SlideShare a Scribd company logo
1 of 36
Knowledge Management Using Enterprise 2.0 Group Charlie Kyle Mathews  Ryan French Greg Knight Westin Hatch Casey Jackman
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
Description of Enterprise 2.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Description of Enterprise 2.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intelligence Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intelligence Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intelligence Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intelligence Management ,[object Object],[object Object],[object Object],[object Object],[object Object],Resistance from middle management:
Micro Sharing ,[object Object],[object Object]
Micro Sharing, Macro Results “ These tools directly contribute to knowledge capture and management as workforces are scaled back and baby boomers retire, and they boost motivation and retention, especially among millennial generation employees.”   -Micro Sharing, Macro Results
Micro Sharing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BYU and Yammer “ I learned more about my boss in one day reading his yammers than in one month working with him”   “ I saw what he was working on, I got the inside scoop on what was going” -Julia Graden
Yammer
Yammer “ People complain about hierarchies, which is basically just abstraction” Kelly Flanagan, CIO BYU
 
Web Communities What is the difference between a web community and an online forum?
WebWise ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Web Communities
WebWise ,[object Object],[object Object],Web Communities Web Communities
Business Benefits ,[object Object],[object Object],[object Object],Web Communities
Costs Web Communities
World changing faster and faster  
Competition increasingly fierce
America is losing its edge
Easy comfortable jobs disappearing
The only sustainable edge is innovation
Get better faster
Learn faster
Enterprise 2.0 helps organizations learn faster
React more quickly
Enterprise 2.0 = "Collaboration on Demand"
Find people & information to solve problem
Solved problems are commodities
Solve problems others aren't

More Related Content

What's hot

Hands On Social Bookmarking
Hands On Social BookmarkingHands On Social Bookmarking
Hands On Social Bookmarkingkbussert
 
Social network structures in online communities.pptx
Social network structures in online communities.pptxSocial network structures in online communities.pptx
Social network structures in online communities.pptxSreyoshi Dey
 
Cmc, diffusion and social theories
Cmc, diffusion and social theoriesCmc, diffusion and social theories
Cmc, diffusion and social theoriesTajanik Oliver
 
“Creating a Global Movement for Changemaking: Fulbright and Beyond”
“Creating a Global Movement for Changemaking: Fulbright and Beyond”“Creating a Global Movement for Changemaking: Fulbright and Beyond”
“Creating a Global Movement for Changemaking: Fulbright and Beyond”Kara Andrade
 
Dc digital engagement
Dc digital engagementDc digital engagement
Dc digital engagementMat Morgan
 
Social Strategies For Revolutionaries
Social Strategies For RevolutionariesSocial Strategies For Revolutionaries
Social Strategies For RevolutionariesCharlene Li
 
Social network 2 (1)
Social network 2 (1)Social network 2 (1)
Social network 2 (1)Aman Raj
 
Developing Adventism In And Through Social Networks
Developing Adventism In And Through Social NetworksDeveloping Adventism In And Through Social Networks
Developing Adventism In And Through Social Networksleftsider
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
The Future Of Social Networks
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social NetworksCharlene Li
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksCharlene Li
 
Microsoft Power Point Lib1 #1262264 V1 Social Networking
Microsoft Power Point   Lib1 #1262264 V1 Social NetworkingMicrosoft Power Point   Lib1 #1262264 V1 Social Networking
Microsoft Power Point Lib1 #1262264 V1 Social Networkingtmdomish
 
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...Carlos Laorden
 
Social media and knowledge management (in English)
Social media and knowledge management (in English)Social media and knowledge management (in English)
Social media and knowledge management (in English)Datheon
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak dataMary Aviles
 
Getting Started with business social networking
Getting Started with business social networkingGetting Started with business social networking
Getting Started with business social networkingLee Bryant
 
Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1Ram Srivastava
 
Framework for cybersecurity info sharing
Framework for cybersecurity info sharingFramework for cybersecurity info sharing
Framework for cybersecurity info sharingRoy Ramkrishna
 

What's hot (20)

Hands On Social Bookmarking
Hands On Social BookmarkingHands On Social Bookmarking
Hands On Social Bookmarking
 
Social network structures in online communities.pptx
Social network structures in online communities.pptxSocial network structures in online communities.pptx
Social network structures in online communities.pptx
 
