SlideShare a Scribd company logo
1 of 44
Download to read offline
Open Source Systems &
Security
Sherif El-Kassas
OSS & Security
● Outline:
– Principles, Motives, & Opportunity
– Trends and attitudes
– Case and examples
(The small matter of Mr. Snowden)
– The way forward
principles
Design Principles
• Well known set of principles
– Saltzer, J.H.; Schroeder, M.D., "The protection of
information in computer systems," Proceedings
of the IEEE , vol.63, no.9, pp.1278,1308, Sept.
1975
– Smith, R.E., "A Contemporary Look at Saltzer
and Schroeder's 1975 Design Principles,"
Security & Privacy, IEEE , vol.10, no.6, pp.20,25,
Nov.-Dec. 2012
– See also:
http://www.cryptosmith.com/book/export/html/365
Saltzer & Schroeder
1. Economy of mechanism
2. Fail-safe defaults
3. Complete mediation
4. Open design
5. Separation of privilege
6. Least privilege
7. Least common mechanism
8. Psychological acceptability
Saltzer & Schroeder
1. Economy of mechanism
2. Fail-safe defaults
3. Complete mediation
4.Open design
Kerckhoffs (19th century)
Shannon: “The enemy knows the system”
5. Separation of privilege
6. Least privilege
7. Least common mechanism
8. Psychological acceptability
motive
Motive
“While security for the user might
mean the repulse of `evil hackers […]
security for the vendor means
growing the market and crushing the
competition.”
– Ross Anderson, "Security in Open versus Closed
Systems - The Dance of Boltzmann, Coase and
Moore", Open Source Software : Economics, Law
and Policy, Toulouse, France, June 20-21, 2002.
opportunity
Reflections on
Trusting Trust
Ken Tompson
Communication of the ACM, Vol. 27, No. 8,
August 1984
Opportunity
Reflections on
Trusting Trust
Ken Tompson
Communication of the ACM, Vol. 27, No. 8,
August 1984
Opportunity
“The moral is obvious. You
can't trust code that you
did not totally create
yourself. (Especially code
from companies that
employ people like me.)”
http://www.cs.tufts.edu/comp/98/Ken_Thompson_84-Reflections_on_Trusting_Trust.pdf
What if we don’t manage
trust & ignore scrutiny?
Lastupdated6July,2011
The Two Faces of Hackinghttp://spctrum.ieee.og/static/hacker-matrix
dependability of the connected world
https://www.wired.com/story/car-hack-shut-down-safety-features/
War stories
http://www.quadibloc.com/crypto/ro0204.htm
http://www.iwm.org.uk/online/eniga/eni-intro.htm
French Weapons in the Falklands
• France manufactured the Exocet
[…]
– France also provided a vast,
virtually unprecedented
amount of technical
assistance, including
information on how to combat
the Exocet missile, which
could well have been
decisive in assuring a British
victory.
http://en.wikipedia.org/wiki/Exocet
conspiracies as facts
www.theguardian.com/world/2013/jun/08/nsa-prism-server-collection-facebook-google
en.wikipedia.org/wiki/2013_mass_surveillance_disclosures
https://www.schneier.com/crypto-gram-1311.html
https://www.schneier.com/crypto-gram-1311.html
“Attacks only get better”
the way forward
Physical vs. Digital world
• what Morpheus might have said
– “Do you believe that my being stronger or
faster has anything to do with my muscles in
this place?”
• mediation, proxies, and trust
● Stallman: How Much Surveillance
Can Democracy Withstand?
“Robust protection for privacy must be
technical”
wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/
R&D agenda
R&D agenda
• Trustworthy technology
– Build our own?
– Open source strategy
– Open scrutiny
– Certification program to ensure quality
●
Note worthy:
• People
• Ensure no harmful shortcuts are taken
Opportunity
CRA, November 2003, [unsolved] grand challenges:
● Economic
● Epidemic
● Engineering
● Human
http://archive.cra.org/Activities/grand.challenges/security/home.html
– The Economist, November 2015:
● “The cost of immaturity”
– Average time to breach detection 205 days
– Estimated global cost of 90m cyber-attacks: $575 billion
● “cyber-security industry is booming”
– Market: $75 billion a year now [...] $170 billion by 2020
– 2016:
● cloud, mobile, social media, and more: “Cybersecurity is terrible,
and will get worse”; IoT “will be a security disaster”
https://www.lightbluetouchpaper.org/2016/02/22/financial-cryptography-2016/
Thank you..
Questions?
www.cse.aucegypt.edu/~skassas/Eitesal-oss-2017
Trusting organization
http://spectrum.ieee.org/telecom/security/the-athens-affair
Kill switches!
spectrum.ieee.org/may08/6171
trends
2013 2014 2105
.00
500,000.00
1,000,000.00
1,500,000.00
2,000,000.00
2,500,000.00
3,000,000.00
3,500,000.00
4,000,000.00
4,500,000.00
insider
unintended
physical loss
portable device
stationary device
“DataBreachesbytheNumbers,”http://www.securityweek.com/data-breaches-numbers
2013 2014 2105
.00
20,000,000.00
40,000,000.00
60,000,000.00
80,000,000.00
100,000,000.00
120,000,000.00
140,000,000.00
hacking
“DataBreachesbytheNumbers,”http://www.securityweek.com/data-breaches-numbers
other conspiracies
http://www.f-
secure.com/weblog/archives/00002226.html
http://vincentarnold.com/blog/chinese-backdoors-hidden-in-router-
firmware/
What can be done about trust?
Only the paranoid survive!
“Anything that happens, happens.
Anything that, in happening, causes
something else to happen, causes
something else to happen.
Anything that, in happening, causes
itself to happen again, happens again.
It doesn't necessarily do it in
chronological order, though.”
--Douglas N. Adams, “Mostly
Harmless”

More Related Content

Similar to Open Source Systems & Security - EiTESAL Digital Transformation "Role of Open Source" Event 29/11/2017

The_Information_Age.pptx
The_Information_Age.pptxThe_Information_Age.pptx
The_Information_Age.pptxAllisaAlcober1
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseShujun Li
 
The New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesThe New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesMajor Hayden
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_ProvidersJon-Michael C. Brook, CISSP
 
IS-Intro.pdf
IS-Intro.pdfIS-Intro.pdf
IS-Intro.pdfwdwd10
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityClare Nelson, CISSP, CIPP-E
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityMark Masterson
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityClaus Cramon Houmann
 
Emerging Technologies - Neuromorphic Engineering / Computing
Emerging Technologies - Neuromorphic Engineering / ComputingEmerging Technologies - Neuromorphic Engineering / Computing
Emerging Technologies - Neuromorphic Engineering / ComputingKevin Espera
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology100656472mercier
 
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureThe challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureJeni Tennison
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxDIPESH30
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Dr. Ann Cavoukian
 

Similar to Open Source Systems & Security - EiTESAL Digital Transformation "Role of Open Source" Event 29/11/2017 (20)

The_Information_Age.pptx
The_Information_Age.pptxThe_Information_Age.pptx
The_Information_Age.pptx
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
The New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilitiesThe New Normal: Managing the constant stream of new vulnerabilities
The New Normal: Managing the constant stream of new vulnerabilities
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
top 10 Data Mining Algorithms
top 10 Data Mining Algorithmstop 10 Data Mining Algorithms
top 10 Data Mining Algorithms
 
IS-Intro.pdf
IS-Intro.pdfIS-Intro.pdf
IS-Intro.pdf
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
 
Cybersecurity fundamental
Cybersecurity fundamentalCybersecurity fundamental
Cybersecurity fundamental
 
Defending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricalityDefending Enterprise IT - beating assymetricality
Defending Enterprise IT - beating assymetricality
 
Emerging Technologies - Neuromorphic Engineering / Computing
Emerging Technologies - Neuromorphic Engineering / ComputingEmerging Technologies - Neuromorphic Engineering / Computing
Emerging Technologies - Neuromorphic Engineering / Computing
 
Fears about Computer Technology
Fears about Computer TechnologyFears about Computer Technology
Fears about Computer Technology
 
