SlideShare a Scribd company logo
1 of 27
Cookies and more...




                      By,
                      Vinay Shriyan
It all started from a ...




             ...shopping cart at Netscape
Wikipedia says...




                 ...a cookie is used for an origin
website to send state information to a user's
browser and for the browser to return the state
information to the origin site
Typical flow

             Go to URL


            Read Cookie


                          Yes
              Is Cookie         Write new Cookie
    No         Empty?



 Use Cookie info




Update Cookie info
Unique Cookies


                             47,908
    382,576


13,489        12,246                     11,219




   10,580         9,895                  4,372

                          Source: Feb 2012 statistics by cookielaw.org
Cookies is used by 49.7% of all the websites.
Cookies cannot...
Automatically access to personal information

Read or write data to hard disk

Read or write information in cookies placed by
 other sites

Run programs on your computer
Cookies can...

Store any information you explicitly provide to a
site



Track your interaction with parent site such as
  pages visited, time of visits, number of visits
Max 4Kb in size




                                            3 imp Attributes: Name,Value,Expiry




300 cookies per browser
Cookies are used for...
User Tracking                     Session Management




                Personalization
Ad server




            Web server
Social widgets are
collaborative but act as homing
devices for online advertisers...
Facebook Case study




I window shop at
Yes I Love
Audience profiling


It knows who you are

        +              =   Better Targeting

  What you like
It knows you, before you even login...
Cookies and UK
  26th May 2011, the Cookie law


  Obtain informed consent from visitors




82% of digital marketers think the EU cookie law is bad for the web
                                                - eConsultancy.com
The ICO case




           “Websites face £500k fine for
           breaching ‘cookie’ law“
Cookies and Privacy
Opt-out of targeting
Opt-out of targeting
RTB – Ecosystem, remember?
What about Chitika??
Thank you...

More Related Content

What's hot

Introduction to SEO
Introduction to SEOIntroduction to SEO
Introduction to SEOMegha yadav
 
Applying web mining application for user behavior understanding
Applying web mining application for user behavior understandingApplying web mining application for user behavior understanding
Applying web mining application for user behavior understandingZakaria Zubi
 
Introduction to web analytics
Introduction to web analyticsIntroduction to web analytics
Introduction to web analyticsRajeev Pillai
 
Search Engine Powerpoint
Search Engine  Powerpoint Search Engine  Powerpoint
Search Engine Powerpoint Partha Himu
 
Data mining on Social Media
Data mining on Social MediaData mining on Social Media
Data mining on Social Mediahome
 
Search engines powerpoint
Search engines powerpointSearch engines powerpoint
Search engines powerpointvbaker2210
 
Web Traffic Time Series Forecasting
Web Traffic  Time Series ForecastingWeb Traffic  Time Series Forecasting
Web Traffic Time Series ForecastingBillTubbs
 
Search engine Optimization,Advantages Of SEO, Benefits of Seo
Search engine Optimization,Advantages Of SEO, Benefits of SeoSearch engine Optimization,Advantages Of SEO, Benefits of Seo
Search engine Optimization,Advantages Of SEO, Benefits of SeoDheeraj Sukumar
 
Information Retrieval Fundamentals - An introduction
Information Retrieval Fundamentals - An introduction Information Retrieval Fundamentals - An introduction
Information Retrieval Fundamentals - An introduction Grace Hui Yang
 
Collaborative Filtering 1: User-based CF
Collaborative Filtering 1: User-based CFCollaborative Filtering 1: User-based CF
Collaborative Filtering 1: User-based CFYusuke Yamamoto
 
Evaluation in Information Retrieval
Evaluation in Information RetrievalEvaluation in Information Retrieval
Evaluation in Information RetrievalDishant Ailawadi
 

What's hot (20)

Web Analytics 101
Web Analytics 101Web Analytics 101
Web Analytics 101
 
Google Keyword Planner Tool
Google Keyword Planner ToolGoogle Keyword Planner Tool
Google Keyword Planner Tool
 
Introduction to SEO
Introduction to SEOIntroduction to SEO
Introduction to SEO
 
WEB MINING.
WEB MINING.WEB MINING.
WEB MINING.
 
Applying web mining application for user behavior understanding
Applying web mining application for user behavior understandingApplying web mining application for user behavior understanding
Applying web mining application for user behavior understanding
 
Google Search Console
Google Search ConsoleGoogle Search Console
Google Search Console
 
Web Crawlers
Web CrawlersWeb Crawlers
Web Crawlers
 
Introduction to web analytics
Introduction to web analyticsIntroduction to web analytics
Introduction to web analytics
 
Search Engine Powerpoint
Search Engine  Powerpoint Search Engine  Powerpoint
Search Engine Powerpoint
 
Data mining on Social Media
Data mining on Social MediaData mining on Social Media
Data mining on Social Media
 
Google Analytics ppt
Google Analytics  pptGoogle Analytics  ppt
Google Analytics ppt
 