Cmc, diffusion and social theories
Cmc, diffusion and social theoriesCmc, diffusion and social theories
Cmc, diffusion and social theories
 
“Creating a Global Movement for Changemaking: Fulbright and Beyond”
“Creating a Global Movement for Changemaking: Fulbright and Beyond”“Creating a Global Movement for Changemaking: Fulbright and Beyond”
“Creating a Global Movement for Changemaking: Fulbright and Beyond”
 
Dc digital engagement
Dc digital engagementDc digital engagement
Dc digital engagement
 
Social Strategies For Revolutionaries
Social Strategies For RevolutionariesSocial Strategies For Revolutionaries
Social Strategies For Revolutionaries
 
Social network 2 (1)
Social network 2 (1)Social network 2 (1)
Social network 2 (1)
 
Developing Adventism In And Through Social Networks
Developing Adventism In And Through Social NetworksDeveloping Adventism In And Through Social Networks
Developing Adventism In And Through Social Networks
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Esecurity e202
Esecurity e202Esecurity e202
Esecurity e202
 
The Future Of Social Networks
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social Networks
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social Networks
 
Microsoft Power Point Lib1 #1262264 V1 Social Networking
Microsoft Power Point   Lib1 #1262264 V1 Social NetworkingMicrosoft Power Point   Lib1 #1262264 V1 Social Networking
Microsoft Power Point Lib1 #1262264 V1 Social Networking
 
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
 
Social media and knowledge management (in English)
Social media and knowledge management (in English)Social media and knowledge management (in English)
Social media and knowledge management (in English)
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
How fluently do you speak data
How fluently do you speak dataHow fluently do you speak data
How fluently do you speak data
 
Getting Started with business social networking
Getting Started with business social networkingGetting Started with business social networking
Getting Started with business social networking
 
Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1Inter Lab06 Bebo White 1
Inter Lab06 Bebo White 1
 
Framework for cybersecurity info sharing
Framework for cybersecurity info sharingFramework for cybersecurity info sharing
Framework for cybersecurity info sharing
 

Viewers also liked

Ven World Irish Folk Music
Ven World Irish Folk MusicVen World Irish Folk Music
Ven World Irish Folk Musicjglasshouse
 
The Brand Is Dead: Long Live the Brand
The Brand Is Dead: Long Live the BrandThe Brand Is Dead: Long Live the Brand
The Brand Is Dead: Long Live the BrandMatthew Thompson
 
If U Dont Want To Be Ill - Speak
If U Dont Want To Be Ill - SpeakIf U Dont Want To Be Ill - Speak
If U Dont Want To Be Ill - Speakryrota
 
Digitalis Design - Mobile App Design (hun)
Digitalis Design - Mobile App Design (hun)Digitalis Design - Mobile App Design (hun)
Digitalis Design - Mobile App Design (hun)Milan Korsos
 
Small and medium-sized busineses' funding
Small and medium-sized busineses' fundingSmall and medium-sized busineses' funding
Small and medium-sized busineses' fundingFrozovsky
 
Baker HIMSS Staffers Final
Baker HIMSS Staffers FinalBaker HIMSS Staffers Final
Baker HIMSS Staffers Finalbakerdb
 
Moestuinier Wim Lybaert kan ook winst oogsten
Moestuinier Wim Lybaert kan ook winst oogstenMoestuinier Wim Lybaert kan ook winst oogsten
Moestuinier Wim Lybaert kan ook winst oogstenThierry Debels
 
Future-of-wearable-computing
Future-of-wearable-computingFuture-of-wearable-computing
Future-of-wearable-computingHessel van Tuinen
 
Sabbath School Lesson - March 6-12
Sabbath School Lesson - March 6-12Sabbath School Lesson - March 6-12
Sabbath School Lesson - March 6-12ryrota
 
Taklimat r trg draf 4 tkini
Taklimat r trg draf 4 tkiniTaklimat r trg draf 4 tkini
Taklimat r trg draf 4 tkinicukasuam
 
A Magical Miniature World By Vyacheslav Mishchenko
A Magical Miniature World By Vyacheslav MishchenkoA Magical Miniature World By Vyacheslav Mishchenko
A Magical Miniature World By Vyacheslav Mishchenkoguimera
 
