SlideShare uma empresa Scribd logo
1 de 44
 
 
 
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A modified Video camera is used for iris identification.
Pits Freckles Corona 266 DOF* * Each Degree of Freedom (Freiheitsgrad) has thousands Variations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
+ Face „only“ also underlies the „ replay attack = fakeable“
 
0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template  1 … 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. 0101001001010010010101011101011001010010100101010001101010010101111010100101010101010101010100101010010100101010101001010101000……….. Template  2 Template  0 1  2  3  4  5  6  7  8  9  0   number
 
[object Object],[object Object],[object Object],[object Object]
www.tabularasa-euproject.org 7th Framework  Research Programme  of the European Union  Trusted Biometrics under Replay & Spoofing Attacks
 
 
API - ID Start MobiComBiom
 
Trust %  Value  Time  100 % 10 % Adaptive Trust Level Your individual/personal Trust Level: - Maximum Payment - Level of Credit at bank - Personal Setting  10  Min. 60  Min. = Maximum 100% = Adds  10% = Adds 5%
 
Which applications could we think of?
Global  e-Access e-Security  e-Comfort One Software Once enroled Many applications on adaptive use
„ out of the box products“
Permanent  Authentication: ID – Perma Face Biometric Face Recognition Initial Authentication  with four figures Face, Voice, and Word Recognition
 
 
 
ID ComBiom  is an All in One Software. The user is always free to decide whether he wants to use  ComBiom  as a package or just single parts of it, such as  PermaFace  only or  PermaVoice  only.  ID Perma Face  will do a permanent biometric face control. If the wrong user is trying to steal data, the system would identify the thief and switch off. ID Perma Voice  identifies the user on it‘s biometric voice identification only. For example at night, without light.
Quelle: Frost & Sullivan, World Biometric Market, 2007
We wish you a merry X-MAS!!
 
 
Smartcard
Webcam
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trusted Traveller Standard Traveller eGate
Intermediate Stage:  Biometric Template  On Database  Central or Local
 
Man in the Middle Modification Trojan
2708 2708 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2500 00 Checksum of 2500,00 = 07 Checksum of 40 633452 0 = 27 ComBiom digits: 07 27 0727 Start Transfer Confirmed +  Stop ComBiom digits: 07 27 0727

Mais conteúdo relacionado

Mais procurados

Applications of face recognition system
Applications of face recognition systemApplications of face recognition system
Applications of face recognition system
AVNISH KUMAR
 
Barnes EMV Training Outline Mar 2013
Barnes EMV Training Outline Mar 2013Barnes EMV Training Outline Mar 2013
Barnes EMV Training Outline Mar 2013
Vivastream
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
Paras Garg
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 
face recognition using Principle Componet Analysis
face recognition using Principle Componet Analysisface recognition using Principle Componet Analysis
face recognition using Principle Componet Analysis
Abhilash Kotawar
 

Mais procurados (20)

Security
SecuritySecurity
Security
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
 
Biometrics
BiometricsBiometrics
Biometrics
 
Applications of face recognition system
Applications of face recognition systemApplications of face recognition system
Applications of face recognition system
 
Barnes EMV Training Outline Mar 2013
Barnes EMV Training Outline Mar 2013Barnes EMV Training Outline Mar 2013
Barnes EMV Training Outline Mar 2013
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Finger print recognized atm system
Finger print recognized atm systemFinger print recognized atm system
Finger print recognized atm system
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
11aman
11aman11aman
11aman
 
face recognation
face recognationface recognation
face recognation
 
Biometric System
Biometric SystemBiometric System
Biometric System
 
An eye with an atm
An eye with an atmAn eye with an atm
An eye with an atm
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
face recognition using Principle Componet Analysis
face recognition using Principle Componet Analysisface recognition using Principle Componet Analysis
face recognition using Principle Componet Analysis
 

