SlideShare a Scribd company logo
PROTECTING ISP
NETWORKS AND THE
INTERNET
CABLELABS INFORM[ED] CONFERENCE
NEWYORK, APRIL 12, 2017
GROWTH OFTHE INTERNET
0%
10%
20%
30%
40%
50%
60%
0
500
1000
1500
2000
2500
3000
3500
4000
Dec-95
Jun-96
Dec-96
Jun-97
Dec-97
Jun-98
Dec-98
Jun-99
Dec-99
Jun-00
Dec-00
Jun-01
Dec-01
Jun-02
Dec-02
Jun-03
Dec-03
Jun-04
Dec-04
Jun-05
Dec-05
Jun-06
Dec-06
Jun-07
Dec-07
Jun-08
Dec-08
Jun-09
Dec-09
Jun-10
Dec-10
Jun-11
Dec-11
Jun-12
Dec-12
Jun-13
Dec-13
Jun-14
Dec-14
Jun-15
Dec-15
Jun-16
Dec-16
INTERNET GROWTH
MILLIONS OF USERS % WORLD POPULATION
COUNT OF UNIQUE SOURCES SCANNING ON POPULAR IOT PORTS
4YEARS (AS OF APRIL 3, 2017)
TCP 23 - Telnet
TCP 7547 – Eir D1000 RouterVulnerability
UDP 53413 – Netis Router Backdoor
TCP 5358 - WSDAPI
TCP 23231 – Mirai port scanning
THE LESSONS OF MIRAI
• In Europe at least three ISPs were seriously impacted
• DeutscheTelekom reportedly being the most significantly affected (900k+ users knocked
offline through Mirai variant affecting CPE)
• It only takes a few vulnerabilities to bring down a network
• Poor security practices by a few vendors (e.g. default credentials) put everyone at risk.
• Customers cannot be expected to overcome vendor mistakes. Products and networks
should be secure by default even if the customer does nothing.
• A new approach is required to break out of “Security Ground Hog Day”
THREATVECTORSTHROUGH COMMON
PRODUCTS
Source: BBC
WHO ISTHE INTERNET?
• Most consumers and businesses connect to the Internet through their ISP.
• Customers rely on a variety of ecosystems players to protect their data and Internet
connectivity: anti-virus companies, ISPs, operating system vendors, application vendors,
search engine vendors, social media vendors, and hardware manufactures to name a few.
• If something goes wrong, customers are likely to call their ISP, but we cannot expect the
builders of highways to provide safe cars and good drivers.
• With the Internet ofThings, the scale of security issues from IoT devices is going to
increase rapidly.
HOW DO ISP’S STAY AHEAD OF ATTACKS?
• Quick and accurate detection
• Data analytics
• Machine learning
• Honey pots
• Quick response
• Traffic management
• Quarantine
• Proactive countermeasures
• DDoS Attacks
• Flow based monitoring / Select DPI
• Data Scrubbing
• Flowspec / Blackhole filtering
• DNS Protections
• Botnets
• Collaboration with law enforcement
• Customer notifications
• Collaboration with other ecosystem
players
TODAY’S PANEL
• Clarke Stevens – Principal Architect, Shaw Communications
• Rich Compton – Principal Engineer, Charter Communications
• AndreVan derWalt – InterimVP and CISO, Liberty Global
• Brian Rexroad –VP, Security Platforms,AT&T
• Mike Glenn –VP Security Services, CableLabs

More Related Content

What's hot

Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Francesca Valente
 
Internet Of Things & Ruby, com Thiago Scalone
Internet Of Things & Ruby, com Thiago ScaloneInternet Of Things & Ruby, com Thiago Scalone
Internet Of Things & Ruby, com Thiago Scalone
iMasters
 
7 facts, fictions and predictions about the Internet of Things (IoT)
7 facts, fictions and predictions about the Internet of Things (IoT) 7 facts, fictions and predictions about the Internet of Things (IoT)
7 facts, fictions and predictions about the Internet of Things (IoT)
Parveen Goel
 
