SlideShare a Scribd company logo
Evolution of security system requirements driven by globalization Wim Lintermans UTC Fire & Security
Preview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Definition ,[object Object],[object Object],[object Object],[object Object]
Globalization trends ,[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges for the global security manager ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Expectations from the security manager Reduce cost Increase quality Peace of mind
Role of the security system manufacturer ,[object Object],[object Object]
Opportunity for the system manufacturer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Standardize ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Investment protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Consistently meet system requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Global presence – local support ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other international incentives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Globalization: walk the talk ! ,[object Object],[object Object],[object Object]
Thank you

More Related Content

What's hot

Rm 05-v2
Rm 05-v2Rm 05-v2
Rm 05-v2
tomkacy
 
Second line of defense - advantages and set up
Second line of defense - advantages and set up Second line of defense - advantages and set up
Second line of defense - advantages and set up
Jim McClanahan
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
Samuel Loomis
 
Directory: Regulatory & Risk Data
Directory: Regulatory & Risk DataDirectory: Regulatory & Risk Data
Directory: Regulatory & Risk Data
Conor Coughlan
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT Risks
Hernan Huwyler, MBA CPA
 
Paul Howland - DSTL - SPF EM risk framework presentation v2
Paul Howland - DSTL - SPF EM risk framework presentation v2Paul Howland - DSTL - SPF EM risk framework presentation v2
Paul Howland - DSTL - SPF EM risk framework presentation v2
techUK
 
Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Example of fisma compliance analysis.1
Example of fisma compliance analysis.1
Sal Velasco
 
Presentation Solar Insurance and Finance | Solarif
Presentation Solar Insurance and Finance | SolarifPresentation Solar Insurance and Finance | Solarif
Presentation Solar Insurance and Finance | Solarif
Solar Insurance & finance
 
Supply Chain Risk Management - riskmethods
Supply Chain Risk Management - riskmethodsSupply Chain Risk Management - riskmethods
Supply Chain Risk Management - riskmethods
Heiko Schwarz
 
Rm 03-v1
Rm 03-v1Rm 03-v1
Rm 03-v1
tomkacy
 
Kick off Meeting Presentation to Framingham State Information Security Council
Kick off Meeting Presentation to Framingham State Information Security CouncilKick off Meeting Presentation to Framingham State Information Security Council
Kick off Meeting Presentation to Framingham State Information Security Council
plaughran
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk Management
Togap Siagian, CPSM
 
Supply Chain Risk Erau webinar march 2018
Supply Chain Risk Erau webinar march 2018 Supply Chain Risk Erau webinar march 2018
Supply Chain Risk Erau webinar march 2018
Bill Gibbs
 
Operational Risk Measurement
Operational Risk MeasurementOperational Risk Measurement
Operational Risk Measurement
Dr. Emmanuel ABOLO, fica,fnimn,ficn,sirm
 
Fintech in Africa : Unpacking Risk and Regulation
Fintech in Africa : Unpacking Risk and RegulationFintech in Africa : Unpacking Risk and Regulation
Fintech in Africa : Unpacking Risk and Regulation
Centre for Financial Regulation and Inclusion
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
Visionet Systems, Inc.
 
Risk Management in supply chain
Risk Management in supply chainRisk Management in supply chain
Risk Management in supply chain
michaelnieuwboer
 
Hernan Huwyler MetricStream German Law idw ps 340
Hernan Huwyler MetricStream German Law idw ps 340Hernan Huwyler MetricStream German Law idw ps 340
Hernan Huwyler MetricStream German Law idw ps 340
Hernan Huwyler, MBA CPA
 

What's hot (18)

Rm 05-v2
Rm 05-v2Rm 05-v2
Rm 05-v2
 
Second line of defense - advantages and set up
Second line of defense - advantages and set up Second line of defense - advantages and set up
Second line of defense - advantages and set up
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
Directory: Regulatory & Risk Data
Directory: Regulatory & Risk DataDirectory: Regulatory & Risk Data
Directory: Regulatory & Risk Data
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT Risks
 
Paul Howland - DSTL - SPF EM risk framework presentation v2
Paul Howland - DSTL - SPF EM risk framework presentation v2Paul Howland - DSTL - SPF EM risk framework presentation v2
Paul Howland - DSTL - SPF EM risk framework presentation v2
 
Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Example of fisma compliance analysis.1
Example of fisma compliance analysis.1
 
Presentation Solar Insurance and Finance | Solarif
Presentation Solar Insurance and Finance | SolarifPresentation Solar Insurance and Finance | Solarif
Presentation Solar Insurance and Finance | Solarif
 
