SlideShare a Scribd company logo
INFORMATION SECURITY
“The Myths & Realities”

Muhammed Usama Bin Shihab
www.usama.in
Internet Ethics
Ethical rules for computer users
Do not use computers to harm other users.
Do not use computers to steal others information.
Do not access files without the permission of the owner.
Do not copy copyrighted software without the author’s permission.
Always respect copyright laws and policies.
Respect the privacy of others, just as you expect the same from others.
Do not use other user's computer resources without their permission.
Use Internet ethically.
Copyrights
Copyright refers to a form of intellectual property
that gives the author of an original work exclusive
right for a certain time period in relative to that work,
including its publication, distribution etc. Copyright is
described under the umbrella term intellectual
property along with rights and trade name.
And what’s in copyrights?
Literature like
poems, stories, articles etc.
Photographs, Graphical
Illustrations etc.
Idea, Design etc.

Music, Movies etc.
And what’s in copyrights?
Literature like poems, stories,
articles etc.
Photographs, Graphical
Illustrations etc.
Idea, Design etc.

Music, Movies etc.
Downloads
How to download safely???

Be Secured
You must powered by
A good antivirus or
site
Advisor programs.

Use Common Sense
If you want a music,
Then no need for
download an .exe file

Verify & Confirm
Check user reviews &
Comments and
confirm the content is
genuine
The “GAMER” facts
Social Networking
Social Networking
Safe Social Networking Tips
You Guessed It: Use Strong Passwords.
Review Your Apps, Add-Ons and Other
Settings.

Be More Cautious with Mobile.
Sites Update Privacy Settings -- So Should You.

Beware "Password Check" Sites.
Limit Hardware and Account Access.
Social Networking
“The Good, Bad and Ugly”
Online Banking & E-Commerce
1. Amazon.com
2. Ebay.com
3. Flipkart.com
Vulnerable Software
“Believe it or not”
BOTNET
Be smart with your SMART
PHONE
An Advice 

THINK Twice Before DO
Be Safe, Be Secured
Source courtesy










Google
Wikipedia
Mashable.com
TechCrunch
InfoSecAwareness, Government of India
Kaspersky Labs
TrendMicro – TrendLabs
FBI Website
CDAC
THANKS
Who am I?
www.usama.in

fb.com/usamaxz

@usamaxtrendz

More Related Content

What's hot

11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
Jonathan Ezor
 
The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?Benjamin Ang
 
Copyright Presentation
Copyright PresentationCopyright Presentation
Copyright Presentationjohns377
 
Copyright and lopez 1
Copyright and lopez 1Copyright and lopez 1
Copyright and lopez 1lopezchhs
 
Copyright 03 28 12
Copyright 03 28 12Copyright 03 28 12
Copyright 03 28 12lopezchhs
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
Himanshu Pathak
 
Copyrights bstremmel1
Copyrights bstremmel1Copyrights bstremmel1
Copyrights bstremmel1
Bryce Stremmel
 
Safe and ethical use of technology
Safe and ethical use of technologySafe and ethical use of technology
Safe and ethical use of technology
Allison Loyd
 
Copyright presentation3
Copyright presentation3Copyright presentation3
Copyright presentation3mdelmartinez
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
Himanshu Pathak
 
Copyright presentation4
Copyright presentation4Copyright presentation4
Copyright presentation4mdelmartinez
 
2nd modification
2nd modification2nd modification
2nd modification
jamieserna
 
Copyright presentation4
Copyright presentation4Copyright presentation4
Copyright presentation4mdelmartinez
 
Copyright Law
Copyright LawCopyright Law
Copyright Law
StudentPressLawCenter
 
Ten commandments
Ten commandmentsTen commandments
Ten commandmentslsanford84
 
Own-It IP Presentation by Alex Shiel, Ward Hadaway.
Own-It IP Presentation by Alex Shiel, Ward Hadaway.Own-It IP Presentation by Alex Shiel, Ward Hadaway.
Own-It IP Presentation by Alex Shiel, Ward Hadaway.
Hannah Rudman
 

What's hot (20)

11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?The Law and Aaron Swartz: Could it happen in Singapore?
The Law and Aaron Swartz: Could it happen in Singapore?
 
Copyright fair use-cc
Copyright fair use-ccCopyright fair use-cc
Copyright fair use-cc
 
Copyright Presentation
Copyright PresentationCopyright Presentation
Copyright Presentation
 
Copyright and lopez 1
Copyright and lopez 1Copyright and lopez 1
Copyright and lopez 1
 
Copyright 03 28 12
Copyright 03 28 12Copyright 03 28 12
Copyright 03 28 12
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Copyrights bstremmel1
Copyrights bstremmel1Copyrights bstremmel1
Copyrights bstremmel1
 
Safe and ethical use of technology
Safe and ethical use of technologySafe and ethical use of technology
Safe and ethical use of technology
 
Copyright presentation3
Copyright presentation3Copyright presentation3
Copyright presentation3
 
Chapter8
Chapter8Chapter8
Chapter8
 
Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 
Copyright presentation4
Copyright presentation4Copyright presentation4
Copyright presentation4
 
2nd modification
2nd modification2nd modification
2nd modification
 
Copyright presentation4
Copyright presentation4Copyright presentation4
Copyright presentation4
 
Copyright Law
Copyright LawCopyright Law
Copyright Law
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
Own-It IP Presentation by Alex Shiel, Ward Hadaway.
Own-It IP Presentation by Alex Shiel, Ward Hadaway.Own-It IP Presentation by Alex Shiel, Ward Hadaway.
Own-It IP Presentation by Alex Shiel, Ward Hadaway.
 