R-NOX IoT
R-NOX IoTR-NOX IoT
R-NOX IoT
Vadim Radzivill
 
Network Innovation: Key to Operators' Cloud Services
Network Innovation: Key to Operators' Cloud ServicesNetwork Innovation: Key to Operators' Cloud Services
Network Innovation: Key to Operators' Cloud Services
Juniper Networks
 
Abel Aguiar - Startups as an engine for IoT development - Productized16
Abel Aguiar - Startups as an engine for IoT development - Productized16Abel Aguiar - Startups as an engine for IoT development - Productized16
Abel Aguiar - Startups as an engine for IoT development - Productized16
Productized
 
The Future Of the Internet
The Future Of the Internet The Future Of the Internet
Drone World Expo Presentation
Drone World Expo PresentationDrone World Expo Presentation
Drone World Expo Presentation
Biren Gandhi
 
Presentación1 2003
Presentación1 2003Presentación1 2003
Presentación1 2003
josepht1
 
IPR - Infographic
IPR - Infographic IPR - Infographic
IPR - Infographic
Ericsson
 
DataBroker DAO presentation at the Internet of Things Scotland Meetup, Feb 22...
DataBroker DAO presentation at the Internet of Things Scotland Meetup, Feb 22...DataBroker DAO presentation at the Internet of Things Scotland Meetup, Feb 22...
DataBroker DAO presentation at the Internet of Things Scotland Meetup, Feb 22...
DataBroker DAO
 
IoT introduction
IoT introductionIoT introduction
IoT introduction
Aravindhan G K
 
Mobile Internet: Καταλύτης για την οικονομική ανάπτυξη
Mobile Internet: Καταλύτης για την οικονομική ανάπτυξηMobile Internet: Καταλύτης για την οικονομική ανάπτυξη
Mobile Internet: Καταλύτης για την οικονομική ανάπτυξη
technology_forum
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu
 
IoT: State of the Union
IoT: State of the Union IoT: State of the Union
IoT: State of the Union
Amazon Web Services
 
Looking Ahead: BMC CEO Bob Beauchamp Predicts the Future of IT at CIO 100 Key...
Looking Ahead: BMC CEO Bob Beauchamp Predicts the Future of IT at CIO 100 Key...Looking Ahead: BMC CEO Bob Beauchamp Predicts the Future of IT at CIO 100 Key...
Looking Ahead: BMC CEO Bob Beauchamp Predicts the Future of IT at CIO 100 Key...
BMC Software
 
Internet of things
Internet of thingsInternet of things
Internet of things
B V HARIKA
 
Databroker DAO Pitchdeck (February 20, 2018)
Databroker DAO Pitchdeck (February 20, 2018)Databroker DAO Pitchdeck (February 20, 2018)
Databroker DAO Pitchdeck (February 20, 2018)
DataBroker DAO
 
Brussels Briefing n. 55: Chris Addison "Blockchain applications for ACP susta...
Brussels Briefing n. 55: Chris Addison "Blockchain applications for ACP susta...Brussels Briefing n. 55: Chris Addison "Blockchain applications for ACP susta...
Brussels Briefing n. 55: Chris Addison "Blockchain applications for ACP susta...
Brussels Briefings (brusselsbriefings.net)
 
Iot
IotIot

What's hot (20)

Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & NegociosForo Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
Foro Empresarial Perú 2017 - Tendencias impactando Ciudades & Negocios
 
Internet Of Things & Ruby, com Thiago Scalone
Internet Of Things & Ruby, com Thiago ScaloneInternet Of Things & Ruby, com Thiago Scalone
Internet Of Things & Ruby, com Thiago Scalone
 
7 facts, fictions and predictions about the Internet of Things (IoT)
7 facts, fictions and predictions about the Internet of Things (IoT) 7 facts, fictions and predictions about the Internet of Things (IoT)
7 facts, fictions and predictions about the Internet of Things (IoT)
 
R-NOX IoT
R-NOX IoTR-NOX IoT
R-NOX IoT
 
Network Innovation: Key to Operators' Cloud Services
Network Innovation: Key to Operators' Cloud ServicesNetwork Innovation: Key to Operators' Cloud Services
Network Innovation: Key to Operators' Cloud Services
 
