SlideShare a Scribd company logo
What we will cover
•What is email?
•Sending and receiving email
•Attachments
•Mailing lists
•E greeting cards
What is email?
http://en.wikipedia.org/wiki/E-mail
Spam
http://en.wikipedia.org/wiki/E-mail_spam
Be careful of viruses. Don’t open an email from someone you
don’t know. Don’t open attachments or follow links in an email
unless you know that the person really did send them to you.
What is Email?
• Email is a method of sending digital messages via the Internet from
one person to one or more recipients.
• Gmail, Hotmail and Yahoo Mail are three common brands of email.
• There is NO COST to sign up with and use any of these three
brands.
What you need to send an Email
To send and receive e-mail, you will need:
1.A computer.
2.2. Internet service.
3. An e-mail address.
4.Friends who also have these three elements.
Why get an email address?
Send and receive letters, message, pictures or videos, documents
Receive notices from services you have signed up with.
Use other websites that require an email address to sign up for them.
Email providers
Web based (allows you to check your email from anywhere).
http://mail.yahoo.com
Also get access to flickr, geocities, calendar, bookmarks, maps.
http://gmail.google.com
Also get access to picasa pictures, blogger, office, calendar, reader, documents, maps.
http://www.hotmail.com/
Also get access to all of the live.com products as well.
mail.aol.com/
http://www.myqwest.com/
http://ww2.cox.com/myconnection/arizona/home.cox
Software
http://www.mozilla.com/en-US/thunderbird/
http://www.eudora.com/
http://get.live.com/wlmail/overview
Microsoft Outlook (comes with Microsoft Office)
Mac Mail – comes with Mac computers
Most smartphones, tablets, etc come with an app to read your mail.
Sending email
http://www.learnthenet.tv/learn-email/
http://en.wikipedia.org/wiki/E-mail_attachment
http://help.yahoo.com/us/tutorials/cg/index.html
Email Ettiquette
http://www.mrmodem.net/cgi-bin/library.pl?action=view&article=113
Mailing Lists
http://en.wikipedia.org/wiki/Electronic_mailing_list
E greeting cards
http://en.wikipedia.org/wiki/E-card
http://www.yahoo.americangreetings.com/
http://www.hallmark.com
Safety
http://www.onguardonline.gov/media/video-0104-hacked-email-what-do
https://techboomers.com/t/email-safety
https://techboomers.com/t/how-to-stop-spam-email
https://techboomers.com/t/phishing-scams
https://techboomers.com/t/advance-fee-fraud
Help
http://www.commoncraft.com/video/email-access
http://www.gcflearnfree.org/emailbasics
http://denverlibrary.org/ctc/email-managing-your-inbox
https://sites.google.com/a/nypl.org/techconnect/course-materials/emailforbeginnersforthe50
https://sites.google.com/a/nypl.org/techconnect/course-materials/advancedemail
http://denverlibrary.org/files/Email_Attaching_a_File_handout_2014_04_19_0.pdf
http://www.tscpl.org/wp-content/uploads/2011/12/YahooEmail.pdf
http://www.gcflearnfree.org/googleaccount/2
http://trysomethingnewpimacounty.wordpress.com/category/gmail/
http://digitallearn.org/learn/intro-email
http://digitallearn.org/learn/intro-email-part-2
https://support.google.com/mail/?hl=en
http://windows.microsoft.com/en-us/windows/email-communication-help
http://help.yahoo.com/help/us/mail/
http://office.microsoft.com/en-us/outlook-help/basic-tasks-in-outlook-2010-HA101829999.aspx
http://www.apple.com/support/mac-apps/mail/
http://www.apple.com/support/ipad/mail/
http://www.spl.org/Documents/audiences/adults/LearningPackets/Email.pdf
http://library.unc.edu/wp-content/uploads/2014/04/Email_Basics_Gmail.pdf
http://library.unc.edu/wp-content/uploads/2014/04/Password-Recovery-Gmail-and-Yahoo.pdf
https://www.denverlibrary.org/ctc/computer-basics-email-gmail
https://www.denverlibrary.org/ctc/google-calendar-101
https://techboomers.com/p/gmail
https://www.youtube.com/playlist?list=PLk3xjyeTggSbo9aFyfojGaAqqowkim3rh
https://www.digitallearn.org/courses/intro-to-email/attachment/89
https://www.digitallearn.org/courses/intro-to-email/attachment/92
https://www.digitallearn.org/courses/intro-to-email/lessons/sign-up-for-email
https://www.digitallearn.org/courses/intro-to-email/attachment/93
http://www.gcflearnfree.org/emailbasics/email101/4/print
https://docs.google.com/viewer?
a=v&pid=sites&srcid=bnlwbC5vcmd8dGVjaGNvbm5lY3R8Z3g6NjczMWVhZ
DE0YWRkOWI1Ng
https://www.youtube.com/playlist?
list=PLk3xjyeTggSbo9aFyfojGaAqqowkim3rh
https://www.gailstoolkit.com/basics
attachment - file sent along with an email
email (electronic mail) - to send or receive typed messages via the Internet
email address - person’s or organization’s address used to receive email (for example,
abby@AskAbbyStokes.com)
emoticon - playful use of keyboard characters and symbols to represent emotional responses (also
referred to as smileys), usually used in email or text messages (for example, >: -( means angry)
phishing - scam email sent to elicit private information from the recipient to be used for identity theft
snail mail - nickname for mail delivered by the postal service that negatively refers to the time it takes to
be delivered in contrast to the speed with which an email is sent
spam - unsolicited commercial/junk email
Spoofing – Email spoofing is when you receive an email message that appears to be from someone
other than the actual sender. This method enables the junk e-mailer to hide his or her identity from the
recipient. In spoofing, the sender places a false return address on the junk message. When spoofed, the
recipient has no idea who sent the message and has no way of responding or stopping the problem.
Emails can also contain a spoofed web site address.

