SlideShare a Scribd company logo
The	Value	of	Differentiated	Learning
About	us
• Mike	Tyrrell-Ead
–Graduating	this	semester	from	Red	Rocks
• Dual	degrees	of	Networking	and	Cyber	Security
–Security	Analyst	for	RRCCIT
–Team	Lead	for	RMCCDC
• Isaac	Kerley
–RRCC
–Technology	Club
• RMCCDC
Objectives
• Learn	of	the	different	college	programs	
around	Colorado
• Learn	of	different	certifications
• Decide	which	is	better	for	you
• Understand	the	challenges	facing	our	industry
• Learn	of	extracurricular	activities	like	
RMCCDC	and	Cyber	Patriots
Cybersecurity	Programs
• RRCC	began	their	program	in	2013
• Regis	launched	their	program	in	2015
• Most	colleges	use	cyber	security	as	a	focus	or	
minor
• Mines	- Pair	with	Electrical	Engineering
• Metro	- Pair	with	criminal	justice
• UCCS	- Bachelor	of	innovation	TM
Certificates
• Certificates keep a security professional
relevant.
• Top certifications offered at RRCC
–CompTIA’s
• Net+
• Linux+
• Security+
–CCNA
So	which	is	better
Degrees
• Clear	the	machine
• Makes	you	a	sellable	item	- reactive
• A	tool	bench
Certifications
• Gets	you	into	the	industry
• Small	upgrades	within	your	company
• Makes	you	a	marketable	item	- proactive
• A	tool
Demands	of	the	industry
• Cybersecurity	is	a	necessity	in	today's	world
• Unfilled	cybersecurity	jobs	will	reach	1.5	
million	by	2019
• Up	to	200	billion	IoT	devices	will	need	
securing	by	2020
• Demand	outstrips	supply	by	a	3	to	1	ratio
Extracurriculars	
• Necessary	to	increase	the	number	of	people	
flowing	into	the	industry	and	school
–Cyber	Patriots
• Increase	the	practical	experience	of	College	
students
–RMCCDC
Cyber	Patriots
• Cyber	Patriots	are	a	High-School	level	cyber	
security	competition
• Securing	a	windows	server
• Securing	a	windows	desktop
• Securing	a	ubuntu	desktop
• Securing	a	packet	tracer	environment
• Doing	a	Cisco	quiz	
• Has	a	scoring	engine	client	on	the	computer	
to	determine	how	secure	the	device	is.
RMCCDC
• RMCCDC	- Rocky	Mountain	Collegiate	Cyber	
Defence	Center
• Two	day	competition
• Red	vs.	Blue	
• A	security	defense	competition	that	
challenges	the	students	with	a	no	win	
scenario	
• Setup	in	a	corporate	network
Q	and	A
RMCCDC	Network
Windows	Admin
• Run	Updates
• Create	GPO’s	that	help	secure	the	end	devices	
through	group	policy
–Enable	firewall
–Install	anti-virus
• Disable	or	delete	no	longer	used	users
• Use	the	principle	of	least	privilege
• Setup	password	complexity	requirements	for	
passwords
• Update	your	repository	list	and	packages
• Disable	unnecessary	users	and	remove	their	
RSA	keys
• Do	not	permit	root	to	be	login	to	without	
running	sudo	su
Linux	Admin
Firewall/Network	Admin
• Update	your	switched	routers	firewalls	and	
APs
• Configure/update	your	ACLs	on	your	Firewall
–Make	sure	that	vlans	for	public	WiFi	cannot	
access	internal	services
• Confirm/configure	your	APs	to	use	WPA2
• Confirm/configure	your	switched	to	have	
their	vlans	correct
Web	Admin
• Update	Lamp/Wamp/Mamp/Xamp/Drupal
• Confirm	that	using	SSL/TLS	for	login	areas
• Confirm	that	SQL	injection	cannot	be	
performed
• Confirm	that	cross	site	scripting	is	not	being	
implemented
Q	and	A

More Related Content

Viewers also liked

25 ways of free leedgen
25 ways of free leedgen25 ways of free leedgen
25 ways of free leedgen
yougm
 
Ashley The Vine
Ashley The VineAshley The Vine
Ashley The Vine
chglat
 
dayana
dayanadayana
dayana
castrillon20
 
Otros antirretornos simples
Otros antirretornos simplesOtros antirretornos simples
Otros antirretornos simples
Carlos Muñiz Cueto
 
Terapia del elogio
Terapia del elogioTerapia del elogio
Terapia del elogio
Marisol Garrido
 
A ostra
A ostraA ostra
Mantenimiento
MantenimientoMantenimiento
Mantenimiento
jaimesisamar
 
Construction on front cover
Construction on front coverConstruction on front cover
Construction on front cover
AS Media Column D
 
Présentation Steem Blockchain - Fr
Présentation Steem Blockchain - FrPrésentation Steem Blockchain - Fr
Présentation Steem Blockchain - Fr
Pascal Ngu Cho
 
