SlideShare uma empresa Scribd logo
1 de 34
MY BACKGROUND
• Legislative Councillor representing the Information
Technology Functional Constituency of the Hong Kong
SAR
• Co-founder, Internet Society Hong Kong
• Honorary President, Hong Kong Information
Technology Federation
• Former Chairman, Hong Kong Internet Service
Providers Association
INTERNET IN 2013
3
Source:
ITU World Telecommunication / ICT Indicators database
CNNIC, “The 32nd China Internet Development Statistics Report”
Jul 2013
40%
of the world‟s
population
2.7billion
Users worldwide
591million
Users in China
21.8%
of the world‟s
internet users
4
Hong Kong Special
Administrative Region
ONE COUNTRY, TWO SYSTEMS
SPEAKING OF INTERNET IN CHINA
WE USUALLY THINK OF THIS…
5
INTERNET IN CHINA: A SNAPSHOT
591million
Internet users
6
464million
Mobile phone
Internet users
44.1%
Internet
penetration
78%
Mobile Internet
penetration rate
10-39
Age group of main
Internet users
21.7hrs
of connection per week
on average
Source: CNNIC, “The 32nd China Internet Development
Statistics Report” Jul 2013
HOW THE CHINESE GOVT
MANAGES THE INTERNET NOW
Prof. Li Yonggang:the internet as waterworks (治水)
Guide more than block
7
SEVEN SPEAK-NOT SUBJECTS 七不講
AND ONLINE PUBLIC OPINION
CENSORSHIP
8
Universal
values
Press freedom Civil society Civil rights
Past mistakes
of the CCP
Crony
capitalists
Judicial
independence
GFW VS WIKIPEDIA
Blocked 7 times since 2004
Filter and block traffic to
sensitive articles
2013: HTTPS encrypted
connections blocked
9
CHINA‟S CENSORSHIP STRATEGY:
TECHNOCRATIC MICROMANAGEMENT
• Appear „reasonable‟ – less
high-handed blanket bans
• More nuanced approach:
• Censoring before news
happens
• Message Control
• Downplay sensitive news
10
NEW APPROACH:
A SUBTLE, MIDDLE
COURSE
Balance between
control and
economic growth
with free flow of
information
11
Modulation and fine-tuning
carefully selected content
SUPPORT FOR GOVERNMENT FRIENDLY,
LOCAL INTERNET COMPANIES
12
NEW INTERNET REGULATIONS IN
CHINA
• Real-name system (approved in Dec 2012, fully
implement by Jun 2014)
• Draft new Privacy Laws and Draft Internet Privacy
Regulations (April 2013)
13
Content monitoring, self-censorship and mandatory
reporting of „state secrets‟ and „impermissible
contents‟ for „network and information security
reasons‟
CENSORSHIP ON MICROBLOG (WEIBO)
14
Source: JMSC, HKU
EVADING GFW ON WEIBO
Netizens getting creative: „hitting edge balls‟ (擦邊球)
 Stay roughly within / skirt around permitted boundary
of censors
• using images such as animated GIFs
• Creating new terms to represent / describe politicians
or incidents
15
HOW DO CHINESE USERS BYPASS
THE GFW? BY TAGGING ALONG
• Chinese users use tools that the Chinese
government does not want the GFW to
blanket block due to economic and
commercial interests
• GoAgent, VPNs, HTTPS/SOCKS
16
Source: OpenITP, “Collateral Freedom – A Snapshot of Chinese
Internet Users Circumventing Censorship”, Apr 2013
POWER OF CROWD AND INFORMATION
17
Whistle-blowing on
social media
18
INTERNET USAGE IN HONG KONG: A
SNAPSHOT
19
Source:
Office of Communications Authority, Apr 2013
Census and Statistics Dept, HKSAR, May 2013
85.2%
Household
broadband
penetration rate
77.9%
Household with
PC and
broadband
30hours
Average time
spent on PCs per
week
229%
Mobile
penetration
65.3%
Mobile internet
penetration
DENSER, MORE COMPLEX, AND
MORE PARTICIPATORY
LANDSCAPE
20
Discussion Forums
Social networking
Online media
IM app
Media sharing
NO
CENSORSHIP,
BUT IS
INTERNET
FREE IN
HONG KONG?
• Fast and reliable internet
connection
• No censorship or filtering of
data traffic