Distributed Heterogeneous Mixture Learning On Spark
Distributed Heterogeneous Mixture Learning On SparkDistributed Heterogeneous Mixture Learning On Spark
Distributed Heterogeneous Mixture Learning On SparkSpark Summit
 
Yogurt: Pick This Multipurpose Snack and Meal [INFOGRAPHIC]
Yogurt: Pick This Multipurpose Snack and Meal [INFOGRAPHIC]Yogurt: Pick This Multipurpose Snack and Meal [INFOGRAPHIC]
Yogurt: Pick This Multipurpose Snack and Meal [INFOGRAPHIC]Food Insight
 
Entrepreneurial opportunities nicoleta litoiu upb_crebus 2012
Entrepreneurial opportunities nicoleta litoiu upb_crebus 2012Entrepreneurial opportunities nicoleta litoiu upb_crebus 2012
Entrepreneurial opportunities nicoleta litoiu upb_crebus 2012crebusproject
 
Science fiction in films and how we design the future - Matthew McGriskin
Science fiction in films and how we design the future - Matthew McGriskinScience fiction in films and how we design the future - Matthew McGriskin
Science fiction in films and how we design the future - Matthew McGriskinUXPA UK
 

Viewers also liked (20)

FOCUS quotes
FOCUS quotesFOCUS quotes
FOCUS quotes
 
Ven World Irish Folk Music
Ven World Irish Folk MusicVen World Irish Folk Music
Ven World Irish Folk Music
 
2012 Taiwan UX Summit 專題演講(四)簡報
2012 Taiwan UX Summit 專題演講(四)簡報2012 Taiwan UX Summit 專題演講(四)簡報
2012 Taiwan UX Summit 專題演講(四)簡報
 
The Brand Is Dead: Long Live the Brand
The Brand Is Dead: Long Live the BrandThe Brand Is Dead: Long Live the Brand
The Brand Is Dead: Long Live the Brand
 
If U Dont Want To Be Ill - Speak
If U Dont Want To Be Ill - SpeakIf U Dont Want To Be Ill - Speak
If U Dont Want To Be Ill - Speak
 
Digitalis Design - Mobile App Design (hun)
Digitalis Design - Mobile App Design (hun)Digitalis Design - Mobile App Design (hun)
Digitalis Design - Mobile App Design (hun)
 
Small and medium-sized busineses' funding
Small and medium-sized busineses' fundingSmall and medium-sized busineses' funding
Small and medium-sized busineses' funding
 
Baker HIMSS Staffers Final
Baker HIMSS Staffers FinalBaker HIMSS Staffers Final
Baker HIMSS Staffers Final
 
Moestuinier Wim Lybaert kan ook winst oogsten
Moestuinier Wim Lybaert kan ook winst oogstenMoestuinier Wim Lybaert kan ook winst oogsten
Moestuinier Wim Lybaert kan ook winst oogsten
 
Future-of-wearable-computing
Future-of-wearable-computingFuture-of-wearable-computing
Future-of-wearable-computing
 
Sabbath School Lesson - March 6-12
Sabbath School Lesson - March 6-12Sabbath School Lesson - March 6-12
Sabbath School Lesson - March 6-12
 
Taklimat r trg draf 4 tkini
Taklimat r trg draf 4 tkiniTaklimat r trg draf 4 tkini
Taklimat r trg draf 4 tkini
 
A Magical Miniature World By Vyacheslav Mishchenko
A Magical Miniature World By Vyacheslav MishchenkoA Magical Miniature World By Vyacheslav Mishchenko
A Magical Miniature World By Vyacheslav Mishchenko
 
Kotoba te
Kotoba teKotoba te
Kotoba te
 
Distributed Heterogeneous Mixture Learning On Spark
Distributed Heterogeneous Mixture Learning On SparkDistributed Heterogeneous Mixture Learning On Spark
Distributed Heterogeneous Mixture Learning On Spark
 
Temporitmika 5 3
Temporitmika 5 3Temporitmika 5 3
Temporitmika 5 3
 
Yogurt: Pick This Multipurpose Snack and Meal [INFOGRAPHIC]
Yogurt: Pick This Multipurpose Snack and Meal [INFOGRAPHIC]Yogurt: Pick This Multipurpose Snack and Meal [INFOGRAPHIC]
Yogurt: Pick This Multipurpose Snack and Meal [INFOGRAPHIC]
 