Transporte vesicular
Transporte vesicularTransporte vesicular
Transporte vesicular
carmen perez juarez
 
Etapas del proceso administrativo
Etapas del proceso administrativoEtapas del proceso administrativo
Etapas del proceso administrativo
Izbeth Sandy
 
Notas semana cultural padres
Notas semana cultural padresNotas semana cultural padres
Notas semana cultural padres
Juan De Austria Leganés
 
Quimica industrial 1 3
Quimica  industrial 1 3Quimica  industrial 1 3
Quimica industrial 1 3
wendy valenzuela
 
Marco del Buen Desempeño Docente
Marco del Buen Desempeño DocenteMarco del Buen Desempeño Docente
Marco del Buen Desempeño Docente
Andrea Choccata Cruz
 
History of british newspapers
History of british newspapersHistory of british newspapers
History of british newspapers
floridegheata
 
3Com 3C13751-US
3Com 3C13751-US3Com 3C13751-US
3Com 3C13751-US
savomir
 
wilfrang
wilfrangwilfrang
wilfrang
wilfrang
 
Instrumentos que motivacion con confiabilidad
Instrumentos que motivacion con confiabilidadInstrumentos que motivacion con confiabilidad
Instrumentos que motivacion con confiabilidad
Jorge Diaz
 
Our journey from good to great
Our journey from good to greatOur journey from good to great
Our journey from good to great
Sukhia Tuimaleali'ifano Go
 
Managing diversity for impact
Managing diversity for impactManaging diversity for impact
Managing diversity for impact
Sukhia Tuimaleali'ifano Go
 

Viewers also liked (20)

25 ways of free leedgen
25 ways of free leedgen25 ways of free leedgen
25 ways of free leedgen
 
Ashley The Vine
Ashley The VineAshley The Vine
Ashley The Vine
 
dayana
dayanadayana
dayana
 
Otros antirretornos simples
Otros antirretornos simplesOtros antirretornos simples
Otros antirretornos simples
 
Terapia del elogio
Terapia del elogioTerapia del elogio
Terapia del elogio
 
A ostra
A ostraA ostra
A ostra
 
Mantenimiento
MantenimientoMantenimiento
Mantenimiento
 
Construction on front cover
Construction on front coverConstruction on front cover
Construction on front cover
 
Présentation Steem Blockchain - Fr
Présentation Steem Blockchain - FrPrésentation Steem Blockchain - Fr
Présentation Steem Blockchain - Fr
 
Transporte vesicular
Transporte vesicularTransporte vesicular
Transporte vesicular
 
Etapas del proceso administrativo
Etapas del proceso administrativoEtapas del proceso administrativo
Etapas del proceso administrativo
 
Notas semana cultural padres
Notas semana cultural padresNotas semana cultural padres
Notas semana cultural padres
 
Quimica industrial 1 3
Quimica  industrial 1 3Quimica  industrial 1 3
Quimica industrial 1 3
 
Marco del Buen Desempeño Docente
Marco del Buen Desempeño DocenteMarco del Buen Desempeño Docente
Marco del Buen Desempeño Docente
 
History of british newspapers
History of british newspapersHistory of british newspapers
History of british newspapers
 
3Com 3C13751-US
3Com 3C13751-US3Com 3C13751-US
3Com 3C13751-US
 
wilfrang
wilfrangwilfrang
wilfrang
 
Instrumentos que motivacion con confiabilidad
Instrumentos que motivacion con confiabilidadInstrumentos que motivacion con confiabilidad
Instrumentos que motivacion con confiabilidad
 
Our journey from good to great
Our journey from good to greatOur journey from good to great
Our journey from good to great
 
Managing diversity for impact
Managing diversity for impactManaging diversity for impact
Managing diversity for impact
 

Similar to Differential learning SnowFROC 2017

Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionals
CSA Argentina
 
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Harry McLaren
 
Cisco Routing and Switching vs Cisco Security
Cisco Routing and Switching vs Cisco SecurityCisco Routing and Switching vs Cisco Security
Cisco Routing and Switching vs Cisco Security
I-Medita Leanring Solutions
 
DCiCON Limited
DCiCON LimitedDCiCON Limited
DCiCON Limited
masudparvaj
 
Networking technologies
Networking technologiesNetworking technologies
Networking technologies
Frido Edu
 
Computer & Network Administration, Cyber Security IT Training Course Programs...
Computer & Network Administration, Cyber Security IT Training Course Programs...Computer & Network Administration, Cyber Security IT Training Course Programs...
Computer & Network Administration, Cyber Security IT Training Course Programs...
CCI Training Center
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
promediakw
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
Prabir Saha
 
Cisco CCNA
Cisco CCNACisco CCNA
Cisco CCNA
Salim Karim
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+
CompTIA
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
Peter HJ van Eijk
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
Naved Ahmed
 
EMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
EMEA10: Implementing CompTIA Strata Fundamentals Into Your CurriculumEMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
EMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
CompTIA UK
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
aletarw
 