Search engines powerpoint
Search engines powerpointSearch engines powerpoint
Search engines powerpoint
 
Web Traffic Time Series Forecasting
Web Traffic  Time Series ForecastingWeb Traffic  Time Series Forecasting
Web Traffic Time Series Forecasting
 
Search engine Optimization,Advantages Of SEO, Benefits of Seo
Search engine Optimization,Advantages Of SEO, Benefits of SeoSearch engine Optimization,Advantages Of SEO, Benefits of Seo
Search engine Optimization,Advantages Of SEO, Benefits of Seo
 
Information Retrieval Fundamentals - An introduction
Information Retrieval Fundamentals - An introduction Information Retrieval Fundamentals - An introduction
Information Retrieval Fundamentals - An introduction
 
Collaborative Filtering 1: User-based CF
Collaborative Filtering 1: User-based CFCollaborative Filtering 1: User-based CF
Collaborative Filtering 1: User-based CF
 
Web mining
Web miningWeb mining
Web mining
 
Crypto wallets
Crypto walletsCrypto wallets
Crypto wallets
 
Evaluation in Information Retrieval
Evaluation in Information RetrievalEvaluation in Information Retrieval
Evaluation in Information Retrieval
 
Google Analytics 4 - Webinar (Smartup)
Google Analytics 4 - Webinar (Smartup)Google Analytics 4 - Webinar (Smartup)
Google Analytics 4 - Webinar (Smartup)
 

Viewers also liked

Google Adwords - Marketing Analysis
Google Adwords - Marketing AnalysisGoogle Adwords - Marketing Analysis
Google Adwords - Marketing AnalysisAniket Kalaskar
 
Amazon hidden empire
Amazon hidden empireAmazon hidden empire
Amazon hidden empirejuthanik
 
Introduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the PixelIntroduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the PixelWishpond
 
Online_Offline_infographic
Online_Offline_infographicOnline_Offline_infographic
Online_Offline_infographicJohn Haake
 
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...Unified
 
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...Intracto digital agency
 
Knowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertisingKnowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertisingLode Lauwers
 
The Cookie--Digital Story
The Cookie--Digital StoryThe Cookie--Digital Story
The Cookie--Digital StoryRob Jacklin
 
UK Cookie Law Compliance: Implications & Answers
 UK Cookie Law Compliance: Implications & Answers  UK Cookie Law Compliance: Implications & Answers
UK Cookie Law Compliance: Implications & Answers Ensighten
 
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...Invest Northern Ireland
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party CookiesWill Clayton
 
LUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Partners
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet CookiesRitika Barethia
 
The History of Advertising Technology
The History of Advertising TechnologyThe History of Advertising Technology
The History of Advertising TechnologyClearcode
 

Viewers also liked (17)

Google Adwords - Marketing Analysis
Google Adwords - Marketing AnalysisGoogle Adwords - Marketing Analysis
Google Adwords - Marketing Analysis
 
Amazon hidden empire
Amazon hidden empireAmazon hidden empire
Amazon hidden empire
 
Introduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the PixelIntroduction to Retargeting with Petey the Pixel
Introduction to Retargeting with Petey the Pixel
 
Online_Offline_infographic
Online_Offline_infographicOnline_Offline_infographic
Online_Offline_infographic
 
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
How Social Identities Are Outperforming Internet Cookies, And Why Marketers S...
 
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
The way the cookie crumbles: user tracking, personalisatie & integratie. Intr...
 
MMA Forum D2 Track 04 - Privacidade
MMA Forum D2 Track 04 - PrivacidadeMMA Forum D2 Track 04 - Privacidade
MMA Forum D2 Track 04 - Privacidade
 
Knowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertisingKnowledge sharing : Targeting in online advertising
Knowledge sharing : Targeting in online advertising
 
The Cookie--Digital Story
The Cookie--Digital StoryThe Cookie--Digital Story
The Cookie--Digital Story
 
UK Cookie Law Compliance: Implications & Answers
 UK Cookie Law Compliance: Implications & Answers  UK Cookie Law Compliance: Implications & Answers
UK Cookie Law Compliance: Implications & Answers
 
WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?WFA webinar: is the EU going to kill digital marketing?
WFA webinar: is the EU going to kill digital marketing?
 
