SlideShare a Scribd company logo
1 of 25
Download to read offline
Red-DragonRising.com©
Red-DragonRising.com©
中
國
黑
客
…
Chinese Hackers…?
William Hagestad II LTCOL (RET)
MA Military Strategy
MSc Security Technologies
MSc Management of Technology
www.red-dragonrising.com
hagestadwt@red-dragonrising.com
Red-DragonRising.com©
中國,當然在世界的中心
Red-DragonRising.com©
“21st Century Chinese
Cyber Warfare”
“二十一世紀中國網絡戰”
ISBN: 9781849283342
取締中華人民共和國
Red-DragonRising.com©
ISBN: 978-1482577105 ISBN: 978-1493771974 ISBN: 978-1496080875
Red-DragonRising.com©
► 500 BC Sun-Tzu’s Art of War – basis
► Sun Ping’s Military Methods
► 1995 - Major General Wang Pufeng –
Founding father of Chinese Information Warfare (IW)
► 1999 - War Without Limits – PLAAF Senior Colonel’s
Qiao Liang & Wang Xiangsui
► 2002 - PLA's IW strategy spearheaded by Major General
Dai Qingmin -
人民解放军- PLA
Integrated Network-Electronic Warfare (INEW)
Red-DragonRising.com©
People's Liberation Army
troops rely on a network of
"voluntold" hackers...
23 AUGUST 2014….
Red-DragonRising.com©
美國政府聲稱中國軍隊黑客
再次黑客關鍵基礎設施
US Government Claims
Chinese Military Hackers
Again Hacking Critical
Infrastructure...
19 SEP 2014….
http://mil.sohu.com/20140919/n404444972.shtml
Red-DragonRising.com©
General Staff Directorate’s (GSD) Cyber Warfare
‘Princelings’…
General Zhang Qinsheng 章沁生
General Chen Bingde 陈炳德
General Ma Xiaotian 马晓天
Vice Admiral Sun Jianguo 孙建国
Major General Hou Shu sen 侯树森
Official Statement of Chinese IW
20 JUL 2010 – ‘Presidential Order:
to handle cyber threats as China enters
the information age, & strengthen
the nation's cyber-infrastructure’
漢族…Han Chinese
Communist…
Technologists…
PLA Leaders…. &
中國人
Red-DragonRising.com©
Red-DragonRising.com©
“War Without Limits”…
“Unrestricted Warfare”…
Red-DragonRising.com©
信息化條件下作戰的發展
“Combat Development Under Conditions of
Informatization”
胡晓峰教授 孟祥青教授
Professor Hu Xiaofeng Professor Meng Xiangqing
http://blog.sina.com.cn/s/blog_4b46cda30100e5dh.html
Red-DragonRising.com©
• Major General Hu Xiaofeng, Deputy Director for the
National Defense University Department of Information
Warfare and Training Command
• Professor Meng Xiangqing, National Defense University
Institute for Strategic Studies
目前中國網絡戰的戰術
China’s “Goal is to achieve a strategic
objective…over adversaries…”
“You have to meet my political conditions or your
government will be toppled, or
you promise to meet some of my political
conditions.”
http://blog.sina.com.cn/s/blog_4b46cda30100e5dh.html
Red-DragonRising.com©
“…train a new type of high-caliber military personnel in large numbers, intensively
carry out military training under computerized conditions, and enhance
integrated combat capability based on extensive IT application…”;
“…implement the military strategy of active defense for the new period, and
enhance military strategic guidance as the times so require”;
“…strengthen national defense aim to safeguard China's sovereignty, security and
territorial integrity and ensure its peaceful development…“;
“…enhance the capability to accomplish a wide range of military tasks, the most
important of which is to win local war in an information age…“;
Chinese Military …. Future OPS
http://news.xinhuanet.com/english/special/18cpcnc/2012-