Carlile_Computers
Carlile_ComputersCarlile_Computers
Carlile_Computers
Colin Carlile
 
Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023
Cyber Security Partners
 
Rooman Corporate Profile
Rooman Corporate ProfileRooman Corporate Profile
Rooman Corporate Profile
nandakumard
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
Dragos, Inc.
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
Cisco Canada
 
Top Certifciations_Poster
Top Certifciations_PosterTop Certifciations_Poster
Top Certifciations_Poster
Rene Jack
 

Similar to Differential learning SnowFROC 2017 (20)

Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionals
 
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)
 
Cisco Routing and Switching vs Cisco Security
Cisco Routing and Switching vs Cisco SecurityCisco Routing and Switching vs Cisco Security
Cisco Routing and Switching vs Cisco Security
 
DCiCON Limited
DCiCON LimitedDCiCON Limited
DCiCON Limited
 
Networking technologies
Networking technologiesNetworking technologies
Networking technologies
 
Computer & Network Administration, Cyber Security IT Training Course Programs...
Computer & Network Administration, Cyber Security IT Training Course Programs...Computer & Network Administration, Cyber Security IT Training Course Programs...
Computer & Network Administration, Cyber Security IT Training Course Programs...
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
 
Cisco CCNA
Cisco CCNACisco CCNA
Cisco CCNA
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+
 
How Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run ITHow Cloud Computing will change how you and your team will run IT
How Cloud Computing will change how you and your team will run IT
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
EMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
EMEA10: Implementing CompTIA Strata Fundamentals Into Your CurriculumEMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
EMEA10: Implementing CompTIA Strata Fundamentals Into Your Curriculum
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Carlile_Computers
Carlile_ComputersCarlile_Computers
Carlile_Computers
 
Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023
 
Rooman Corporate Profile
Rooman Corporate ProfileRooman Corporate Profile
Rooman Corporate Profile
 
Solving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
 
So you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technologySo you’ve bought into the concept of “cloud” technology
So you’ve bought into the concept of “cloud” technology
 
Top Certifciations_Poster
Top Certifciations_PosterTop Certifciations_Poster
Top Certifciations_Poster
 

More from Frank Victory

Container security Familiar problems in new technology
Container security Familiar problems in new technologyContainer security Familiar problems in new technology
Container security Familiar problems in new technology
Frank Victory
 
Kealy OWASP interactive_artifacts
Kealy OWASP interactive_artifactsKealy OWASP interactive_artifacts
Kealy OWASP interactive_artifacts
Frank Victory
 
Automation and open source turning the tide on the attackers
Automation and open source   turning the tide on the attackersAutomation and open source   turning the tide on the attackers
Automation and open source turning the tide on the attackers
Frank Victory
 
CNG 256 cloud computing
CNG 256 cloud computingCNG 256 cloud computing
CNG 256 cloud computing
Frank Victory
 
CNG 256 wireless wi-fi and bluetooth
CNG 256 wireless   wi-fi and bluetoothCNG 256 wireless   wi-fi and bluetooth
CNG 256 wireless wi-fi and bluetooth
Frank Victory
 
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Frank Victory
 
Active defensecombo clean
Active defensecombo cleanActive defensecombo clean
Active defensecombo clean
Frank Victory
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutions
Frank Victory
 
Cng 125 – chapter 12 network policies
Cng 125 – chapter 12   network policiesCng 125 – chapter 12   network policies
Cng 125 – chapter 12 network policies
Frank Victory
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
Frank Victory
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
Frank Victory
 
Lesson 6 web based attacks
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacks
Frank Victory
 

More from Frank Victory (12)

Container security Familiar problems in new technology
Container security Familiar problems in new technologyContainer security Familiar problems in new technology
Container security Familiar problems in new technology
 
Kealy OWASP interactive_artifacts
Kealy OWASP interactive_artifactsKealy OWASP interactive_artifacts
Kealy OWASP interactive_artifacts
 
Automation and open source turning the tide on the attackers
Automation and open source   turning the tide on the attackersAutomation and open source   turning the tide on the attackers
Automation and open source turning the tide on the attackers
 
CNG 256 cloud computing
CNG 256 cloud computingCNG 256 cloud computing
CNG 256 cloud computing
 
CNG 256 wireless wi-fi and bluetooth
CNG 256 wireless   wi-fi and bluetoothCNG 256 wireless   wi-fi and bluetooth
CNG 256 wireless wi-fi and bluetooth
 
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
 
Active defensecombo clean
Active defensecombo cleanActive defensecombo clean
Active defensecombo clean
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutions
 
Cng 125 – chapter 12 network policies
Cng 125 – chapter 12   network policiesCng 125 – chapter 12   network policies
Cng 125 – chapter 12 network policies
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 
9.0 security (2)
9.0 security (2)9.0 security (2)
9.0 security (2)
 
Lesson 6 web based attacks
Lesson 6 web based attacksLesson 6 web based attacks
Lesson 6 web based attacks
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

Differential learning SnowFROC 2017