SlideShare a Scribd company logo
Who are You?
Who am I?
Who is Anybody?
Who am I?
Who are You?
Who is Anybody?
Who am I?
I’m not ...
<a href="http://lanyrd.com/people/psd" rel="me" >Lanyrd</a>
http://tools.microformatic.com/help/xhtml/rel-lint/
http://socialgraph-resources.googlecode.com/svn/trunk/samples/findyours.html
Social Graph API
https://twitter.com/hotdogsladies/status/121634890612617216
FAIL!
http://inmaps.linkedinlabs.com/share/Paul_Downey/254787113202758123919768153472111744090
Who are you?
https://twitter.com/Jermolene/status/121537205608001536
https://twitter.com/paulmadsen/status/122271400336699392
Basic Authentication




http://en.wikipedia.org/wiki/Basic_access_authentication
Digest Authentication




http://en.wikipedia.org/wiki/Digest_access_authentication
PASSWORD
REHABILITATION
sha1
Secret URIs

•   http://farm3.static.flickr.com/2291/1806225034_50df5b8ba4_o.png

•   http://inmaps.linkedinlabs.com/share/Paul_Downey/
    254787113202758123919768153472111744090
http://en.wikipedia.org/wiki/HTTP_cookie
http://softwareas.com/signing-up-to-websites-1999-2009-a-montage
https://github.com/hanssonlarsson/express-csrf
EU Privacy Directive on Cookies
http://www.davidnaylor.co.uk/eu-cookies-directive-interactive-guide-to-25th-
                   may-and-what-it-means-for-you.html
UX
More
Secure




         Less pleasant to use
DNS Is B0rken




http://blog.icann.org/2008/11/why-the-dns-is-broken-in-plain-language/
HTTPS
$ openssl s_client -connect www.google.com:443 <
/dev/null | openssl x509 -outform DER | openssl sha1

depth=1 /C=ZA/O=Thawte Consulting (Pty) Ltd./CN=Thawte
SGC CA
verify error:num=20:unable to get local issuer
certificate
verify return:0
DONE
405062e5befde4af97e9382af16cc87c8fb7c4e2


$ dig +short
405062e5befde4af97e9382af16cc87c8fb7c4e2.certs.googled
nstest.com TXT

"14867 15062 74"



   http://googleonlinesecurity.blogspot.com/2011/04/improving-ssl-certificate-security.html
Client Certs?
http://codebutler.github.com/firesheep/
https://www.eff.org/https-everywhere
you have to opt-out ..
               .. in every browser ..
                    .. this is evil ..
                     .. and doomed to failure
http://xauth.org/
http://en.wikipedia.org/wiki/OpenID
<XRD>
    <Subject>http://blog.example.com/article/id/314</
Subject>
    <Alias>http://blog.example.com/cool_new_thing</Alias>
    <Expires>2010-01-30T09:30:00Z</Expires>
    <Type>http://blgx.example.net/ns/version/1.2</Type>
    <Type>http://blgx.example.net/ns/ext/language</Type>
    <Link>
         <Rel>author</Rel>
         <URI>http://blog.example.com/author/steve</URI>
         <MediaType>text/html</MediaType>
    </Link>
</XRD>