Supply Chain Risk Management - riskmethods
Supply Chain Risk Management - riskmethodsSupply Chain Risk Management - riskmethods
Supply Chain Risk Management - riskmethods
 
Rm 03-v1
Rm 03-v1Rm 03-v1
Rm 03-v1
 
Kick off Meeting Presentation to Framingham State Information Security Council
Kick off Meeting Presentation to Framingham State Information Security CouncilKick off Meeting Presentation to Framingham State Information Security Council
Kick off Meeting Presentation to Framingham State Information Security Council
 
Supply Chain Risk Management
Supply Chain Risk ManagementSupply Chain Risk Management
Supply Chain Risk Management
 
Supply Chain Risk Erau webinar march 2018
Supply Chain Risk Erau webinar march 2018 Supply Chain Risk Erau webinar march 2018
Supply Chain Risk Erau webinar march 2018
 
Operational Risk Measurement
Operational Risk MeasurementOperational Risk Measurement
Operational Risk Measurement
 
Fintech in Africa : Unpacking Risk and Regulation
Fintech in Africa : Unpacking Risk and RegulationFintech in Africa : Unpacking Risk and Regulation
Fintech in Africa : Unpacking Risk and Regulation
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
Risk Management in supply chain
Risk Management in supply chainRisk Management in supply chain
Risk Management in supply chain
 
Hernan Huwyler MetricStream German Law idw ps 340
Hernan Huwyler MetricStream German Law idw ps 340Hernan Huwyler MetricStream German Law idw ps 340
Hernan Huwyler MetricStream German Law idw ps 340
 

Viewers also liked

The History of Security
The History of Security The History of Security
The History of Security
PerspecSys
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
George Fares
 
Risk Management and Patient Safety Evolution and Progress
Risk Management and Patient Safety Evolution and ProgressRisk Management and Patient Safety Evolution and Progress
Risk Management and Patient Safety Evolution and Progress
Plan de Calidad para el SNS
 
Historical analysis
Historical analysisHistorical analysis
Historical analysis
Moy Alotumi
 
Roger Fenton, Errol Morris, and the Process of Historical Thinking
Roger Fenton, Errol Morris, and the Process of Historical ThinkingRoger Fenton, Errol Morris, and the Process of Historical Thinking
Roger Fenton, Errol Morris, and the Process of Historical Thinking
Lee Cafferata
 
SGP_Police
SGP_PoliceSGP_Police
SGP_Police
bagodonut1213
 
Crime Prevention History And Theory
Crime Prevention History And TheoryCrime Prevention History And Theory
Crime Prevention History And Theory
National Crime Prevention Council
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
Faheem Ul Hasan
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
Christophe Briguet
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
amiable_indian
 

Viewers also liked (10)

The History of Security
The History of Security The History of Security
The History of Security
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Risk Management and Patient Safety Evolution and Progress
Risk Management and Patient Safety Evolution and ProgressRisk Management and Patient Safety Evolution and Progress
Risk Management and Patient Safety Evolution and Progress
 
Historical analysis
Historical analysisHistorical analysis
Historical analysis
 
Roger Fenton, Errol Morris, and the Process of Historical Thinking
Roger Fenton, Errol Morris, and the Process of Historical ThinkingRoger Fenton, Errol Morris, and the Process of Historical Thinking
Roger Fenton, Errol Morris, and the Process of Historical Thinking
 
SGP_Police
SGP_PoliceSGP_Police
SGP_Police
 
Crime Prevention History And Theory
Crime Prevention History And TheoryCrime Prevention History And Theory
Crime Prevention History And Theory
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Evolution of Security Management
Evolution of Security ManagementEvolution of Security Management
Evolution of Security Management
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 

Similar to Nfpa apsei evolution-ofsecurity_wl_14092010

Corporate Tekes Safety and Security programme 2013
Corporate Tekes Safety and Security programme 2013Corporate Tekes Safety and Security programme 2013
Corporate Tekes Safety and Security programme 2013
Turvallisuus2013
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
Nick Krym
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
Turvallisuus2013
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
Vincent Kwon
 
Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010
Agora Group
 
Information Security Gm Aug09
Information Security Gm Aug09Information Security Gm Aug09
Information Security Gm Aug09
John Reno
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
ecommerce
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
Dale Butler
 
Managing risks when offshoring services including a practical indian experie...
Managing risks when offshoring services  including a practical indian experie...Managing risks when offshoring services  including a practical indian experie...
Managing risks when offshoring services including a practical indian experie...
IFCLA - International Federation of Computer Law Associations
 
