SlideShare a Scribd company logo
JUNE. 2, 2020 • BLOCKSURVEY
Privacy
Applications of
Blockchain
Agenda
UNDERSTANDING PRIVACY
Physical vs Digital
Why privacy is important?
Who owns it?
UNDERSTANDING BLOCKCHAIN
History and Principles
It's a protocol
Identity and Data ownership
Path to decentralized era
PRIVACY APPLICATIONS ON
BLOCKCHAIN
Own your identity and data
List of applications
How to build?
Research
Understanding Privacy
Physical
vs
Digital World
Both worlds have converged.
WHERE DO YOU LIVE?
You are an enhanced human.
DIGITAL WORLD
Access, security, privacy, surveillance
ethics, ownership.....
DIGITAL ISSUES
Do you own your digital identity
and data?
“Solitude sometimes is best
society.”
― John Milton, Paradise Lost
Privacy
WHAT IS IT?
WHAT ARE WE TRYING TO
PROTECT?
WHY PROTECT IT?
HOW IT WENT WRONG?
COMMON QUESTIONS
WHO OWNS IT?
How can we solve this?
Understanding Blockchain
Blockchain
An application of Blockchain.
Democratize Finance. Financial
Privacy. Decentralized Currency.
BITCOIN
Trust, Decentralized, Incentived value,
Inclusiveness, Privacy
PRINCIPLES
It's a protocol
Blockchain
Identity Ownership(DID) and
Data ownership
Data & trust breaches are causing
consumers to second-guess data silos
Developers want more room for
innovation outside of current data-
monopolies
Developers want to reduce cost,
overhead, and liability of deploying
apps
Current era
No data-monopolies, data is user owned
and can be used in any app
Universal, password-less authentication
Apps run on user devices, explicit user opt-in
and increased security
Decentralized era
Privacy applications on
Blockchain
https://blockstack.org
Apps
How to build?
Research
Areas
BLOCKCHAIN
NAMING SERVICE
ZERO KNOWLEDGE
PROOF
PROOF OF
OWNERSHIP
PROOF OF TRUTHPSEUDOANONYMITY
Other Resources
BOOKS
Privacy 3.0, Surveillance Capitalism, Where will man take us?, 1984, Permanent
Record...
MOVIES
1984, Minority Report, Snowden, Imitation Game, Great Hack....
COMMUNITY
Internet Freedom Foundation, BlockStack, Mozilla, Solid
WILSON BRIGHT
co-founder @ BlockSurvey

More Related Content

What's hot

How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
SSIMeetup
 
Blockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscapeBlockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscape
Sebastian Cochinescu
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
Prateek Panda
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
Tudor Stanciu
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
SSIMeetup
 
Vlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationVlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentation
Sebastian Cochinescu
 
Thing Monk 2017 - Blockchain Secured IOT
Thing Monk 2017 - Blockchain Secured IOTThing Monk 2017 - Blockchain Secured IOT
Thing Monk 2017 - Blockchain Secured IOT
Joseph Pindar
 
Blockchain and Government: the Malta experience
Blockchain and Government: the Malta experienceBlockchain and Government: the Malta experience
Blockchain and Government: the Malta experience
StrategyWorks
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
Daniel Austin
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
Hamed Mohamadi
 
Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0  Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0
TechXpla
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
Prabath Siriwardena
 
BigchainDB and IoT at Bosch Connected worlds
BigchainDB and IoT at Bosch Connected worldsBigchainDB and IoT at Bosch Connected worlds
BigchainDB and IoT at Bosch Connected worlds
Dimitri De Jonghe
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
Kaliya "Identity Woman" Young
 
Sydney Identity Summit: Consent & Control: The NZ Approach to Privacy & Ident...
Sydney Identity Summit: Consent & Control: The NZ Approach to Privacy & Ident...Sydney Identity Summit: Consent & Control: The NZ Approach to Privacy & Ident...
Sydney Identity Summit: Consent & Control: The NZ Approach to Privacy & Ident...
ForgeRock
 
A practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossA practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian Foss
Kristian Foss
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
Jose L. Quiñones-Borrero
 
IOT & Blockchain - The Misunderstood children of our time
IOT & Blockchain - The Misunderstood children of our timeIOT & Blockchain - The Misunderstood children of our time
IOT & Blockchain - The Misunderstood children of our time
Joseph Pindar
 
The Blockchain in Four Futures
The Blockchain in Four FuturesThe Blockchain in Four Futures
The Blockchain in Four Futures
Daniel Riveong
 

What's hot (19)

How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
 
Blockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscapeBlockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscape
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Legal, Policy & the Blockchain
Legal, Policy & the BlockchainLegal, Policy & the Blockchain
Legal, Policy & the Blockchain
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
Vlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentationVlad Andrei - Tokens Deep Dive presentation
Vlad Andrei - Tokens Deep Dive presentation
 
Thing Monk 2017 - Blockchain Secured IOT
Thing Monk 2017 - Blockchain Secured IOTThing Monk 2017 - Blockchain Secured IOT
Thing Monk 2017 - Blockchain Secured IOT
 
Blockchain and Government: the Malta experience
Blockchain and Government: the Malta experienceBlockchain and Government: the Malta experience
Blockchain and Government: the Malta experience
 
Big Data and the Future of Money 2014
Big Data and the Future of Money 2014Big Data and the Future of Money 2014
Big Data and the Future of Money 2014
 
Blockchain 101
Blockchain 101Blockchain 101
Blockchain 101
 
Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0  Potential of blockchain into industry 4.0
Potential of blockchain into industry 4.0
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
 
BigchainDB and IoT at Bosch Connected worlds
BigchainDB and IoT at Bosch Connected worldsBigchainDB and IoT at Bosch Connected worlds
BigchainDB and IoT at Bosch Connected worlds
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Sydney Identity Summit: Consent & Control: The NZ Approach to Privacy & Ident...
Sydney Identity Summit: Consent & Control: The NZ Approach to Privacy & Ident...Sydney Identity Summit: Consent & Control: The NZ Approach to Privacy & Ident...
Sydney Identity Summit: Consent & Control: The NZ Approach to Privacy & Ident...
 
A practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian FossA practical approach to the internet of things by Kristian Foss
A practical approach to the internet of things by Kristian Foss
 
Hacking blockchain
Hacking blockchainHacking blockchain
Hacking blockchain
 
IOT & Blockchain - The Misunderstood children of our time
IOT & Blockchain - The Misunderstood children of our timeIOT & Blockchain - The Misunderstood children of our time
IOT & Blockchain - The Misunderstood children of our time
 
The Blockchain in Four Futures
The Blockchain in Four FuturesThe Blockchain in Four Futures
The Blockchain in Four Futures
 

Similar to Privacy applications on blockchain

Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
Don Lovett
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
AgeFriendlyEconomy
 
Blockchains in the mainstream - interviews with entrepreneurs
Blockchains in the mainstream - interviews with entrepreneurs Blockchains in the mainstream - interviews with entrepreneurs
Blockchains in the mainstream - interviews with entrepreneurs
Ian Beckett
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
caniceconsulting
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
Inês Almeida
 
Sam Wouters - Blockchain and the big data/market research industry
Sam Wouters - Blockchain and the big data/market research industrySam Wouters - Blockchain and the big data/market research industry
Sam Wouters - Blockchain and the big data/market research industry
BAQMaR
 
Crypto.pdf
Crypto.pdfCrypto.pdf
Crypto.pdf
shoploala
 
What are Cryptocurrencies?
What are Cryptocurrencies?What are Cryptocurrencies?
What are Cryptocurrencies?
JNC X
 
Blockchain Insider - Modules Outline
Blockchain Insider - Modules OutlineBlockchain Insider - Modules Outline
Blockchain Insider - Modules Outline
Koh How Tze
 
LD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxLD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docx
stirlingvwriters
 
