SlideShare a Scribd company logo
Securing PHP Web Applications Web Applications ,[object Object],[object Object],[object Object]
$ whoami ,[object Object],[object Object],[object Object]
<?=presoinfo();?> ,[object Object],[object Object],[object Object],[object Object],[object Object]
SQL Injection ,[object Object],[object Object],[object Object]
[object Object]
SQL Injection ,[object Object],[object Object],[object Object],[object Object]
Cross-Site Scripting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
XSS Example ,[object Object],[object Object],[object Object]
Real-world Dangers ,[object Object]
So what? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Coder for Hire? ,[object Object],[object Object],[object Object],[object Object]
Common Mitigations ,[object Object],[object Object],[object Object]
Sanitization/Encoding ,[object Object],[object Object],[object Object],[object Object]
Input Sanitization Fail ,[object Object],[object Object],[object Object],[object Object],exec ( &quot;convert '&quot; . mysql_escape_string ( $path ) .  &quot;' /tmp/'&quot; . mysql_escape_string ( basename ( $path )). &quot;'.png&quot; );
Better? ,[object Object],[object Object],[object Object],[object Object]
Server-Side Checks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bug Hunting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cross-Site Request Forgery ,[object Object],[object Object],[object Object]
GET CSRF ,[object Object],[object Object],[object Object]
POST CSRF ,[object Object],<form name=”csrf” action=” http://x.com/delete.php ” method=”POST”> <input type=”hidden” name=”id” value=”123”> </form> <script>document.csrf.submit()</script>
CSRF in Action
Fixing CSRF ,[object Object],[object Object],[object Object],[object Object],[object Object]
Other Protections ,[object Object],[object Object],[object Object],[object Object],[object Object]
3rd Party Plugins ,[object Object],[object Object],[object Object]
Server Config ,[object Object],[object Object],[object Object],[object Object]
Location: $references ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thanks ,[object Object],http://xkcd.com/327/

More Related Content

What's hot

When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentalsWhen Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
Simon Willison
 
JSConf Asia: Node.js Authentication and Data Security
JSConf Asia: Node.js Authentication and Data SecurityJSConf Asia: Node.js Authentication and Data Security
JSConf Asia: Node.js Authentication and Data Security
Tim Messerschmidt
 
Authentication in Node.js
Authentication in Node.jsAuthentication in Node.js
Authentication in Node.jsJason Pearson
 
Java script, security and you - Tri-Cities Javascript Developers Group
Java script, security and you - Tri-Cities Javascript Developers GroupJava script, security and you - Tri-Cities Javascript Developers Group
Java script, security and you - Tri-Cities Javascript Developers Group
Adam Caudill
 
Integrating External APIs with WordPress
Integrating External APIs with WordPressIntegrating External APIs with WordPress
Integrating External APIs with WordPress
Marty Thornley
 
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by DefaultCase Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
Mohammed ALDOUB
 
Xss is more than a simple threat
Xss is more than a simple threatXss is more than a simple threat
Xss is more than a simple threat
Avădănei Andrei
 
From 0 to Spring Security 4.0
From 0 to Spring Security 4.0From 0 to Spring Security 4.0
From 0 to Spring Security 4.0
robwinch
 
Mozilla Web Apps - Super-VanJS
Mozilla Web Apps - Super-VanJSMozilla Web Apps - Super-VanJS
Mozilla Web Apps - Super-VanJS
Robert Nyman
 
OAuth Hacks A gentle introduction to OAuth 2 and Apache Oltu
OAuth Hacks A gentle introduction to OAuth 2 and Apache OltuOAuth Hacks A gentle introduction to OAuth 2 and Apache Oltu
OAuth Hacks A gentle introduction to OAuth 2 and Apache Oltu
Antonio Sanso
 
PHP Security
PHP SecurityPHP Security
PHP Security
Mindfire Solutions
 
Node.js Authentication & Data Security
Node.js Authentication & Data SecurityNode.js Authentication & Data Security
Node.js Authentication & Data Security
Tim Messerschmidt
 
Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)
Michael Hendrickx
 
Repaso rápido a los nuevos estándares web
Repaso rápido a los nuevos estándares webRepaso rápido a los nuevos estándares web
Repaso rápido a los nuevos estándares web
Pablo Garaizar
 
