SlideShare a Scribd company logo
designing…
in the open!
Sean Martell
@mart3ll
introduction to open
designing at mozilla
mozilla brand evolution
as an open designer
introduction to open
art director
introduction to open
(logoembiggener)
(reticulatorofsplines)
POPUNDER!
CLICK
RATES
ARE
HOT
THIS WILL GO VIRAL
BELOW
THE
introduction to open
POPUPS!
OPUPS!
POPUPS!
POPUPS!
introduction to open
GONNA
SHARE
MY WORK
yeah, no
introduction to open
(Yay!)
introduction to open
introduction to open
ohai, bugzilla
introduction to open
what was I thinking?
introduction to open
are you…
serious?
introduction to open
Sean’s Blog
2006-2006
introduction to open
designing at mozilla
(Yay!)
designing at mozilla
company
foundation
community
designing at mozilla
yes, we’re open
(inourstoresoon!)
communication
designing at mozilla
irc.mozilla.org
designing at mozilla
designing at mozilla
share n’ teach
designing at mozilla
designing at mozilla
designing at mozilla
designing at mozilla
contribute?
code!
designing at mozilla
designing at mozilla
designs plz?
designing at mozilla
youareabadperson
foraskingthat.
i haz a sad
designing at mozilla
designing at mozilla
learn
designing at mozilla
oops
designing at mozilla
partners
designing at mozilla
designing at mozilla
GOOD NEWS
EVERYBODY
WE’RE GETTING
MUCH BETTER!
designing at mozilla
fun
designing at mozilla
designing at mozilla
mozilla brand evolution
?
mozilla brand evolution
living brand
mozilla brand evolution
bake in openness
make it “of the Web”
reflect one mozilla
mozilla brand evolution
IRC + blogs + livestream
#mologo
mozilla brand evolution
mozilla brand evolution
mozilla brand evolution
Fira Sans
mozilla brand evolution
mozilla brand evolution
open data
WHAT EXACTLY
DO YOU MEAN
BY OPEN DATA?
mozilla brand evolution
mozilla brand evolution
mozilla brand evolution
mozilla brand evolution
mozilla brand evolution
mozilla brand evolution
coming soon!
as an open designer
designing in the open
as an open designer
social Web
as an open designer
(OMGUCOPIED!)
as an open designer
as an open designer
twitic ~ someone who uses
social networks to vocalize
their distaste in others’ work
as an open designer
most important part
of designing in the open
(important!)
as an open designer
lead by example
as an open designer
embrace fear
as an open designer
love what you do,
share what you do
as an open designer
inspire others,
don’t belittle them
as an open designer
be constructive,
not destructive
as an open designer
love the helpers,
ignore the haters
as an open designer
as an open designer
don’t let a paycheque
make you a hater
as an open designer
as an open designer
share, teach, learn
as an open designer
have fun!
@mart3ll

More Related Content

Similar to Designing in the Open

Areas of Contribution (MOZILLAPH)
Areas of Contribution (MOZILLAPH)Areas of Contribution (MOZILLAPH)
Areas of Contribution (MOZILLAPH)
Mozilla Philippines Community
 
Design Presentation
Design PresentationDesign Presentation
Design Presentation
Andreas Beining
 
Orta Therox
Orta TheroxOrta Therox
Orta Therox
CodeFest
 
Tapping designer thought process, The Goa Project 2013
Tapping designer thought process, The Goa Project 2013Tapping designer thought process, The Goa Project 2013
Tapping designer thought process, The Goa Project 2013
Sarup Banskota
 
Our Streets - Sketches
Our Streets - SketchesOur Streets - Sketches
Our Streets - Sketchesourstreets
 
How to Create Your Dream Logo
How to Create Your Dream LogoHow to Create Your Dream Logo
How to Create Your Dream Logo
VirrgoTech
 
Flat Design - A Primer
Flat Design - A PrimerFlat Design - A Primer
Flat Design - A Primer
wedu, Inc
 