Ben Hutchinson
Ben HutchinsonBen Hutchinson
Ben Hutchinson
 
Ben Hutchinson,
Ben Hutchinson, Ben Hutchinson,
Ben Hutchinson,
 
Design Principles for Digital Preservation Systems
Design Principles for Digital Preservation SystemsDesign Principles for Digital Preservation Systems
Design Principles for Digital Preservation Systems
 
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructureThe challenges of building a strong data infrastructure
The challenges of building a strong data infrastructure
 
Laureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docxLaureate Online Education Information Security Engineering .docx
Laureate Online Education Information Security Engineering .docx
 
Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015Privacy by Design Seminar - Jan 22, 2015
Privacy by Design Seminar - Jan 22, 2015
 

More from EITESANGO

Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...EITESANGO
 
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...EITESANGO
 
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...EITESANGO
 
Open source communities - EiTESAL Digital Transformation "Role of Open Source...
Open source communities - EiTESAL Digital Transformation "Role of Open Source...Open source communities - EiTESAL Digital Transformation "Role of Open Source...
Open source communities - EiTESAL Digital Transformation "Role of Open Source...EITESANGO
 
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...EITESANGO
 
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...EITESANGO
 
EiTESAL event UK Market challenges & opportunities 18/7/2017
EiTESAL event UK Market challenges & opportunities 18/7/2017EiTESAL event UK Market challenges & opportunities 18/7/2017
EiTESAL event UK Market challenges & opportunities 18/7/2017EITESANGO
 
EiTESAL Gender Diversity Initiative Launching day 12/7/2014
EiTESAL Gender Diversity Initiative Launching day 12/7/2014EiTESAL Gender Diversity Initiative Launching day 12/7/2014
EiTESAL Gender Diversity Initiative Launching day 12/7/2014EITESANGO
 
EiTESAL Gender Diversity Initiative Launching day 12/7/2017
EiTESAL Gender Diversity Initiative Launching day 12/7/2017EiTESAL Gender Diversity Initiative Launching day 12/7/2017
EiTESAL Gender Diversity Initiative Launching day 12/7/2017EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EITESANGO
 

More from EITESANGO (20)

Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
Open Source Strategy - EiTESAL Digital Transformation "Role of Open Source" E...
 
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
Egypt FOSS Success Story- EiTESAL Digital Transformation "Role of Open Source...
 
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
البرمجيات مفتوحة المصدر في الحكومة - EiTESAL Digital Transformation "Role of ...
 
Open source communities - EiTESAL Digital Transformation "Role of Open Source...
Open source communities - EiTESAL Digital Transformation "Role of Open Source...Open source communities - EiTESAL Digital Transformation "Role of Open Source...
Open source communities - EiTESAL Digital Transformation "Role of Open Source...
 
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
Open Source for GIS - EiTESAL Digital Transformation "Role of Open Source" Ev...
 
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
The impact of individual - EiTESAL Digital Transformation " Role of Open Sour...
 
EiTESAL event UK Market challenges & opportunities 18/7/2017
EiTESAL event UK Market challenges & opportunities 18/7/2017EiTESAL event UK Market challenges & opportunities 18/7/2017
EiTESAL event UK Market challenges & opportunities 18/7/2017
 
EiTESAL Gender Diversity Initiative Launching day 12/7/2014
EiTESAL Gender Diversity Initiative Launching day 12/7/2014EiTESAL Gender Diversity Initiative Launching day 12/7/2014
EiTESAL Gender Diversity Initiative Launching day 12/7/2014
 
EiTESAL Gender Diversity Initiative Launching day 12/7/2017
EiTESAL Gender Diversity Initiative Launching day 12/7/2017EiTESAL Gender Diversity Initiative Launching day 12/7/2017
EiTESAL Gender Diversity Initiative Launching day 12/7/2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 
EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017 EiTESAL eHealth Conference 14&15 May 2017
EiTESAL eHealth Conference 14&15 May 2017
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Open Source Systems & Security - EiTESAL Digital Transformation "Role of Open Source" Event 29/11/2017