Disruptive tech and philanthropy- rhodri davies
Disruptive tech and philanthropy- rhodri daviesDisruptive tech and philanthropy- rhodri davies
Disruptive tech and philanthropy- rhodri davies
rhoddavies1
 
01 Introduction atala prism.pdf
01 Introduction atala prism.pdf01 Introduction atala prism.pdf
01 Introduction atala prism.pdf
DuongNguyenNgoc10
 
Data protection by design and by default on the blockchain
Data protection by design and by default on the blockchainData protection by design and by default on the blockchain
Data protection by design and by default on the blockchain
Alexandra Giannopoulou
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Irish Future Internet Forum
 
Five Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPRFive Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPR
DivyaConsagous
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
David Kelts, CIPT
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 
BlockchainPaper.pdf
BlockchainPaper.pdfBlockchainPaper.pdf
BlockchainPaper.pdf
NAGARAJANSR
 
If, When and How Blockchain Technologies Can Provide Civic Change
If, When and How Blockchain Technologies Can Provide Civic ChangeIf, When and How Blockchain Technologies Can Provide Civic Change
If, When and How Blockchain Technologies Can Provide Civic Change
Stefaan Verhulst
 

Similar to Privacy applications on blockchain (20)

Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Age Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data UseAge Friendly Economy - Legislation and Ethics of Data Use
Age Friendly Economy - Legislation and Ethics of Data Use
 
Blockchains in the mainstream - interviews with entrepreneurs
Blockchains in the mainstream - interviews with entrepreneurs Blockchains in the mainstream - interviews with entrepreneurs
Blockchains in the mainstream - interviews with entrepreneurs
 
Module 5 - Legislation - Online
Module 5 - Legislation - OnlineModule 5 - Legislation - Online
Module 5 - Legislation - Online
 
Blockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and AdvertisingBlockchain Possibilities: Identity, Privacy, and Advertising
Blockchain Possibilities: Identity, Privacy, and Advertising
 
Sam Wouters - Blockchain and the big data/market research industry
Sam Wouters - Blockchain and the big data/market research industrySam Wouters - Blockchain and the big data/market research industry
Sam Wouters - Blockchain and the big data/market research industry
 
Crypto.pdf
Crypto.pdfCrypto.pdf
Crypto.pdf
 
What are Cryptocurrencies?
What are Cryptocurrencies?What are Cryptocurrencies?
What are Cryptocurrencies?
 
Blockchain Insider - Modules Outline
Blockchain Insider - Modules OutlineBlockchain Insider - Modules Outline
Blockchain Insider - Modules Outline
 
LD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docxLD7028 Research Methods And Project Management.docx
LD7028 Research Methods And Project Management.docx
 
Disruptive tech and philanthropy- rhodri davies
Disruptive tech and philanthropy- rhodri daviesDisruptive tech and philanthropy- rhodri davies
Disruptive tech and philanthropy- rhodri davies
 
01 Introduction atala prism.pdf
01 Introduction atala prism.pdf01 Introduction atala prism.pdf
01 Introduction atala prism.pdf
 
Data protection by design and by default on the blockchain
Data protection by design and by default on the blockchainData protection by design and by default on the blockchain
Data protection by design and by default on the blockchain
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
FinalBlockchainPaper_mod
FinalBlockchainPaper_modFinalBlockchainPaper_mod
FinalBlockchainPaper_mod
 
Five Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPRFive Considerations for Blockchain Applied to Data Privacy & GDPR
Five Considerations for Blockchain Applied to Data Privacy & GDPR
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
BlockchainPaper.pdf
BlockchainPaper.pdfBlockchainPaper.pdf
BlockchainPaper.pdf
 
If, When and How Blockchain Technologies Can Provide Civic Change
If, When and How Blockchain Technologies Can Provide Civic ChangeIf, When and How Blockchain Technologies Can Provide Civic Change
If, When and How Blockchain Technologies Can Provide Civic Change
 

Recently uploaded

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 

Recently uploaded (20)

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 

Privacy applications on blockchain