Top 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesTop 10 Web Security Vulnerabilities
Top 10 Web Security Vulnerabilities
Carol McDonald
 
Securing WordPress
Securing WordPressSecuring WordPress
Securing WordPress
Shawn Hooper
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
Mike Crabb
 
Secure Coding with WordPress - WordCamp SF 2008
Secure Coding with WordPress - WordCamp SF 2008Secure Coding with WordPress - WordCamp SF 2008
Secure Coding with WordPress - WordCamp SF 2008Mark Jaquith
 
Website Security
Website SecurityWebsite Security
Website Security
MODxpo
 

What's hot (20)

When Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentalsWhen Ajax Attacks! Web application security fundamentals
When Ajax Attacks! Web application security fundamentals
 
JSConf Asia: Node.js Authentication and Data Security
JSConf Asia: Node.js Authentication and Data SecurityJSConf Asia: Node.js Authentication and Data Security
JSConf Asia: Node.js Authentication and Data Security
 
Authentication in Node.js
Authentication in Node.jsAuthentication in Node.js
Authentication in Node.js
 
Java script, security and you - Tri-Cities Javascript Developers Group
Java script, security and you - Tri-Cities Javascript Developers GroupJava script, security and you - Tri-Cities Javascript Developers Group
Java script, security and you - Tri-Cities Javascript Developers Group
 
Integrating External APIs with WordPress
Integrating External APIs with WordPressIntegrating External APIs with WordPress
Integrating External APIs with WordPress
 
Case Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by DefaultCase Study of Django: Web Frameworks that are Secure by Default
Case Study of Django: Web Frameworks that are Secure by Default
 
Xss is more than a simple threat
Xss is more than a simple threatXss is more than a simple threat
Xss is more than a simple threat
 
From 0 to Spring Security 4.0
From 0 to Spring Security 4.0From 0 to Spring Security 4.0
From 0 to Spring Security 4.0
 
Fav
FavFav
Fav
 
Mozilla Web Apps - Super-VanJS
Mozilla Web Apps - Super-VanJSMozilla Web Apps - Super-VanJS
Mozilla Web Apps - Super-VanJS
 
OAuth Hacks A gentle introduction to OAuth 2 and Apache Oltu
OAuth Hacks A gentle introduction to OAuth 2 and Apache OltuOAuth Hacks A gentle introduction to OAuth 2 and Apache Oltu
OAuth Hacks A gentle introduction to OAuth 2 and Apache Oltu
 
PHP Security
PHP SecurityPHP Security
PHP Security
 
Node.js Authentication & Data Security
Node.js Authentication & Data SecurityNode.js Authentication & Data Security
Node.js Authentication & Data Security
 
Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)
 
Repaso rápido a los nuevos estándares web
Repaso rápido a los nuevos estándares webRepaso rápido a los nuevos estándares web
Repaso rápido a los nuevos estándares web
 
Top 10 Web Security Vulnerabilities
Top 10 Web Security VulnerabilitiesTop 10 Web Security Vulnerabilities
Top 10 Web Security Vulnerabilities
 
Securing WordPress
Securing WordPressSecuring WordPress
Securing WordPress
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
Secure Coding with WordPress - WordCamp SF 2008
Secure Coding with WordPress - WordCamp SF 2008Secure Coding with WordPress - WordCamp SF 2008
Secure Coding with WordPress - WordCamp SF 2008
 
Website Security
Website SecurityWebsite Security
Website Security
 

Viewers also liked

PRESENTACION VALLE DE TENA
PRESENTACION VALLE DE TENAPRESENTACION VALLE DE TENA
PRESENTACION VALLE DE TENA
Hotel Privilegio
 
PARABÉNS TFUFP!!!
PARABÉNS TFUFP!!!PARABÉNS TFUFP!!!
PARABÉNS TFUFP!!!mjoaocastro
 
seniorweb.ch - ein soziales Netzwerk
seniorweb.ch - ein soziales Netzwerkseniorweb.ch - ein soziales Netzwerk
seniorweb.ch - ein soziales Netzwerk
alfons buehlmann
 
Sony emcs-scholarship-2012
Sony emcs-scholarship-2012Sony emcs-scholarship-2012
Sony emcs-scholarship-2012Eiyka Ahmad
 
Leistritz Key Seating Machines
Leistritz Key Seating MachinesLeistritz Key Seating Machines
Leistritz Key Seating Machines
TREVOR MOSS
 