Massimo Burgio Social Media What? Reykjavik RIMC 2010
Massimo Burgio Social Media What? Reykjavik RIMC 2010Massimo Burgio Social Media What? Reykjavik RIMC 2010
Massimo Burgio Social Media What? Reykjavik RIMC 2010
Massimo Burgio
 
CTA Design Builders, Inc. SWOT Analysis
CTA Design Builders, Inc. SWOT AnalysisCTA Design Builders, Inc. SWOT Analysis
CTA Design Builders, Inc. SWOT Analysis
Megan Lillick
 
Strategy in social medias
Strategy in social mediasStrategy in social medias
Strategy in social medias
Lorenzo MATTIACCI
 
"Wordpress And Your Brand" 2010 - By Sara Cannon
"Wordpress And Your Brand" 2010 - By Sara Cannon"Wordpress And Your Brand" 2010 - By Sara Cannon
"Wordpress And Your Brand" 2010 - By Sara Cannon
Sara Cannon
 
Get creative with latest web design and ui trends for 2021 and beyond! conver...
Get creative with latest web design and ui trends for 2021 and beyond! conver...Get creative with latest web design and ui trends for 2021 and beyond! conver...
Get creative with latest web design and ui trends for 2021 and beyond! conver...
CatherineTeves1
 
Open design foss4 g - 2019-eriol-fox-opera-room-3pm (1)
Open design   foss4 g - 2019-eriol-fox-opera-room-3pm (1)Open design   foss4 g - 2019-eriol-fox-opera-room-3pm (1)
Open design foss4 g - 2019-eriol-fox-opera-room-3pm (1)
Eriol Fox
 
Open design foss4 g - 2019-eriol-fox-opera-room-3pm (1)
Open design   foss4 g - 2019-eriol-fox-opera-room-3pm (1)Open design   foss4 g - 2019-eriol-fox-opera-room-3pm (1)
Open design foss4 g - 2019-eriol-fox-opera-room-3pm (1)
Eriol Fox
 
Mozilla - MoJo - Chicago Hacks/Hackers event
Mozilla - MoJo - Chicago Hacks/Hackers eventMozilla - MoJo - Chicago Hacks/Hackers event
Mozilla - MoJo - Chicago Hacks/Hackers event
Phillip Smith
 
Things designers and developers should know (WDS18)
Things designers and developers should know (WDS18)Things designers and developers should know (WDS18)
Things designers and developers should know (WDS18)
Ben Buchanan
 
Getting Involved with Joomla - Why and how to contribute
Getting Involved with Joomla - Why and how to contributeGetting Involved with Joomla - Why and how to contribute
Getting Involved with Joomla - Why and how to contribute
Parth Lawate
 
Social Media as Business Development for Architects and Architectural Designers
Social Media as Business Development for Architects and Architectural DesignersSocial Media as Business Development for Architects and Architectural Designers
Social Media as Business Development for Architects and Architectural Designers
ebossnow
 
40 years in design: what can the last 20 years teach us about the next 20?
40 years in design: what can the last 20 years teach us about the next 20?40 years in design: what can the last 20 years teach us about the next 20?
40 years in design: what can the last 20 years teach us about the next 20?
Juho Paasonen
 

Similar to Designing in the Open (20)

Areas of Contribution (MOZILLAPH)
Areas of Contribution (MOZILLAPH)Areas of Contribution (MOZILLAPH)
Areas of Contribution (MOZILLAPH)
 
Design Presentation
Design PresentationDesign Presentation
Design Presentation
 
Orta Therox
Orta TheroxOrta Therox
Orta Therox
 
Tapping designer thought process, The Goa Project 2013
Tapping designer thought process, The Goa Project 2013Tapping designer thought process, The Goa Project 2013
Tapping designer thought process, The Goa Project 2013
 
Our Streets - Sketches
Our Streets - SketchesOur Streets - Sketches
Our Streets - Sketches
 
How to Create Your Dream Logo
How to Create Your Dream LogoHow to Create Your Dream Logo
How to Create Your Dream Logo
 
Flat Design - A Primer
Flat Design - A PrimerFlat Design - A Primer
Flat Design - A Primer
 
Massimo Burgio Social Media What? Reykjavik RIMC 2010
Massimo Burgio Social Media What? Reykjavik RIMC 2010Massimo Burgio Social Media What? Reykjavik RIMC 2010
Massimo Burgio Social Media What? Reykjavik RIMC 2010
 
CTA Design Builders, Inc. SWOT Analysis
CTA Design Builders, Inc. SWOT AnalysisCTA Design Builders, Inc. SWOT Analysis
CTA Design Builders, Inc. SWOT Analysis
 
Strategy in social medias
Strategy in social mediasStrategy in social medias
Strategy in social medias
 
logos.pptx
logos.pptxlogos.pptx
logos.pptx
 
"Wordpress And Your Brand" 2010 - By Sara Cannon
"Wordpress And Your Brand" 2010 - By Sara Cannon"Wordpress And Your Brand" 2010 - By Sara Cannon
"Wordpress And Your Brand" 2010 - By Sara Cannon
 
Get creative with latest web design and ui trends for 2021 and beyond! conver...
Get creative with latest web design and ui trends for 2021 and beyond! conver...Get creative with latest web design and ui trends for 2021 and beyond! conver...
Get creative with latest web design and ui trends for 2021 and beyond! conver...
 
Open design foss4 g - 2019-eriol-fox-opera-room-3pm (1)
Open design   foss4 g - 2019-eriol-fox-opera-room-3pm (1)Open design   foss4 g - 2019-eriol-fox-opera-room-3pm (1)
Open design foss4 g - 2019-eriol-fox-opera-room-3pm (1)
 
Open design foss4 g - 2019-eriol-fox-opera-room-3pm (1)
Open design   foss4 g - 2019-eriol-fox-opera-room-3pm (1)Open design   foss4 g - 2019-eriol-fox-opera-room-3pm (1)
Open design foss4 g - 2019-eriol-fox-opera-room-3pm (1)
 
Mozilla - MoJo - Chicago Hacks/Hackers event
Mozilla - MoJo - Chicago Hacks/Hackers eventMozilla - MoJo - Chicago Hacks/Hackers event
Mozilla - MoJo - Chicago Hacks/Hackers event
 
Things designers and developers should know (WDS18)
Things designers and developers should know (WDS18)Things designers and developers should know (WDS18)
Things designers and developers should know (WDS18)
 
Getting Involved with Joomla - Why and how to contribute
Getting Involved with Joomla - Why and how to contributeGetting Involved with Joomla - Why and how to contribute
Getting Involved with Joomla - Why and how to contribute
 
Social Media as Business Development for Architects and Architectural Designers
Social Media as Business Development for Architects and Architectural DesignersSocial Media as Business Development for Architects and Architectural Designers
Social Media as Business Development for Architects and Architectural Designers
 
40 years in design: what can the last 20 years teach us about the next 20?
40 years in design: what can the last 20 years teach us about the next 20?40 years in design: what can the last 20 years teach us about the next 20?
40 years in design: what can the last 20 years teach us about the next 20?
 

More from All Things Open

Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of Observability
All Things Open
 
Modern Database Best Practices
Modern Database Best PracticesModern Database Best Practices
Modern Database Best Practices
All Things Open
 
Open Source and Public Policy
Open Source and Public PolicyOpen Source and Public Policy
Open Source and Public Policy
All Things Open
 
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
All Things Open
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil Nash
All Things Open
 
Total ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptTotal ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScript
All Things Open
 
What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?
All Things Open
 
How to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractHow to Write & Deploy a Smart Contract
How to Write & Deploy a Smart Contract
All Things Open
 