11/08/c_131959900.htm
8 NOV 2012: Former Chinese President Hu JinTao:
“China will speed up full
military IT Applications by 2020”
Red-DragonRising.com©
Evolving Chinese Military Cyber Doctrine
15
http://www.amazon.com/Science-Military-Strategy-
GUANGQIAN-YOUZHI/dp/780137892X
中國武裝力量的多元
化就業
16APR2013
http://news.xinhuanet.com/mil/2013-04/16/c_124586672.htm
http://roll.sohu.com/20130417/n372988548.shtml
In addition to winning local wars under
conditions of informatization outside the
core military tasks, but also given by the
State to complete the new diversified military
missions and tasks.
Red-DragonRising.com©
揭秘中国情报机构总参三部
• China’s NSA…總參三部
• 上海崇明岛上的一个跨太
平洋通信电缆警示牌,上
面文字显示是解放军
61398部队所立。
• 在北京附近的山区里,类
似于美国国家安全局(U.S.
National Security Agency)
的中国国家安全机构正在
监控俄罗斯和追踪导弹;
中国的军事专家在一座被
称为中国夏威夷(Hawaii)
的岛上分析互联网电话记
录;在西南的一个偏远省
份,中国的密码破译人员
正在进行破译工作。 http://www.awaker.hk/2014/07/02/the-nsa-nsa-listening-is-just-the-
beginning-led-us-into-the-network-war-spy-chief.html
http://cn.wsj.com/gb/20140708/bch104007.asp
Red-DragonRising.com©
鲍廷祥
总参某信息保障基地政
委
Bao Tingxiang
Political Commissar
of
Information
Assurance Base
张宁
总参某卫星地面站主
任
Zhang Ning
General Staff
Director of
Strategic Satellites
张玉
总参某卫星地面站工
程师
Zhang Yu
General Staff
Director of Satellite
Earth Stations
http://tv.81.cn/2014/dmmxrzn.htmhttp://www.oumil.co
m/article/zhenggong/26101.html
Red-DragonRising.com©
中國軍隊信息化战争时代的战斗
力生成模式
China's Information Warfare Age -
A Mode for Generating Combat
Power
http://bit.ly/1sTMDPF
http://www.81it.com/2014/1022/5382.html
http://goo.gl/UcPIjJ
http://www.81it.com/2014/1217/5707.html
中国网络战部队大数据助力军队提高信
息化作战能力
Chinese Cyber Forces: Large Data to Help
Improve Chinese Military Information
Warfare Capability
Red-DragonRising.com©
Evolving Chinese Military Cyber Doctrine
19
http://www.amazon.com/Science-Military-Strategy-
GUANGQIAN-YOUZHI/dp/780137892X
中國武裝力量的多元
化就業
16APR2013
http://news.xinhuanet.com/mil/2013-04/16/c_124586672.htm
http://roll.sohu.com/20130417/n372988548.shtml
In addition to winning local wars under
conditions of informatization outside the
core military tasks, but also given by the
State to complete the new diversified military
missions and tasks.
Red-DragonRising.com©
西電開設網絡工程學院
Xi'an University of Electronic
Science & Technology and
Chinese military PLA cyber
warfare courses
http://news.xidian.edu.cn/view-47502.html
http://cn.nytimes.com/china/20150107/c07cyber/zh-hant/
西安电子科大网络与信
息安全学院成立 -
Xi'an Electronic Science
Tech Inst establishes
Network & Info Security
Courses
2015…PLA continues cyber preparations…
Red-DragonRising.com©
朱成虎谈世界军事发展:信息化武器是未来主
要作战手段--军事
Information weapons are the key to future warfare
国防大学教授朱成虎少将在发表演讲
http://military.people.com.cn/n/2015/0106/c1011-26336440.html
Red-DragonRising.com©
"Cyber ​​Army" Which is stronger?
US leader "Keyboard War"
“网军”哪家强?美军领跑“键盘战争”
http://news.163.com/14/1228/09/AEHR60C300014Q4P.html
http://gzdaily.dayoo.com/html/2014-12/25/content_2829393.htm
Red-DragonRising.com©
@Red-DragonRising
http://www.linkedin.com/in/RedDragon1949
Red-DragonRising.com
Red-DragonRising.com©
Red-DragonRising.com©
William T Hagestad II
Red Dragon Rising
RedDragon1949
hagestadwt@red-dragonrising.com
Red-dragonrising.com

