SlideShare uma empresa Scribd logo
1 de 27
Rooting Android
Created By : Mayank Talwar
Android
Currently Developed by Google
OS Versions named after desserts:
• 1.6 Donut
• 2.0 Eclair
• 2.2 Froyo
• 2.3 Gingerbread
• 3.0 Honeycomb
• 4.0 Ice Cream Sandwich
• 4.1 Jelly Bean
• 4.4 Kitkat
• 5.0 Marshmallow
What is Rooting?
• Administrative or root access
• Android by default doesn’t have root
• Different Methods for different phones
• Rooting gives you a lot of advantages.
This is usually how you can see if an
android phone is rooted – the
SuperUser app
Roms
• Read Only Memory
• Data cannot be modified, or can be modified only slowly or
with difficulty
• ROM is modified version of android
• Stock ROM is the default ROM (Backup)
Kernel
• Component of OS
• Manages communication b/w S/W & H/W
• Custom Kernel can speed up phone
• Custom Kernel can improve battery life
Flashing
• Installing something on your device
• Done through recovery or through
ADB(Android Debug Bridge)
• It can be Rom/Kernel or recovery
Brick
WHAT IS BRICKING?
Bootloader
• Lowest level of S/W on your phone
• Runs all the code to start OS
• Security Checkpoint for different partitions
• Locked Bootloader keeps phone safe
• Bootloader verify signature of system image
before booting
Recovery
• S/W on your phone that lets you take backups or
flash roms
• Wiping cache/data
Nandroid
From most third-party recovery
modules, you can make backups of your
phone called nandroid backups. It's
essentially a system image
of your phone:
Everything exactly how it is right
now.
Superuser
• Rooting android device makes you superuser
Why Root?
ADVANTAGES
1. Control your CPU.
ADVANTAGES
2. Flash a custom ROM.
ADVANTAGES
3. Flash a custom Kernel.
ADVANTAGES
4. Remove pre-installed bloatware.
ADVANTAGES
5. Backup for seamless transitions.
ADVANTAGES
6. Use Low end device with high end performance
ADVANTAGES
7. Completely Block Advertisements
ADVANTAGES
8. Automate Everything with Tasker
ADVANTAGES
9. Dual Boot Roms
ADVANTAGES
10. Move apps to SD CARD
Hacking
• Hack site,server or n/w
• Linux based has high high hacking capabilities
• Enhanced to 100% by rooting
• WIFI KILL- Secured or unsecured wifi
Risks of Rooting
Method
1. Before doing anything - Make a backup!
1.SMS, call logs text messages etc. can be erased so don't
take chances!
2. Every device is different but the basic premise is you need
to
• unlock bootloader
• flash a custom recovery which will allow you to
• install Superuser APK
1. Before flashing a new ROM, make a backup of your current
ROM.
1.If anything goes wrong you'll be able to reflash a ROM
you know works.
CONCLUSION

Rooting your device turns you into its owner in the
truest sense of the word, as it puts you in charge of
every aspect of your phone.

It allows you to extend the longevity of a device via
custom ROMs, tweaks, and up to date patches.

By rooting your android device and getting super user
access, things can only get better for you.

Mais conteúdo relacionado

Mais procurados

Rooting an Android phone
Rooting an Android phoneRooting an Android phone
Rooting an Android phoneArnav Gupta
 
What is Rooting in Anndroid, Benefit and Risk of Android Rooting
What is Rooting in Anndroid, Benefit and Risk of Android RootingWhat is Rooting in Anndroid, Benefit and Risk of Android Rooting
What is Rooting in Anndroid, Benefit and Risk of Android Rootingkalaivanan97
 
Rooting of Android Devices
Rooting of Android DevicesRooting of Android Devices
Rooting of Android DevicesSai Ganesh
 
Custom rom
Custom romCustom rom
Custom romMADRAG
 
android and root process
android and root processandroid and root process
android and root processprotik nahiyan
 
Android os installation
Android os installationAndroid os installation
Android os installationNipun Jolly
 
Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !Veduruparthy Bharat
 
Android Rooting and Flashing
Android Rooting and FlashingAndroid Rooting and Flashing
Android Rooting and FlashingMuhammad Ehsan
 
What to do after Rooting ?
What to do after Rooting ?What to do after Rooting ?
What to do after Rooting ?Arnav Gupta
 
Android introduction and rooting technology
Android introduction and rooting technologyAndroid introduction and rooting technology
Android introduction and rooting technologyGagandeep Nanda
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testingSanthosh Kumar
 
Android Technology
Android TechnologyAndroid Technology
Android TechnologyAnuj Modi
 
Android viirendra sharma
Android viirendra sharmaAndroid viirendra sharma
Android viirendra sharmaVIRENDRA SHARMA
 