Viewers also liked

Information Security, some illustrated principles
Information Security, some illustrated principlesInformation Security, some illustrated principles
Information Security, some illustrated principles
boskabout
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
Seccuris Inc.
 
ISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and Developments
Certification Europe
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
Dinesh O Bareja
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
PECB
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
Information Technology Society Nepal
 
Understanding Information Security
Understanding Information SecurityUnderstanding Information Security
Understanding Information Security
Sanjaya K Saxena
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
ControlCase
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
Andrew Byers
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
Nicholas Davis
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 

Viewers also liked (13)

Information Security, some illustrated principles
Information Security, some illustrated principlesInformation Security, some illustrated principles
Information Security, some illustrated principles
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 
ISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and DevelopmentsISO 27001 Information Security Management Systems Trends and Developments
ISO 27001 Information Security Management Systems Trends and Developments
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Understanding Information Security
Understanding Information SecurityUnderstanding Information Security
Understanding Information Security
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Information Security: "Myths & Realities"

Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptx
CherryLim21
 
scivis ethics
scivis ethicsscivis ethics
scivis ethics
scivis
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Charles Flynt
 
Copyright and fair use basics
Copyright and fair use basicsCopyright and fair use basics
Copyright and fair use basicslightb
 
Why Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docxWhy Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docx
alanfhall8953
 
Copyright and fair use
Copyright and fair useCopyright and fair use
Copyright and fair usetrbeattie13
 
Copyright, Not Wrong
Copyright, Not WrongCopyright, Not Wrong
Copyright, Not Wrong
s0191020
 
AMD LAW Library presentation regarding copyright protection
AMD LAW Library presentation regarding copyright protectionAMD LAW Library presentation regarding copyright protection
AMD LAW Library presentation regarding copyright protection
aureliakev
 
Copyrite (3)
Copyrite (3)Copyrite (3)
Copyrite (3)Kadeen202
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
thothakhail
 
Copyright for educators and students [autosaved]
Copyright for educators and students [autosaved]Copyright for educators and students [autosaved]
Copyright for educators and students [autosaved]
readlistendream
 
Copyright and IPR issues
Copyright and IPR issues   Copyright and IPR issues
Copyright and IPR issues
Smitha Velayudhan M
 
3.copyright for media college cmu 2016
3.copyright for media college cmu 20163.copyright for media college cmu 2016
3.copyright for media college cmu 2016
booybooy chodchat tawonkasemhatai
 
Copyright Protection in China - A Guide for European SMEs
Copyright Protection in China - A Guide for European SMEsCopyright Protection in China - A Guide for European SMEs
Copyright Protection in China - A Guide for European SMEs
China IPR SME Helpdesk
 
Copyright for Publishers
Copyright for PublishersCopyright for Publishers
Copyright for Publishersguestc7e749
 
What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.
ABDULAZIZ KHAMIS
 

Similar to Information Security: "Myths & Realities" (20)

Lesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptxLesson 1. Computer ethics and safety.pptx
Lesson 1. Computer ethics and safety.pptx
 
scivis ethics
scivis ethicsscivis ethics
scivis ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Copyright and fair use basics
Copyright and fair use basicsCopyright and fair use basics
Copyright and fair use basics
 
Why Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docxWhy Property Laws are Important Property Laws play a fund.docx
Why Property Laws are Important Property Laws play a fund.docx
 
Copyright and fair use
Copyright and fair useCopyright and fair use
Copyright and fair use
 
Copyright, Not Wrong
Copyright, Not WrongCopyright, Not Wrong
Copyright, Not Wrong
 
AMD LAW Library presentation regarding copyright protection
AMD LAW Library presentation regarding copyright protectionAMD LAW Library presentation regarding copyright protection
AMD LAW Library presentation regarding copyright protection
 
Copyrite (3)
Copyrite (3)Copyrite (3)
Copyrite (3)
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Privacy
PrivacyPrivacy
Privacy
 
Copyright for educators and students [autosaved]
Copyright for educators and students [autosaved]Copyright for educators and students [autosaved]
Copyright for educators and students [autosaved]
 
Copyright and IPR issues
Copyright and IPR issues   Copyright and IPR issues
Copyright and IPR issues
 
A Lecture in Copyright
A Lecture in CopyrightA Lecture in Copyright
A Lecture in Copyright
 
3.copyright for media college cmu 2016
3.copyright for media college cmu 20163.copyright for media college cmu 2016
3.copyright for media college cmu 2016
 
Copyright Protection in China - A Guide for European SMEs
Copyright Protection in China - A Guide for European SMEsCopyright Protection in China - A Guide for European SMEs
Copyright Protection in China - A Guide for European SMEs
 
Copyright for Publishers
Copyright for PublishersCopyright for Publishers
Copyright for Publishers
 
What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.What Every IT Person Should Be Aware of.
What Every IT Person Should Be Aware of.
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Information Security: "Myths & Realities"