Destaque

Comprehensive Business Modules - Business Enhancement Class, 5 - 6 Maret 2016...
Comprehensive Business Modules - Business Enhancement Class, 5 - 6 Maret 2016...Comprehensive Business Modules - Business Enhancement Class, 5 - 6 Maret 2016...
Comprehensive Business Modules - Business Enhancement Class, 5 - 6 Maret 2016...
Jesandy Krisano
 

Destaque (18)

2009-10 Hiring Trends: A Recruiter's Perspective
2009-10 Hiring Trends:  A Recruiter's Perspective2009-10 Hiring Trends:  A Recruiter's Perspective
2009-10 Hiring Trends: A Recruiter's Perspective
 
Turismo
TurismoTurismo
Turismo
 
Comprehensive Business Modules - Business Enhancement Class, 5 - 6 Maret 2016...
Comprehensive Business Modules - Business Enhancement Class, 5 - 6 Maret 2016...Comprehensive Business Modules - Business Enhancement Class, 5 - 6 Maret 2016...
Comprehensive Business Modules - Business Enhancement Class, 5 - 6 Maret 2016...
 
Social media101 for Tourism
Social media101 for TourismSocial media101 for Tourism
Social media101 for Tourism
 
Social Media 101 FINAL
Social Media 101 FINALSocial Media 101 FINAL
Social Media 101 FINAL
 
PPT Pengembangan karir
 PPT Pengembangan karir PPT Pengembangan karir
PPT Pengembangan karir
 
Implement a Sucessfull E-Distribution Strategy by Hopineo
Implement a Sucessfull E-Distribution Strategy by HopineoImplement a Sucessfull E-Distribution Strategy by Hopineo
Implement a Sucessfull E-Distribution Strategy by Hopineo
 
Marketing plan in 85 slides
Marketing plan in 85 slidesMarketing plan in 85 slides
Marketing plan in 85 slides
 
Representative Projects
Representative ProjectsRepresentative Projects
Representative Projects
 
Pms presentation
Pms presentationPms presentation
Pms presentation
 
Continuous Integration, Delivery and Deployment for Mobile Tauno Talimaa - CT...
Continuous Integration, Delivery and Deployment for Mobile Tauno Talimaa - CT...Continuous Integration, Delivery and Deployment for Mobile Tauno Talimaa - CT...
Continuous Integration, Delivery and Deployment for Mobile Tauno Talimaa - CT...
 
Celebrating 20 years of Hydraulic Component Design library in LMS Imagine.Lab...
Celebrating 20 years of Hydraulic Component Design library in LMS Imagine.Lab...Celebrating 20 years of Hydraulic Component Design library in LMS Imagine.Lab...
Celebrating 20 years of Hydraulic Component Design library in LMS Imagine.Lab...
 
Optimica Compiler Toolkit - Overview
Optimica Compiler Toolkit - OverviewOptimica Compiler Toolkit - Overview
Optimica Compiler Toolkit - Overview
 
Job Market Trend Report 2009-10
Job Market Trend Report 2009-10Job Market Trend Report 2009-10
Job Market Trend Report 2009-10
 
AWS CloudFormation Intrinsic Functions and Mappings
AWS CloudFormation Intrinsic Functions and Mappings AWS CloudFormation Intrinsic Functions and Mappings
AWS CloudFormation Intrinsic Functions and Mappings
 
The Journey from Monolith to Microservices: a Guided Adventure
The Journey from Monolith to Microservices: a Guided AdventureThe Journey from Monolith to Microservices: a Guided Adventure
The Journey from Monolith to Microservices: a Guided Adventure
 
Presentation on Cox's Bazar and Kuakata
Presentation on Cox's Bazar and KuakataPresentation on Cox's Bazar and Kuakata
Presentation on Cox's Bazar and Kuakata
 
How to Build a Successful AWS Consulting Practice
How to Build a Successful AWS Consulting PracticeHow to Build a Successful AWS Consulting Practice
How to Build a Successful AWS Consulting Practice
 

Semelhante a Biometry Presentation in Riga, Werner Blessing

Vortrag CeBIT 2011 - Biometric Security
Vortrag CeBIT 2011 - Biometric SecurityVortrag CeBIT 2011 - Biometric Security
Vortrag CeBIT 2011 - Biometric Security
BIOMETRY.com AG
 
