SlideShare uma empresa Scribd logo
1 de 117
SCADA and ICS for
Security Experts:
         How to Avoid Being a Cyber Idiot


James Arlen, CISA
Black Hat Europe - Barcelona - 2010


                                            1
Disclaimer

 I am employed in the Infosec industry,
 but not authorized to speak on behalf
 of my employer or clients.


 Everything I say can be blamed on
 great food, mind-control and jet lag.



                                          2
Credentials

 15+ years information security specialist
 staff operations, consultant, auditor, researcher
 utilities vertical (grid operations, generation, distribution)
 financial vertical (banks, trust companies, trading)


                           ...still not an expert at anything.


                                                                  3
1/ Stop Sounding Stupid




                          4
Scada
got
sexy




        5
Follow
the
money




         6
Who's
an
expert
now?



         7
One
time
at
security
camp


           8
Gotta
get
me
a
piece
of
that
        9
Gotta
get
me
a
piece
of
that
        10
2/ Big Things and
    Little Things



                    11
Not all ‘scada’ is SCADA




                           12
Big things:
power grid




              13
Big things:
pipeline




              14
Inter-
connected
sensors and
controls
under
central
management
              15
Inter-
connected
sensors and
controls
under
central
management
              16
Supervisory control and
    data acquisition



                          17
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  18
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  19
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  20
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  21
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  22
Little
Things:
chemical plant,
power plant,
manufacturing
facility


                  23
Lots of
individual
capabilities
with some
orchestration


                24
Programmable
logic
controllers




               25
Programmable
logic
controllers




               26
Programmable
logic
controllers




               27
Industrial control systems/
Distributed control systems



                              28
3/ Part of a Bigger Picture




                              29
So if you
break the
computer,
you break
everything


             30
What
happens
when Edna
falls into the
reactant
vessel

                 31
This is the data

                   32
This is the data

                   33
This is the process

                      34
This is the process

                      35
This is the process

                      36
I know you
can grok
the protocol,
can you
break the
controls?

                37
I know you
can grok
the protocol,
can you
break the
controls?

                38
Oh, you
forgot about
safety




               39
Oh, you
forgot about
safety




               40
Oh, you
forgot about
testing




               41
Oh, you
forgot about
testing




               42
Oh, you
forgot about
people




               43
Oh, you
forgot about
people




               44
What if it really is SCADA?

                              45
Stuff breaks




               46
All the
&*^$ing
time




          47
And it gets
fixed




              48
And it gets
fixed




              49
And you
never
noticed




          50
And you
never
noticed




          51
And you
never
noticed




          52
And you
never
noticed




          53
4/ Practical Positive Things




                               54
You can
understand
this stuff




             55
You can
help




          56
They need
you




            57
You need to
suck it up




              58
It's time to
learn before
teaching




               59
It's time to
learn before
teaching




               60
5/ You Wouldn't Believe
    Me If I Told You



                          61
The
Organization
is
against
you


               62
Your prima
donna
attitude is
against you



              63
Your age is
against you




              64
It's time to
start
hacking




               65
First you
hack the
org




            66
Then you own their asses

                           67
Then you own their asses

                           68
6/ Movies Would Have
   You Believe



                       69
It's a mad
mad
graphical
awesome
world


             70
It's a mad
mad
graphical
awesome
world


             71
It's a mad
mad
graphical
awesome
world


             72
It's a mad
mad
graphical
awesome
world


             73
It's a mad
mad
graphical
awesome
world


             74
It's a mad
mad
graphical
awesome
world


             75
It's a mad
mad
graphical
awesome
world


             76
It's a mad
mad
graphical
awesome
world


             77
It's a mad
mad
graphical
awesome
world


             78
It's a mad
mad
graphical
awesome
world


             79
What an afternoon at the
console really feels like
                            80
What an afternoon at the
console really feels like
                            81
What an afternoon at the
console really feels like
                            82
7/ The Media Hypes
    It As If...