               http://hueniverse.com/2009/03/xrd-sneak-peek/
https://dev.twitter.com/docs/auth/oauth
Delegation UX
The “F” Word
Federated
https://twitter.com/hipsterhacker/status/77716476873801728
https://twitter.com/jtauber/status/60586912196460544
Transport Independence
ww  .w3.org/
                                                                                                  ss >http://w le.org/
                                                                                      <w sa:Addre ttp://examp
                                                                         dd ressing"> ustomer="h
                                                          .org/2 005/08/a ers xmlns:c                     </
                                                                                                 merKey> wsdl/">
                                                      .w3                et                  sto
                                          tt p://www eferenceParam </customer :Cu mlsoap.org/                            /
                            mln s:wsa="h ss><wsa:R                    56789              m as.x              rg /2006/01
                 eference x </wsa:Addre                 y>K  ey#1234 lns="http://sche ttp://www.w3.o ce>
< wsa:E ndpointR essing/none           r :Cus  tomerKe efinitions xm                       "h
                                                                                 n xmlns= sa:EndpointRefe
                                                                                                            ren
                 r                 me                    d                   tio
    200  5/08/add tomer"><custo <wsa:Metada>< itions><descrip adata></w
                cus                  >                     n                  et
                         Par ameters          re! --></defi iption></wsa:M
          wsa:R eference of WSDL 1.1 he ! --></descr
                                               e
                 <!-- load WSDL 2.0 her
                            e
            wsdl"> <!-- mor
<?xml version="1.0" encoding="UTF-8"?>
<SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:ns1="http://sdk.bt.com/2007/01/WhiteLabelAuthentication"
xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/" xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing" xmlns:wsse="http://docs.oasis-
open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-




                         HEADERS?
utility-1.0.xsd" xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
   <SOAP-ENV:Header>
      <wsse:Security>
         <ds:Signature>
            <ds:SignedInfo>
               <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
               <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
               <ds:Reference URI="#ac016ffe-a6e9-23d4-ebd1-ccef7ea31db7">
                   <ds:Transforms>
                      <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                   </ds:Transforms>
                   <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
                   <ds:DigestValue>bwlAKau7KQAubgGNJzysZoEEF8o=</ds:DigestValue>
               </ds:Reference>
               <ds:Reference URI="#78223460-ef68-5501-83d6-a5edb6d452b6">
                   <ds:Transforms>