More Related Content

What's hot

Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09Richard Stiennon
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paperMarioEliseo3
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technologypradhansushil
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsRichard Stiennon
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarRichard Stiennon
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Сравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиСравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиPositive Hack Days
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015AFCEA International
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015 Bill Hagestad II
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Mark Raduenzel
 

What's hot (20)

Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
Surviving Cyber War April09
Surviving Cyber War April09Surviving Cyber War April09
Surviving Cyber War April09
 
Cyber war
Cyber warCyber war
Cyber war
 
Asymmetric threat 5_paper
Asymmetric threat 5_paperAsymmetric threat 5_paper
Asymmetric threat 5_paper
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Terror And Technology
Terror And TechnologyTerror And Technology
Terror And Technology
 
Nsa sid nato
Nsa sid natoNsa sid nato
Nsa sid nato
 
How the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwarsHow the Revolution in Military Affairs has set the stage for future cyberwars
How the Revolution in Military Affairs has set the stage for future cyberwars
 
Cyberwar Update2010
Cyberwar Update2010Cyberwar Update2010
Cyberwar Update2010
 
There WIll Be Cyberwar
There WIll Be Cyberwar There WIll Be Cyberwar
There WIll Be Cyberwar
 
The Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be CyberwarThe Internet of Military Things: There Will Be Cyberwar
The Internet of Military Things: There Will Be Cyberwar
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Сравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной КореиСравнение хакеров Ирана, Китая и Северной Кореи
Сравнение хакеров Ирана, Китая и Северной Кореи
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015Cyber Ethics: TechNet Augusta 2015
Cyber Ethics: TechNet Augusta 2015
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015  China’s clandestine services red dragon rising copyright 2015
China’s clandestine services red dragon rising copyright 2015
 
Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2Raduenzel - INTL621 Assignment 2
Raduenzel - INTL621 Assignment 2
 

Similar to Evolving chinese military cyber doctrine 中国网络战部队

Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Sharmin Ahammad
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack StratagemsKarl Wolfgang
 
Dr. Tom Bussing Briefing to Williams Foundation Seminar on Joint Strike, Augu...
Dr. Tom Bussing Briefing to Williams Foundation Seminar on Joint Strike, Augu...Dr. Tom Bussing Briefing to Williams Foundation Seminar on Joint Strike, Augu...
Dr. Tom Bussing Briefing to Williams Foundation Seminar on Joint Strike, Augu...ICSA, LLC
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacksClifford Stone
 

Similar to Evolving chinese military cyber doctrine 中国网络战部队 (7)

Ht f42
Ht f42Ht f42
Ht f42
 
Cyber Warfare Europe 2011
Cyber Warfare Europe 2011Cyber Warfare Europe 2011
Cyber Warfare Europe 2011
 
Png r32 a
Png r32 aPng r32 a
Png r32 a
 
Emerging China
Emerging ChinaEmerging China
Emerging China
 
Computer Attack Stratagems
Computer Attack StratagemsComputer Attack Stratagems
Computer Attack Stratagems
 
Dr. Tom Bussing Briefing to Williams Foundation Seminar on Joint Strike, Augu...
Dr. Tom Bussing Briefing to Williams Foundation Seminar on Joint Strike, Augu...Dr. Tom Bussing Briefing to Williams Foundation Seminar on Joint Strike, Augu...
Dr. Tom Bussing Briefing to Williams Foundation Seminar on Joint Strike, Augu...
 
Foreign military studies office publications human network attacks
Foreign military studies office publications   human network attacksForeign military studies office publications   human network attacks
Foreign military studies office publications human network attacks
 

More from Bill Hagestad II

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Bill Hagestad II
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Bill Hagestad II
 
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
China's People's Liberation Army force distribution 2015  中国人民解放军陆军China's People's Liberation Army force distribution 2015  中国人民解放军陆军
China's People's Liberation Army force distribution 2015 中国人民解放军陆军Bill Hagestad II
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructureBill Hagestad II
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...Bill Hagestad II
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014Bill Hagestad II
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparisonBill Hagestad II
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Bill Hagestad II
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber securityBill Hagestad II
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Bill Hagestad II
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Bill Hagestad II
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502Bill Hagestad II
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoSBill Hagestad II
 
Red Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionRed Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionBill Hagestad II
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites listBill Hagestad II
 

More from Bill Hagestad II (15)

Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02Hagestad xmlversion-120110170214-phpapp02
Hagestad xmlversion-120110170214-phpapp02
 
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場 Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
Chinese Uses of Big Data Cloud Security 漫步在雲端資安新戰場
 
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
China's People's Liberation Army force distribution 2015  中国人民解放军陆军China's People's Liberation Army force distribution 2015  中国人民解放军陆军
China's People's Liberation Army force distribution 2015 中国人民解放军陆军
 
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructures4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
s4x15whychinaoriranwouldtargetusnationalcriticalinfrastructure
 
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
'The How & Why China & Iran Would Successfully Target US Critical Infratsruct...
 
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014高技术战争 Gaojishu People's Liberation Army high tech war in 2014
高技术战争 Gaojishu People's Liberation Army high tech war in 2014
 
Weaponized malware comparison
Weaponized malware comparisonWeaponized malware comparison
Weaponized malware comparison
 
Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014Cyber Threat Taxonomy Matrix APR 2014
Cyber Threat Taxonomy Matrix APR 2014
 
사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security사이버 보안의 이해 Intro to korean cyber security
사이버 보안의 이해 Intro to korean cyber security
 
Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육Korean information security practices 보안 인식교육
Korean information security practices 보안 인식교육
 
Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全Chinese hackers how to presentation投影片 1網路安全
Chinese hackers how to presentation投影片 1網路安全
 
No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502No Cyber for you CONOPLAN 3502
No Cyber for you CONOPLAN 3502
 
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
解放軍网络对抗技术 Chinese Military Network Warfare Technology DDoS
 
Red Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx versionRed Dragon's CYBER Security RSS Feed .docx version
Red Dragon's CYBER Security RSS Feed .docx version
 
Niels G's security websites list
Niels G's security websites listNiels G's security websites list
Niels G's security websites list
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Evolving chinese military cyber doctrine 中国网络战部队