Jens_CV_and_Reference_Letter_June 2016
Jens_CV_and_Reference_Letter_June 2016Jens_CV_and_Reference_Letter_June 2016
Jens_CV_and_Reference_Letter_June 2016Jens Rune Brandal
 
ACCIONA Informa N. 59 - Noviembre 2014
ACCIONA Informa N. 59 - Noviembre 2014ACCIONA Informa N. 59 - Noviembre 2014
ACCIONA Informa N. 59 - Noviembre 2014
acciona
 
IV Foro TIC y Sostenibilidad: Futuro de la gestion RAEE de Colombia
IV Foro TIC y Sostenibilidad: Futuro de la gestion RAEE de ColombiaIV Foro TIC y Sostenibilidad: Futuro de la gestion RAEE de Colombia
IV Foro TIC y Sostenibilidad: Futuro de la gestion RAEE de Colombiagaiasas
 
Sistemas de-comunicación-por-fibra
Sistemas de-comunicación-por-fibraSistemas de-comunicación-por-fibra
Sistemas de-comunicación-por-fibra
Darthuz Kilates
 
Global Dementia Legacy Event: Canada & France: Dr Etienne Hirsch & Dr Yves Jo...
Global Dementia Legacy Event: Canada & France: Dr Etienne Hirsch & Dr Yves Jo...Global Dementia Legacy Event: Canada & France: Dr Etienne Hirsch & Dr Yves Jo...
Global Dementia Legacy Event: Canada & France: Dr Etienne Hirsch & Dr Yves Jo...
Department of Health
 
Sanghaya inc
Sanghaya incSanghaya inc
Sanghaya inc
Birei Gonzales
 
Deportes Extremos
Deportes ExtremosDeportes Extremos
Deportes Extremos
ORLANDGOLD
 
Ecc report-cross-border-e-commerce en
Ecc report-cross-border-e-commerce enEcc report-cross-border-e-commerce en
Ecc report-cross-border-e-commerce enAna Smilović
 
newsasset Agency Edition
newsasset Agency Editionnewsasset Agency Edition
newsasset Agency Edition
Athens Technology Center
 
Edition 20 - Sharing in Petrobras - number 1/2006
Edition 20 - Sharing in Petrobras - number 1/2006Edition 20 - Sharing in Petrobras - number 1/2006
Edition 20 - Sharing in Petrobras - number 1/2006Petrobras
 
COETUR 2014: Casos de éxito en la gestión de un alojamiento rural con Riojania
COETUR 2014: Casos de éxito en la gestión de un alojamiento rural con RiojaniaCOETUR 2014: Casos de éxito en la gestión de un alojamiento rural con Riojania
COETUR 2014: Casos de éxito en la gestión de un alojamiento rural con Riojania
EscapadaRural
 
Employee Benefits Guide 2017
Employee Benefits Guide 2017Employee Benefits Guide 2017
Employee Benefits Guide 2017Alicia Holmes
 
Mapa parv relaciones_logico_matematicas_y_cuantificacion
Mapa parv relaciones_logico_matematicas_y_cuantificacionMapa parv relaciones_logico_matematicas_y_cuantificacion
Mapa parv relaciones_logico_matematicas_y_cuantificacion
Karin Arancibia Estay
 
Personal Finance for Engineers (LinkedIn 2014)
Personal Finance for Engineers (LinkedIn 2014)Personal Finance for Engineers (LinkedIn 2014)
Personal Finance for Engineers (LinkedIn 2014)
Adam Nash
 

Viewers also liked (20)

PRESENTACION VALLE DE TENA
PRESENTACION VALLE DE TENAPRESENTACION VALLE DE TENA
PRESENTACION VALLE DE TENA
 
PARABÉNS TFUFP!!!
PARABÉNS TFUFP!!!PARABÉNS TFUFP!!!
PARABÉNS TFUFP!!!
 
seniorweb.ch - ein soziales Netzwerk
seniorweb.ch - ein soziales Netzwerkseniorweb.ch - ein soziales Netzwerk
seniorweb.ch - ein soziales Netzwerk
 
Sony emcs-scholarship-2012
Sony emcs-scholarship-2012Sony emcs-scholarship-2012
Sony emcs-scholarship-2012
 