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
Driving Online Sales - Ted Jenson, Big Ted’s Cookies, Taking advantage of opp...
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party Cookies
 
LUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the PeopleLUMA Digital Brief 010 - Power to the People
LUMA Digital Brief 010 - Power to the People
 
What is Retargeting?
What is Retargeting?What is Retargeting?
What is Retargeting?
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet Cookies
 
The History of Advertising Technology
The History of Advertising TechnologyThe History of Advertising Technology
The History of Advertising Technology
 

Similar to Cookies (in Online Advertising)

Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 EricZhuZhengyi
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookiesanita gouda
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakePiwik PRO
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to knowCrafted
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanismJivan Nepali
 
Cookies in php lecture 1
Cookies in php lecture 1Cookies in php lecture 1
Cookies in php lecture 1Mudasir Syed
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]yvonneschnurr
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentationNilu Desai
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessionsSukrit Gupta
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxMIsmail73
 
Cookie Policy Verfication Framework
Cookie Policy Verfication FrameworkCookie Policy Verfication Framework
Cookie Policy Verfication Frameworksitemorse
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookiesSimilarweb
 
What are cookies and what is changing
What are cookies and what is changingWhat are cookies and what is changing
What are cookies and what is changingDCRB
 

Similar to Cookies (in Online Advertising) (20)

Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s SakeWhat Is Evercookie and Why You Should Avoid It for Privacy’s Sake
What Is Evercookie and Why You Should Avoid It for Privacy’s Sake
 
Cookies
CookiesCookies
Cookies
 
EU cookie law - What you need to know
EU cookie law - What you need to knowEU cookie law - What you need to know
EU cookie law - What you need to know
 
Cookies: HTTP state management mechanism
Cookies: HTTP state management mechanismCookies: HTTP state management mechanism
Cookies: HTTP state management mechanism
 
Cookies in php lecture 1
Cookies in php lecture 1Cookies in php lecture 1
Cookies in php lecture 1
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]
 
Cookie replay attack unit wise presentation
Cookie replay attack  unit wise presentationCookie replay attack  unit wise presentation
Cookie replay attack unit wise presentation
 
Cookies and sessions
Cookies and sessionsCookies and sessions
Cookies and sessions
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 
Cookies
CookiesCookies
Cookies
 
Cookie Policy Verfication Framework
Cookie Policy Verfication FrameworkCookie Policy Verfication Framework
Cookie Policy Verfication Framework
 
Electronic computer cookies
Electronic computer cookiesElectronic computer cookies
Electronic computer cookies
 
What are cookies and what is changing
What are cookies and what is changingWhat are cookies and what is changing
What are cookies and what is changing
 

More from Vinay Shriyan, Certified ScrumMaster® (CSM)

More from Vinay Shriyan, Certified ScrumMaster® (CSM) (17)

How to sell anything to anybody - Joe Girard
How to sell anything to anybody - Joe GirardHow to sell anything to anybody - Joe Girard
How to sell anything to anybody - Joe Girard
 
Biography of a giant - Amazon.com
Biography of a giant - Amazon.comBiography of a giant - Amazon.com
Biography of a giant - Amazon.com
 
Giving Feedbacks (Management)
Giving Feedbacks (Management)Giving Feedbacks (Management)
Giving Feedbacks (Management)
 
HNI Selling - The Rolls Royce Case
HNI Selling  - The Rolls Royce CaseHNI Selling  - The Rolls Royce Case
HNI Selling - The Rolls Royce Case
 
Google Ad - Parisian Love
Google Ad - Parisian LoveGoogle Ad - Parisian Love
Google Ad - Parisian Love
 
Brand management Apple inc.
Brand management Apple inc.Brand management Apple inc.
Brand management Apple inc.
 
Brand management ICICI Bank
Brand management ICICI BankBrand management ICICI Bank
Brand management ICICI Bank
 
MIS and BPO (Avaya's solution)
MIS and BPO (Avaya's solution)MIS and BPO (Avaya's solution)
MIS and BPO (Avaya's solution)
 
Personality not included (Book concise)
Personality not included (Book concise)Personality not included (Book concise)
Personality not included (Book concise)
 
Personality not included (Book concise)
Personality not included (Book concise)Personality not included (Book concise)
Personality not included (Book concise)
 
Environment reporting (Starbucks case)
Environment reporting (Starbucks case)Environment reporting (Starbucks case)
Environment reporting (Starbucks case)
 
Snowball Sampling Using Social Networks to Research Non heterosexual Women
Snowball Sampling Using Social Networks to Research Non heterosexual WomenSnowball Sampling Using Social Networks to Research Non heterosexual Women
Snowball Sampling Using Social Networks to Research Non heterosexual Women
 
Environment ethics (brief)
Environment ethics (brief)Environment ethics (brief)
Environment ethics (brief)
 
Making a business(or any other ) presentation worth it
Making a business(or any other ) presentation worth itMaking a business(or any other ) presentation worth it
Making a business(or any other ) presentation worth it
 
Effect of demographics on consumer behavior
Effect of demographics on consumer behaviorEffect of demographics on consumer behavior
Effect of demographics on consumer behavior
 
Search engines, SEO and SEM
Search engines, SEO and SEMSearch engines, SEO and SEM
Search engines, SEO and SEM
 
Intro to Web Development
Intro to Web DevelopmentIntro to Web Development
Intro to Web Development
 

Recently uploaded

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 

Recently uploaded (20)

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

Cookies (in Online Advertising)