Unified Threat Management Market - Key Industry Dynamics, Analysis and Key In...
Unified Threat Management Market - Key Industry Dynamics, Analysis and Key In...Unified Threat Management Market - Key Industry Dynamics, Analysis and Key In...
Unified Threat Management Market - Key Industry Dynamics, Analysis and Key In...
PriyanshiSingh187645
 
IoT Insurance Observatory
IoT Insurance ObservatoryIoT Insurance Observatory
IoT Insurance Observatory
MatteoCarbone6
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
sunnay
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
Philippe A. R. Schaeffer
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
AlliedConSapCourses
 
Final Mba Thesis Presentatie Hazenberg V1.01
Final Mba Thesis Presentatie Hazenberg V1.01Final Mba Thesis Presentatie Hazenberg V1.01
Final Mba Thesis Presentatie Hazenberg V1.01
hazenbw
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management Program
William McBorrough
 
USA Information Security Compliance Market Overview
USA Information Security Compliance Market OverviewUSA Information Security Compliance Market Overview
USA Information Security Compliance Market Overview
Niraj Singhvi
 
Physical security information management market
Physical security information management marketPhysical security information management market
Physical security information management market
RishabhJain1113
 
Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?
Ruth Thomson
 

Similar to Nfpa apsei evolution-ofsecurity_wl_14092010 (20)

Corporate Tekes Safety and Security programme 2013
Corporate Tekes Safety and Security programme 2013Corporate Tekes Safety and Security programme 2013
Corporate Tekes Safety and Security programme 2013
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010Ibm+ +bc-dr+-+28apr2010
Ibm+ +bc-dr+-+28apr2010
 
Information Security Gm Aug09
Information Security Gm Aug09Information Security Gm Aug09
Information Security Gm Aug09
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
Managing risks when offshoring services including a practical indian experie...
Managing risks when offshoring services  including a practical indian experie...Managing risks when offshoring services  including a practical indian experie...
Managing risks when offshoring services including a practical indian experie...
 
Unified Threat Management Market - Key Industry Dynamics, Analysis and Key In...
Unified Threat Management Market - Key Industry Dynamics, Analysis and Key In...Unified Threat Management Market - Key Industry Dynamics, Analysis and Key In...
Unified Threat Management Market - Key Industry Dynamics, Analysis and Key In...
 
IoT Insurance Observatory
IoT Insurance ObservatoryIoT Insurance Observatory
IoT Insurance Observatory
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Final Mba Thesis Presentatie Hazenberg V1.01
Final Mba Thesis Presentatie Hazenberg V1.01Final Mba Thesis Presentatie Hazenberg V1.01
Final Mba Thesis Presentatie Hazenberg V1.01
 
MCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management ProgramMCGlobalTech Enterprise Risk Management Program
MCGlobalTech Enterprise Risk Management Program
 
USA Information Security Compliance Market Overview
USA Information Security Compliance Market OverviewUSA Information Security Compliance Market Overview
USA Information Security Compliance Market Overview
 
Physical security information management market
Physical security information management marketPhysical security information management market
Physical security information management market
 
Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?
 

More from Nuno Tasso de Figueiredo

CETO / Drop shot 2017
CETO / Drop shot  2017CETO / Drop shot  2017
CETO / Drop shot 2017
Nuno Tasso de Figueiredo
 
Op format word_fy01mwlayout
Op format word_fy01mwlayoutOp format word_fy01mwlayout
Op format word_fy01mwlayout
Nuno Tasso de Figueiredo
 
Ws leis regulamentos & normas
Ws leis regulamentos & normasWs leis regulamentos & normas
Ws leis regulamentos & normas
Nuno Tasso de Figueiredo
 
Certificado de habilitações licenciatura
Certificado de habilitações licenciaturaCertificado de habilitações licenciatura
Certificado de habilitações licenciaturaNuno Tasso de Figueiredo
 
Cgma launch report
Cgma launch reportCgma launch report
Cgma launch report
Nuno Tasso de Figueiredo
 
Utc ccs corporate 2012 pt
Utc ccs corporate 2012 ptUtc ccs corporate 2012 pt
Utc ccs corporate 2012 pt
Nuno Tasso de Figueiredo
 
Tese mestrado 2012_final
Tese mestrado 2012_finalTese mestrado 2012_final
Tese mestrado 2012_final
Nuno Tasso de Figueiredo
 
Ws ifs
Ws ifsWs ifs
Ws uma luz_no_caminho_da_seguranca_v1.0
Ws uma luz_no_caminho_da_seguranca_v1.0Ws uma luz_no_caminho_da_seguranca_v1.0
Ws uma luz_no_caminho_da_seguranca_v1.0
Nuno Tasso de Figueiredo
 
