SlideShare a Scribd company logo
5.4: Common & Natural
Logarithmic Functions
© 2008 Roy L. Gover(www.mrgover.com)
Learning Goals:
•Evaluate common and
natural logarithms
•Solve logarithmic
equations
Definition
logay x=
if and
only if
y=log
base a of x
y
a x=
Important Idea
logay x= Logarithmic
Form
Exponential
Form
y
a x=
The
logarithmic
function is the
inverse of the
exponential
function
y x=
Important Idea
x
y a=
logay x=
Example
Write the following
logarithmic function in
exponential form:
10log 0.01 2= −
5log 25 2=
3
1
log 3
27
 
= − 
 
6log 6 1=
Try This
Write the following
logarithmic function in
exponential form:
2
10 100=10log 100 2=
2 1
5
25
−
=5
1
log 2
25
 
= − 
 
Important Idea
In your book and
on the calculator,
is
the same
as . If no
base is stated, it
is understood that
the base is 10.
10log x
log x
Example
Without using your
calculator, find each value:
log1000
log1
log 10
log( 3)−
Try This
Without using your
calculator, find each value:
log100,000
log10
3
log 10
log( 7)−
5
1
1/3
undefined
Example
Solve each equation by using
an equivalent statement:
log 2x =
10 29x
=
Try This
Solve each equation by using
an equivalent statement:
log 3x =
10 52x
=
x=1000
x=1.716
Definition
A second type of logarithm
exists, called the natural
logarithm and written ln x,
that uses the number e as a
base instead of the number
10. The natural logarithm is
very useful in science and
engineering.
Important Idea
Like , the
number e is a
very important
number in
mathematics.
π
Important Idea
ln x
The natural logarithm is a
logarithm with the base e
is a short way of
writing: loge x
Definition
ln x y=
y
e x=
If and
only if
ln logex x=
Example
ln 0.0198
Use a calculator to find
the following value to the
nearest ten-thousandth:
Try This
1
ln
0.32
 
 
 
Use a calculator to find the
following value to the
nearest ten-thousandth:
1.1394
Example
Solve each equation by using
an equivalent statement:
ln 4x =
5x
e =
Try This
Solve each equation by using
an equivalent statement:
ln 2x = x=7.389
x=2.0798x
e =
Example
Using your calculator, graph
the following:
1 lny x=
Where does the graph cross
the x-axis?
Example
Using your calculator, graph
the following:
1 lny x=
Can ln x ever be 0 or
negative?
Example
Using your calculator, graph
the following:
1 lny x=
What is the domain and
range of ln x?
Example
Using your calculator, graph
the following:
1 lny x=
How fast does ln x grow?
Find the ln 1,000,000.
Try This
Using your calculator, graph:
1 lny x=
2 ln( 3)y x= −
3 ln( 3) 5y x= − +
Describe the differences.
How does the domain and
range change?
Lesson Close
A logarithm is an
exponent. Illustrate with
an example why this is
so.

More Related Content

What's hot

Math Algebra
Math AlgebraMath Algebra
Math Algebra
Mark Brahier
 
June 4, 2014
June 4, 2014June 4, 2014
June 4, 2014khyps13
 
Functional programming
Functional programmingFunctional programming
Functional programming
Heman Gandhi
 
Properties of Addition & Multiplication
Properties of Addition & MultiplicationProperties of Addition & Multiplication
Properties of Addition & Multiplicationitutor
 
Closure properties of numbers
Closure properties of numbersClosure properties of numbers
Closure properties of numbers
SKY HAWKS' ACADEMY
 
MCI-SIF PDA Thailand Project
MCI-SIF PDA Thailand ProjectMCI-SIF PDA Thailand Project
MCI-SIF PDA Thailand Project
Jimmy Keng
 
Imaginary numbers
Imaginary numbersImaginary numbers
Imaginary numbers
Arturo Mendez
 
Math Functions
Math FunctionsMath Functions
Math Functions
Mark Brahier
 
2 1
2 12 1
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
Mohamed Loey
 
Math
MathMath
Math Geometry
Math GeometryMath Geometry
Math Geometry
Mark Brahier
 
Authentic learning activity
Authentic learning activityAuthentic learning activity
Authentic learning activity
obakeng mokotedi
 
Analysis of algorithm
Analysis of algorithmAnalysis of algorithm
Analysis of algorithm
Rajendra Dangwal
 