More Related Content

What's hot

Email
EmailEmail
How to upload your contact files into Linkedin
How to upload your contact files into LinkedinHow to upload your contact files into Linkedin
How to upload your contact files into Linkedin
Mood Design Solutions
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
jatin batra
 
Gmail Security
Gmail SecurityGmail Security
Social Media Automation Automation Using IFTTT
Social Media Automation Automation Using IFTTTSocial Media Automation Automation Using IFTTT
Social Media Automation Automation Using IFTTT
Edu Rojas
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
Lisa Lindsay
 
Social media ingles tecnico 3
Social media ingles tecnico 3Social media ingles tecnico 3
Social media ingles tecnico 3
UTECO
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
How to add your hotmail account to ipad
How to add your hotmail account to ipadHow to add your hotmail account to ipad
How to add your hotmail account to ipad
staefenia sun
 
Email strategies
Email strategiesEmail strategies
Email strategies
Alan Haller
 
Threats – m2
Threats – m2Threats – m2
Threats – m2
Ryan-Parish
 
Maryam Abbas 9 B
Maryam Abbas 9 BMaryam Abbas 9 B
Maryam Abbas 9 B
jboulanger
 
Introduction To Email
Introduction To EmailIntroduction To Email
Introduction To Email
Christian County Library
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
Jason S
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 
online spying tools
online spying toolsonline spying tools
online spying tools
Deepa Jacob
 
Social media
Social mediaSocial media
Social media
Jose Antonio Guzman
 
Protect
ProtectProtect
Protect
Yamitza Rosas
 
Slide share-Susan Branch
Slide share-Susan BranchSlide share-Susan Branch
Slide share-Susan Branch
Susan Branch
 

What's hot (19)

Email
EmailEmail
Email
 
How to upload your contact files into Linkedin
How to upload your contact files into LinkedinHow to upload your contact files into Linkedin
How to upload your contact files into Linkedin
 
Benefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer CentreBenefits of email ! Batra Computer Centre
Benefits of email ! Batra Computer Centre
 
Gmail Security
Gmail SecurityGmail Security
Gmail Security
 
Social Media Automation Automation Using IFTTT
Social Media Automation Automation Using IFTTTSocial Media Automation Automation Using IFTTT
Social Media Automation Automation Using IFTTT
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
Social media ingles tecnico 3
Social media ingles tecnico 3Social media ingles tecnico 3
Social media ingles tecnico 3
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
How to add your hotmail account to ipad
How to add your hotmail account to ipadHow to add your hotmail account to ipad
How to add your hotmail account to ipad
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
Threats – m2
Threats – m2Threats – m2
Threats – m2
 