                      <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
                   </ds:Transforms>
                   <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
                   <ds:DigestValue>kyBw9fnMjhi2I39+wfBIklyk8g4=</ds:DigestValue>
               </ds:Reference>
            </ds:SignedInfo>
            <ds:SignatureValue>XW2FqP9o/A1J+NOg6Kv3ncn3PvSg5lzr2V4H/AQpRycXUSk7bzWK8kzhtMrlXUwkykrJ2AyEzw+xrRtSBIeaId1Iveme2KO02p21MTglr73cPCft/
GHvEvAHZ4B6N6gSaX7NcGFrYnsYKP0nX5vT7jBh7WZ7Euqn0PyjCHyYxbU=</ds:SignatureValue>
            <ds:KeyInfo>
               <wsse:SecurityTokenReference>
                   <wsse:Reference URI="#CERTID"/>
               </wsse:SecurityTokenReference>
            </ds:KeyInfo>
         </ds:Signature>
         <wsu:Timestamp wsu:Id="ac016ffe-a6e9-23d4-ebd1-ccef7ea31db7">
            <wsu:Created>2007-02-23T07:47:01Z</wsu:Created>
            <wsu:Expires>2007-02-23T08:47:01Z</wsu:Expires>
         </wsu:Timestamp>
         <wsse:BinarySecurityToken EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary"
ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"
wsu:Id="CERTID">MIICdzCCAeCgAwIBAgICAX0wDQYJKoZIhvcNAQEEBQAwezEnMCUGA1UEChMeQnJpdGlzaCBUZWxlY29tbXVuaWNhdGlvbnMgUExDMR4wHAYDVQQLExVDZXJ0aWZpY2F0ZSBBdXRob3
JpdHkxDzANBgNVBAcTBkxmRvbjELMAkGA1UEBhMCR0IxEjAQBgNVBTCUJUIFNESyBDQTAiFxEwNzAxMDMxNTE5MjIrMDAwMBcNMDgwMTA0MTUxOTIyWjCBgjELMAkGA1UEBhMCR0IxDzANBgNVBAgTBkxv
bmRvbjEPMA0GA1UEBxMGTG9uZG9uMQ8wDQYDVQQKEwZCVCBTREsxLTArBgNVBAsTJDM0ZDU0NTkwLTRkZTEtNGJmNi04ZGMxLWZjODQzNzM1MmM4MjERMA8GA1UEAxMIcGhvbmVib3gwgZ8wDQYJKoZIhv
cNAQEBBQADgY0AMIGJAoGBANKIQf+DOAKNZqs+HvCBYJ7+Q/wdCQBfFslIOGMnKN5zxpCuwB/pPW4DjLnqcWkIIVIH4A7RlWRemIO5e5caTW9bwvz0Fl1ZM6e2Mx9XKT0ZkxvXq8Dxn0abqWzoKyD3IJ2/
tUhqriWveFR+6PY3PSBcj7NpJaqr7yH3z6RtEGNlAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAmabZVFeAXfXcBKR6NUK7kYqHhtX7YdNtxZcULRMMpFEkCMGERWCH5bK6/xnFtNXG09RkwkSTGs2dhM6/
jQNvd1jJhLR6E2ejYrYWWf6Sap0Etok7sJqrS9awdbFmQGenFZKRUAEeyHeZhdFil8trzyJv1VzgPIjDRZmhnpItzQ8=</wsse:BinarySecurityToken>
      </wsse:Security>
      <wsa:Action>http://sdk.bt.com/2007/01/WhiteLabelAuthentication#login</wsa:Action>
      <wsa:MessageID>urn:uuid:e12edac3-f87d-3e0a-b621-04fa4d0b8cda</wsa:MessageID>
   </SOAP-ENV:Header>
   <SOAP-ENV:Body wsu:Id="78223460-ef68-5501-83d6-a5edb6d452b6">
      <ns1:login>
         <ns1:userName>paul.downey@bt.com</ns1:userName>
         <ns1:password>2344324t</ns1:password>
      </ns1:login>
   </SOAP-ENV:Body>
</SOAP-ENV:Envelope>
http://www.xmlgrrl.com/blog/2007/03/28/the-venn-of-identity/
http://www.xmlgrrl.com/blog/2007/03/28/the-venn-of-identity/
http://connectid.blogspot.com
http://www.xmlgrrl.com/blog/2008/09/04/venn-and-the-art-of-data-sharing/
http://kantarainitiative.org
http://en.wikipedia.org/wiki/OpenID
http://www.bbc.co.uk/news/technology-13749010
https://twitter.com/IdentityWoman/status/110622242127364096
https://twitter.com/robinberjon/status/109611765435875329
very cool!
http://www.w3.org/wiki/WebID
http://webfinger.org/
correct
 horse
battery
 staple
http://nigelparry.com/news/guardian-david-leigh-cablegate.shtml
.. but .. wait!
https://twitter.com/rem/status/123392299320344579
Verified by Visa not only protects your card against unauthorised use, it
 also means you can have confidence that the online retailer you’re
 buying from has made your security a priority.