Entrepreneurial opportunities nicoleta litoiu upb_crebus 2012
Entrepreneurial opportunities nicoleta litoiu upb_crebus 2012Entrepreneurial opportunities nicoleta litoiu upb_crebus 2012
Entrepreneurial opportunities nicoleta litoiu upb_crebus 2012
 
Boost.Study 14 Opening
Boost.Study 14 OpeningBoost.Study 14 Opening
Boost.Study 14 Opening
 
Science fiction in films and how we design the future - Matthew McGriskin
Science fiction in films and how we design the future - Matthew McGriskinScience fiction in films and how we design the future - Matthew McGriskin
Science fiction in films and how we design the future - Matthew McGriskin
 

Similar to Enterprise 2.0

Harnessing Collective Intelligence: Shifting Power To The Edge
Harnessing  Collective Intelligence: Shifting Power To The EdgeHarnessing  Collective Intelligence: Shifting Power To The Edge
Harnessing Collective Intelligence: Shifting Power To The EdgeMike Gotta
 
Social Media for the Government
Social Media for the GovernmentSocial Media for the Government
Social Media for the GovernmentKady Chiu
 
Asq Worcester Network Power Public
Asq Worcester Network Power PublicAsq Worcester Network Power Public
Asq Worcester Network Power PublicMaya Townsend
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleMike Gotta
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Managementguestc9f21b
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentJonathan Sinclair
 
Net Effectiveness April7
Net Effectiveness April7Net Effectiveness April7
Net Effectiveness April7dianascearce
 
Strategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital businessStrategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital businessMarco Brambilla
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
Running head RESPONSE .docx
Running head RESPONSE                              .docxRunning head RESPONSE                              .docx
Running head RESPONSE .docxtoltonkendal
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalKannan Subbiah
 
Net Effectiveness Oct 6
Net Effectiveness Oct 6Net Effectiveness Oct 6
Net Effectiveness Oct 6dianascearce
 
Network effectiveness presentation materials
Network effectiveness presentation materialsNetwork effectiveness presentation materials
Network effectiveness presentation materialsguestb12b087
 
LinkedIn Tips For The Biotech Professional
LinkedIn Tips For The Biotech ProfessionalLinkedIn Tips For The Biotech Professional
LinkedIn Tips For The Biotech ProfessionalLinkedIn
 

Similar to Enterprise 2.0 (20)

Harnessing Collective Intelligence: Shifting Power To The Edge
Harnessing  Collective Intelligence: Shifting Power To The EdgeHarnessing  Collective Intelligence: Shifting Power To The Edge
Harnessing Collective Intelligence: Shifting Power To The Edge
 
Social Media for the Government
Social Media for the GovernmentSocial Media for the Government
Social Media for the Government
 
What I Did
What I DidWhat I Did
What I Did
 
Asq Worcester Network Power Public
Asq Worcester Network Power PublicAsq Worcester Network Power Public
Asq Worcester Network Power Public
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
STC Wikinomics
STC WikinomicsSTC Wikinomics
STC Wikinomics
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
 
Net Effectiveness April7
Net Effectiveness April7Net Effectiveness April7
Net Effectiveness April7
 
Thom’s top ten
Thom’s top tenThom’s top ten
Thom’s top ten
 
Strategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital businessStrategic scenarios in digital content and digital business
Strategic scenarios in digital content and digital business
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
New Rules New Tools
New Rules New ToolsNew Rules New Tools
New Rules New Tools
 
Running head RESPONSE .docx
Running head RESPONSE                              .docxRunning head RESPONSE                              .docx
Running head RESPONSE .docx
 
Is It Really Free
Is It Really FreeIs It Really Free
Is It Really Free
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 
Net Effectiveness Oct 6
Net Effectiveness Oct 6Net Effectiveness Oct 6
Net Effectiveness Oct 6
 
Network effectiveness presentation materials
Network effectiveness presentation materialsNetwork effectiveness presentation materials
Network effectiveness presentation materials
 