Workshop with marioff 2012
Workshop with marioff 2012Workshop with marioff 2012
Workshop with marioff 2012
Nuno Tasso de Figueiredo
 
A simplicidade da agua na segurança
A simplicidade da agua na segurançaA simplicidade da agua na segurança
A simplicidade da agua na segurança
Nuno Tasso de Figueiredo
 
Marioff workshop utc pt
Marioff   workshop utc ptMarioff   workshop utc pt
Marioff workshop utc pt
Nuno Tasso de Figueiredo
 
Mkt relacional crm & mobile mkt
Mkt relacional crm & mobile mktMkt relacional crm & mobile mkt
Mkt relacional crm & mobile mkt
Nuno Tasso de Figueiredo
 
Trabalho individual Medidas de
Trabalho individual Medidas deTrabalho individual Medidas de
Trabalho individual Medidas de
Nuno Tasso de Figueiredo
 
Mkt relacional semestre 21.01.2011
Mkt relacional semestre 21.01.2011Mkt relacional semestre 21.01.2011
Mkt relacional semestre 21.01.2011
Nuno Tasso de Figueiredo
 
Desenho & operações de serviço
Desenho & operações de serviçoDesenho & operações de serviço
Desenho & operações de serviço
Nuno Tasso de Figueiredo
 
Tecnologia sob o ponto de vista do fabricante
Tecnologia sob o ponto de vista do fabricanteTecnologia sob o ponto de vista do fabricante
Tecnologia sob o ponto de vista do fabricante
Nuno Tasso de Figueiredo
 

More from Nuno Tasso de Figueiredo (20)

CETO / Drop shot 2017
CETO / Drop shot  2017CETO / Drop shot  2017
CETO / Drop shot 2017
 
Op format word_fy01mwlayout
Op format word_fy01mwlayoutOp format word_fy01mwlayout
Op format word_fy01mwlayout
 
Ws leis regulamentos & normas
Ws leis regulamentos & normasWs leis regulamentos & normas
Ws leis regulamentos & normas
 
Leadership training
Leadership trainingLeadership training
Leadership training
 
Certificado de habilitações licenciatura
Certificado de habilitações licenciaturaCertificado de habilitações licenciatura
Certificado de habilitações licenciatura
 
Diploma licenciatura
Diploma licenciaturaDiploma licenciatura
Diploma licenciatura
 
Certificado mestrado
Certificado mestradoCertificado mestrado
Certificado mestrado
 
Cgma launch report
Cgma launch reportCgma launch report
Cgma launch report
 
Utc ccs corporate 2012 pt
Utc ccs corporate 2012 ptUtc ccs corporate 2012 pt
Utc ccs corporate 2012 pt
 
Tese mestrado 2012_final
Tese mestrado 2012_finalTese mestrado 2012_final
Tese mestrado 2012_final
 
Ws ifs
Ws ifsWs ifs
Ws ifs
 
Ws uma luz_no_caminho_da_seguranca_v1.0
Ws uma luz_no_caminho_da_seguranca_v1.0Ws uma luz_no_caminho_da_seguranca_v1.0
Ws uma luz_no_caminho_da_seguranca_v1.0
 
Workshop with marioff 2012
Workshop with marioff 2012Workshop with marioff 2012
Workshop with marioff 2012
 
A simplicidade da agua na segurança
A simplicidade da agua na segurançaA simplicidade da agua na segurança
A simplicidade da agua na segurança
 
Marioff workshop utc pt
Marioff   workshop utc ptMarioff   workshop utc pt
Marioff workshop utc pt
 
Mkt relacional crm & mobile mkt
Mkt relacional crm & mobile mktMkt relacional crm & mobile mkt
Mkt relacional crm & mobile mkt
 
Trabalho individual Medidas de
Trabalho individual Medidas deTrabalho individual Medidas de
Trabalho individual Medidas de
 
Mkt relacional semestre 21.01.2011
Mkt relacional semestre 21.01.2011Mkt relacional semestre 21.01.2011
Mkt relacional semestre 21.01.2011
 
Desenho & operações de serviço
Desenho & operações de serviçoDesenho & operações de serviço
Desenho & operações de serviço
 
Tecnologia sob o ponto de vista do fabricante
Tecnologia sob o ponto de vista do fabricanteTecnologia sob o ponto de vista do fabricante
Tecnologia sob o ponto de vista do fabricante
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Nfpa apsei evolution-ofsecurity_wl_14092010