http://www.visaeurope.com/en/cardholders/verified_by_visa.aspx
http://cyberelk.net/tim/2008/11/20/chip-and-pin/
http://krebsonsecurity.com/2011/09/gang-used-3d-printers-for-atm-skimmers/
http://berglondon.com/blog/2009/10/12/the-ghost-in-the-field/
http://gizmodo.com/5366022/sniff-the-rfid-dog-likes-to-smell-your-credit-cards
http://www.chromaroma.com/
http://www.bijlmereuro.net/
http://www.cerealbits.com/
http://en.wikipedia.org/wiki/Blue_box_(phreaking)
https://bitcointalk.org/index.php?topic=9047.0
http://en.aureatechnology.net/
http://cs-exhibitions.uni-klu.ac.at/index.php?id=258
Bio-meh-trics
http://www.flickr.com/photos/jeff-barnes/76948611
Something you have

 Something you are

Something you know
The Mobile
    is
The Dongle
             ™




         not really
http://www.duosecurity.com/
Who is anybody?
http://isaach.com/2011/07/mention-constellations.html
BUTTON SLUTS
https://twitter.com/beng/status/118026274148073472
https://twitter.com/monkchips/status/117246164839043072
http://www.ghostery.com/
Yikes!
http://collusion.toolness.org/
•   Standard HTTP Cookies
              •   Flash Local Shared Objects
              •   Silverlight Isolated Storage
              •   auto-generated force-cached RGB values
              •   PNG/HTML5 Canvas tag to read pixels
              •   Web History
              •   HTTP ETags
              •   Web cache
evercookies   •   window.name caching
              •   Internet Explorer userData storage
              •   HTML5 Session Storage
              •   HTML5 Local Storage
              •   HTML5 Global Storage
              •   HTML5 Database Storage (SQLite)
              •   HTTP Authentication
              •   Java NIC based unique key
https://panopticlick.eff.org/
https://twitter.com/9600/status/117309784130199553
“The thing that makes newspapers so
fundamentally fascinating — that serendipity
— can be calculated now.
We can actually produce it electronically.
The power of individual targeting — the
technology will be so good it will be very hard
for people to watch or consume something
that has not in some sense been tailored for
them”
                           — Eric Schmidt


http://googlesystem.blogspot.com/2010/08/eric-schmidt-on-future-of-search.html
Privacy Window
four legs good,
two legs better ...
https://twitter.com/danbri/status/114241481346252801
Test Driven Development

    Behaviour Driven Development

Jenga Driven Development

             Domain Driven Design

Development Driven Development

             Design Driven Driving
Investor Driven
 Development
Confusion
Conclusion
Who am I?
 — someone who treasures linking

Who are you?
 — someone who deserves grokable
 security

Who is Anybody?
 — mind your own bloomin’ business!

More Related Content

Similar to Who am I? Who are you? Who is anybody?

OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)
OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)
OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)
Pat Patterson
 
OpenWeb Discovery
OpenWeb DiscoveryOpenWeb Discovery
OpenWeb Discovery
James Walker
 
WSO2Con USA 2015: Securing your APIs: Patterns and More
WSO2Con USA 2015: Securing your APIs: Patterns and MoreWSO2Con USA 2015: Securing your APIs: Patterns and More
WSO2Con USA 2015: Securing your APIs: Patterns and More
WSO2
 
REST teori og praksis; REST in theory and practice
REST teori og praksis; REST in theory and practiceREST teori og praksis; REST in theory and practice
REST teori og praksis; REST in theory and practice
hamnis
 
Sample data and other ur ls
Sample data and other ur lsSample data and other ur ls
Sample data and other ur lsMark Wilkinson
 
Microsoft Accademic Cloud Tour Genova
Microsoft Accademic Cloud Tour GenovaMicrosoft Accademic Cloud Tour Genova
Microsoft Accademic Cloud Tour Genovaantimo musone
 
Enterprise integration options with Smallworld
Enterprise integration options with SmallworldEnterprise integration options with Smallworld
Enterprise integration options with Smallworld
Peter Batty
 
Enterprise integration options with Smallworld
Enterprise integration options with SmallworldEnterprise integration options with Smallworld
Enterprise integration options with Smallworld
Peter Batty
 
Microformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and TechnologyMicroformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and TechnologyNishikant Taksande
 
About REST. Архитектурные семинары Softengi
About REST. Архитектурные семинары SoftengiAbout REST. Архитектурные семинары Softengi
About REST. Архитектурные семинары Softengi
Softengi
 
Rails 3 overview
Rails 3 overviewRails 3 overview
Rails 3 overviewYehuda Katz
 
Makanan halal-haram-2970785
Makanan halal-haram-2970785Makanan halal-haram-2970785
Makanan halal-haram-2970785khairulamar
 
Create WSDL
Create WSDLCreate WSDL
Create WSDL
SJ Choudary
 
Java Web Programming [5/9] : EL, JSTL and Custom Tags
Java Web Programming [5/9] : EL, JSTL and Custom TagsJava Web Programming [5/9] : EL, JSTL and Custom Tags
Java Web Programming [5/9] : EL, JSTL and Custom Tags
IMC Institute
 