Todays modern biometric solutions
Todays modern biometric solutionsTodays modern biometric solutions
Todays modern biometric solutions
BIOMETRY.com AG
 
Securing the Software Defined Car™ Using Artificial Intelligence and OTA Updates
Securing the Software Defined Car™ Using Artificial Intelligence and OTA UpdatesSecuring the Software Defined Car™ Using Artificial Intelligence and OTA Updates
Securing the Software Defined Car™ Using Artificial Intelligence and OTA Updates
Mahbubul Alam
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
suniljoshi151
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 

Semelhante a Biometry Presentation in Riga, Werner Blessing (20)

Vortrag CeBIT 2011 - Biometric Security
Vortrag CeBIT 2011 - Biometric SecurityVortrag CeBIT 2011 - Biometric Security
Vortrag CeBIT 2011 - Biometric Security
 
Todays modern biometric solutions
Todays modern biometric solutionsTodays modern biometric solutions
Todays modern biometric solutions
 
2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch2011 05 11 12-45 werner blessing topfsoft_ch
2011 05 11 12-45 werner blessing topfsoft_ch
 
BIOMETRYsso
BIOMETRYssoBIOMETRYsso
BIOMETRYsso
 
E banking security
E banking securityE banking security
E banking security
 
Axiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identityAxiom protect-2.0-with-one identity
Axiom protect-2.0-with-one identity
 
Securing the Software Defined Car™ Using Artificial Intelligence and OTA Updates
Securing the Software Defined Car™ Using Artificial Intelligence and OTA UpdatesSecuring the Software Defined Car™ Using Artificial Intelligence and OTA Updates
Securing the Software Defined Car™ Using Artificial Intelligence and OTA Updates
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor Authentication
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Seminar
SeminarSeminar
Seminar
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
iTM Banking Security Presentation
iTM Banking Security PresentationiTM Banking Security Presentation
iTM Banking Security Presentation
 
Introduction To Biometrics
Introduction To BiometricsIntroduction To Biometrics
Introduction To Biometrics
 
System Z Mainframe Security For An Enterprise
System Z Mainframe Security For An EnterpriseSystem Z Mainframe Security For An Enterprise
System Z Mainframe Security For An Enterprise
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Face detection and recognition
Face detection and recognitionFace detection and recognition
Face detection and recognition
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tDefcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
 

Mais de MobileMonday Estonia

Mais de MobileMonday Estonia (20)

Modern problems in backend engineering, Siim Kaspar Uustalu
Modern problems in backend engineering, Siim Kaspar UustaluModern problems in backend engineering, Siim Kaspar Uustalu
Modern problems in backend engineering, Siim Kaspar Uustalu
 
Modern problems in backend engineering, Marten Meikop
Modern problems in backend engineering, Marten MeikopModern problems in backend engineering, Marten Meikop
Modern problems in backend engineering, Marten Meikop
 
Modern problems in backend engineering, Asko Tiidumaa
Modern problems in backend engineering, Asko TiidumaaModern problems in backend engineering, Asko Tiidumaa
Modern problems in backend engineering, Asko Tiidumaa
 
Modern problems in backend engineering, Joel Mislav Kunst
Modern problems in backend engineering, Joel Mislav KunstModern problems in backend engineering, Joel Mislav Kunst
Modern problems in backend engineering, Joel Mislav Kunst
 
Modern problems in backend engineering, Jüri Tarkpea
Modern problems in backend engineering, Jüri TarkpeaModern problems in backend engineering, Jüri Tarkpea
Modern problems in backend engineering, Jüri Tarkpea
 
Scientists meet Entrepreneurs - AI & Machine Learning, Mark Fishel, Institute...
Scientists meet Entrepreneurs - AI & Machine Learning, Mark Fishel, Institute...Scientists meet Entrepreneurs - AI & Machine Learning, Mark Fishel, Institute...
Scientists meet Entrepreneurs - AI & Machine Learning, Mark Fishel, Institute...
 