• Article 30 of the Basic Law
specifies freedom and privacy
of communication of HK
residents are protected by law
• Yet certain laws govern the
use of Internet
21
ALL-PURPOSE COMPUTER CRIME
LEGISLATION
Section 161 of the Crimes Ordinance (Cap. 200)
(i.e. access to computer with criminal or dishonest intent)
that any person who obtains access to a computer:
(a) with intent to commit an offence;
(b) with a dishonest intent to deceive;
(c) with a view to dishonest gain for himself or
another; or
(d) with a dishonest intent to cause loss to another,
whether on the same occasion as he obtains such access
or on any future occasion, commits an offence.
22
EVERYTHING UNDER ONE UMBRELLA?
23
Computer system
hacking
Cyber attacks
Distributing fake
government releases
online
Taking and storing
"under-skirt" photographs
s.161
Access to computer
with criminal or
dishonest intent
2008 consultation with proposal
to impose mandatory filtering at
the level of the ISPs' servers
24
PROTECTING THE
YOUTH BY
FILTERING?
CONTROL OF
OBSCENE AND
INDECENT ARTICLES
ORDINANCE
COPYRIGHT
ORDINANCE AND
FREEDOM OF
EXPRESSION
Government consultation in
progress: Exemption for
parody, satire and
derivative works?
25
TELECOMMUNICATIONS ORDINANCE
Sections of Telecommunications Ordinance are against:
- Willful interception of any message
- Damage, remove or interfere with a
telecommunications installation to intercept /
discover contents of a message
In relation: Personal Data (Privacy Ordinance)
26
BUT WHO‟S THE BIGGEST ENEMY?
27
HONG KONG GOVERNMENT‟S
INVISIBLE HAND TOWARDS ISP…
My question to HK government on user data /
content removal requests made by departments
and law enforcement agencies to ISPs in the past 3 years
revealed…
28
>14,000
User data requests
7,000
Content removal
requests
Many were made
with no court
order
MORE OPENNESS AND TRANSPARENCY,
BETTER INTERNET REGULATION
29
The public has the right to
know how government actions
affect their privacy and free
flow of information
HONG KONG TRANSPARENCY REPORT
30
Gathering, analysing and
publishing legally available data on
government user data and
content removal requests
State of
transparency
between the Hong
Kong Govt and
technology and
telecommunications
companies Protecting
the fundamental
freedomsof
netizens
4PM TODAY - DISCUSSION ON
TRANSPARENCY REPORT
http://transparency.jmsc.hku.hk/
Presentation on Hong Kong‟s first Transparency Report
Panel discussion:
• Ying Chan, Director, JMSC, Hong Kong University
• Lokman Tsui, Head of Free Expression, Asia Pacific,
Google
• Andrew Lih, USC Professor and author of The
Wikipedia Revolution
• Ot van Daalen, Bits of Freedom
31
Where: PQ304, PolyU
ONE INTERNET, MANY SYSTEMS?
32
IMAGE CREDIT
http://www.aqualegion.com/wp-content/uploads/Water-droplet-image-Water-sampling-and-
water-testing-in-London-copy.jpg
http://www.elitee2.com/wp-content/uploads/2010/02/Surveillance.jpg
http://blogs-images.forbes.com/greatspeculations/files/2012/02/magnifying-glass2.jpg
http://codeandreload.com/wp-content/uploads/2010/12/photography_shadow-
hand_eclipse_9774.jpg
https://upload.wikimedia.org/wikipedia/commons/9/96/China-outline.svg
http://upload.wikimedia.org/wikipedia/commons/c/c2/Hong_Kong_Outline_Map.png
https://upload.wikimedia.org/wikipedia/commons/5/53/Wikipedia-logo-en-big.png
http://img.sharpdaily.com.hk/rtn/20130729/large/1375098101_38e5.jpg
http://mappingourworlds.files.wordpress.com/2010/12/internet.jpg
33
34
Charles Mok
Legislative Councillor
(Information Technology)
charles@charlesmok.hk
www.charlesmok.hk
Facebook: Charles Mok B
Twitter: @charlesmok