SAPS - Semantic AtomPub-based Services
SAPS - Semantic AtomPub-based ServicesSAPS - Semantic AtomPub-based Services
SAPS - Semantic AtomPub-based Services
Markus Lanthaler
 
SHARE & the Semantic Web — This Time it's Personal
SHARE & the Semantic Web — This Time it's PersonalSHARE & the Semantic Web — This Time it's Personal
SHARE & the Semantic Web — This Time it's PersonalLuke McCarthy
 
Idoc script beginner guide
Idoc script beginner guide Idoc script beginner guide
Idoc script beginner guide
Vinay Kumar
 

Similar to Who am I? Who are you? Who is anybody? (20)

OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)
OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)
OData: Universal Data Solvent or Clunky Enterprise Goo? (GlueCon 2015)
 
Dorothea orem-theory
Dorothea orem-theoryDorothea orem-theory
Dorothea orem-theory
 
OpenWeb Discovery
OpenWeb DiscoveryOpenWeb Discovery
OpenWeb Discovery
 
WSO2Con USA 2015: Securing your APIs: Patterns and More
WSO2Con USA 2015: Securing your APIs: Patterns and MoreWSO2Con USA 2015: Securing your APIs: Patterns and More
WSO2Con USA 2015: Securing your APIs: Patterns and More
 
REST teori og praksis; REST in theory and practice
REST teori og praksis; REST in theory and practiceREST teori og praksis; REST in theory and practice
REST teori og praksis; REST in theory and practice
 
Sample data and other ur ls
Sample data and other ur lsSample data and other ur ls
Sample data and other ur ls
 
Microsoft Accademic Cloud Tour Genova
Microsoft Accademic Cloud Tour GenovaMicrosoft Accademic Cloud Tour Genova
Microsoft Accademic Cloud Tour Genova
 
Enterprise integration options with Smallworld
Enterprise integration options with SmallworldEnterprise integration options with Smallworld
Enterprise integration options with Smallworld
 
Enterprise integration options with Smallworld
Enterprise integration options with SmallworldEnterprise integration options with Smallworld
Enterprise integration options with Smallworld
 
Microformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and TechnologyMicroformats, Institute of Engineering and Technology
Microformats, Institute of Engineering and Technology
 
About REST. Архитектурные семинары Softengi
About REST. Архитектурные семинары SoftengiAbout REST. Архитектурные семинары Softengi
About REST. Архитектурные семинары Softengi
 
SOAP-based Web Services
SOAP-based Web ServicesSOAP-based Web Services
SOAP-based Web Services
 
Rails 3 overview
Rails 3 overviewRails 3 overview
Rails 3 overview
 
Makanan halal-haram-2970785
Makanan halal-haram-2970785Makanan halal-haram-2970785
Makanan halal-haram-2970785
 
Guia de-estudio-2
Guia de-estudio-2Guia de-estudio-2
Guia de-estudio-2
 
Create WSDL
Create WSDLCreate WSDL
Create WSDL
 
Java Web Programming [5/9] : EL, JSTL and Custom Tags
Java Web Programming [5/9] : EL, JSTL and Custom TagsJava Web Programming [5/9] : EL, JSTL and Custom Tags
Java Web Programming [5/9] : EL, JSTL and Custom Tags
 
SAPS - Semantic AtomPub-based Services
SAPS - Semantic AtomPub-based ServicesSAPS - Semantic AtomPub-based Services
SAPS - Semantic AtomPub-based Services
 
SHARE & the Semantic Web — This Time it's Personal
SHARE & the Semantic Web — This Time it's PersonalSHARE & the Semantic Web — This Time it's Personal
SHARE & the Semantic Web — This Time it's Personal
 
Idoc script beginner guide
Idoc script beginner guide Idoc script beginner guide
Idoc script beginner guide
 

More from Paul Downey

ODI Lunchtime Talk, Creating an open register – what it takes and why
ODI Lunchtime Talk, Creating an open register – what it takes and whyODI Lunchtime Talk, Creating an open register – what it takes and why
ODI Lunchtime Talk, Creating an open register – what it takes and why
Paul Downey
 