Abel Aguiar - Startups as an engine for IoT development - Productized16
Abel Aguiar - Startups as an engine for IoT development - Productized16Abel Aguiar - Startups as an engine for IoT development - Productized16
Abel Aguiar - Startups as an engine for IoT development - Productized16
 
The Future Of the Internet
The Future Of the Internet The Future Of the Internet
The Future Of the Internet
 
Drone World Expo Presentation
Drone World Expo PresentationDrone World Expo Presentation
Drone World Expo Presentation
 
Presentación1 2003
Presentación1 2003Presentación1 2003
Presentación1 2003
 
IPR - Infographic
IPR - Infographic IPR - Infographic
IPR - Infographic
 
DataBroker DAO presentation at the Internet of Things Scotland Meetup, Feb 22...
DataBroker DAO presentation at the Internet of Things Scotland Meetup, Feb 22...DataBroker DAO presentation at the Internet of Things Scotland Meetup, Feb 22...
DataBroker DAO presentation at the Internet of Things Scotland Meetup, Feb 22...
 
IoT introduction
IoT introductionIoT introduction
IoT introduction
 
Mobile Internet: Καταλύτης για την οικονομική ανάπτυξη
Mobile Internet: Καταλύτης για την οικονομική ανάπτυξηMobile Internet: Καταλύτης για την οικονομική ανάπτυξη
Mobile Internet: Καταλύτης για την οικονομική ανάπτυξη
 
Michael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEEMichael Enescu - Cloud + IoT at IEEE
Michael Enescu - Cloud + IoT at IEEE
 
IoT: State of the Union
IoT: State of the Union IoT: State of the Union
IoT: State of the Union
 
Looking Ahead: BMC CEO Bob Beauchamp Predicts the Future of IT at CIO 100 Key...
Looking Ahead: BMC CEO Bob Beauchamp Predicts the Future of IT at CIO 100 Key...Looking Ahead: BMC CEO Bob Beauchamp Predicts the Future of IT at CIO 100 Key...
Looking Ahead: BMC CEO Bob Beauchamp Predicts the Future of IT at CIO 100 Key...
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Databroker DAO Pitchdeck (February 20, 2018)
Databroker DAO Pitchdeck (February 20, 2018)Databroker DAO Pitchdeck (February 20, 2018)
Databroker DAO Pitchdeck (February 20, 2018)
 
Brussels Briefing n. 55: Chris Addison "Blockchain applications for ACP susta...
Brussels Briefing n. 55: Chris Addison "Blockchain applications for ACP susta...Brussels Briefing n. 55: Chris Addison "Blockchain applications for ACP susta...
Brussels Briefing n. 55: Chris Addison "Blockchain applications for ACP susta...
 
Iot
IotIot
Iot
 

Similar to Protecting ISP Networks and the Internet at Inform[ED] IoT Security

Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
Gerry Elman
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
APNIC
 
A new way to prevent Botnet Attack
A new way to prevent Botnet AttackA new way to prevent Botnet Attack
A new way to prevent Botnet Attack
yennhi2812
 
Network Security in the Age of the Third Platform
Network Security in the Age of the Third PlatformNetwork Security in the Age of the Third Platform
Network Security in the Age of the Third Platform
Napier University
 
presentation Comstor IoT_RTL
presentation Comstor IoT_RTLpresentation Comstor IoT_RTL
presentation Comstor IoT_RTL
Johan Basson
 
Ch # 5, CISM
Ch # 5, CISMCh # 5, CISM
Ch # 5, CISM
Raja Manzar
 
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValueWhy Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
RapidValue
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
Matteo Masi
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
Cristian Garcia G.
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
NetworkCollaborators
 
Big Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications TrackBig Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications Track
Ron Batra
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
Aurobindo Nayak
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
Biznes to Rozmowy
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
PECB
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
Insights success media and technology pvt ltd
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
Mychal McCabe
 
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
CisCon 2017 - La Nuova era del Networking – La Rete IntuitivaCisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
AreaNetworking.it
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients Performance
Imperva Incapsula
 
The Science Behind Generating Big Data
The Science Behind Generating Big DataThe Science Behind Generating Big Data
The Science Behind Generating Big Data
Codero
 
Roberto minerva 20181130
Roberto minerva 20181130  Roberto minerva 20181130
Roberto minerva 20181130
Roberto Minerva
 