Mais conteúdo relacionado

Mais procurados

090812 B Nguyen
090812 B Nguyen090812 B Nguyen
090812 B Nguyen
biennn
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
Dhruva Jaishankar
 

Mais procurados (20)

12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia12 04-03-anal-ict-tunisia
12 04-03-anal-ict-tunisia
 
After 9 11
After 9 11After 9 11
After 9 11
 
Internet Governance and Open Source Software
Internet Governance and Open Source SoftwareInternet Governance and Open Source Software
Internet Governance and Open Source Software
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet Freedom
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
 
Bangladesh Cyber Incident Trends 2013 & bdCERT Update
Bangladesh Cyber Incident Trends 2013 & bdCERT UpdateBangladesh Cyber Incident Trends 2013 & bdCERT Update
Bangladesh Cyber Incident Trends 2013 & bdCERT Update
 
Bangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global PerspectiveBangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global Perspective
 
Internet
InternetInternet
Internet
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Pakistan’s ISI Plans for surveillance
Pakistan’s ISI Plans for surveillancePakistan’s ISI Plans for surveillance
Pakistan’s ISI Plans for surveillance
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladesh
 
Data Protection & Risk Management
Data Protection & Risk Management Data Protection & Risk Management
Data Protection & Risk Management
 
090812 B Nguyen
090812 B Nguyen090812 B Nguyen
090812 B Nguyen
 
Bangladesh Cyber Incident Trends 2012 & bdCERT Update
Bangladesh Cyber Incident Trends 2012 & bdCERT UpdateBangladesh Cyber Incident Trends 2012 & bdCERT Update
Bangladesh Cyber Incident Trends 2012 & bdCERT Update
 
Internet Freedom 2.1
Internet Freedom 2.1Internet Freedom 2.1
Internet Freedom 2.1
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 

Destaque (7)

Big Data -- a free and open world
Big Data -- a free and open worldBig Data -- a free and open world
Big Data -- a free and open world
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and Potentials
 
iCity:iHongKong -- Symposium on Smart City
iCity:iHongKong -- Symposium on Smart City iCity:iHongKong -- Symposium on Smart City
iCity:iHongKong -- Symposium on Smart City
 
How social media is changing the world
How social media is changing the worldHow social media is changing the world
How social media is changing the world
 
Government ICT Procurement Policy Industry Survey
Government ICT Procurement Policy Industry SurveyGovernment ICT Procurement Policy Industry Survey
Government ICT Procurement Policy Industry Survey
 
十大資訊基建 2009 05 08
十大資訊基建 2009 05 08十大資訊基建 2009 05 08
十大資訊基建 2009 05 08
 
香港信息服务业的现状及发展、全球信息管理技术
香港信息服务业的现状及发展、全球信息管理技术香港信息服务业的现状及发展、全球信息管理技术
香港信息服务业的现状及发展、全球信息管理技术
 

Semelhante a Wikimania 2013 keynote: One Internet Two Systems

Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdf
aghsports
 
Digital exclusion as a hindrance to the emergence of the information society:...
Digital exclusion as a hindrance to the emergence of the information society:...Digital exclusion as a hindrance to the emergence of the information society:...
Digital exclusion as a hindrance to the emergence of the information society:...
Przegląd Politologiczny
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
wraythallchan
 
Osimopolitika20v2
Osimopolitika20v2Osimopolitika20v2
Osimopolitika20v2
osimod
 
Egovmon
EgovmonEgovmon
Egovmon
osimod
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
PhngLinhTrn33
 
Network Neutrality Policy Summary
Network Neutrality Policy SummaryNetwork Neutrality Policy Summary
Network Neutrality Policy Summary
Kim Moore
 
IB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaIB 46 Surya Kiran Sharma
IB 46 Surya Kiran Sharma
Surya Sharma
 

Semelhante a Wikimania 2013 keynote: One Internet Two Systems (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Chinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdfChinas Great FirewallChina has a population of over 14 bil.pdf
Chinas Great FirewallChina has a population of over 14 bil.pdf
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
The great chinese firewall
The great chinese firewallThe great chinese firewall
The great chinese firewall
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Digital exclusion as a hindrance to the emergence of the information society:...
Digital exclusion as a hindrance to the emergence of the information society:...Digital exclusion as a hindrance to the emergence of the information society:...
Digital exclusion as a hindrance to the emergence of the information society:...
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docxArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
ArticlesJournal of Contemporary Criminal Justice26(1) 10.docx
 
Osimopolitika20v2
Osimopolitika20v2Osimopolitika20v2
Osimopolitika20v2
 
The Impact of Technology on Comsumers' Lives
The Impact of Technology on Comsumers' LivesThe Impact of Technology on Comsumers' Lives
The Impact of Technology on Comsumers' Lives
 
Egovmon
EgovmonEgovmon
Egovmon
 
How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.How consumers use technology and its impact on their lives.
How consumers use technology and its impact on their lives.
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social media
 
Internet
InternetInternet
Internet
 
Network Neutrality Policy Summary
Network Neutrality Policy SummaryNetwork Neutrality Policy Summary
Network Neutrality Policy Summary
 
IB 46 Surya Kiran Sharma
IB 46 Surya Kiran SharmaIB 46 Surya Kiran Sharma
IB 46 Surya Kiran Sharma
 
Web Trends
Web TrendsWeb Trends
Web Trends
 

Mais de Charles Mok

Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Charles Mok
 

Mais de Charles Mok (20)

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Wikimania 2013 keynote: One Internet Two Systems