                     83
There's a
hacker
behind the
bush



             84
There's a
hacker
behind the
bush



             85
There's a
hacker
behind the
bush



             86
There's a
hacker
behind the
bush



             87
There's a
hacker
behind the
bush



             88
A 14yo in
Mom's
basement




            89
A 14yo in
Mom's
basement




            90
A 14yo in
Mom's
basement




            91
L337 cadre
of
genetically
engineered
supersoldiers


                92
L337 cadre
of
genetically
engineered
supersoldiers


                93
L337 cadre
of
genetically
engineered
supersoldiers


                94
Killer Tubes




               95
8/ Bad Shit That
    Actually Happened



                        96
Not
necessarily
public news.




               97
9/ What Could Have
   Saved It



                     98
Superheroes,
Ninjas and
Pirates




               99
Superheroes,
Ninjas and
Pirates




               100
Superheroes,
Ninjas and
Pirates




               101
Following
Instructions




               102
Or, not sucking at
implementation
                     103
Or, doing
what you're
told




              104
Or, stuff
that has
nothing at
all to do
with
computers

             105
10/ What You Can Do -
    Little Picture



                        106
Learn

        107
Stop listening to "experts"

                              108
Modest
changes,
massive
results



           109
11/ What You Can Do -
    Big Picture



                        110
Stop feeding
the trolls




               111
Avoid being
‘that person’




                112
Press for
sane
acquisitions




               113
Study past
success




             114
Study past
success




             115
Q & A
          @myrcurial
james.arlen@pushthestack.com




                               116
Credits, Links and Notices
                                 http://jamesarlen.net and
Me:                              http://www.linkedin.com/in/jamesarlen
                                 and sometimes http://liquidmatrix.org/blog

                                 All of you, My Family, Friends, Jeff Moss
                                 (for demanding this talk) and the rest of
                                 the Black Hat Europe Team.
Thanks:
                                 Mentors/Luminaries: D. Anderson, M. Fabro, J. Brodsky,
                                 R. Southworth, M. Sachs, C. Jager, B. Radvanovsky
                                 and J. Weiss (all from whom I borrowed material)

                                 twitter, fast music, caffeine, my lovely wife
Inspiration:                     and hackerish children, blinky lights, shiny
                                 things, & altruism.
      http://creativecommons.org/licenses/by-nc-sa/2.5/ca/                                117

Mais conteúdo relacionado

Destaque

Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration TestingAhmed Sherif
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS CommunicationsDigital Bond
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsShah Sheikh
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsAleksandr Timorin
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 

Destaque (11)

Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration Testing
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 

Semelhante a BlackHat Europe 2010: SCADA and ICS for Security Experts

Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012Wil Reynolds
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackersgrugq
 
6 Radical Work Changes In Next Decade
6 Radical Work Changes In Next Decade6 Radical Work Changes In Next Decade
6 Radical Work Changes In Next DecadeJeff Hurt
 
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)GeekWire
 
Pyramid Song
Pyramid SongPyramid Song
Pyramid SongFITC
 
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Vlad Styran
 
3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IP3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IPRising Media, Inc.
 
Secrets of a super hacker
Secrets of a super hackerSecrets of a super hacker
Secrets of a super hackerDecarl Decarl
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoDeja vu Security
 
2600 v15 n4 (winter 1998)
2600 v15 n4 (winter 1998)2600 v15 n4 (winter 1998)
2600 v15 n4 (winter 1998)Felipe Prado
 
William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015CSO_Presentations
 
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine LearningWell, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine LearningDevFest DC
 
Hackers contemplations
Hackers contemplationsHackers contemplations
Hackers contemplationsChris Roberts
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DANeil Lines
 
Just the basics_strata_2013
Just the basics_strata_2013Just the basics_strata_2013
Just the basics_strata_2013Ken Mwai
 
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...OpenCredo
 

Semelhante a BlackHat Europe 2010: SCADA and ICS for Security Experts (20)