Maryam Abbas 9 B
Maryam Abbas 9 BMaryam Abbas 9 B
Maryam Abbas 9 B
 
Introduction To Email
Introduction To EmailIntroduction To Email
Introduction To Email
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Social media
Social mediaSocial media
Social media
 
Protect
ProtectProtect
Protect
 
Slide share-Susan Branch
Slide share-Susan BranchSlide share-Susan Branch
Slide share-Susan Branch
 

Viewers also liked

Web 2.0 & Social Computing
Web 2.0 & Social Computing Web 2.0 & Social Computing
Web 2.0 & Social Computing
Munaz Anjum
 
Start
StartStart
Start
cat509
 
TEDx Poetry and Science
TEDx Poetry and ScienceTEDx Poetry and Science
TEDx Poetry and Science
Mark Underwood
 
Exercises
ExercisesExercises
Exercises
cat509
 
Millennial Generation Panel Discussion
Millennial Generation Panel DiscussionMillennial Generation Panel Discussion
Millennial Generation Panel Discussion
jsnugent
 
Hpl Questions(V2.0)
Hpl Questions(V2.0)Hpl Questions(V2.0)
Hpl Questions(V2.0)
jsnugent
 
Learning in the Open: Faculty and Student Perspectives of blogging to Support...
Learning in the Open: Faculty and Student Perspectives of blogging to Support...Learning in the Open: Faculty and Student Perspectives of blogging to Support...
Learning in the Open: Faculty and Student Perspectives of blogging to Support...
jsnugent
 
Safari
SafariSafari
Safari
cat509
 
Advent 2006
Advent 2006Advent 2006
Advent 2006
valenejl
 
Overdrive
OverdriveOverdrive
Overdrive
cat509
 
Netbook
NetbookNetbook
Netbook
cat509
 
Windows10
Windows10Windows10
Windows10
cat509
 
mp3 players
mp3 playersmp3 players
mp3 players
cat509
 
Self-Directed Learning in a PLN
Self-Directed Learning in a PLNSelf-Directed Learning in a PLN
Self-Directed Learning in a PLN
jsnugent
 
UA and Google Tag Manager – Why & How!
UA and Google Tag Manager – Why & How!UA and Google Tag Manager – Why & How!
UA and Google Tag Manager – Why & How!
Munaz Anjum
 

Viewers also liked (16)

Web 2.0 & Social Computing
Web 2.0 & Social Computing Web 2.0 & Social Computing
Web 2.0 & Social Computing
 
Start
StartStart
Start
 
TEDx Poetry and Science
TEDx Poetry and ScienceTEDx Poetry and Science
TEDx Poetry and Science
 
4 Tob
4 Tob4 Tob
4 Tob
 
Exercises
ExercisesExercises
Exercises
 
Millennial Generation Panel Discussion
Millennial Generation Panel DiscussionMillennial Generation Panel Discussion
Millennial Generation Panel Discussion
 
Hpl Questions(V2.0)
Hpl Questions(V2.0)Hpl Questions(V2.0)
Hpl Questions(V2.0)
 
Learning in the Open: Faculty and Student Perspectives of blogging to Support...
Learning in the Open: Faculty and Student Perspectives of blogging to Support...Learning in the Open: Faculty and Student Perspectives of blogging to Support...
Learning in the Open: Faculty and Student Perspectives of blogging to Support...
 
Safari
SafariSafari
Safari
 
Advent 2006
Advent 2006Advent 2006
Advent 2006
 
Overdrive
OverdriveOverdrive
Overdrive
 
Netbook
NetbookNetbook
Netbook
 
Windows10
Windows10Windows10
Windows10
 
mp3 players
mp3 playersmp3 players
mp3 players
 
Self-Directed Learning in a PLN
Self-Directed Learning in a PLNSelf-Directed Learning in a PLN
Self-Directed Learning in a PLN
 
UA and Google Tag Manager – Why & How!
UA and Google Tag Manager – Why & How!UA and Google Tag Manager – Why & How!
UA and Google Tag Manager – Why & How!
 