Ksdg customize-your-firefoxos
Ksdg customize-your-firefoxosKsdg customize-your-firefoxos
Ksdg customize-your-firefoxosYuren Ju
 
Killer Applications or Devices
Killer Applications or DevicesKiller Applications or Devices
Killer Applications or DeviceseXplanoTech
 
Synapse india iphone apps presentation on android vs ios
Synapse india iphone apps   presentation on android vs iosSynapse india iphone apps   presentation on android vs ios
Synapse india iphone apps presentation on android vs iosSynapseIndiaiPhoneApps
 
The Virus Killer Game
The Virus Killer GameThe Virus Killer Game
The Virus Killer GameGreta Helder
 
Development environment
Development environmentDevelopment environment
Development environmentmaamir farooq
 

Mais procurados (20)

Rooting an Android phone
Rooting an Android phoneRooting an Android phone
Rooting an Android phone
 
What is Rooting in Anndroid, Benefit and Risk of Android Rooting
What is Rooting in Anndroid, Benefit and Risk of Android RootingWhat is Rooting in Anndroid, Benefit and Risk of Android Rooting
What is Rooting in Anndroid, Benefit and Risk of Android Rooting
 
Rooting of Android Devices
Rooting of Android DevicesRooting of Android Devices
Rooting of Android Devices
 
Android Rooting
Android RootingAndroid Rooting
Android Rooting
 
Custom rom
Custom romCustom rom
Custom rom
 
android and root process
android and root processandroid and root process
android and root process
 
Android os installation
Android os installationAndroid os installation
Android os installation
 
Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !Android and ios cracking, hackintosh included !
Android and ios cracking, hackintosh included !
 
Android Rooting and Flashing
Android Rooting and FlashingAndroid Rooting and Flashing
Android Rooting and Flashing
 
What to do after Rooting ?
What to do after Rooting ?What to do after Rooting ?
What to do after Rooting ?
 
Android introduction and rooting technology
Android introduction and rooting technologyAndroid introduction and rooting technology
Android introduction and rooting technology
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
Android Technology
Android TechnologyAndroid Technology
Android Technology
 
Android viirendra sharma
Android viirendra sharmaAndroid viirendra sharma
Android viirendra sharma
 
Ksdg customize-your-firefoxos
Ksdg customize-your-firefoxosKsdg customize-your-firefoxos
Ksdg customize-your-firefoxos
 
Killer Applications or Devices
Killer Applications or DevicesKiller Applications or Devices
Killer Applications or Devices
 
Lange
LangeLange
Lange
 
Synapse india iphone apps presentation on android vs ios
Synapse india iphone apps   presentation on android vs iosSynapse india iphone apps   presentation on android vs ios
Synapse india iphone apps presentation on android vs ios
 
The Virus Killer Game
The Virus Killer GameThe Virus Killer Game
The Virus Killer Game
 
Development environment
Development environmentDevelopment environment
Development environment
 

Destaque

Parapsicología y psicología de la emergencia
Parapsicología y psicología de la emergenciaParapsicología y psicología de la emergencia
Parapsicología y psicología de la emergenciacienciaspsiquicas
 
2014TrainingForumProgram.Final10
2014TrainingForumProgram.Final102014TrainingForumProgram.Final10
2014TrainingForumProgram.Final10Abby F. Curro
 
Short film posters  general overview codes and con
Short film posters  general overview codes and conShort film posters  general overview codes and con
Short film posters  general overview codes and conLine-Teta Blemont
 
Balbuzie stato dell'arte. D.ssa Angela SCALZO
Balbuzie stato dell'arte. D.ssa Angela SCALZOBalbuzie stato dell'arte. D.ssa Angela SCALZO
Balbuzie stato dell'arte. D.ssa Angela SCALZORosangela Scalzo
 
The CDRC Masters Research Dissertation Programme - Call for Sponsors
The CDRC Masters Research Dissertation Programme - Call for SponsorsThe CDRC Masters Research Dissertation Programme - Call for Sponsors
The CDRC Masters Research Dissertation Programme - Call for SponsorsGuy Lansley
 
Il modello richiesta pei_scuole
Il  modello richiesta pei_scuoleIl  modello richiesta pei_scuole
Il modello richiesta pei_scuoleRosangela Scalzo
 
Documentary analysis
Documentary analysisDocumentary analysis
Documentary analysisOwenMaers
 
pandas: Powerful data analysis tools for Python
pandas: Powerful data analysis tools for Pythonpandas: Powerful data analysis tools for Python
pandas: Powerful data analysis tools for PythonWes McKinney
 
How to Tell a Story With Your Google Analytics Data
How to Tell a Story With Your Google Analytics DataHow to Tell a Story With Your Google Analytics Data
How to Tell a Story With Your Google Analytics DataJeff Sauer
 

