SlideShare a Scribd company logo
Social Media Security Challenges Aleksandr Yampolskiy, Ph.D. (Gilt Groupe)
Quick Survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is Social Media?
Benefits of Social Media Reach out to customers quicker Brand recognition Recruiting
Risks of Social Media Twitter XSS bug Myspace Samy worm Facebook spear-phishing Facebook page of MI6 chief’s wife
Pros/Cons of Social Media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Our solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sample Threat Matrix For Social Media Data leakage  on Twitter Facebook malware Spear-phishing
Social media security challenges

More Related Content

What's hot

Social Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural HubSocial Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural Hub
OutserveWeb
 
The of Social Media - Women in Management
The of Social Media - Women in ManagementThe of Social Media - Women in Management
The of Social Media - Women in Management
Thomas Clifford
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
IIIT Hyderabad
 
Social Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business SkillsSocial Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business Skills
OutserveWeb
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
Fort Rucker FRSA
 
Social Networking For Success Osa
Social Networking For Success   OsaSocial Networking For Success   Osa
Social Networking For Success Osa
ProtingentDan
 
6 online identity
6 online identity6 online identity
6 online identity
COMP 113
 
MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12
Alex Lawrence
 
Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012
Philip Oakley
 
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Evan Donovan
 
Ideas and Tactics for CIPCO
Ideas and Tactics for CIPCOIdeas and Tactics for CIPCO
Ideas and Tactics for CIPCO
Sevans Strategy
 
Twitter Powerpoint
Twitter PowerpointTwitter Powerpoint
Twitter Powerpoint
szyarto
 
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should MasterUrban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Anvil Media, Inc.
 
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Spiderworking
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
Chad Warner
 
Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011
PasocoPteLtd
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
Helen Levinson
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures
Bryan Fendley
 
Learning in a VUCA world
Learning in a VUCA worldLearning in a VUCA world
Learning in a VUCA world
Frédéric Williquet
 
Social.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.finalSocial.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.final
Digital Firefly Marketing
 

What's hot (20)

Social Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural HubSocial Media Talk to Shropshire Rural Hub
Social Media Talk to Shropshire Rural Hub
 
The of Social Media - Women in Management
The of Social Media - Women in ManagementThe of Social Media - Women in Management
The of Social Media - Women in Management
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Social Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business SkillsSocial Media for Stourbridge College Business Skills
Social Media for Stourbridge College Business Skills
 
Smr week 23 opsec and safe social networking
Smr week 23   opsec and safe social networkingSmr week 23   opsec and safe social networking
Smr week 23 opsec and safe social networking
 
Social Networking For Success Osa
Social Networking For Success   OsaSocial Networking For Success   Osa
Social Networking For Success Osa
 
6 online identity
6 online identity6 online identity
6 online identity
 
MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12MarketStar - Twitter - 3/23/12
MarketStar - Twitter - 3/23/12
 
Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012
 
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
 
Ideas and Tactics for CIPCO
Ideas and Tactics for CIPCOIdeas and Tactics for CIPCO
Ideas and Tactics for CIPCO
 
Twitter Powerpoint
Twitter PowerpointTwitter Powerpoint
Twitter Powerpoint
 
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should MasterUrban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
Urban Summit 2012: The Three F’s Every Successful Entrepreneur Should Master
 
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
Social Media The Nuts And Bolts For Irish College of General Practitioners Wi...
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
 
Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011Internet and PC safety - for CIS PTA - 19 Jan 2011
Internet and PC safety - for CIS PTA - 19 Jan 2011
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
 
Cyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ ProceduresCyberbullying Investigation/Reporting/ Procedures
Cyberbullying Investigation/Reporting/ Procedures
 
Learning in a VUCA world
Learning in a VUCA worldLearning in a VUCA world
Learning in a VUCA world
 
Social.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.finalSocial.media.marketing.natural.disasters.final
Social.media.marketing.natural.disasters.final
 

Similar to Social media security challenges

Social Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA ChicagoSocial Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Wise Elephant
 
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 SlidesUSDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
agbegin
 
Breaking into social media marketing
Breaking into social media marketingBreaking into social media marketing
Breaking into social media marketing
Sarah Maynard
 
Owasp8thdec
Owasp8thdecOwasp8thdec
Owasp8thdec
tmacuk
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
SchleighS
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Raul Colon
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
Stites & Harbison
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
FERMA
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
Nathan Wright
 
Social Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University WestSocial Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University West
Sandra Masters
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
ESI Attorneys LLC
 
Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Social Media Case Studies Dec09 V1.0Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Digital Marketing Agency
 
Mapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media Risk
Mohamed Mahdy
 
Twitter Ideas for a Small Business
Twitter Ideas for a Small BusinessTwitter Ideas for a Small Business
Twitter Ideas for a Small Business
Jay Massey
 
