SlideShare a Scribd company logo
Felipe Santos
Felipe Santos
Ursula Capano
Sandra Mattos
Sandra Mattos
Rosana Barbosa
Michele Maria
Karen Baéz

More Related Content

Viewers also liked

CQRS in der Praxis - Newsletter Double-Opt-In
CQRS in der Praxis - Newsletter Double-Opt-InCQRS in der Praxis - Newsletter Double-Opt-In
CQRS in der Praxis - Newsletter Double-Opt-In
PHP in DD
 
Fosway Group & Docebo - Integrating the HR Landscape on the Cloud
Fosway Group & Docebo - Integrating the HR Landscape on the CloudFosway Group & Docebo - Integrating the HR Landscape on the Cloud
Fosway Group & Docebo - Integrating the HR Landscape on the Cloud
DoceboElearning
 
Innovation
InnovationInnovation
Innovation
i4VC
 
Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden ThreatCh 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden Threat
Sam Bowne
 
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblyPractical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Sam Bowne
 
Industrial Revolution
Industrial RevolutionIndustrial Revolution
Actividades u2 arte romano
Actividades u2 arte romanoActividades u2 arte romano
Actividades u2 arte romano
Eva Tomlinson
 

Viewers also liked (7)

CQRS in der Praxis - Newsletter Double-Opt-In
CQRS in der Praxis - Newsletter Double-Opt-InCQRS in der Praxis - Newsletter Double-Opt-In
CQRS in der Praxis - Newsletter Double-Opt-In
 
Fosway Group & Docebo - Integrating the HR Landscape on the Cloud
Fosway Group & Docebo - Integrating the HR Landscape on the CloudFosway Group & Docebo - Integrating the HR Landscape on the Cloud
Fosway Group & Docebo - Integrating the HR Landscape on the Cloud
 
Innovation
InnovationInnovation
Innovation
 
Ch 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden ThreatCh 9: Embedded Operating Systems: The Hidden Threat
Ch 9: Embedded Operating Systems: The Hidden Threat
 
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblyPractical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
 
Industrial Revolution
Industrial RevolutionIndustrial Revolution
Industrial Revolution
 
Actividades u2 arte romano
Actividades u2 arte romanoActividades u2 arte romano
Actividades u2 arte romano