Destaque (12)

Coca cola
Coca colaCoca cola
Coca cola
 
Ijmet 06 10_005
Ijmet 06 10_005Ijmet 06 10_005
Ijmet 06 10_005
 
Parapsicología y psicología de la emergencia
Parapsicología y psicología de la emergenciaParapsicología y psicología de la emergencia
Parapsicología y psicología de la emergencia
 
2014TrainingForumProgram.Final10
2014TrainingForumProgram.Final102014TrainingForumProgram.Final10
2014TrainingForumProgram.Final10
 
Short film posters  general overview codes and con
Short film posters  general overview codes and conShort film posters  general overview codes and con
Short film posters  general overview codes and con
 
Balbuzie stato dell'arte. D.ssa Angela SCALZO
Balbuzie stato dell'arte. D.ssa Angela SCALZOBalbuzie stato dell'arte. D.ssa Angela SCALZO
Balbuzie stato dell'arte. D.ssa Angela SCALZO
 
El cántico de la cúantica
El cántico de la cúanticaEl cántico de la cúantica
El cántico de la cúantica
 
The CDRC Masters Research Dissertation Programme - Call for Sponsors
The CDRC Masters Research Dissertation Programme - Call for SponsorsThe CDRC Masters Research Dissertation Programme - Call for Sponsors
The CDRC Masters Research Dissertation Programme - Call for Sponsors
 
Il modello richiesta pei_scuole
Il  modello richiesta pei_scuoleIl  modello richiesta pei_scuole
Il modello richiesta pei_scuole
 
Documentary analysis
Documentary analysisDocumentary analysis
Documentary analysis
 
pandas: Powerful data analysis tools for Python
pandas: Powerful data analysis tools for Pythonpandas: Powerful data analysis tools for Python
pandas: Powerful data analysis tools for Python
 
How to Tell a Story With Your Google Analytics Data
How to Tell a Story With Your Google Analytics DataHow to Tell a Story With Your Google Analytics Data
How to Tell a Story With Your Google Analytics Data
 

Semelhante a Rooting android

How to flash custom roms?
How to flash custom roms?How to flash custom roms?
How to flash custom roms?shrinime
 
Android Rooting and Flashing
Android Rooting and FlashingAndroid Rooting and Flashing
Android Rooting and FlashingMuhammad Ehsan
 
Working of Cyanogen mod
Working of Cyanogen modWorking of Cyanogen mod
Working of Cyanogen modallwin thomas
 
Beginner's Guide to Rooting
Beginner's Guide to RootingBeginner's Guide to Rooting
Beginner's Guide to RootingPavan Koli
 
CNIT 128 8. Identifying and Exploiting Android Implementation Issues (Part 2)
CNIT 128 8. Identifying and Exploiting Android Implementation Issues (Part 2)CNIT 128 8. Identifying and Exploiting Android Implementation Issues (Part 2)
CNIT 128 8. Identifying and Exploiting Android Implementation Issues (Part 2)Sam Bowne
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS ConsolidatedKarter Rohrer
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat Security Conference
 
E adda presentation 8-9-13
E   adda presentation 8-9-13E   adda presentation 8-9-13
E adda presentation 8-9-13UnMounted Iftee
 
7 tips to use your computer more efficiently
7 tips to use your computer more efficiently7 tips to use your computer more efficiently
7 tips to use your computer more efficientlyigoldsmi
 
1319571 634635606205391250
1319571 6346356062053912501319571 634635606205391250
1319571 634635606205391250MadNor Exe
 
Security Issues in Android Custom ROM
Security Issues in Android Custom ROMSecurity Issues in Android Custom ROM
Security Issues in Android Custom ROMAnant Shrivastava
 
Introduction to Android Programming
Introduction to Android ProgrammingIntroduction to Android Programming
Introduction to Android Programming'Zamin Mammadov
 
CNIT 128 8. Android Implementation Issues (Part 2)
CNIT 128 8. Android Implementation Issues (Part 2)CNIT 128 8. Android Implementation Issues (Part 2)
CNIT 128 8. Android Implementation Issues (Part 2)Sam Bowne
 
CNIT 128: Android Implementation Issues (Part 2)
CNIT 128: Android Implementation Issues (Part 2)CNIT 128: Android Implementation Issues (Part 2)
CNIT 128: Android Implementation Issues (Part 2)Sam Bowne
 
Jailbreaking iOS
Jailbreaking iOSJailbreaking iOS
Jailbreaking iOSMihir Patel
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using androidDroidcon Berlin
 

Semelhante a Rooting android (20)

How to flash custom roms?
How to flash custom roms?How to flash custom roms?
How to flash custom roms?
 