Leistritz Key Seating Machines
Leistritz Key Seating MachinesLeistritz Key Seating Machines
Leistritz Key Seating Machines
 
Jens_CV_and_Reference_Letter_June 2016
Jens_CV_and_Reference_Letter_June 2016Jens_CV_and_Reference_Letter_June 2016
Jens_CV_and_Reference_Letter_June 2016
 
ACCIONA Informa N. 59 - Noviembre 2014
ACCIONA Informa N. 59 - Noviembre 2014ACCIONA Informa N. 59 - Noviembre 2014
ACCIONA Informa N. 59 - Noviembre 2014
 
IV Foro TIC y Sostenibilidad: Futuro de la gestion RAEE de Colombia
IV Foro TIC y Sostenibilidad: Futuro de la gestion RAEE de ColombiaIV Foro TIC y Sostenibilidad: Futuro de la gestion RAEE de Colombia
IV Foro TIC y Sostenibilidad: Futuro de la gestion RAEE de Colombia
 
Sistemas de-comunicación-por-fibra
Sistemas de-comunicación-por-fibraSistemas de-comunicación-por-fibra
Sistemas de-comunicación-por-fibra
 
Global Dementia Legacy Event: Canada & France: Dr Etienne Hirsch & Dr Yves Jo...
Global Dementia Legacy Event: Canada & France: Dr Etienne Hirsch & Dr Yves Jo...Global Dementia Legacy Event: Canada & France: Dr Etienne Hirsch & Dr Yves Jo...
Global Dementia Legacy Event: Canada & France: Dr Etienne Hirsch & Dr Yves Jo...
 
Sanghaya inc
Sanghaya incSanghaya inc
Sanghaya inc
 
Deportes Extremos
Deportes ExtremosDeportes Extremos
Deportes Extremos
 
Ecc report-cross-border-e-commerce en
Ecc report-cross-border-e-commerce enEcc report-cross-border-e-commerce en
Ecc report-cross-border-e-commerce en
 
newsasset Agency Edition
newsasset Agency Editionnewsasset Agency Edition
newsasset Agency Edition
 
Edition 20 - Sharing in Petrobras - number 1/2006
Edition 20 - Sharing in Petrobras - number 1/2006Edition 20 - Sharing in Petrobras - number 1/2006
Edition 20 - Sharing in Petrobras - number 1/2006
 
COETUR 2014: Casos de éxito en la gestión de un alojamiento rural con Riojania
COETUR 2014: Casos de éxito en la gestión de un alojamiento rural con RiojaniaCOETUR 2014: Casos de éxito en la gestión de un alojamiento rural con Riojania
COETUR 2014: Casos de éxito en la gestión de un alojamiento rural con Riojania
 
IPKeysPP - WEEC Presentation 9.29.15
IPKeysPP - WEEC Presentation 9.29.15IPKeysPP - WEEC Presentation 9.29.15
IPKeysPP - WEEC Presentation 9.29.15
 
Employee Benefits Guide 2017
Employee Benefits Guide 2017Employee Benefits Guide 2017
Employee Benefits Guide 2017
 
Mapa parv relaciones_logico_matematicas_y_cuantificacion
Mapa parv relaciones_logico_matematicas_y_cuantificacionMapa parv relaciones_logico_matematicas_y_cuantificacion
Mapa parv relaciones_logico_matematicas_y_cuantificacion
 
Personal Finance for Engineers (LinkedIn 2014)
Personal Finance for Engineers (LinkedIn 2014)Personal Finance for Engineers (LinkedIn 2014)
Personal Finance for Engineers (LinkedIn 2014)
 

Similar to PHPUG Presentation

PHP Secure Programming
PHP Secure ProgrammingPHP Secure Programming
PHP Secure Programming
Balavignesh Kasinathan
 
2009 Barcamp Nashville Web Security 101
2009 Barcamp Nashville   Web Security 1012009 Barcamp Nashville   Web Security 101
2009 Barcamp Nashville Web Security 101
brian_dailey
 
Securing Java EE Web Apps
Securing Java EE Web AppsSecuring Java EE Web Apps
Securing Java EE Web AppsFrank Kim
 
Ajax Security
Ajax SecurityAjax Security
Ajax Security
Joe Walker
 
Intro to Php Security
Intro to Php SecurityIntro to Php Security
Intro to Php Security
Dave Ross
 
