
Healthcare Payer and Provider WebinarHealthcare Payer and Provider Webinar
Healthcare Payer and Provider Webinar
 
Cloud books presentation(2)
Cloud books presentation(2)Cloud books presentation(2)
Cloud books presentation(2)
 
Community Systems Presents: Four Ways To Market Your Community's Commercial ...
Community Systems Presents:  Four Ways To Market Your Community's Commercial ...Community Systems Presents:  Four Ways To Market Your Community's Commercial ...
Community Systems Presents: Four Ways To Market Your Community's Commercial ...
 
Digital Transformation: How Global Organisations can use the Power of Crowdso...
Digital Transformation: How Global Organisations can use the Power of Crowdso...Digital Transformation: How Global Organisations can use the Power of Crowdso...
Digital Transformation: How Global Organisations can use the Power of Crowdso...
 
Qlinkbox: the technology at the service of the company
Qlinkbox: the technology at the service of the companyQlinkbox: the technology at the service of the company
Qlinkbox: the technology at the service of the company
 
Should Businesses Move to the Cloud
Should Businesses Move to the CloudShould Businesses Move to the Cloud
Should Businesses Move to the Cloud
 
SilverStripe ♥︎ Mautic
SilverStripe ♥︎ MauticSilverStripe ♥︎ Mautic
SilverStripe ♥︎ Mautic
 
GraphTour - Popular Use Cases
GraphTour - Popular Use CasesGraphTour - Popular Use Cases
GraphTour - Popular Use Cases
 
Provide first level remote help desk support
Provide first level remote help desk supportProvide first level remote help desk support
Provide first level remote help desk support
 
Cloud Computing 4 Accounting Firms
Cloud Computing 4 Accounting FirmsCloud Computing 4 Accounting Firms
Cloud Computing 4 Accounting Firms
 
Using digital performance analytic to optimize digital user experience id av5
Using digital performance analytic to optimize digital user experience id av5Using digital performance analytic to optimize digital user experience id av5
Using digital performance analytic to optimize digital user experience id av5
 
WordPress and Business Intelligence
WordPress and Business IntelligenceWordPress and Business Intelligence
WordPress and Business Intelligence
 
How To Achieve a 30% Reply Rate on Cold Emails with Hull, Paddle, Outreach, &...
How To Achieve a 30% Reply Rate on Cold Emails with Hull, Paddle, Outreach, &...How To Achieve a 30% Reply Rate on Cold Emails with Hull, Paddle, Outreach, &...
How To Achieve a 30% Reply Rate on Cold Emails with Hull, Paddle, Outreach, &...
 
provide1923.pptx
provide1923.pptxprovide1923.pptx
provide1923.pptx
 

More from Databarracks

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response Plan
Databarracks
 
Lessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveriesLessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveries
Databarracks
 
How to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery PlanHow to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery Plan
Databarracks
 
Cyber Incident Response Plan
Cyber Incident Response PlanCyber Incident Response Plan
Cyber Incident Response Plan
Databarracks
 
Who's responsible for what in a crisis
Who's responsible for what in a crisisWho's responsible for what in a crisis
Who's responsible for what in a crisis
Databarracks
 
How to communicate in a crisis
How to communicate in a crisisHow to communicate in a crisis
How to communicate in a crisis
Databarracks
 
How to protect backups from ransomware
How to protect backups from ransomwareHow to protect backups from ransomware
How to protect backups from ransomware
Databarracks
 
Requirements for cyber insurance
Requirements for cyber insuranceRequirements for cyber insurance
Requirements for cyber insurance
Databarracks
 
How to make your supply chain resilient
How to make your supply chain resilientHow to make your supply chain resilient
How to make your supply chain resilient
Databarracks
 
How to recover from ransomware lessons from real recoveries
How to recover from ransomware   lessons from real recoveriesHow to recover from ransomware   lessons from real recoveries
How to recover from ransomware lessons from real recoveries
Databarracks
 