100 ways to kill a concept
100 ways to kill a concept100 ways to kill a concept
100 ways to kill a concept
 
Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012Think Devlish act Angelic - Search Love 2012
Think Devlish act Angelic - Search Love 2012
 
OPSEC for hackers
OPSEC for hackersOPSEC for hackers
OPSEC for hackers
 
6 Radical Work Changes In Next Decade
6 Radical Work Changes In Next Decade6 Radical Work Changes In Next Decade
6 Radical Work Changes In Next Decade
 
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
Jordan Weisman - Warning startups maybe dangerous to your health (and ego)
 
Pyramid Song
Pyramid SongPyramid Song
Pyramid Song
 
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
Human is an amateur; the monkey is an expert. How to stop trying to secure yo...
 
3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IP3D Printing and the Future (or Demise) of IP
3D Printing and the Future (or Demise) of IP
 
Dv40
Dv40Dv40
Dv40
 
Secrets of a super hacker
Secrets of a super hackerSecrets of a super hacker
Secrets of a super hacker
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
 
Flash Mob Sprint
Flash Mob SprintFlash Mob Sprint
Flash Mob Sprint
 
2600 v15 n4 (winter 1998)
2600 v15 n4 (winter 1998)2600 v15 n4 (winter 1998)
2600 v15 n4 (winter 1998)
 
William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015
 
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine LearningWell, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
Well, That Escalated Quickly: Anomaly Detection with Elastic Machine Learning
 
Dec2018 istanbul-2
Dec2018 istanbul-2Dec2018 istanbul-2
Dec2018 istanbul-2
 
Hackers contemplations
Hackers contemplationsHackers contemplations
Hackers contemplations
 
Hunt for the red DA
Hunt for the red DAHunt for the red DA
Hunt for the red DA
 
Just the basics_strata_2013
Just the basics_strata_2013Just the basics_strata_2013
Just the basics_strata_2013
 
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
Goto Chicago; Journeys To Cloud Native Architecture: Sun, Sea And Emergencies...
 

Mais de James Arlen

Notacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next GenerationNotacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next GenerationJames Arlen
 
HAR2009 - Your Mind: Legal Status, Rights and Securing Yourself
HAR2009 - Your Mind: Legal Status, Rights and Securing YourselfHAR2009 - Your Mind: Legal Status, Rights and Securing Yourself
HAR2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
DEFCON17 - Fail Panel
DEFCON17 - Fail PanelDEFCON17 - Fail Panel
DEFCON17 - Fail PanelJames Arlen
 
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfSecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowBlack Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowJames Arlen
 
SecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongSecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongJames Arlen
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfBlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfJames Arlen
 
The Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitThe Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitJames Arlen
 

Mais de James Arlen (9)

Notacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next GenerationNotacon 7 - Hacking The Future Weaponizing The Next Generation
Notacon 7 - Hacking The Future Weaponizing The Next Generation
 
HAR2009 - Your Mind: Legal Status, Rights and Securing Yourself
HAR2009 - Your Mind: Legal Status, Rights and Securing YourselfHAR2009 - Your Mind: Legal Status, Rights and Securing Yourself
HAR2009 - Your Mind: Legal Status, Rights and Securing Yourself
 
DEFCON17 - Fail Panel
DEFCON17 - Fail PanelDEFCON17 - Fail Panel
DEFCON17 - Fail Panel
 
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfSecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
SecTor 2009 - Your Mind: Legal Status, Rights and Securing Yourself
 
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse NowBlack Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
 
SecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It WrongSecTor 2008 - Security Heretic: We're Doing It Wrong
SecTor 2008 - Security Heretic: We're Doing It Wrong
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
 
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting YourselfBlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
BlackHat USA 2009 - Your Mind: Legal Status, Rights and Protecting Yourself
 
The Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black SuitThe Last HOPE - Black Hat To A Black Suit
The Last HOPE - Black Hat To A Black Suit
 

Último

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

BlackHat Europe 2010: SCADA and ICS for Security Experts