Similar to Email

General Internet Services
General Internet ServicesGeneral Internet Services
General Internet Services
CeliaBSeaton
 
Email security netwroking
Email security  netwrokingEmail security  netwroking
Email security netwroking
Salman Memon
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
santosh26kumar2003
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
Adam Ripsam
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
Tayfun TEK
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
enukahansana
 
Ibm vciso sunderland
Ibm vciso sunderlandIbm vciso sunderland
Ibm vciso sunderland
►David Clarke FBCS CITP
 
E‑mail
E‑mailE‑mail
E‑mail
Mukul Kumar
 
Web 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web AppWeb 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web App
Andy Denmark
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
Wan Solo
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
edrianrheine
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
lesteraporado16
 
Viruses
VirusesViruses
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
JuliusECatipon
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
JuliusECatipon
 
All about email
All about emailAll about email
All about email
Bathmanathan Kuttiappan
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
Dave Archer
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats

Similar to Email (20)

General Internet Services
General Internet ServicesGeneral Internet Services
General Internet Services
 
Email security netwroking
Email security  netwrokingEmail security  netwroking
Email security netwroking
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
 
L5_Electronic communication.pptx
L5_Electronic communication.pptxL5_Electronic communication.pptx
L5_Electronic communication.pptx
 
Ibm vciso sunderland
Ibm vciso sunderlandIbm vciso sunderland
Ibm vciso sunderland
 
E‑mail
E‑mailE‑mail
E‑mail
 
Web 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web AppWeb 2.0: Making Email a Useful Web App
Web 2.0: Making Email a Useful Web App
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Viruses
VirusesViruses
Viruses
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
 
Web Technologies.pptx
Web Technologies.pptxWeb Technologies.pptx
Web Technologies.pptx
 
All about email
All about emailAll about email
All about email
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
NCET Biz Bite | Darren McBride, Email Productivity Tips and Tricks | Mar 28
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 

More from cat509

Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
cat509
 
Myspace
MyspaceMyspace
Myspace
cat509
 
Microsoft Office Basics
Microsoft Office BasicsMicrosoft Office Basics
Microsoft Office Basics
cat509
 
Health apps
Health appsHealth apps
Health apps
cat509
 
Video apps
Video appsVideo apps
Video apps
cat509
 
Blogs 101 and Websites for Free
Blogs 101 and Websites for Free Blogs 101 and Websites for Free
Blogs 101 and Websites for Free
cat509
 
Music apps
Music appsMusic apps
Music apps
cat509
 
Travel apps
Travel appsTravel apps
Travel apps
cat509
 
Todo apps
Todo appsTodo apps
Todo apps
cat509
 
Ebooksandmp3s
Ebooksandmp3sEbooksandmp3s
Ebooksandmp3s
cat509
 
Cutting the cord
Cutting the cordCutting the cord
Cutting the cord
cat509
 
Digphoto
DigphotoDigphoto
Digphoto
cat509
 
Train The Trainer
Train The TrainerTrain The Trainer
Train The Trainer
cat509
 
Wifi
WifiWifi
Wifi
cat509
 
craigslist
craigslistcraigslist
craigslist
cat509
 
Organization
OrganizationOrganization
Organization
cat509
 
End
EndEnd
End
cat509
 
Youtube
YoutubeYoutube
Youtubecat509
 
Buy computers
Buy computersBuy computers
Buy computers
cat509
 

More from cat509 (19)

Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Myspace
MyspaceMyspace
Myspace
 
Microsoft Office Basics
Microsoft Office BasicsMicrosoft Office Basics
Microsoft Office Basics
 
Health apps
Health appsHealth apps
Health apps
 
Video apps
Video appsVideo apps
Video apps
 
Blogs 101 and Websites for Free
Blogs 101 and Websites for Free Blogs 101 and Websites for Free
Blogs 101 and Websites for Free
 
Music apps
Music appsMusic apps
Music apps
 
Travel apps
Travel appsTravel apps
Travel apps
 
Todo apps
Todo appsTodo apps
Todo apps
 
Ebooksandmp3s
Ebooksandmp3sEbooksandmp3s
Ebooksandmp3s
 
Cutting the cord
Cutting the cordCutting the cord
Cutting the cord
 
Digphoto
DigphotoDigphoto
Digphoto
 
Train The Trainer
Train The TrainerTrain The Trainer
Train The Trainer
 
Wifi
WifiWifi
Wifi
 
craigslist
craigslistcraigslist
craigslist
 
Organization
OrganizationOrganization
Organization
 
End
EndEnd
End
 
Youtube
YoutubeYoutube
Youtube
 
Buy computers
Buy computersBuy computers
Buy computers
 

Recently uploaded

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 

Recently uploaded (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 

Email