SlideShare a Scribd company logo
1 of 52
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls
Protection of Information System & Types of Controls

More Related Content

What's hot

Information security
Information securityInformation security
Information securityLJ PROJECTS
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxRSAArcher
 
The real cost of a cheap security operations center
The real cost of a cheap security operations centerThe real cost of a cheap security operations center
The real cost of a cheap security operations centerCyberhat
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
 
Information security
Information securityInformation security
Information securityMustahid Ali
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001Owako Rodah
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence programMark Arena
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Top 10 Database Threats
Top 10 Database ThreatsTop 10 Database Threats
Top 10 Database ThreatsImperva
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 
Security operation center
Security operation centerSecurity operation center
Security operation centerMuthuKumaran267
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 

What's hot (20)

Information security
Information securityInformation security
Information security
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
What is SIEM
What is SIEMWhat is SIEM
What is SIEM
 
The real cost of a cheap security operations center
The real cost of a cheap security operations centerThe real cost of a cheap security operations center
The real cost of a cheap security operations center
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
Information system
Information systemInformation system
Information system
 
Information security
Information securityInformation security
Information security
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001General Data Protection Regulation (GDPR) and ISO 27001
General Data Protection Regulation (GDPR) and ISO 27001
 
Information security
Information securityInformation security
Information security
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Top 10 Database Threats
Top 10 Database ThreatsTop 10 Database Threats
Top 10 Database Threats
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 

Viewers also liked

SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016SteveAtHPE
 
AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016Sam Newman
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Preparation of Project Report
Preparation of Project ReportPreparation of Project Report
Preparation of Project ReportSunny Sabharwal
 
Management information system
Management information systemManagement information system
Management information systemAnamika Sonawane
 
Internal Control & Risk
Internal Control & RiskInternal Control & Risk
Internal Control & RiskEzat Dandashi
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)Navneet Jingar
 

Viewers also liked (15)

SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
8 Access Control
8 Access Control8 Access Control
8 Access Control
 
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
 
AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016AppSec & Microservices - Velocity 2016
AppSec & Microservices - Velocity 2016
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Corrective Action & Preventive Action
Corrective Action & Preventive ActionCorrective Action & Preventive Action
Corrective Action & Preventive Action
 
Preparation of Project Report
Preparation of Project ReportPreparation of Project Report
Preparation of Project Report
 
15 common defense mechanisms
15 common defense mechanisms15 common defense mechanisms
15 common defense mechanisms
 
Management information system
Management information systemManagement information system
Management information system
 
Internal Control & Risk
Internal Control & RiskInternal Control & Risk
Internal Control & Risk
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 

More from VR Talsaniya

GST in India: E - Way Bill
GST in India: E - Way BillGST in India: E - Way Bill
GST in India: E - Way BillVR Talsaniya
 
Basic Concepts of Cost Accounting
Basic Concepts of Cost AccountingBasic Concepts of Cost Accounting
Basic Concepts of Cost AccountingVR Talsaniya
 
Cost Accounting: Integral & Non-Integral Accounting
Cost Accounting: Integral & Non-Integral AccountingCost Accounting: Integral & Non-Integral Accounting
Cost Accounting: Integral & Non-Integral AccountingVR Talsaniya
 
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINALInformation System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINALVR Talsaniya
 
Chapter - 5 : Business Process Automation Through Software
Chapter - 5 : Business Process Automation Through SoftwareChapter - 5 : Business Process Automation Through Software
Chapter - 5 : Business Process Automation Through SoftwareVR Talsaniya
 
Chapter - 4 : Business Information Systems
Chapter - 4 : Business Information SystemsChapter - 4 : Business Information Systems
Chapter - 4 : Business Information SystemsVR Talsaniya
 
Chapter - 3 : Telecommunication & Networks
Chapter - 3 : Telecommunication & NetworksChapter - 3 : Telecommunication & Networks
Chapter - 3 : Telecommunication & NetworksVR Talsaniya
 
Chapter - 2 : Information System & Information Technology Fundamentals
Chapter - 2 : Information System & Information Technology FundamentalsChapter - 2 : Information System & Information Technology Fundamentals
Chapter - 2 : Information System & Information Technology FundamentalsVR Talsaniya
 
Chapter - 1 : Business Process Management & Information Technology
Chapter - 1 : Business Process Management & Information TechnologyChapter - 1 : Business Process Management & Information Technology
Chapter - 1 : Business Process Management & Information TechnologyVR Talsaniya
 
Technology in CA Education
Technology in CA EducationTechnology in CA Education
Technology in CA EducationVR Talsaniya
 
International Taxation
International TaxationInternational Taxation
International TaxationVR Talsaniya
 