Ludäscher et al. 2014 - A Hybrid Diagnosis Approach Combining Black-Box and W...
Ludäscher et al. 2014 - A Hybrid Diagnosis Approach Combining Black-Box and W...Ludäscher et al. 2014 - A Hybrid Diagnosis Approach Combining Black-Box and W...
Ludäscher et al. 2014 - A Hybrid Diagnosis Approach Combining Black-Box and W...
taxonbytes
 
MODULE 5-Searching and-sorting
MODULE 5-Searching and-sortingMODULE 5-Searching and-sorting
MODULE 5-Searching and-sorting
nikshaikh786
 
6th math -c2--L4--aug27
6th math -c2--L4--aug276th math -c2--L4--aug27
6th math -c2--L4--aug27jdurst65
 

What's hot (20)

Math Algebra
Math AlgebraMath Algebra
Math Algebra
 
Evaluate Algebraic Expressions
Evaluate Algebraic ExpressionsEvaluate Algebraic Expressions
Evaluate Algebraic Expressions
 
June 4, 2014
June 4, 2014June 4, 2014
June 4, 2014
 
Functional programming
Functional programmingFunctional programming
Functional programming
 
Properties of Addition & Multiplication
Properties of Addition & MultiplicationProperties of Addition & Multiplication
Properties of Addition & Multiplication
 
Closure properties of numbers
Closure properties of numbersClosure properties of numbers
Closure properties of numbers
 
MCI-SIF PDA Thailand Project
MCI-SIF PDA Thailand ProjectMCI-SIF PDA Thailand Project
MCI-SIF PDA Thailand Project
 
Imaginary numbers
Imaginary numbersImaginary numbers
Imaginary numbers
 
Math Functions
Math FunctionsMath Functions
Math Functions
 
2 1
2 12 1
2 1
 
Mathematichs
MathematichsMathematichs
Mathematichs
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
 
Math
MathMath
Math
 
Math Geometry
Math GeometryMath Geometry
Math Geometry
 
5.9 complex numbers
5.9 complex numbers5.9 complex numbers
5.9 complex numbers
 
Authentic learning activity
Authentic learning activityAuthentic learning activity
Authentic learning activity
 
Analysis of algorithm
Analysis of algorithmAnalysis of algorithm
Analysis of algorithm
 
Ludäscher et al. 2014 - A Hybrid Diagnosis Approach Combining Black-Box and W...
Ludäscher et al. 2014 - A Hybrid Diagnosis Approach Combining Black-Box and W...Ludäscher et al. 2014 - A Hybrid Diagnosis Approach Combining Black-Box and W...
Ludäscher et al. 2014 - A Hybrid Diagnosis Approach Combining Black-Box and W...
 
MODULE 5-Searching and-sorting
MODULE 5-Searching and-sortingMODULE 5-Searching and-sorting
MODULE 5-Searching and-sorting
 
6th math -c2--L4--aug27
6th math -c2--L4--aug276th math -c2--L4--aug27
6th math -c2--L4--aug27
 

Viewers also liked

Tutorials--Exponential Functions in Tabular and Graph Form
Tutorials--Exponential Functions in Tabular and Graph FormTutorials--Exponential Functions in Tabular and Graph Form
Tutorials--Exponential Functions in Tabular and Graph Form
Media4math
 
Exponential functions
Exponential functionsExponential functions
Exponential functionskvillave
 
2.2 exponential function and compound interest
2.2 exponential function and compound interest2.2 exponential function and compound interest
2.2 exponential function and compound interestmath123c
 
4.1 exponential functions 2
4.1 exponential functions 24.1 exponential functions 2
4.1 exponential functions 2kvillave
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1kvillave
 
Simple interest
Simple interestSimple interest
Simple interest
Anju Soman
 
61 exponential functions
61 exponential functions61 exponential functions
61 exponential functionsmath126
 
The Exponential and natural log functions
The Exponential and natural log functionsThe Exponential and natural log functions
The Exponential and natural log functionsJJkedst
 
Lesson 14: Exponential Functions
Lesson 14: Exponential FunctionsLesson 14: Exponential Functions
Lesson 14: Exponential Functions
Matthew Leingang
 
Compound Interest
Compound InterestCompound Interest
Compound Interestitutor
 
Exponential functions
Exponential functionsExponential functions
Exponential functionsRon Eick
 
Logarithmic Functions
Logarithmic FunctionsLogarithmic Functions
Logarithmic Functionsswartzje
 
Exponential functions
Exponential functionsExponential functions
Exponential functions
omar_egypt
 
Properties of logarithms
Properties of logarithmsProperties of logarithms
Properties of logarithmsJessica Garcia
 
