SlideShare a Scribd company logo
1 of 5
New media and security   Chendan  XU ID: n7360169 TUT: Friday 1pm
Security risk  Social media Social media web sites allow users to ,[object Object]
communicate with each other,
network
and interact but because of the easy transfer of information between different social media sites, information that should be private becomes public and opens the users to serious security risks.

More Related Content

What's hot

'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...
'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...
'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...Axel Bruns
 
Social Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationSocial Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationAxel Bruns
 
Social Media May 2009
Social Media May 2009Social Media May 2009
Social Media May 2009derekabdinor
 
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...Axel Bruns
 
Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...Scott A. Hale
 
From Cable Niche to Social Media Success: International Engagement with Sky N...
From Cable Niche to Social Media Success: International Engagement with Sky N...From Cable Niche to Social Media Success: International Engagement with Sky N...
From Cable Niche to Social Media Success: International Engagement with Sky N...Axel Bruns
 
Social Network Site personal use
Social Network Site personal useSocial Network Site personal use
Social Network Site personal useJennifer LeBeau
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 
Social Media Brownbag Presentation
Social Media Brownbag PresentationSocial Media Brownbag Presentation
Social Media Brownbag PresentationArlton Lowry
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesIJCNCJournal
 
Let’s get social tm speech presentation
Let’s get social tm speech presentationLet’s get social tm speech presentation
Let’s get social tm speech presentationaudragerger
 
Teaching with Social Media | Faculty Seminars at Michigan State University 2014
Teaching with Social Media | Faculty Seminars at Michigan State University 2014Teaching with Social Media | Faculty Seminars at Michigan State University 2014
Teaching with Social Media | Faculty Seminars at Michigan State University 2014Emily Brozovic
 
CityWeek presentation by Mark Jones
CityWeek presentation by Mark JonesCityWeek presentation by Mark Jones
CityWeek presentation by Mark JonesMark Jones
 
Social Media Best Practices
Social Media Best PracticesSocial Media Best Practices
Social Media Best PracticesEric Sheninger
 
2013 05 20 field_directors
2013 05 20 field_directors2013 05 20 field_directors
2013 05 20 field_directorsCliff Lampe
 
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...Axel Bruns
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
Crowdsourcing Investigative Journalism
Crowdsourcing Investigative JournalismCrowdsourcing Investigative Journalism
Crowdsourcing Investigative JournalismPaul Bradshaw
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickStefan Tanase
 

What's hot (20)

'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...
'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...
'Fake News' on Facebook: A Large-Scale Longitudinal Study of Problematic Link...
 
Social Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)informationSocial Media and the News: Approaches to the Spread of (Mis)information
Social Media and the News: Approaches to the Spread of (Mis)information
 
Social Media May 2009
Social Media May 2009Social Media May 2009
Social Media May 2009
 
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...
Covering Conspiracy: Mainstream and Fringe Reporting of the COVID/5G Conspira...
 
Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...
 
From Cable Niche to Social Media Success: International Engagement with Sky N...
From Cable Niche to Social Media Success: International Engagement with Sky N...From Cable Niche to Social Media Success: International Engagement with Sky N...
From Cable Niche to Social Media Success: International Engagement with Sky N...
 
Social Network Site personal use
Social Network Site personal useSocial Network Site personal use
Social Network Site personal use
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
Social Media Brownbag Presentation
Social Media Brownbag PresentationSocial Media Brownbag Presentation
Social Media Brownbag Presentation
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking Websites
 
Let’s get social tm speech presentation
Let’s get social tm speech presentationLet’s get social tm speech presentation
Let’s get social tm speech presentation
 
Teaching with Social Media | Faculty Seminars at Michigan State University 2014
Teaching with Social Media | Faculty Seminars at Michigan State University 2014Teaching with Social Media | Faculty Seminars at Michigan State University 2014
Teaching with Social Media | Faculty Seminars at Michigan State University 2014
 
Social media
Social mediaSocial media
Social media
 
CityWeek presentation by Mark Jones
CityWeek presentation by Mark JonesCityWeek presentation by Mark Jones
CityWeek presentation by Mark Jones
 
Social Media Best Practices
Social Media Best PracticesSocial Media Best Practices
Social Media Best Practices
 
2013 05 20 field_directors
2013 05 20 field_directors2013 05 20 field_directors
2013 05 20 field_directors
 
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...
Sharing, Spamming, Sockpuppeting: Comparing the Twitter Dissemination Careers...
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Crowdsourcing Investigative Journalism
Crowdsourcing Investigative JournalismCrowdsourcing Investigative Journalism
Crowdsourcing Investigative Journalism
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 

Viewers also liked

Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLucy Shop
 
00.水域安全與救生 目錄
00.水域安全與救生 目錄00.水域安全與救生 目錄
00.水域安全與救生 目錄Wen-Hsien SU
 
How to kill your product
How to kill your productHow to kill your product
How to kill your productVineet Markan
 
Pluto7 meetup -silicon valley - 2015 version3
Pluto7    meetup -silicon valley -  2015 version3Pluto7    meetup -silicon valley -  2015 version3
Pluto7 meetup -silicon valley - 2015 version3Manju Devadas
 
Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLucy Shop
 
Pluto7 - Vizualization and BI Trends and Best Practices 2015
Pluto7   - Vizualization and BI Trends and Best Practices 2015Pluto7   - Vizualization and BI Trends and Best Practices 2015
Pluto7 - Vizualization and BI Trends and Best Practices 2015Manju Devadas
 
Future of Work and Birch
Future of Work and BirchFuture of Work and Birch
Future of Work and BirchVineet Markan
 
TweetUp presentation
TweetUp presentationTweetUp presentation
TweetUp presentationKanna Taylor
 
Lời hứa anh và em
Lời hứa anh và emLời hứa anh và em
Lời hứa anh và emLucy Shop
 
Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLucy Shop
 
第二次讀書會活動流程簡報
第二次讀書會活動流程簡報第二次讀書會活動流程簡報
第二次讀書會活動流程簡報Wen-Hsien SU
 
創意發想 I travel
創意發想   I travel創意發想   I travel
創意發想 I travelWen-Hsien SU
 
Pluto7 - Tableau Webinar on enabling Organization to be Data Driven in 201...
Pluto7   -  Tableau Webinar on enabling Organization to be Data Driven in 201...Pluto7   -  Tableau Webinar on enabling Organization to be Data Driven in 201...
Pluto7 - Tableau Webinar on enabling Organization to be Data Driven in 201...Manju Devadas
 

Viewers also liked (17)

Circuit Simplifier
Circuit SimplifierCircuit Simplifier
Circuit Simplifier
 
Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàng
 
00.水域安全與救生 目錄
00.水域安全與救生 目錄00.水域安全與救生 目錄
00.水域安全與救生 目錄
 
How to kill your product
How to kill your productHow to kill your product
How to kill your product
 
Pluto7 meetup v2
Pluto7    meetup v2Pluto7    meetup v2
Pluto7 meetup v2
 
Pluto7 meetup -silicon valley - 2015 version3
Pluto7    meetup -silicon valley -  2015 version3Pluto7    meetup -silicon valley -  2015 version3
Pluto7 meetup -silicon valley - 2015 version3
 
Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàng
 
Pluto7 - Vizualization and BI Trends and Best Practices 2015
Pluto7   - Vizualization and BI Trends and Best Practices 2015Pluto7   - Vizualization and BI Trends and Best Practices 2015
Pluto7 - Vizualization and BI Trends and Best Practices 2015
 
Future of Work and Birch
Future of Work and BirchFuture of Work and Birch
Future of Work and Birch
 
TweetUp presentation
TweetUp presentationTweetUp presentation
TweetUp presentation
 
Lời hứa anh và em
Lời hứa anh và emLời hứa anh và em
Lời hứa anh và em
 
Lời hứa không đến dễ dàng
Lời hứa không đến dễ dàngLời hứa không đến dễ dàng
Lời hứa không đến dễ dàng
 
Storyboard 研究
Storyboard 研究Storyboard 研究
Storyboard 研究
 
第二次讀書會活動流程簡報
第二次讀書會活動流程簡報第二次讀書會活動流程簡報
第二次讀書會活動流程簡報
 
創意發想 I travel
創意發想   I travel創意發想   I travel
創意發想 I travel
 
Pluto7 - Tableau Webinar on enabling Organization to be Data Driven in 201...
Pluto7   -  Tableau Webinar on enabling Organization to be Data Driven in 201...Pluto7   -  Tableau Webinar on enabling Organization to be Data Driven in 201...
Pluto7 - Tableau Webinar on enabling Organization to be Data Driven in 201...
 
Start the f **k up
Start the f **k upStart the f **k up
Start the f **k up
 

Similar to Kcb207

PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...ijwscjournal
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...ijwscjournal
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationshipsElizabeth Gestier
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Social media visualization for crisis management
Social media visualization for crisis managementSocial media visualization for crisis management
Social media visualization for crisis managementMustafa Alkhunni
 
A Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesA Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesIOSR Journals
 
Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)rhonabwy
 
Masters Thesis Project
Masters Thesis ProjectMasters Thesis Project
Masters Thesis ProjectDaniel Moran
 
Social Media Guidelines for INC Journalists
Social Media Guidelines for INC Journalists Social Media Guidelines for INC Journalists
Social Media Guidelines for INC Journalists Daniel Moran
 
Slides
SlidesSlides
Slidesrkc20
 
Social networking-overview
Social networking-overviewSocial networking-overview
Social networking-overviewsakshicherry
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt Sudhanshu Sandhir
 

Similar to Kcb207 (20)

PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Suciu et al_ ro_edunet_2015
Suciu et al_ ro_edunet_2015Suciu et al_ ro_edunet_2015
Suciu et al_ ro_edunet_2015
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationships
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social media visualization for crisis management
Social media visualization for crisis managementSocial media visualization for crisis management
Social media visualization for crisis management
 
A Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesA Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking Sites
 
Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)Social Networking (UA Campus Communicators)
Social Networking (UA Campus Communicators)
 
Masters Thesis Project
Masters Thesis ProjectMasters Thesis Project
Masters Thesis Project
 
Social Media Guidelines for INC Journalists
Social Media Guidelines for INC Journalists Social Media Guidelines for INC Journalists
Social Media Guidelines for INC Journalists
 
Slides
SlidesSlides
Slides
 
Social networking-overview
Social networking-overviewSocial networking-overview
Social networking-overview
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Kcb207