Building systems with integrity
Building systems with integrityBuilding systems with integrity
Building systems with integrity
Paul Downey
 
Registers
RegistersRegisters
Registers
Paul Downey
 
ETSI Hell's Kitchen Debate, Nice 2009
ETSI Hell's Kitchen Debate, Nice 2009ETSI Hell's Kitchen Debate, Nice 2009
ETSI Hell's Kitchen Debate, Nice 2009
Paul Downey
 
Denver
DenverDenver
Denver
Paul Downey
 
XML Schema Patterns for Databinding
XML Schema Patterns for DatabindingXML Schema Patterns for Databinding
XML Schema Patterns for Databinding
Paul Downey
 
The Best Web APIs are Web Sites
The Best Web APIs are Web SitesThe Best Web APIs are Web Sites
The Best Web APIs are Web Sites
Paul Downey
 
Publishing Web Services Policies
Publishing Web Services PoliciesPublishing Web Services Policies
Publishing Web Services Policies
Paul Downey
 
The Web Is Agreement Opentech2008
The Web Is Agreement   Opentech2008The Web Is Agreement   Opentech2008
The Web Is Agreement Opentech2008Paul Downey
 
Vrm Wedding
Vrm WeddingVrm Wedding
Vrm Wedding
Paul Downey
 
Versioning XML and Open Source Tools
Versioning XML and Open Source ToolsVersioning XML and Open Source Tools
Versioning XML and Open Source Tools
Paul Downey
 
Open Source, Agile, Life-Style
Open Source, Agile, Life-StyleOpen Source, Agile, Life-Style
Open Source, Agile, Life-StylePaul Downey
 
Extensibility And Versioning
Extensibility And VersioningExtensibility And Versioning
Extensibility And VersioningPaul Downey
 
Mashing up The Mobile
Mashing up The MobileMashing up The Mobile
Mashing up The Mobile
Paul Downey
 

More from Paul Downey (14)

ODI Lunchtime Talk, Creating an open register – what it takes and why
ODI Lunchtime Talk, Creating an open register – what it takes and whyODI Lunchtime Talk, Creating an open register – what it takes and why
ODI Lunchtime Talk, Creating an open register – what it takes and why
 
Building systems with integrity
Building systems with integrityBuilding systems with integrity
Building systems with integrity
 
Registers
RegistersRegisters
Registers
 
ETSI Hell's Kitchen Debate, Nice 2009
ETSI Hell's Kitchen Debate, Nice 2009ETSI Hell's Kitchen Debate, Nice 2009
ETSI Hell's Kitchen Debate, Nice 2009
 
Denver
DenverDenver
Denver
 
XML Schema Patterns for Databinding
XML Schema Patterns for DatabindingXML Schema Patterns for Databinding
XML Schema Patterns for Databinding
 
The Best Web APIs are Web Sites
The Best Web APIs are Web SitesThe Best Web APIs are Web Sites
The Best Web APIs are Web Sites
 
Publishing Web Services Policies
Publishing Web Services PoliciesPublishing Web Services Policies
Publishing Web Services Policies
 
The Web Is Agreement Opentech2008
The Web Is Agreement   Opentech2008The Web Is Agreement   Opentech2008
The Web Is Agreement Opentech2008
 
Vrm Wedding
Vrm WeddingVrm Wedding
Vrm Wedding
 
Versioning XML and Open Source Tools
Versioning XML and Open Source ToolsVersioning XML and Open Source Tools
Versioning XML and Open Source Tools
 
Open Source, Agile, Life-Style
Open Source, Agile, Life-StyleOpen Source, Agile, Life-Style
Open Source, Agile, Life-Style
 
Extensibility And Versioning
Extensibility And VersioningExtensibility And Versioning
Extensibility And Versioning
 
Mashing up The Mobile
Mashing up The MobileMashing up The Mobile
Mashing up The Mobile
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Who am I? Who are you? Who is anybody?