How to decommission a data centre
How to decommission a data centreHow to decommission a data centre
How to decommission a data centre
Databarracks
 
Zerto in azure technical deep dive
Zerto in azure   technical deep diveZerto in azure   technical deep dive
Zerto in azure technical deep dive
Databarracks
 
How to know when combined backup and replication is for you
How to know when combined backup and replication is for youHow to know when combined backup and replication is for you
How to know when combined backup and replication is for you
Databarracks
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response Plan
Databarracks
 
Introducing rubrik a new approach to data protection
Introducing rubrik   a new approach to data protectionIntroducing rubrik   a new approach to data protection
Introducing rubrik a new approach to data protection
Databarracks
 
How to invoke Disaster Recovery
How to invoke Disaster RecoveryHow to invoke Disaster Recovery
How to invoke Disaster Recovery
Databarracks
 
How to setup disaster recovery
How to setup disaster recoveryHow to setup disaster recovery
How to setup disaster recovery
Databarracks
 
DRaaS to Azure with Zerto
DRaaS to Azure with ZertoDRaaS to Azure with Zerto
DRaaS to Azure with Zerto
Databarracks
 
How to recover from ransomware
How to recover from ransomwareHow to recover from ransomware
How to recover from ransomware
Databarracks
 

More from Databarracks (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response Plan
 
Lessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveriesLessons from 100+ ransomware recoveries
Lessons from 100+ ransomware recoveries
 
How to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery PlanHow to write an IT Disaster Recovery Plan
How to write an IT Disaster Recovery Plan
 
Cyber Incident Response Plan
Cyber Incident Response PlanCyber Incident Response Plan
Cyber Incident Response Plan
 
Who's responsible for what in a crisis
Who's responsible for what in a crisisWho's responsible for what in a crisis
Who's responsible for what in a crisis
 
How to communicate in a crisis
How to communicate in a crisisHow to communicate in a crisis
How to communicate in a crisis
 
How to protect backups from ransomware
How to protect backups from ransomwareHow to protect backups from ransomware
How to protect backups from ransomware
 
Requirements for cyber insurance
Requirements for cyber insuranceRequirements for cyber insurance
Requirements for cyber insurance
 
How to make your supply chain resilient
How to make your supply chain resilientHow to make your supply chain resilient
How to make your supply chain resilient
 
How to recover from ransomware lessons from real recoveries
How to recover from ransomware   lessons from real recoveriesHow to recover from ransomware   lessons from real recoveries
How to recover from ransomware lessons from real recoveries
 
How to decommission a data centre
How to decommission a data centreHow to decommission a data centre
How to decommission a data centre
 
Zerto in azure technical deep dive
Zerto in azure   technical deep diveZerto in azure   technical deep dive
Zerto in azure technical deep dive
 
How to know when combined backup and replication is for you
How to know when combined backup and replication is for youHow to know when combined backup and replication is for you
How to know when combined backup and replication is for you
 
How to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response PlanHow to write an effective Cyber Incident Response Plan
How to write an effective Cyber Incident Response Plan
 
Introducing rubrik a new approach to data protection
Introducing rubrik   a new approach to data protectionIntroducing rubrik   a new approach to data protection
Introducing rubrik a new approach to data protection
 
How to invoke Disaster Recovery
How to invoke Disaster RecoveryHow to invoke Disaster Recovery
How to invoke Disaster Recovery
 
How to setup disaster recovery
How to setup disaster recoveryHow to setup disaster recovery
How to setup disaster recovery
 
DRaaS to Azure with Zerto
DRaaS to Azure with ZertoDRaaS to Azure with Zerto
DRaaS to Azure with Zerto
 
How to recover from ransomware
How to recover from ransomwareHow to recover from ransomware
How to recover from ransomware
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Databarracks webinar how to build a mass notification service for disaster recovery