SlideShare a Scribd company logo
GreatHorn
Know Before The Breach
@greathorn_inc
@greathorn_inc
GreatHorn
Know Before The Breach
@greathorn_inc
@greathorn_inc
@greathorn_inc
@greathorn_inc
This email was never sent by Ray…
@greathorn_inc
@greathorn_inc
15 million
spear phishing emails every day
@greathorn_inc
90%of data breaches begin
via spear phishing
$36 billion
@greathorn_inc
cloud communicaCon market, 2019
@greathorn_inc
What if these attacks
could be found and
stopped
before the breach?
@greathorn_inc
@greathorn_inc
@greathorn_inc
@greathorn_inc
Homograph
Detection
Behavioral
Analysis
Content
Compliance
Policy
Enforcement
DNS Heuristics
Spoofing
Detection
@greathorn_inc
GreatHorn Analysis Engine
DetecCon and
ClassificaCon Rule Engine
ML SVM
(Emergent DetecCon)
GreatHorn Preprocessors + Sensors
Data Lake (Aggregated Learning Set)
15 Minute
Deployment
@greathorn_inc
@greathorn_inc
• Inbox threat removal
• Pre-built automation rules
• Basic daily reporting
• Incident forensics dashboard
• Configurable policy engine
• Full reporting and analytics
GreatHorn Realtime
Basic protection for smaller orgs
GreatHorn Enterprise
Complete defense for larger teams
@greathorn_inc
16 Million Emails Protected
4MM
8MM
12MM
16MM
Sept 15 Oct 15 Nov 15 Dec 15
@greathorn_inc
$50,000ARR
Qualified Opportunity Pipeline (2016)
@greathorn_inc
$1,000,000+
@greathorn_inc
Strategic Partnership
@greathorn_inc
Kevin O’Brien
CEO
Raymond Wallace, III
CTO
Christopher Fraser
Sales / BD
30 days’ free monitoring
@greathorn_inc
@greathorn_inc
founders@greathorn.com
Connect with the companies
Text: 917-790-0611 or visit: bit.ly/nycdemoday

More Related Content

Viewers also liked

Master's Degree Thesis
Master's Degree ThesisMaster's Degree Thesis
Master's Degree Thesis
Matt Stark
 
Apa
ApaApa
Marketing Paper
Marketing PaperMarketing Paper
Marketing Paper
Angelica Berghoff
 
Internet and Aftermarket
Internet and AftermarketInternet and Aftermarket
Internet and Aftermarket
Tom Venetis
 
Lori Hall Resume_May2015
Lori Hall  Resume_May2015Lori Hall  Resume_May2015
Lori Hall Resume_May2015
Lori Hall
 
Psycho
PsychoPsycho
MarketingPresentation
MarketingPresentationMarketingPresentation
MarketingPresentation
Angelica Berghoff
 
Admission essay
Admission essayAdmission essay
Admission essay
Álvaro Remiro Chacón
 
INGRESSE DEMO DAY
INGRESSE DEMO DAYINGRESSE DEMO DAY
INGRESSE DEMO DAY
500 Startups
 
Root4 Startup Next Demo Day 2014
Root4 Startup Next Demo Day 2014Root4 Startup Next Demo Day 2014
Root4 Startup Next Demo Day 2014
Marcos Quezada
 
Вебинар "Подсказки супервизору" VoIPTime
Вебинар "Подсказки супервизору" VoIPTimeВебинар "Подсказки супервизору" VoIPTime
Вебинар "Подсказки супервизору" VoIPTime
Tetyana Gonchar
 
Randstad presentation
Randstad presentationRandstad presentation
Randstad presentation
Mari Vollmann
 
Indian Pharma's Only CEO Roundtable on Field Force Excellence
Indian Pharma's Only CEO Roundtable on Field Force ExcellenceIndian Pharma's Only CEO Roundtable on Field Force Excellence
Indian Pharma's Only CEO Roundtable on Field Force Excellence
Anup Soans
 
Faktor penyebab defisit air bersih
Faktor penyebab defisit air bersih Faktor penyebab defisit air bersih
Faktor penyebab defisit air bersih
qistyafifah
 
Vidrovr, NYC Media Lab Combine Demo Day
Vidrovr, NYC Media Lab Combine Demo DayVidrovr, NYC Media Lab Combine Demo Day
Vidrovr, NYC Media Lab Combine Demo Day
Daniel Morozoff-Abezgauz
 
Beyond The Business Case For Diversity and Inclusion In Tech
Beyond The Business Case For Diversity and Inclusion In TechBeyond The Business Case For Diversity and Inclusion In Tech
Beyond The Business Case For Diversity and Inclusion In Tech
Wayne Sutton
 
CV KONAIN ALAM ANSARI (Rigging Supervisor) 2015
CV KONAIN ALAM ANSARI (Rigging Supervisor) 2015CV KONAIN ALAM ANSARI (Rigging Supervisor) 2015
CV KONAIN ALAM ANSARI (Rigging Supervisor) 2015
konain alam ansari ansari
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
Javaria Chiragh
 
Design Ethics for Artificial Intelligence
Design Ethics for Artificial IntelligenceDesign Ethics for Artificial Intelligence
Design Ethics for Artificial Intelligence
Charbel Zeaiter
 

Viewers also liked (19)

Master's Degree Thesis
Master's Degree ThesisMaster's Degree Thesis
Master's Degree Thesis
 
Apa
ApaApa
Apa
 
Marketing Paper
Marketing PaperMarketing Paper
Marketing Paper
 
Internet and Aftermarket
Internet and AftermarketInternet and Aftermarket
Internet and Aftermarket
 
Lori Hall Resume_May2015
Lori Hall  Resume_May2015Lori Hall  Resume_May2015
Lori Hall Resume_May2015
 
Psycho
PsychoPsycho
Psycho
 
MarketingPresentation
MarketingPresentationMarketingPresentation
MarketingPresentation
 
Admission essay
Admission essayAdmission essay
Admission essay
 
INGRESSE DEMO DAY
INGRESSE DEMO DAYINGRESSE DEMO DAY
INGRESSE DEMO DAY
 
Root4 Startup Next Demo Day 2014
Root4 Startup Next Demo Day 2014Root4 Startup Next Demo Day 2014
Root4 Startup Next Demo Day 2014
 
Вебинар "Подсказки супервизору" VoIPTime
Вебинар "Подсказки супервизору" VoIPTimeВебинар "Подсказки супервизору" VoIPTime
Вебинар "Подсказки супервизору" VoIPTime
 
Randstad presentation
Randstad presentationRandstad presentation
Randstad presentation
 
Indian Pharma's Only CEO Roundtable on Field Force Excellence
Indian Pharma's Only CEO Roundtable on Field Force ExcellenceIndian Pharma's Only CEO Roundtable on Field Force Excellence
Indian Pharma's Only CEO Roundtable on Field Force Excellence
 
Faktor penyebab defisit air bersih
Faktor penyebab defisit air bersih Faktor penyebab defisit air bersih
Faktor penyebab defisit air bersih
 
Vidrovr, NYC Media Lab Combine Demo Day
Vidrovr, NYC Media Lab Combine Demo DayVidrovr, NYC Media Lab Combine Demo Day
Vidrovr, NYC Media Lab Combine Demo Day
 
Beyond The Business Case For Diversity and Inclusion In Tech
Beyond The Business Case For Diversity and Inclusion In TechBeyond The Business Case For Diversity and Inclusion In Tech
Beyond The Business Case For Diversity and Inclusion In Tech
 
CV KONAIN ALAM ANSARI (Rigging Supervisor) 2015
CV KONAIN ALAM ANSARI (Rigging Supervisor) 2015CV KONAIN ALAM ANSARI (Rigging Supervisor) 2015
CV KONAIN ALAM ANSARI (Rigging Supervisor) 2015
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Design Ethics for Artificial Intelligence
Design Ethics for Artificial IntelligenceDesign Ethics for Artificial Intelligence
Design Ethics for Artificial Intelligence
 

Similar to GreatHorn - Techstars NYC 2015 Demo Day

Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
Rohit Kapoor
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
TEKMONKS
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
Cristian Garcia G.
 
Machine learning for bestt group - 20170714
Machine learning for bestt group - 20170714Machine learning for bestt group - 20170714
Machine learning for bestt group - 20170714
IBM Thailand Co Ltd
 
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Cameron Townshend
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
Software Guru
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
Saqib Chaudhry
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
Dev Secops Software Supply Chain
Dev Secops Software Supply ChainDev Secops Software Supply Chain
Dev Secops Software Supply Chain
Cameron Townshend
 
Hacking autonomous things, from automobile through IoT to biohack
Hacking autonomous things, from automobile through IoT to biohackHacking autonomous things, from automobile through IoT to biohack
Hacking autonomous things, from automobile through IoT to biohack
Dan Romescu
 
Big data
Big dataBig data
Big data
Brian Pereira
 
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Amazon Web Services Korea
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Olivier Busolini
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in IS
ISACA Riyadh
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
Sagi Brody
 
AI and ML for Everyone
AI and ML for EveryoneAI and ML for Everyone
AI and ML for Everyone
bigdata trunk
 
Login cat tekmonks - v5 (mini)
Login cat   tekmonks - v5 (mini)Login cat   tekmonks - v5 (mini)
Login cat tekmonks - v5 (mini)
Rohit Kapoor
 
LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini Presentation
Rohit Kapoor
 
Find værdi i alle data
Find værdi i alle dataFind værdi i alle data
Find værdi i alle data
Microsoft
 

Similar to GreatHorn - Techstars NYC 2015 Demo Day (20)

Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Login cat tekmonks - v4
Login cat   tekmonks - v4Login cat   tekmonks - v4
Login cat tekmonks - v4
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Machine learning for bestt group - 20170714
Machine learning for bestt group - 20170714Machine learning for bestt group - 20170714
Machine learning for bestt group - 20170714
 
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
Security Software Supply Chains - Sonatype - DevSecCon Singapore March 2019
 
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscapeDevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
DevSecCon Singapore 2019: Embracing Security - A changing DevOps landscape
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Dev Secops Software Supply Chain
Dev Secops Software Supply ChainDev Secops Software Supply Chain
Dev Secops Software Supply Chain
 
Hacking autonomous things, from automobile through IoT to biohack
Hacking autonomous things, from automobile through IoT to biohackHacking autonomous things, from automobile through IoT to biohack
Hacking autonomous things, from automobile through IoT to biohack
 
Big data
Big dataBig data
Big data
 
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
Democratization - New Wave of Data Science (홍운표 상무, DataRobot) :: AWS Techfor...
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in IS
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
 
AI and ML for Everyone
AI and ML for EveryoneAI and ML for Everyone
AI and ML for Everyone
 
Login cat tekmonks - v5 (mini)
Login cat   tekmonks - v5 (mini)Login cat   tekmonks - v5 (mini)
Login cat tekmonks - v5 (mini)
 
LoginCat - Mini Presentation
LoginCat - Mini PresentationLoginCat - Mini Presentation
LoginCat - Mini Presentation
 
Find værdi i alle data
Find værdi i alle dataFind værdi i alle data
Find værdi i alle data
 

Recently uploaded

LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 

Recently uploaded (20)

LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 

GreatHorn - Techstars NYC 2015 Demo Day