Independent Director
Independent Director Independent Director
Independent Director VR Talsaniya
 
International Taxation - Transfer Pricing
International Taxation - Transfer PricingInternational Taxation - Transfer Pricing
International Taxation - Transfer PricingVR Talsaniya
 
Corporate and Commercial Laws in India
Corporate and Commercial Laws in IndiaCorporate and Commercial Laws in India
Corporate and Commercial Laws in IndiaVR Talsaniya
 
MS Office - MS Outlook & Calendar
MS Office -  MS Outlook & CalendarMS Office -  MS Outlook & Calendar
MS Office - MS Outlook & CalendarVR Talsaniya
 
Service Tax on Works Contract
Service Tax on Works ContractService Tax on Works Contract
Service Tax on Works ContractVR Talsaniya
 
Cloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing ModelsCloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing ModelsVR Talsaniya
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsVR Talsaniya
 
Types of Interest Connections & Meaning of IP Address
Types of Interest Connections & Meaning of IP AddressTypes of Interest Connections & Meaning of IP Address
Types of Interest Connections & Meaning of IP AddressVR Talsaniya
 
Wealth Tax Act, 1957 - List of Sections
Wealth Tax Act, 1957 - List of SectionsWealth Tax Act, 1957 - List of Sections
Wealth Tax Act, 1957 - List of SectionsVR Talsaniya
 

More from VR Talsaniya (20)

GST in India: E - Way Bill
GST in India: E - Way BillGST in India: E - Way Bill
GST in India: E - Way Bill
 
Basic Concepts of Cost Accounting
Basic Concepts of Cost AccountingBasic Concepts of Cost Accounting
Basic Concepts of Cost Accounting
 
Cost Accounting: Integral & Non-Integral Accounting
Cost Accounting: Integral & Non-Integral AccountingCost Accounting: Integral & Non-Integral Accounting
Cost Accounting: Integral & Non-Integral Accounting
 
Information System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINALInformation System Control & Audit (ISCA) - CA FINAL
Information System Control & Audit (ISCA) - CA FINAL
 
Chapter - 5 : Business Process Automation Through Software
Chapter - 5 : Business Process Automation Through SoftwareChapter - 5 : Business Process Automation Through Software
Chapter - 5 : Business Process Automation Through Software
 
Chapter - 4 : Business Information Systems
Chapter - 4 : Business Information SystemsChapter - 4 : Business Information Systems
Chapter - 4 : Business Information Systems
 
Chapter - 3 : Telecommunication & Networks
Chapter - 3 : Telecommunication & NetworksChapter - 3 : Telecommunication & Networks
Chapter - 3 : Telecommunication & Networks
 
Chapter - 2 : Information System & Information Technology Fundamentals
Chapter - 2 : Information System & Information Technology FundamentalsChapter - 2 : Information System & Information Technology Fundamentals
Chapter - 2 : Information System & Information Technology Fundamentals
 
Chapter - 1 : Business Process Management & Information Technology
Chapter - 1 : Business Process Management & Information TechnologyChapter - 1 : Business Process Management & Information Technology
Chapter - 1 : Business Process Management & Information Technology
 
Technology in CA Education
Technology in CA EducationTechnology in CA Education
Technology in CA Education
 
International Taxation
International TaxationInternational Taxation
International Taxation
 
Independent Director
Independent Director Independent Director
Independent Director
 
International Taxation - Transfer Pricing
International Taxation - Transfer PricingInternational Taxation - Transfer Pricing
International Taxation - Transfer Pricing
 
Corporate and Commercial Laws in India
Corporate and Commercial Laws in IndiaCorporate and Commercial Laws in India
Corporate and Commercial Laws in India
 
MS Office - MS Outlook & Calendar
MS Office -  MS Outlook & CalendarMS Office -  MS Outlook & Calendar
MS Office - MS Outlook & Calendar
 
Service Tax on Works Contract
Service Tax on Works ContractService Tax on Works Contract
Service Tax on Works Contract
 
Cloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing ModelsCloud Computing - An Emerging Technology & Cloud Computing Models
Cloud Computing - An Emerging Technology & Cloud Computing Models
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information Systems
 
Types of Interest Connections & Meaning of IP Address
Types of Interest Connections & Meaning of IP AddressTypes of Interest Connections & Meaning of IP Address
Types of Interest Connections & Meaning of IP Address
 
Wealth Tax Act, 1957 - List of Sections
Wealth Tax Act, 1957 - List of SectionsWealth Tax Act, 1957 - List of Sections
Wealth Tax Act, 1957 - List of Sections
 

Recently uploaded

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Recently uploaded (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty