SlideShare uma empresa Scribd logo
1 de 89
Baixar para ler offline
Social media
is okay —
jeopardizing
security isn’t
I am Jordan Wollman
Executive Creative Director & Partner @ Aria
I’m 28
years old
(although my wife
may beg to differ)
I’m married to
     a fantastic
photographer:
        Briana
I have a
one-month
old daughter:
Remy
I generally talk about
  design, marketing,
    social media,
  music and movies
I have 357 followers on
   Twitter, 401 friends on
    Facebook, and 241
connections on LinkedIn
I love Star Wars
Some people call me Jedi Master
I am a Husband,
        Father,
      Advertiser,
  Avid snowboarder,
   Wine enthusiast,
Social media navigator.
You can find me on   Twitter, Facebook,
                     LinkedIn, Google+,
                     Behance, About.me,
                     Wordpress, projeqt, Virb,
                     Spotify, Vimeo, YouTube,
                     Last.fm, Pandora,
                     Delicious, Tumblr, Flickr,
                     Gowalla, Foursquare,
                     Klout, Ping.fm
                     ...
All that information,
and a lot more, you can find on

Facebook
A digital agency —
   we design the
experience of brands.
We design the
     experience of brands...
In one of many ways, online and
     through social media
Ihere?
        am
 o, why
S
    Let’s talk
    Social Media
Why should
 you care
about Social
  Media?
In 2011

  110 billion
minutes were
spent on social
  networks &
    blogs       [Source: Nielsen]
In 2011

          has 500
 million users.
That’s 1 in every
 13 people on
      earth.
In 2011

55 million
tweets are
 published
 each day
In 2011

300,000
users join
each day
In 2011




exceeds
2 billion
 views
each day
In 2011
  On the professional side,

        has
 over 100
million users
world wide
In 2011
  On the professional side,

 And a new
  user joins
every second
  of the day
Those are
your clients...
And they’re
  talking
about you.
It’s about the
disproportionate
    power of 1

    says my true reach is 270
     klout.com/#/jordanwollman
Yeah. Yeah. Yeah.
But is it safe?
In a lot of ways, yes.


In others...?
It’s the
 wild, wild west.
The rules are being
written in real-time.
Two sides to the safety coin:
1) Your personal safety
2) Your client’s safety
then
Okay

 Let’s look at a
 few case studies
@PrincessTweep
asks to be robbed,
and gets... robbed
Social Media is Okay - Jeopardizing Security Isn't
“Well, I was ‘checking in’ on Foursquare all over
town today. I know it’s risky — but I lost one of
my mayorships last week and I’m not going to
      let that happen again.” said Tweep.
“A new website called PleaseRobMe.com
does nothing more than aggregate publicly
shared check-ins, but its name and purpose
attempt to shed more light on the dangerous
      side effects of location-sharing.”


                    via
“Many of us location-sharers get so caught
 up in the novelty and bonuses associated
    with our behavior that we forget the
         implications of our actions.”



                    via
“Some law enforcement agencies are referring
   to check-ins as recent empty homes”




                     via
✓   Foursquare
                ✓
Tools you       ✓
                    Gowalla
                    Loopt
willingly       ✓
                ✓
                    Google Buzz
                    Google+
check in with   ✓   Facebook
                ✓   Twitter
✓ Transit swipe-cards
              ✓
Things that   ✓
                Swipe cards for doors
                Electronic tolling (TollTag)
track your    ✓
              ✓
                Cellphones
                Location searches on
location        your PDA
              ✓ Free Wi-Fi
passively     ✓ Parking meters you call to
                add money



                                 [Source: eff.org]
Creepy: cree.py
is an application that allows you
to gather geolocation related
information about users from
social networking platforms
and image hosting services.
Hackers hacking
 July, 2011: AntiSec claimed credit for the
Booz Allen hack. It published a list of 90,000
military e-mail addresses, apparently stolen
          from Booz Allen's systems.



                      via
London fights back at RIM

 August, 2011: In the wake of ongoing riots in
   London, Blackberry maker Research in
  Motion’s website was hacked on Tuesday.




                      via
London fights back at RIM

“No Blackberry you will NOT assist the police,”
 wrote one hacker on a Research in Motion blog”
Social networking sites leak
   personal information
     ...a new study has found, raising the
   possibility that users of such sites can be
      tracked everywhere they go online




                       via
Social networking sites leak
   personal information
The study looked at twelve social networking sites:
 Bebo, Digg, Facebook, Friendster, Hi5, Imeem,
 LinkedIn, LiveJournal, MySpace, Orkut, Twitter,
                   and Xanga



                        via
Social networking sites leak
   personal information
   "Not only do they know where I'm visiting,
     they know who I am," said Wills. "And
              that's disconcerting."




                       via
Social networking sites leak
   personal information
    The report found that between 55%
    and 90% of users keep the default
            privacy settings




                   via
Can it be dangerous? Yes.




But the time is now!
Keeping
yourself safe
Privacy
Settings
Get to know who can and
can’t see your information
it
             e t!,
            e i
           s e
          n ar
     y  a h
     Privacy
       c s
    e n
  th Settings
If y ca
 theGet to know who can and
    can’t see your information
Photo by Jennifer Daniel




                           Only friend
                           friends
                           It’s not a popularity contest
                           Facebook will cap you at 5,001 anyway
Checking-in
 is okay...
  But do it as you leave,
    not as you arrive
Don’t check-in
  at home
    And don’t let your
    friends do it either
Frank
                                  Annie




 Photo-tagging
        Is generally associated
           with Geo-Tagging
Keeping your
 clients safe
Have a plan
     Know the dangers & pitfalls
     before you start out
State your terms
of use clearly
And report violators
to Facebook, Twitter,
YouTube, etc.
Don’t feed
 the trolls
 The only want to incite riot
— just report, then ignore them
Choose
a partner
   Maximize opportunity
   & avoid pitfalls
If not, choose
  a good tool
Verify
 age
 Well... do what you can.
Asking for check-
   ins is risky

     Make sure your clients
    are aware of the dangers
ASL
Don’t ask for, or require
 Age, Sex, Location
Moderate the
conversation
It’s okay to delete other’s comments,
or use profanity filtering
It may be risky,
   but go forth
 and conquer!
Because
✓ Over 50% of the       ✓ If Facebook were a
  world is under 30       country it would be
                          the world’s 3rd
✓ In 10 years over        largest and 2x the
  40% of the Fortune      size of the U.S.
  500 won’t be here
                        ✓ 2009 study revealed
✓ Facebook tops           that online students
  Google for weekly       out performed those
  traffic in the U.S.     receiving face-to-
                          face instruction
Where your
audience is
  hiding
There’s plenty of
info out there on
  the big boys
The new kid on the block
A total mystery to marketers:
they aren’t playing by the rules!
Google+ is about individuals
     — not businesses,
 organizations, corporations
Individuals
    are
 authentic
Individuals
    are
  flawed
Individuals
    are
interesting
Individuals
    are
identifiable
Who’s
done it
right?
Social Media is Okay - Jeopardizing Security Isn't
Until...
Social Media is Okay - Jeopardizing Security Isn't
That’s Fabio!
That’s Fabio!


No... really!
Individuals
    are
 willing to
advocate a
good cause
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Conclusion
✓ Brave it... the       ✓ Be authentic.
  time is now!            That’s what the
                          ever-growing 50%,
✓ It may be               under 30
  dangerous, but          population wants
  with a little           from brands
  common sense,
  it’s worth the
  investment and risk
And remember.
What happens in
Vegas...

...stays on Facebook,
YouTube, and Flickr
Q&A
w ariaagency.com
t @jordanwollman
f /jordanwollman

Mais conteúdo relacionado

Mais procurados

Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentationsahrdebeck52
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Michelle Ferrier
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints PresentationProjectsByJen.com
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet SafetyJessica Punke
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
 
Fys social media explosion1
Fys social media explosion1Fys social media explosion1
Fys social media explosion1kayleebreeann
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comeducatedcommuni79
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonJohn Florentino E Echon
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Jim Adler
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineHolly Solomon
 
Paul muller flip book 2jun17
Paul muller flip book 2jun17Paul muller flip book 2jun17
Paul muller flip book 2jun17Paul Muller
 
Presentation
PresentationPresentation
PresentationLHSICT
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital FootprintsEric Cole
 
Digital footprints final
Digital footprints finalDigital footprints final
Digital footprints finalseanclimbs
 

Mais procurados (20)

Digital Footprint
Digital Footprint  Digital Footprint
Digital Footprint
 
Davy Lunch & Learn
Davy Lunch & LearnDavy Lunch & Learn
Davy Lunch & Learn
 
Web pp
Web ppWeb pp
Web pp
 
Digital footprint presentation
Digital footprint presentationDigital footprint presentation
Digital footprint presentation
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Digital Footprints Presentation
Digital Footprints PresentationDigital Footprints Presentation
Digital Footprints Presentation
 
The Truth About Internet Safety
The Truth About Internet SafetyThe Truth About Internet Safety
The Truth About Internet Safety
 
What Parents Should Know
What Parents Should KnowWhat Parents Should Know
What Parents Should Know
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 
Fys social media explosion1
Fys social media explosion1Fys social media explosion1
Fys social media explosion1
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.com
 
Where does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane AbdonWhere does cyberbullying occur? by Francis Jane Abdon
Where does cyberbullying occur? by Francis Jane Abdon
 
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
Confessions of a “Recovering” Data Broker: Responsible Innovation in the Age ...
 
Social Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe OnlineSocial Media Training for Parents: Keeping Your Kids Safe Online
Social Media Training for Parents: Keeping Your Kids Safe Online
 
Facebook- Women- Smoking
Facebook- Women- SmokingFacebook- Women- Smoking
Facebook- Women- Smoking
 
Paul muller flip book 2jun17
Paul muller flip book 2jun17Paul muller flip book 2jun17
Paul muller flip book 2jun17
 
Unit 35
Unit 35Unit 35
Unit 35
 
Presentation
PresentationPresentation
Presentation
 
Digital Footprints
Digital FootprintsDigital Footprints
Digital Footprints
 
Digital footprints final
Digital footprints finalDigital footprints final
Digital footprints final
 

Destaque (7)

R.Smith Art
R.Smith ArtR.Smith Art
R.Smith Art
 
Building Muscle
Building MuscleBuilding Muscle
Building Muscle
 
The Big Four
The Big FourThe Big Four
The Big Four
 
DNA
DNADNA
DNA
 
R.Smith Art
R.Smith ArtR.Smith Art
R.Smith Art
 
Fungus
FungusFungus
Fungus
 
Molecular Genetics
Molecular GeneticsMolecular Genetics
Molecular Genetics
 

Semelhante a Social Media is Okay - Jeopardizing Security Isn't

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceFive Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceDave LaFontaine
 
Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social mediaDave LaFontaine
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Digital Thumbprint Program-TEACHER Module_v1.pdf
Digital Thumbprint Program-TEACHER Module_v1.pdfDigital Thumbprint Program-TEACHER Module_v1.pdf
Digital Thumbprint Program-TEACHER Module_v1.pdfAkuiniNaguit
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& dataminingPaige Jaeger
 
Do not put too much information pdf
Do not put too much information pdfDo not put too much information pdf
Do not put too much information pdfShangli Jiang
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPSmicaja
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parentsagoldberghvs
 
Online Identity Controversy
Online Identity ControversyOnline Identity Controversy
Online Identity ControversyElena Nongos
 
Research Paper On Facebook Diminishing Privacy
Research Paper On Facebook Diminishing PrivacyResearch Paper On Facebook Diminishing Privacy
Research Paper On Facebook Diminishing PrivacyLori Mathers
 

Semelhante a Social Media is Okay - Jeopardizing Security Isn't (20)

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
03 dllo davidlafontaine
03 dllo davidlafontaine03 dllo davidlafontaine
03 dllo davidlafontaine
 
Rent Wiki Social Prez
Rent Wiki Social PrezRent Wiki Social Prez
Rent Wiki Social Prez
 
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceFive Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 Conference
 
Five tricks to grow your audience using social media
Five tricks to grow your audience using social mediaFive tricks to grow your audience using social media
Five tricks to grow your audience using social media
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 
Social web for grannies
Social web for granniesSocial web for grannies
Social web for grannies
 
Digital Thumbprint Program-TEACHER Module_v1.pdf
Digital Thumbprint Program-TEACHER Module_v1.pdfDigital Thumbprint Program-TEACHER Module_v1.pdf
Digital Thumbprint Program-TEACHER Module_v1.pdf
 
Digital footprints& datamining
Digital footprints& dataminingDigital footprints& datamining
Digital footprints& datamining
 
Facebook
FacebookFacebook
Facebook
 
Do not put too much information pdf
Do not put too much information pdfDo not put too much information pdf
Do not put too much information pdf
 
Digital footprints fetc13
Digital footprints fetc13Digital footprints fetc13
Digital footprints fetc13
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPS
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Social Media for Parents
Social Media for ParentsSocial Media for Parents
Social Media for Parents
 
Online Identity Controversy
Online Identity ControversyOnline Identity Controversy
Online Identity Controversy
 
Research Paper On Facebook Diminishing Privacy
Research Paper On Facebook Diminishing PrivacyResearch Paper On Facebook Diminishing Privacy
Research Paper On Facebook Diminishing Privacy
 

Último

UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 

Último (20)

UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 

Social Media is Okay - Jeopardizing Security Isn't