Similar to Protecting ISP Networks and the Internet at Inform[ED] IoT Security (20)

Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
 
A new way to prevent Botnet Attack
A new way to prevent Botnet AttackA new way to prevent Botnet Attack
A new way to prevent Botnet Attack
 
Network Security in the Age of the Third Platform
Network Security in the Age of the Third PlatformNetwork Security in the Age of the Third Platform
Network Security in the Age of the Third Platform
 
presentation Comstor IoT_RTL
presentation Comstor IoT_RTLpresentation Comstor IoT_RTL
presentation Comstor IoT_RTL
 
Ch # 5, CISM
Ch # 5, CISMCh # 5, CISM
Ch # 5, CISM
 
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValueWhy Big Data is a Top Priority for Enterprises - Infographics by RapidValue
Why Big Data is a Top Priority for Enterprises - Infographics by RapidValue
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Big Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications TrackBig Communications Event, Keynote Communications Track
Big Communications Event, Keynote Communications Track
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
 
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
CisCon 2017 - La Nuova era del Networking – La Rete IntuitivaCisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
 
D3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients PerformanceD3SF17- Improving Our China Clients Performance
D3SF17- Improving Our China Clients Performance
 
The Science Behind Generating Big Data
The Science Behind Generating Big DataThe Science Behind Generating Big Data
The Science Behind Generating Big Data
 
Roberto minerva 20181130
Roberto minerva 20181130  Roberto minerva 20181130
Roberto minerva 20181130
 

More from CableLabs

"Future Impact of IoT and the Implications of Security" Keynote by Brian Scri...
"Future Impact of IoT and the Implications of Security" Keynote by Brian Scri..."Future Impact of IoT and the Implications of Security" Keynote by Brian Scri...
"Future Impact of IoT and the Implications of Security" Keynote by Brian Scri...
CableLabs
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
CableLabs
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
CableLabs
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
CableLabs
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
CableLabs
 
Innovation in Connected Healthcare by Summer Knight MD at Inform[ED] Connecte...
Innovation in Connected Healthcare by Summer Knight MD at Inform[ED] Connecte...Innovation in Connected Healthcare by Summer Knight MD at Inform[ED] Connecte...
Innovation in Connected Healthcare by Summer Knight MD at Inform[ED] Connecte...
CableLabs
 
Keynote by Simon Kos at Inform[ED] Connected Healthcare
Keynote by Simon Kos at Inform[ED] Connected HealthcareKeynote by Simon Kos at Inform[ED] Connected Healthcare
Keynote by Simon Kos at Inform[ED] Connected Healthcare
CableLabs
 
NFV ISG – Phase 2 Begins
NFV ISG – Phase 2 BeginsNFV ISG – Phase 2 Begins
NFV ISG – Phase 2 Begins
CableLabs
 

More from CableLabs (8)

"Future Impact of IoT and the Implications of Security" Keynote by Brian Scri...
"Future Impact of IoT and the Implications of Security" Keynote by Brian Scri..."Future Impact of IoT and the Implications of Security" Keynote by Brian Scri...
"Future Impact of IoT and the Implications of Security" Keynote by Brian Scri...
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
Innovation in Connected Healthcare by Summer Knight MD at Inform[ED] Connecte...
Innovation in Connected Healthcare by Summer Knight MD at Inform[ED] Connecte...Innovation in Connected Healthcare by Summer Knight MD at Inform[ED] Connecte...
Innovation in Connected Healthcare by Summer Knight MD at Inform[ED] Connecte...
 
Keynote by Simon Kos at Inform[ED] Connected Healthcare
Keynote by Simon Kos at Inform[ED] Connected HealthcareKeynote by Simon Kos at Inform[ED] Connected Healthcare
Keynote by Simon Kos at Inform[ED] Connected Healthcare
 
NFV ISG – Phase 2 Begins
NFV ISG – Phase 2 BeginsNFV ISG – Phase 2 Begins
NFV ISG – Phase 2 Begins
 

Recently uploaded

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 

Recently uploaded (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 

Protecting ISP Networks and the Internet at Inform[ED] IoT Security