Scientists meet Entrepreneurs - AI & Machine Learning, Kristjan Korjus, Starship
Scientists meet Entrepreneurs - AI & Machine Learning, Kristjan Korjus, StarshipScientists meet Entrepreneurs - AI & Machine Learning, Kristjan Korjus, Starship
Scientists meet Entrepreneurs - AI & Machine Learning, Kristjan Korjus, Starship
 
Scientists meet Entrepreneurs - AI & Machine Learning, Peeter Piksarv, Moonca...
Scientists meet Entrepreneurs - AI & Machine Learning, Peeter Piksarv, Moonca...Scientists meet Entrepreneurs - AI & Machine Learning, Peeter Piksarv, Moonca...
Scientists meet Entrepreneurs - AI & Machine Learning, Peeter Piksarv, Moonca...
 
Scientists meet Entrepreneurs - AI & Machine Learning, Tambet Matiisen, Unive...
Scientists meet Entrepreneurs - AI & Machine Learning, Tambet Matiisen, Unive...Scientists meet Entrepreneurs - AI & Machine Learning, Tambet Matiisen, Unive...
Scientists meet Entrepreneurs - AI & Machine Learning, Tambet Matiisen, Unive...
 
Scientists meet Entrepreneurs - AI & Machine Learning, Dima Fishman, Universi...
Scientists meet Entrepreneurs - AI & Machine Learning, Dima Fishman, Universi...Scientists meet Entrepreneurs - AI & Machine Learning, Dima Fishman, Universi...
Scientists meet Entrepreneurs - AI & Machine Learning, Dima Fishman, Universi...
 
Space Edition, Sven Lilla, ESA BIC
Space Edition, Sven Lilla, ESA BICSpace Edition, Sven Lilla, ESA BIC
Space Edition, Sven Lilla, ESA BIC
 
Space Edition, Kadri Bussov, EST Cube
Space Edition, Kadri Bussov, EST CubeSpace Edition, Kadri Bussov, EST Cube
Space Edition, Kadri Bussov, EST Cube
 
Space Edition, Kalev Koppel, KappaZetta
Space Edition, Kalev Koppel, KappaZettaSpace Edition, Kalev Koppel, KappaZetta
Space Edition, Kalev Koppel, KappaZetta
 
Space Edition, Dr. Ali Nadir Arslan
Space Edition, Dr. Ali Nadir Arslan Space Edition, Dr. Ali Nadir Arslan
Space Edition, Dr. Ali Nadir Arslan
 
Product Marketing, Kair Käsper, Pipedrive
Product Marketing, Kair Käsper, PipedriveProduct Marketing, Kair Käsper, Pipedrive
Product Marketing, Kair Käsper, Pipedrive
 
Product Marketing, Marelle Ellen
Product Marketing, Marelle EllenProduct Marketing, Marelle Ellen
Product Marketing, Marelle Ellen
 
Product Marketing, Mattias Liivak, Fortumo
Product Marketing, Mattias Liivak, FortumoProduct Marketing, Mattias Liivak, Fortumo
Product Marketing, Mattias Liivak, Fortumo
 
What Does it take to Develop Kickass Products?, Laura Noodapera
What Does it take to Develop Kickass Products?, Laura NoodaperaWhat Does it take to Develop Kickass Products?, Laura Noodapera
What Does it take to Develop Kickass Products?, Laura Noodapera
 
What Does it take to Develop Kickass Products?, Britt Maasalu
What Does it take to Develop Kickass Products?, Britt MaasaluWhat Does it take to Develop Kickass Products?, Britt Maasalu
What Does it take to Develop Kickass Products?, Britt Maasalu
 
Meeting Female Entrepreneurs in Tech, Triinu Sirge
Meeting Female Entrepreneurs in Tech, Triinu SirgeMeeting Female Entrepreneurs in Tech, Triinu Sirge
Meeting Female Entrepreneurs in Tech, Triinu Sirge
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Biometry Presentation in Riga, Werner Blessing