Android Rooting and Flashing
Android Rooting and FlashingAndroid Rooting and Flashing
Android Rooting and Flashing
 
Working of Cyanogen mod
Working of Cyanogen modWorking of Cyanogen mod
Working of Cyanogen mod
 
Beginner's Guide to Rooting
Beginner's Guide to RootingBeginner's Guide to Rooting
Beginner's Guide to Rooting
 
Android rooting
Android rooting Android rooting
Android rooting
 
CNIT 128 8. Identifying and Exploiting Android Implementation Issues (Part 2)
CNIT 128 8. Identifying and Exploiting Android Implementation Issues (Part 2)CNIT 128 8. Identifying and Exploiting Android Implementation Issues (Part 2)
CNIT 128 8. Identifying and Exploiting Android Implementation Issues (Part 2)
 
Forensics WS Consolidated
Forensics WS ConsolidatedForensics WS Consolidated
Forensics WS Consolidated
 
iOS jailbreaking
iOS jailbreakingiOS jailbreaking
iOS jailbreaking
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without device
 
E adda presentation 8-9-13
E   adda presentation 8-9-13E   adda presentation 8-9-13
E adda presentation 8-9-13
 
7 tips to use your computer more efficiently
7 tips to use your computer more efficiently7 tips to use your computer more efficiently
7 tips to use your computer more efficiently
 
1319571 634635606205391250
1319571 6346356062053912501319571 634635606205391250
1319571 634635606205391250
 
Security Issues in Android Custom ROM
Security Issues in Android Custom ROMSecurity Issues in Android Custom ROM
Security Issues in Android Custom ROM
 
Security Issues in Android Custom Rom
Security Issues in Android Custom RomSecurity Issues in Android Custom Rom
Security Issues in Android Custom Rom
 
Introduction to Android Programming
Introduction to Android ProgrammingIntroduction to Android Programming
Introduction to Android Programming
 
CNIT 128 8. Android Implementation Issues (Part 2)
CNIT 128 8. Android Implementation Issues (Part 2)CNIT 128 8. Android Implementation Issues (Part 2)
CNIT 128 8. Android Implementation Issues (Part 2)
 
CNIT 128: Android Implementation Issues (Part 2)
CNIT 128: Android Implementation Issues (Part 2)CNIT 128: Android Implementation Issues (Part 2)
CNIT 128: Android Implementation Issues (Part 2)
 
Jailbreaking iOS
Jailbreaking iOSJailbreaking iOS
Jailbreaking iOS
 
Android basic
Android basicAndroid basic
Android basic
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
 

Mais de Dignitas Digital Pvt. Ltd. (16)

Emotions in Marketing | Understanding Emotions In The Marketing.
Emotions in Marketing | Understanding Emotions In The Marketing.Emotions in Marketing | Understanding Emotions In The Marketing.
Emotions in Marketing | Understanding Emotions In The Marketing.
 
Affiliate marketing
Affiliate marketingAffiliate marketing
Affiliate marketing
 
Visual Content Marketing
Visual Content MarketingVisual Content Marketing
Visual Content Marketing
 
An Ideal Sales Cycle
An Ideal Sales CycleAn Ideal Sales Cycle
An Ideal Sales Cycle
 
Website audit for SEO
Website audit for SEOWebsite audit for SEO
Website audit for SEO
 
What is Ethical Hacking?
What is Ethical Hacking? What is Ethical Hacking?
What is Ethical Hacking?
 
Infographics
InfographicsInfographics
Infographics
 
Marketing Tools & Strategies
Marketing Tools & StrategiesMarketing Tools & Strategies
Marketing Tools & Strategies
 
LinkedIn marketing
LinkedIn marketingLinkedIn marketing
LinkedIn marketing
 
UI / UX Design Presentation
UI / UX Design PresentationUI / UX Design Presentation
UI / UX Design Presentation
 
Behavior Driven Development Testing (BDD)
Behavior Driven Development Testing (BDD)Behavior Driven Development Testing (BDD)
Behavior Driven Development Testing (BDD)
 
The Project ARA
The Project ARAThe Project ARA
The Project ARA
 
Ease of doing business in India and Agile Methodology
Ease of doing business in India and Agile MethodologyEase of doing business in India and Agile Methodology
Ease of doing business in India and Agile Methodology
 
Customer Relationship Management (CRM)
Customer Relationship Management (CRM)Customer Relationship Management (CRM)
Customer Relationship Management (CRM)
 
Digital Marketing & Advertising
Digital Marketing & AdvertisingDigital Marketing & Advertising
Digital Marketing & Advertising
 
DIY! Introduction to Arduino (Development Board)
DIY! Introduction to Arduino (Development Board) DIY! Introduction to Arduino (Development Board)
DIY! Introduction to Arduino (Development Board)
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Rooting android