SlideShare uma empresa Scribd logo
1 de 11
Meet Jitsi
How journalists can use Jitsi Meet to protect
their communications
1. Go to meet.jit.si
2. Set up cam and mic
2. You will get a new URL
3. Set up a password
5. Write your password
6. Conference is now safe
7. Now, share the link
8. Share the password too
9. You are ready to talk!
JORGE LUIS SIERRA
Global Knight International Journalism Fellow
Follow me at @latinointx

Mais conteúdo relacionado

Mais procurados

Fortnite video poste template
Fortnite video poste templateFortnite video poste template
Fortnite video poste templateKhadijaSlit
 
NJ Hadoop Meetup - Apache NiFi Deep Dive
NJ Hadoop Meetup - Apache NiFi Deep DiveNJ Hadoop Meetup - Apache NiFi Deep Dive
NJ Hadoop Meetup - Apache NiFi Deep DiveBryan Bende
 
Hyper-casual in a Hypercompetitive Market - Voodoo
Hyper-casual in a Hypercompetitive Market - VoodooHyper-casual in a Hypercompetitive Market - Voodoo
Hyper-casual in a Hypercompetitive Market - VoodooGameAnalytics
 
Eight Great Elementary Learning Strategies using Keynote
Eight Great Elementary Learning Strategies using KeynoteEight Great Elementary Learning Strategies using Keynote
Eight Great Elementary Learning Strategies using KeynoteKaren Bosch
 
12 Principles Of Animations
12 Principles Of Animations12 Principles Of Animations
12 Principles Of AnimationsDaniel Downs
 
Unity 3D game engine seminar
Unity 3D game engine  seminarUnity 3D game engine  seminar
Unity 3D game engine seminarNikhilThorat15
 
Introduction to Rust language programming
Introduction to Rust language programmingIntroduction to Rust language programming
Introduction to Rust language programmingRodolfo Finochietti
 
iPads for Language Arts Creativity
iPads for Language Arts CreativityiPads for Language Arts Creativity
iPads for Language Arts CreativityKaren Bosch
 
The Art of Educational Game Design.pdf
The Art of Educational Game Design.pdfThe Art of Educational Game Design.pdf
The Art of Educational Game Design.pdfJesse Schell
 
第12回オペレーティングシステム
第12回オペレーティングシステム第12回オペレーティングシステム
第12回オペレーティングシステム眞樹 冨澤
 
Beneath the Linux Interrupt handling
Beneath the Linux Interrupt handlingBeneath the Linux Interrupt handling
Beneath the Linux Interrupt handlingBhoomil Chavda
 
MPI DevCon Hsinchu City 2017: MIPI C-PHY/D-PHY Dual Mode Subsystem Performanc...
MPI DevCon Hsinchu City 2017: MIPI C-PHY/D-PHY Dual Mode Subsystem Performanc...MPI DevCon Hsinchu City 2017: MIPI C-PHY/D-PHY Dual Mode Subsystem Performanc...
MPI DevCon Hsinchu City 2017: MIPI C-PHY/D-PHY Dual Mode Subsystem Performanc...MIPI Alliance
 
Artificial intelligence in gaming.
Artificial intelligence in gaming.Artificial intelligence in gaming.
Artificial intelligence in gaming.Rishikese MR
 
SFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEESFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEELinaro
 
Intro to Mobile Game Development
Intro to Mobile Game DevelopmentIntro to Mobile Game Development
Intro to Mobile Game DevelopmentShahed Chowdhuri
 
HKG18-402 - Build secure key management services in OP-TEE
HKG18-402 - Build secure key management services in OP-TEEHKG18-402 - Build secure key management services in OP-TEE
HKG18-402 - Build secure key management services in OP-TEELinaro
 
Insights on the Configuration and Performances of SOME/IP Service Discovery
Insights on the Configuration and Performances of SOME/IP Service DiscoveryInsights on the Configuration and Performances of SOME/IP Service Discovery
Insights on the Configuration and Performances of SOME/IP Service DiscoveryRealTime-at-Work (RTaW)
 
No More Flat Stanley: Learning in 3D
No More Flat Stanley: Learning in 3DNo More Flat Stanley: Learning in 3D
No More Flat Stanley: Learning in 3DKaren Bosch
 

Mais procurados (20)

Fortnite video poste template
Fortnite video poste templateFortnite video poste template
Fortnite video poste template
 
Fidl analysis
Fidl analysisFidl analysis
Fidl analysis
 
NJ Hadoop Meetup - Apache NiFi Deep Dive
NJ Hadoop Meetup - Apache NiFi Deep DiveNJ Hadoop Meetup - Apache NiFi Deep Dive
NJ Hadoop Meetup - Apache NiFi Deep Dive
 
Hyper-casual in a Hypercompetitive Market - Voodoo
Hyper-casual in a Hypercompetitive Market - VoodooHyper-casual in a Hypercompetitive Market - Voodoo
Hyper-casual in a Hypercompetitive Market - Voodoo
 
Eight Great Elementary Learning Strategies using Keynote
Eight Great Elementary Learning Strategies using KeynoteEight Great Elementary Learning Strategies using Keynote
Eight Great Elementary Learning Strategies using Keynote
 
12 Principles Of Animations
12 Principles Of Animations12 Principles Of Animations
12 Principles Of Animations
 
Gdd template
Gdd templateGdd template
Gdd template
 
Unity 3D game engine seminar
Unity 3D game engine  seminarUnity 3D game engine  seminar
Unity 3D game engine seminar
 
Introduction to Rust language programming
Introduction to Rust language programmingIntroduction to Rust language programming
Introduction to Rust language programming
 
iPads for Language Arts Creativity
iPads for Language Arts CreativityiPads for Language Arts Creativity
iPads for Language Arts Creativity
 
The Art of Educational Game Design.pdf
The Art of Educational Game Design.pdfThe Art of Educational Game Design.pdf
The Art of Educational Game Design.pdf
 
第12回オペレーティングシステム
第12回オペレーティングシステム第12回オペレーティングシステム
第12回オペレーティングシステム
 
Beneath the Linux Interrupt handling
Beneath the Linux Interrupt handlingBeneath the Linux Interrupt handling
Beneath the Linux Interrupt handling
 
MPI DevCon Hsinchu City 2017: MIPI C-PHY/D-PHY Dual Mode Subsystem Performanc...
MPI DevCon Hsinchu City 2017: MIPI C-PHY/D-PHY Dual Mode Subsystem Performanc...MPI DevCon Hsinchu City 2017: MIPI C-PHY/D-PHY Dual Mode Subsystem Performanc...
MPI DevCon Hsinchu City 2017: MIPI C-PHY/D-PHY Dual Mode Subsystem Performanc...
 
Artificial intelligence in gaming.
Artificial intelligence in gaming.Artificial intelligence in gaming.
Artificial intelligence in gaming.
 
SFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEESFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEE
 
Intro to Mobile Game Development
Intro to Mobile Game DevelopmentIntro to Mobile Game Development
Intro to Mobile Game Development
 
HKG18-402 - Build secure key management services in OP-TEE
HKG18-402 - Build secure key management services in OP-TEEHKG18-402 - Build secure key management services in OP-TEE
HKG18-402 - Build secure key management services in OP-TEE
 
Insights on the Configuration and Performances of SOME/IP Service Discovery
Insights on the Configuration and Performances of SOME/IP Service DiscoveryInsights on the Configuration and Performances of SOME/IP Service Discovery
Insights on the Configuration and Performances of SOME/IP Service Discovery
 
No More Flat Stanley: Learning in 3D
No More Flat Stanley: Learning in 3DNo More Flat Stanley: Learning in 3D
No More Flat Stanley: Learning in 3D
 

Destaque

Jitsi Videobridge
Jitsi VideobridgeJitsi Videobridge
Jitsi Videobridgeemilivov
 
Конференции с Jitsi Meet
Конференции с Jitsi MeetКонференции с Jitsi Meet
Конференции с Jitsi MeetYasen Pramatarov
 
Securing Voice Communication
Securing Voice CommunicationSecuring Voice Communication
Securing Voice CommunicationLuca Pradovera
 
Top 10 Best Skype Alternatives
Top 10 Best Skype AlternativesTop 10 Best Skype Alternatives
Top 10 Best Skype Alternativesmaccolar
 
How to encrypt emails
How to encrypt emailsHow to encrypt emails
How to encrypt emailsIJNet
 
Bulletproofing digital newsrooms
Bulletproofing digital newsroomsBulletproofing digital newsrooms
Bulletproofing digital newsroomsJorge Luis Sierra
 
Конференции с Jitsi Meet
Конференции с Jitsi MeetКонференции с Jitsi Meet
Конференции с Jitsi MeetYasen Pramatarov
 
IoTをインターネット越しで見る
IoTをインターネット越しで見るIoTをインターネット越しで見る
IoTをインターネット越しで見るtnoho
 
Virtual Engagement Through Videoconferencing by Ted Ritzer June 25, 2015
Virtual Engagement Through Videoconferencing by Ted Ritzer June 25, 2015Virtual Engagement Through Videoconferencing by Ted Ritzer June 25, 2015
Virtual Engagement Through Videoconferencing by Ted Ritzer June 25, 2015Ted Ritzer
 
Jitsi video bridge で遊んでみた
Jitsi video bridge で遊んでみたJitsi video bridge で遊んでみた
Jitsi video bridge で遊んでみたtnoho
 
The future of virtual learning environments: Beyond Chamilo 2
The future of  virtual learning environments: Beyond Chamilo 2The future of  virtual learning environments: Beyond Chamilo 2
The future of virtual learning environments: Beyond Chamilo 2Frederik Questier
 
Chamilo advantages against other LMSes
Chamilo advantages against other LMSesChamilo advantages against other LMSes
Chamilo advantages against other LMSesYannick Warnier
 
SFUの話
SFUの話SFUの話
SFUの話tnoho
 
Documentation of the Hands-on workshop: experience the life of your Content O...
Documentation of the Hands-on workshop: experience the life of your Content O...Documentation of the Hands-on workshop: experience the life of your Content O...
Documentation of the Hands-on workshop: experience the life of your Content O...Chamilo Association
 

Destaque (20)

Jitsi Videobridge
Jitsi VideobridgeJitsi Videobridge
Jitsi Videobridge
 
Конференции с Jitsi Meet
Конференции с Jitsi MeetКонференции с Jitsi Meet
Конференции с Jitsi Meet
 
Jitsi
JitsiJitsi
Jitsi
 
Securing Voice Communication
Securing Voice CommunicationSecuring Voice Communication
Securing Voice Communication
 
Jitsi: State of the Union
Jitsi: State of the UnionJitsi: State of the Union
Jitsi: State of the Union
 
Top 10 Best Skype Alternatives
Top 10 Best Skype AlternativesTop 10 Best Skype Alternatives
Top 10 Best Skype Alternatives
 
How to encrypt emails
How to encrypt emailsHow to encrypt emails
How to encrypt emails
 
Bulletproofing digital newsrooms
Bulletproofing digital newsroomsBulletproofing digital newsrooms
Bulletproofing digital newsrooms
 
Конференции с Jitsi Meet
Конференции с Jitsi MeetКонференции с Jitsi Meet
Конференции с Jitsi Meet
 
IoTをインターネット越しで見る
IoTをインターネット越しで見るIoTをインターネット越しで見る
IoTをインターネット越しで見る
 
Virtual Engagement Through Videoconferencing by Ted Ritzer June 25, 2015
Virtual Engagement Through Videoconferencing by Ted Ritzer June 25, 2015Virtual Engagement Through Videoconferencing by Ted Ritzer June 25, 2015
Virtual Engagement Through Videoconferencing by Ted Ritzer June 25, 2015
 
Chamilo lms
Chamilo lmsChamilo lms
Chamilo lms
 
Jitsi video bridge で遊んでみた
Jitsi video bridge で遊んでみたJitsi video bridge で遊んでみた
Jitsi video bridge で遊んでみた
 
A jQuery for WebRTC
A jQuery for WebRTCA jQuery for WebRTC
A jQuery for WebRTC
 
Chamilo
ChamiloChamilo
Chamilo
 
The future of virtual learning environments: Beyond Chamilo 2
The future of  virtual learning environments: Beyond Chamilo 2The future of  virtual learning environments: Beyond Chamilo 2
The future of virtual learning environments: Beyond Chamilo 2
 
De SIP a WebRTC y vice versa
De SIP a WebRTC y vice versaDe SIP a WebRTC y vice versa
De SIP a WebRTC y vice versa
 
Chamilo advantages against other LMSes
Chamilo advantages against other LMSesChamilo advantages against other LMSes
Chamilo advantages against other LMSes
 
SFUの話
SFUの話SFUの話
SFUの話
 
Documentation of the Hands-on workshop: experience the life of your Content O...
Documentation of the Hands-on workshop: experience the life of your Content O...Documentation of the Hands-on workshop: experience the life of your Content O...
Documentation of the Hands-on workshop: experience the life of your Content O...
 

Mais de Jorge Luis Sierra

Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chromeManual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chromeJorge Luis Sierra
 
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0Jorge Luis Sierra
 
Manual de seguridad digital y móvil
Manual de seguridad digital y móvilManual de seguridad digital y móvil
Manual de seguridad digital y móvilJorge Luis Sierra
 
Cómo encriptar tu celular Android
Cómo encriptar tu celular AndroidCómo encriptar tu celular Android
Cómo encriptar tu celular AndroidJorge Luis Sierra
 
Caja de herramientas de seguridad digital
Caja de herramientas de seguridad digitalCaja de herramientas de seguridad digital
Caja de herramientas de seguridad digitalJorge Luis Sierra
 
Protege tu comunicación digital
Protege tu comunicación digitalProtege tu comunicación digital
Protege tu comunicación digitalJorge Luis Sierra
 
Evaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en GuerreroEvaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en GuerreroJorge Luis Sierra
 
Evaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en VeracruzEvaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en VeracruzJorge Luis Sierra
 
Policías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de VeracruzPolicías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de VeracruzJorge Luis Sierra
 
Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet Jorge Luis Sierra
 
Cómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVaultCómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVaultJorge Luis Sierra
 
Cómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmailCómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmailJorge Luis Sierra
 
Protección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internetProtección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internetJorge Luis Sierra
 
Protección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñasProtección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñasJorge Luis Sierra
 
How to encrypt word documents
How to encrypt word documentsHow to encrypt word documents
How to encrypt word documentsJorge Luis Sierra
 

Mais de Jorge Luis Sierra (20)

Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chromeManual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
 
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
 
Manual de seguridad digital y móvil
Manual de seguridad digital y móvilManual de seguridad digital y móvil
Manual de seguridad digital y móvil
 
Cómo encriptar tu celular Android
Cómo encriptar tu celular AndroidCómo encriptar tu celular Android
Cómo encriptar tu celular Android
 
Caja de herramientas de seguridad digital
Caja de herramientas de seguridad digitalCaja de herramientas de seguridad digital
Caja de herramientas de seguridad digital
 
Protege tu comunicación digital
Protege tu comunicación digitalProtege tu comunicación digital
Protege tu comunicación digital
 
How to use anonymox
How to use anonymoxHow to use anonymox
How to use anonymox
 
Spear phishing attacks
Spear phishing attacksSpear phishing attacks
Spear phishing attacks
 
Evaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en GuerreroEvaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en Guerrero
 
Evaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en VeracruzEvaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en Veracruz
 
Policías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de VeracruzPolicías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de Veracruz
 
Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet
 
Cómo usar peerio
Cómo usar peerioCómo usar peerio
Cómo usar peerio
 
Cómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVaultCómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVault
 
Cómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmailCómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmail
 
Cómo encriptar emails
Cómo encriptar emailsCómo encriptar emails
Cómo encriptar emails
 
Protección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internetProtección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internet
 
Protege tu móvil
Protege tu móvilProtege tu móvil
Protege tu móvil
 
Protección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñasProtección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñas
 
How to encrypt word documents
How to encrypt word documentsHow to encrypt word documents
How to encrypt word documents
 

Último

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Jitsi meet