LinkedIn Tips For The Biotech Professional
LinkedIn Tips For The Biotech ProfessionalLinkedIn Tips For The Biotech Professional
LinkedIn Tips For The Biotech Professional
 

More from Kyle Mathews

Presentation on Gatsby to SF Static Web Tech Meetup
Presentation on Gatsby to SF Static Web Tech MeetupPresentation on Gatsby to SF Static Web Tech Meetup
Presentation on Gatsby to SF Static Web Tech MeetupKyle Mathews
 
Eduglu presentation at TTIX
Eduglu presentation at TTIXEduglu presentation at TTIX
Eduglu presentation at TTIXKyle Mathews
 
Presentation on Eduglu from Drupalcon SF
Presentation on Eduglu from Drupalcon SFPresentation on Eduglu from Drupalcon SF
Presentation on Eduglu from Drupalcon SFKyle Mathews
 
Designing and using group software through patterns
Designing and using group software through patternsDesigning and using group software through patterns
Designing and using group software through patternsKyle Mathews
 
Drupal Training#2 Cck Views
Drupal Training#2 Cck ViewsDrupal Training#2 Cck Views
Drupal Training#2 Cck ViewsKyle Mathews
 
Drupal Training #1
Drupal Training #1Drupal Training #1
Drupal Training #1Kyle Mathews
 
Building Social Networks in the University -- Ignite Salt Lake 2
Building Social Networks in the University -- Ignite Salt Lake 2Building Social Networks in the University -- Ignite Salt Lake 2
Building Social Networks in the University -- Ignite Salt Lake 2Kyle Mathews
 
Drupalcon Dc Presentation
Drupalcon Dc PresentationDrupalcon Dc Presentation
Drupalcon Dc PresentationKyle Mathews
 
Linux Backup System using rsync, tar, gzip
Linux Backup System using rsync, tar, gzipLinux Backup System using rsync, tar, gzip
Linux Backup System using rsync, tar, gzipKyle Mathews
 
Chapter 4 - Light the Fire
Chapter 4 - Light the FireChapter 4 - Light the Fire
Chapter 4 - Light the FireKyle Mathews
 
Chapter 4 - Light the Fire
Chapter 4 - Light the FireChapter 4 - Light the Fire
Chapter 4 - Light the FireKyle Mathews
 

More from Kyle Mathews (11)

Presentation on Gatsby to SF Static Web Tech Meetup
Presentation on Gatsby to SF Static Web Tech MeetupPresentation on Gatsby to SF Static Web Tech Meetup
Presentation on Gatsby to SF Static Web Tech Meetup
 
Eduglu presentation at TTIX
Eduglu presentation at TTIXEduglu presentation at TTIX
Eduglu presentation at TTIX
 
Presentation on Eduglu from Drupalcon SF
Presentation on Eduglu from Drupalcon SFPresentation on Eduglu from Drupalcon SF
Presentation on Eduglu from Drupalcon SF
 
Designing and using group software through patterns
Designing and using group software through patternsDesigning and using group software through patterns
Designing and using group software through patterns
 
Drupal Training#2 Cck Views
Drupal Training#2 Cck ViewsDrupal Training#2 Cck Views
Drupal Training#2 Cck Views
 
Drupal Training #1
Drupal Training #1Drupal Training #1
Drupal Training #1
 
Building Social Networks in the University -- Ignite Salt Lake 2
Building Social Networks in the University -- Ignite Salt Lake 2Building Social Networks in the University -- Ignite Salt Lake 2
Building Social Networks in the University -- Ignite Salt Lake 2
 
Drupalcon Dc Presentation
Drupalcon Dc PresentationDrupalcon Dc Presentation
Drupalcon Dc Presentation
 
Linux Backup System using rsync, tar, gzip
Linux Backup System using rsync, tar, gzipLinux Backup System using rsync, tar, gzip
Linux Backup System using rsync, tar, gzip
 
Chapter 4 - Light the Fire
Chapter 4 - Light the FireChapter 4 - Light the Fire
Chapter 4 - Light the Fire
 
Chapter 4 - Light the Fire
Chapter 4 - Light the FireChapter 4 - Light the Fire
Chapter 4 - Light the Fire
 

Recently uploaded

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Enterprise 2.0