Social Technology Overview with Case Studies
Social Technology Overview with Case StudiesSocial Technology Overview with Case Studies
Social Technology Overview with Case Studies
Digital Insights - Digital Marketing Agency
 
Terenure Digital Insights Social Technology Overview Case Studies
Terenure Digital Insights Social Technology Overview Case StudiesTerenure Digital Insights Social Technology Overview Case Studies
Terenure Digital Insights Social Technology Overview Case Studies
Digital Insights - Digital Marketing Agency
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media Policies
Dave Tinker, CFRE
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
Dave Tinker, CFRE
 
Social Media Research
Social Media ResearchSocial Media Research
Social Media Research
mabar207
 
Corporate Relations - Social media presentation
Corporate Relations - Social media presentationCorporate Relations - Social media presentation
Corporate Relations - Social media presentation
LeedsMet_CR
 

Similar to Social media security challenges (20)

Social Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA ChicagoSocial Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
Social Media: Risk or Reward? (Presentation for the IIA/ISACA Chicago
 
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 SlidesUSDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
USDmkt805 - Social Media Marketing Lecture 1 & 2 Slides
 
Breaking into social media marketing
Breaking into social media marketingBreaking into social media marketing
Breaking into social media marketing
 
Owasp8thdec
Owasp8thdecOwasp8thdec
Owasp8thdec
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
 
MIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentationMIMA Summit Social Marketing 101 presentation
MIMA Summit Social Marketing 101 presentation
 
Social Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University WestSocial Media Education Workshop for AAMGA University West
Social Media Education Workshop for AAMGA University West
 
The Legal Implications of Social Media
The Legal Implications of Social MediaThe Legal Implications of Social Media
The Legal Implications of Social Media
 
Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Social Media Case Studies Dec09 V1.0Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Social Media Case Studies Dec09 V1.0
 
Mapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media Risk
 
Twitter Ideas for a Small Business
Twitter Ideas for a Small BusinessTwitter Ideas for a Small Business
Twitter Ideas for a Small Business
 
Social Technology Overview with Case Studies
Social Technology Overview with Case StudiesSocial Technology Overview with Case Studies
Social Technology Overview with Case Studies
 
Terenure Digital Insights Social Technology Overview Case Studies
Terenure Digital Insights Social Technology Overview Case StudiesTerenure Digital Insights Social Technology Overview Case Studies
Terenure Digital Insights Social Technology Overview Case Studies
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media Policies
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
Social Media Research
Social Media ResearchSocial Media Research
Social Media Research
 
Corporate Relations - Social media presentation
Corporate Relations - Social media presentationCorporate Relations - Social media presentation
Corporate Relations - Social media presentation
 

More from Aleksandr Yampolskiy

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome Session
Aleksandr Yampolskiy
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter Bell
Aleksandr Yampolskiy
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy Steps
Aleksandr Yampolskiy
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
Aleksandr Yampolskiy
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
Aleksandr Yampolskiy
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
Aleksandr Yampolskiy
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
Aleksandr Yampolskiy
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
Aleksandr Yampolskiy
 
OWASP Much ado about randomness
OWASP Much ado about randomnessOWASP Much ado about randomness
OWASP Much ado about randomness
Aleksandr Yampolskiy
 
Malware goes to the movies
Malware goes to the moviesMalware goes to the movies
Malware goes to the movies
Aleksandr Yampolskiy
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of viruses
Aleksandr Yampolskiy
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
Aleksandr Yampolskiy
 
Number theory lecture (part 2)
Number theory lecture (part 2)Number theory lecture (part 2)
Number theory lecture (part 2)
Aleksandr Yampolskiy
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
Aleksandr Yampolskiy
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
Aleksandr Yampolskiy
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networks
Aleksandr Yampolskiy
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
Aleksandr Yampolskiy
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelement
Aleksandr Yampolskiy
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topology
Aleksandr Yampolskiy
 
Business Case Studies
Business Case Studies Business Case Studies
Business Case Studies
Aleksandr Yampolskiy
 

More from Aleksandr Yampolskiy (20)

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome Session
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter Bell
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy Steps
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
OWASP Much ado about randomness
OWASP Much ado about randomnessOWASP Much ado about randomness
OWASP Much ado about randomness
 
Malware goes to the movies
Malware goes to the moviesMalware goes to the movies
Malware goes to the movies
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of viruses
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
Number theory lecture (part 2)
Number theory lecture (part 2)Number theory lecture (part 2)
Number theory lecture (part 2)
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networks
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelement
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topology
 
Business Case Studies
Business Case Studies Business Case Studies
Business Case Studies
 

Recently uploaded

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 

Recently uploaded (20)

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 

Social media security challenges