Exponential Functions
Exponential FunctionsExponential Functions
Exponential Functionsitutor
 
Simple interest
Simple interestSimple interest

Viewers also liked (20)

Tutorials--Exponential Functions in Tabular and Graph Form
Tutorials--Exponential Functions in Tabular and Graph FormTutorials--Exponential Functions in Tabular and Graph Form
Tutorials--Exponential Functions in Tabular and Graph Form
 
Exponential functions
Exponential functionsExponential functions
Exponential functions
 
2.2 exponential function and compound interest
2.2 exponential function and compound interest2.2 exponential function and compound interest
2.2 exponential function and compound interest
 
4.1 exponential functions 2
4.1 exponential functions 24.1 exponential functions 2
4.1 exponential functions 2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Simple interest
Simple interestSimple interest
Simple interest
 
61 exponential functions
61 exponential functions61 exponential functions
61 exponential functions
 
Indices & logarithm
Indices & logarithmIndices & logarithm
Indices & logarithm
 
Hprec5 5
Hprec5 5Hprec5 5
Hprec5 5
 
The Exponential and natural log functions
The Exponential and natural log functionsThe Exponential and natural log functions
The Exponential and natural log functions
 
Lesson 14: Exponential Functions
Lesson 14: Exponential FunctionsLesson 14: Exponential Functions
Lesson 14: Exponential Functions
 
Simple Interest
Simple InterestSimple Interest
Simple Interest
 
Compound Interest
Compound InterestCompound Interest
Compound Interest
 
Exponential functions
Exponential functionsExponential functions
Exponential functions
 
Logarithmic Functions
Logarithmic FunctionsLogarithmic Functions
Logarithmic Functions
 
Exponential functions
Exponential functionsExponential functions
Exponential functions
 
Properties of logarithms
Properties of logarithmsProperties of logarithms
Properties of logarithms
 
Compound Interest
Compound InterestCompound Interest
Compound Interest
 
Exponential Functions
Exponential FunctionsExponential Functions
Exponential Functions
 
Simple interest
Simple interestSimple interest
Simple interest
 

Similar to Hprec5 4

4.3 Logarithmic Functions
4.3 Logarithmic Functions4.3 Logarithmic Functions
4.3 Logarithmic Functions
smiller5
 
Mc ty-logarithms-2009-1
Mc ty-logarithms-2009-1Mc ty-logarithms-2009-1
Mc ty-logarithms-2009-1
sheetslibrary
 
Logarithms Text
Logarithms TextLogarithms Text
Logarithms Text
SifuDias
 
6.3 Logarithmic Functions
6.3 Logarithmic Functions6.3 Logarithmic Functions
6.3 Logarithmic Functions
smiller5
 
C) solving equations
C) solving equationsC) solving equations
C) solving equations
Asawari Warkad
 
Common natural logarithms
Common natural logarithmsCommon natural logarithms
Common natural logarithmsJessica Garcia
 
4.5 Exponential and Logarithmic Equations
4.5 Exponential and Logarithmic Equations4.5 Exponential and Logarithmic Equations
4.5 Exponential and Logarithmic Equations
smiller5
 
Deep learning Unit1 BasicsAllllllll.pptx
Deep learning Unit1 BasicsAllllllll.pptxDeep learning Unit1 BasicsAllllllll.pptx
Deep learning Unit1 BasicsAllllllll.pptx
FreefireGarena30
 
Logarithm
LogarithmLogarithm
Logarithmitutor
 
Advance algebra
Advance algebraAdvance algebra
Advance algebra
lyra matalubos
 
098A_exponents_factoring.ppt
098A_exponents_factoring.ppt098A_exponents_factoring.ppt
098A_exponents_factoring.ppt
Marjorie Malveda
 
098A_exponents_factoring.ppt
098A_exponents_factoring.ppt098A_exponents_factoring.ppt
098A_exponents_factoring.ppt
ElmabethDelaCruz1
 
Module 4 exponential and logarithmic functions
Module 4   exponential and logarithmic functionsModule 4   exponential and logarithmic functions
Module 4 exponential and logarithmic functions
dionesioable
 
Algebra 2 06 Exponential and Logarithmic Functions 2.pptx
Algebra 2 06 Exponential and Logarithmic Functions 2.pptxAlgebra 2 06 Exponential and Logarithmic Functions 2.pptx
Algebra 2 06 Exponential and Logarithmic Functions 2.pptx
PallaviGupta66118
 
4.3 Logarithmic Functions
4.3 Logarithmic Functions4.3 Logarithmic Functions
4.3 Logarithmic Functions
smiller5
 

Similar to Hprec5 4 (20)

4.3 Logarithmic Functions
4.3 Logarithmic Functions4.3 Logarithmic Functions
4.3 Logarithmic Functions
 
Mc ty-logarithms-2009-1
Mc ty-logarithms-2009-1Mc ty-logarithms-2009-1
Mc ty-logarithms-2009-1
 
Logarithms Text
Logarithms TextLogarithms Text
Logarithms Text
 
6.3 Logarithmic Functions
6.3 Logarithmic Functions6.3 Logarithmic Functions
6.3 Logarithmic Functions
 
Lar calc10 ch05_sec1
Lar calc10 ch05_sec1Lar calc10 ch05_sec1
Lar calc10 ch05_sec1
 
C) solving equations
C) solving equationsC) solving equations
C) solving equations
 
8.4 logarithms1
8.4 logarithms18.4 logarithms1
8.4 logarithms1
 
Common natural logarithms
Common natural logarithmsCommon natural logarithms
Common natural logarithms
 
7.3
7.37.3
7.3
 
4.5 Exponential and Logarithmic Equations
4.5 Exponential and Logarithmic Equations4.5 Exponential and Logarithmic Equations
4.5 Exponential and Logarithmic Equations
 
Deep learning Unit1 BasicsAllllllll.pptx
Deep learning Unit1 BasicsAllllllll.pptxDeep learning Unit1 BasicsAllllllll.pptx
Deep learning Unit1 BasicsAllllllll.pptx
 
Logarithm
LogarithmLogarithm
Logarithm
 
Advance algebra
Advance algebraAdvance algebra
Advance algebra
 
Exponents
ExponentsExponents
Exponents
 
098A_exponents_factoring.ppt
098A_exponents_factoring.ppt098A_exponents_factoring.ppt
098A_exponents_factoring.ppt
 
098A_exponents_factoring.ppt
098A_exponents_factoring.ppt098A_exponents_factoring.ppt
098A_exponents_factoring.ppt
 
Module 4 exponential and logarithmic functions
Module 4   exponential and logarithmic functionsModule 4   exponential and logarithmic functions
Module 4 exponential and logarithmic functions
 
Algebra 2 06 Exponential and Logarithmic Functions 2.pptx
Algebra 2 06 Exponential and Logarithmic Functions 2.pptxAlgebra 2 06 Exponential and Logarithmic Functions 2.pptx
Algebra 2 06 Exponential and Logarithmic Functions 2.pptx
 
4.3 Logarithmic Functions
4.3 Logarithmic Functions4.3 Logarithmic Functions
4.3 Logarithmic Functions
 
Logarithmic functions (2)
Logarithmic functions (2)Logarithmic functions (2)
Logarithmic functions (2)
 

More from stevenhbills (20)

Hprec2 2
Hprec2 2Hprec2 2
Hprec2 2
 
Hprec2 4
Hprec2 4Hprec2 4
Hprec2 4
 
Hprec2 5
Hprec2 5Hprec2 5
Hprec2 5
 
Hat04 0203
Hat04 0203Hat04 0203
Hat04 0203
 
Hat04 0205
Hat04 0205Hat04 0205
Hat04 0205
 
3.1
3.13.1
3.1
 
3.2
3.23.2
3.2
 
Hprec3 7
Hprec3 7Hprec3 7
Hprec3 7
 
Hprec5.2
Hprec5.2Hprec5.2
Hprec5.2
 
Hprec5.3
Hprec5.3Hprec5.3
Hprec5.3
 
5.6 solving exponential and logarithmic equations
5.6 solving exponential and logarithmic equations5.6 solving exponential and logarithmic equations
5.6 solving exponential and logarithmic equations
 
Hprec6 1
Hprec6 1Hprec6 1
Hprec6 1
 
Hprec6 2
Hprec6 2Hprec6 2
Hprec6 2
 
Hprec6 3
Hprec6 3Hprec6 3
Hprec6 3
 
Hprec6 4
Hprec6 4Hprec6 4
Hprec6 4
 
Hprec6 5
Hprec6 5Hprec6 5
Hprec6 5
 
Hprec7 4
Hprec7 4Hprec7 4
Hprec7 4
 
Hprec7.1
Hprec7.1Hprec7.1
Hprec7.1
 
Hprec7.3
Hprec7.3Hprec7.3
Hprec7.3
 
Hprec8 1
Hprec8 1Hprec8 1
Hprec8 1
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Hprec5 4