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
All Things Open
 
DEI Challenges and Success
DEI Challenges and SuccessDEI Challenges and Success
DEI Challenges and Success
All Things Open
 
Scaling Web Applications with Background
Scaling Web Applications with BackgroundScaling Web Applications with Background
Scaling Web Applications with Background
All Things Open
 
Supercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblySupercharging tutorials with WebAssembly
Supercharging tutorials with WebAssembly
All Things Open
 
Using SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksUsing SQL to Find Needles in Haystacks
Using SQL to Find Needles in Haystacks
All Things Open
 
Configuration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptConfiguration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit Intercept
All Things Open
 
Scaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramScaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship Program
All Things Open
 
Build Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceBuild Developer Experience Teams for Open Source
Build Developer Experience Teams for Open Source
All Things Open
 
Deploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamDeploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache Beam
All Things Open
 
Sudo – Giving access while staying in control
Sudo – Giving access while staying in controlSudo – Giving access while staying in control
Sudo – Giving access while staying in control
All Things Open
 
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsFortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
All Things Open
 
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
All Things Open
 

More from All Things Open (20)

Building Reliability - The Realities of Observability
Building Reliability - The Realities of ObservabilityBuilding Reliability - The Realities of Observability
Building Reliability - The Realities of Observability
 
Modern Database Best Practices
Modern Database Best PracticesModern Database Best Practices
Modern Database Best Practices
 
Open Source and Public Policy
Open Source and Public PolicyOpen Source and Public Policy
Open Source and Public Policy
 
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
Weaving Microservices into a Unified GraphQL Schema with graph-quilt - Ashpak...
 
The State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil NashThe State of Passwordless Auth on the Web - Phil Nash
The State of Passwordless Auth on the Web - Phil Nash
 
Total ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScriptTotal ReDoS: The dangers of regex in JavaScript
Total ReDoS: The dangers of regex in JavaScript
 
What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?What Does Real World Mass Adoption of Decentralized Tech Look Like?
What Does Real World Mass Adoption of Decentralized Tech Look Like?
 
How to Write & Deploy a Smart Contract
How to Write & Deploy a Smart ContractHow to Write & Deploy a Smart Contract
How to Write & Deploy a Smart Contract
 
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
Spinning Your Drones with Cadence Workflows, Apache Kafka and TensorFlow
 
DEI Challenges and Success
DEI Challenges and SuccessDEI Challenges and Success
DEI Challenges and Success
 
Scaling Web Applications with Background
Scaling Web Applications with BackgroundScaling Web Applications with Background
Scaling Web Applications with Background
 
Supercharging tutorials with WebAssembly
Supercharging tutorials with WebAssemblySupercharging tutorials with WebAssembly
Supercharging tutorials with WebAssembly
 
Using SQL to Find Needles in Haystacks
Using SQL to Find Needles in HaystacksUsing SQL to Find Needles in Haystacks
Using SQL to Find Needles in Haystacks
 
Configuration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit InterceptConfiguration Security as a Game of Pursuit Intercept
Configuration Security as a Game of Pursuit Intercept
 
Scaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship ProgramScaling an Open Source Sponsorship Program
Scaling an Open Source Sponsorship Program
 
Build Developer Experience Teams for Open Source
Build Developer Experience Teams for Open SourceBuild Developer Experience Teams for Open Source
Build Developer Experience Teams for Open Source
 
Deploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache BeamDeploying Models at Scale with Apache Beam
Deploying Models at Scale with Apache Beam
 
Sudo – Giving access while staying in control
Sudo – Giving access while staying in controlSudo – Giving access while staying in control
Sudo – Giving access while staying in control
 
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML ApplicationsFortifying the Future: Tackling Security Challenges in AI/ML Applications
Fortifying the Future: Tackling Security Challenges in AI/ML Applications
 
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
Securing Cloud Resources Deployed with Control Planes on Kubernetes using Gov...
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Designing in the Open