Avoiding Cross Site Scripting - Not as easy as you might think
Avoiding Cross Site Scripting - Not as easy as you might thinkAvoiding Cross Site Scripting - Not as easy as you might think
Avoiding Cross Site Scripting - Not as easy as you might think
Erlend Oftedal
 
Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009mirahman
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
Slawomir Jasek
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
SecuRing
 
Application Security around OWASP Top 10
Application Security around OWASP Top 10Application Security around OWASP Top 10
Application Security around OWASP Top 10
Sastry Tumuluri
 
Building Secure Twitter Apps
Building Secure Twitter AppsBuilding Secure Twitter Apps
Building Secure Twitter Apps
Damon Cortesi
 
Joomla security nuggets
Joomla security nuggetsJoomla security nuggets
Joomla security nuggetsguestbd1cdca
 
General Principles of Web Security
General Principles of Web SecurityGeneral Principles of Web Security
General Principles of Web Security
jemond
 
My app is secure... I think
My app is secure... I thinkMy app is secure... I think
My app is secure... I think
Wim Godden
 
Security 202 - Are you sure your site is secure?
Security 202 - Are you sure your site is secure?Security 202 - Are you sure your site is secure?
Security 202 - Are you sure your site is secure?ConFoo
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
Michael Peters
 
DVWA BruCON Workshop
DVWA BruCON WorkshopDVWA BruCON Workshop
DVWA BruCON Workshop
testuser1223
 
Web Security
Web SecurityWeb Security
Web Security
Supankar Banik
 
Evolution Of Web Security
Evolution Of Web SecurityEvolution Of Web Security
Evolution Of Web Security
Chris Shiflett
 
The top 10 security issues in web applications
The top 10 security issues in web applicationsThe top 10 security issues in web applications
The top 10 security issues in web applications
Devnology
 

Similar to PHPUG Presentation (20)

PHP Secure Programming
PHP Secure ProgrammingPHP Secure Programming
PHP Secure Programming
 
2009 Barcamp Nashville Web Security 101
2009 Barcamp Nashville   Web Security 1012009 Barcamp Nashville   Web Security 101
2009 Barcamp Nashville Web Security 101
 
Securing Java EE Web Apps
Securing Java EE Web AppsSecuring Java EE Web Apps
Securing Java EE Web Apps
 
Ajax Security
Ajax SecurityAjax Security
Ajax Security
 
Intro to Php Security
Intro to Php SecurityIntro to Php Security
Intro to Php Security
 
Avoiding Cross Site Scripting - Not as easy as you might think
Avoiding Cross Site Scripting - Not as easy as you might thinkAvoiding Cross Site Scripting - Not as easy as you might think
Avoiding Cross Site Scripting - Not as easy as you might think
 
Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009Php & Web Security - PHPXperts 2009
Php & Web Security - PHPXperts 2009
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
 
Applications secure by default
Applications secure by defaultApplications secure by default
Applications secure by default
 
Application Security around OWASP Top 10
Application Security around OWASP Top 10Application Security around OWASP Top 10
Application Security around OWASP Top 10
 
Building Secure Twitter Apps
Building Secure Twitter AppsBuilding Secure Twitter Apps
Building Secure Twitter Apps
 
Joomla security nuggets
Joomla security nuggetsJoomla security nuggets
Joomla security nuggets
 
General Principles of Web Security
General Principles of Web SecurityGeneral Principles of Web Security
General Principles of Web Security
 
My app is secure... I think
My app is secure... I thinkMy app is secure... I think
My app is secure... I think
 
Security 202 - Are you sure your site is secure?
Security 202 - Are you sure your site is secure?Security 202 - Are you sure your site is secure?
Security 202 - Are you sure your site is secure?
 
Web Security 101
Web Security 101Web Security 101
Web Security 101
 
DVWA BruCON Workshop
DVWA BruCON WorkshopDVWA BruCON Workshop
DVWA BruCON Workshop
 
Web Security
Web SecurityWeb Security
Web Security
 
Evolution Of Web Security
Evolution Of Web SecurityEvolution Of Web Security
Evolution Of Web Security
 
The top 10 security issues in web applications
The top 10 security issues in web applicationsThe top 10 security issues in web applications
The top 10 security issues in web applications
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

PHPUG Presentation

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.