SlideShare a Scribd company logo
Mobiles for Activism & Advocacy Examples, Challenges & Opportunities Patrick Meier  Director of Research DigiActive.org MobileActive08, Johannesburg
Presentation Focuses on  Grassroots Digital Activists… Limited Resources   Loose Networks   Anonymity   Individual Actors  Security   Low/No Budget
Examples…
1. Using Mobile Phones to Organize and Coordinate  Protests …
Protests…
Philippines ‘01 - “Coup de Text” Protests…
Philippines ‘01 - “Coup de Text” Spain ‘04 - “The Night of SMS” Protests…
Philippines ‘01 - “Coup de Text” Spain ‘04 - “The Night of SMS” Pakistan ‘07 - “Flash Protests” Protests…
2. Using Mobile Phone Videos to Document Human Rights  Abuses …
Videos…
Egypt - “Exposing Torture” Videos…
Tibet - “Media Blackout?” Egypt - “Exposing Torture” Videos…
Morocco ‘08 - “Exposing Abuse” Egypt - “Exposing Torture” Tibet ’08 - “Media Blackout?” Videos…
Using a Camera Phone and YouTube to Expose Police Brutality in Morocco
3. Using  Microblogging  Tools to Bridge Between Mobile Phones and Internet Activism
MicroBlogging…
MicroBlogging… Egypt - “Twitter out of Jail”
Egypt - “Twitter out of Jail” China - “Live-Twittered Arrest” MicroBlogging…
Egypt - “Twitter out of Jail” China - “Live-Twittered Arrest” MicroBlogging… Egypt - “Twitter to Safety”
Issues to Consider…
1. Network Structure centralized decentralized distributed source: http://en.wikipedia.org/wiki/Social_networks
2. Security
Surveillance Content Filtering Traceability Network Integrity 2. Security
NonID Prepaid Cards  (Anonymity) “ Mobile” Mobile Activism  (On the Move) Avoid Centralization  (Distribute Risk) 2. Security
3. Cost
NGO Budget Premium Rate Number Prepaid Cards Top-up to Subscribe? 3. Cost
4. Dissemination
Calling for Action Using Relays Distributed Public Sphere Using Complementary Tools 4. Dissemination
Thank You www.DigiActive.org [email_address] Twitter.com/DigiActive iRevolution .wordpress.com    my blog

More Related Content

Similar to Digi Active For Mobile Active 2008 Final

Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
WAIHIGA K.MUTURI
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
ACAD1ITG
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
CRS4 Research Center in Sardinia
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
VincentAcapen
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
CTIC Technology Centre
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
008_Anuj
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paperAkshay Sinha
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
Chris Marsden
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
REVULN
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Charles Mok
 
South african mobile generation
South african mobile generation South african mobile generation
South african mobile generation Akshay Sinha
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךgkurtz
 
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
Inge de Waard
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
VivekanandaGN1
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
Chelsea Porter
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
Michael Edson
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Preet Hanspal
 

Similar to Digi Active For Mobile Active 2008 Final (20)

Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfInternet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdf
 
Cyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptxCyber Landscape in the Philippines.pptx
Cyber Landscape in the Philippines.pptx
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
 
Protecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... GloballyProtecting and Empowering our Next Generation... Globally
Protecting and Empowering our Next Generation... Globally
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
South Africa MXIT exploratory paper
South Africa MXIT exploratory paperSouth Africa MXIT exploratory paper
South Africa MXIT exploratory paper
 
Privacy, social networks and EU policy
Privacy, social networks and EU policyPrivacy, social networks and EU policy
Privacy, social networks and EU policy
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
South african mobile generation
South african mobile generation South african mobile generation
South african mobile generation
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
 
Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2Impact Mobile Social Media Developing Countries2
Impact Mobile Social Media Developing Countries2
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)The Web We Want: Dealing with the dark side of social media (work in progress)
The Web We Want: Dealing with the dark side of social media (work in progress)
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

More from Patrick Meier

Meier uav experts meeting 2014
Meier uav experts meeting 2014Meier uav experts meeting 2014
Meier uav experts meeting 2014Patrick Meier
 
Digital Humanitarians: Book Slides
Digital Humanitarians: Book SlidesDigital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
Patrick Meier
 
Monitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital AgeMonitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital Age
Patrick Meier
 
Presentation to QCRI
Presentation to QCRIPresentation to QCRI
Presentation to QCRIPatrick Meier
 
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENAUshahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
Patrick Meier
 
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENAUshahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENAPatrick Meier
 
Digital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century DemocracyDigital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century Democracy
Patrick Meier
 
Red Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a TimeRed Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a Time
Patrick Meier
 
Recampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at TimeRecampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at Time
Patrick Meier
 
Re:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a TimeRe:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a Time
Patrick Meier
 
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a PurposeIntroduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Patrick Meier
 
Changing the World, One Map at a Time
Changing the World, One Map at a TimeChanging the World, One Map at a Time
Changing the World, One Map at a Time
Patrick Meier
 
Ushahidi Presentation for UN IASC
Ushahidi Presentation for UN IASCUshahidi Presentation for UN IASC
Ushahidi Presentation for UN IASC
Patrick Meier
 
The Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in PracticeThe Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in Practice
Patrick Meier
 
Ushahidi Deployments
Ushahidi DeploymentsUshahidi Deployments
Ushahidi Deployments
Patrick Meier
 
Collaborative Crisis Mapping
Collaborative Crisis MappingCollaborative Crisis Mapping
Collaborative Crisis MappingPatrick Meier
 
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009
Patrick Meier
 
Crisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHACrisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHA
Patrick Meier
 
How to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive RegimesHow to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive Regimes
Patrick Meier
 

More from Patrick Meier (20)

Meier uav experts meeting 2014
Meier uav experts meeting 2014Meier uav experts meeting 2014
Meier uav experts meeting 2014
 
Digital Humanitarians: Book Slides
Digital Humanitarians: Book SlidesDigital Humanitarians: Book Slides
Digital Humanitarians: Book Slides
 
Monitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital AgeMonitoring Humanitarian Crises in the Digital Age
Monitoring Humanitarian Crises in the Digital Age
 
Presentation to QCRI
Presentation to QCRIPresentation to QCRI
Presentation to QCRI
 
Meier where20 2012
Meier where20 2012Meier where20 2012
Meier where20 2012
 
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENAUshahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
 
Ushahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENAUshahidi, Social Media and Political Change in MENA
Ushahidi, Social Media and Political Change in MENA
 
Digital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century DemocracyDigital Mapping Technologies for 21st Century Democracy
Digital Mapping Technologies for 21st Century Democracy
 
Red Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a TimeRed Cross: Changing the World, One Map at a Time
Red Cross: Changing the World, One Map at a Time
 
Recampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at TimeRecampaign 2011: Changing the World, One Map at Time
Recampaign 2011: Changing the World, One Map at Time
 
Re:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a TimeRe:publica 2011: Changing the World, One Map at a Time
Re:publica 2011: Changing the World, One Map at a Time
 
Introduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a PurposeIntroduction to Live Crisis Mapping & Checkin's with a Purpose
Introduction to Live Crisis Mapping & Checkin's with a Purpose
 
Changing the World, One Map at a Time
Changing the World, One Map at a TimeChanging the World, One Map at a Time
Changing the World, One Map at a Time
 
Ushahidi Presentation for UN IASC
Ushahidi Presentation for UN IASCUshahidi Presentation for UN IASC
Ushahidi Presentation for UN IASC
 
The Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in PracticeThe Ushahidi Story: Liberation Technology in Practice
The Ushahidi Story: Liberation Technology in Practice
 
Ushahidi Deployments
Ushahidi DeploymentsUshahidi Deployments
Ushahidi Deployments
 
Collaborative Crisis Mapping
Collaborative Crisis MappingCollaborative Crisis Mapping
Collaborative Crisis Mapping
 
Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009Crisis Mapping Presentation at Fletcher, November 2009
Crisis Mapping Presentation at Fletcher, November 2009
 
Crisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHACrisis Mapping Presentation for UN OCHA
Crisis Mapping Presentation for UN OCHA
 
How to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive RegimesHow to Communicate Securely in Repressive Regimes
How to Communicate Securely in Repressive Regimes
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

Digi Active For Mobile Active 2008 Final

Editor's Notes

  1. Early warning systems HHI Ushahidi Interest in digital activism and Digiactive