-
Få indsigt i cybersikkerhed som begreb og en introduktion til nogle af de værktøjer og tilgange, du kan tage i brug allerede i dag for at beskytte dig…
Introduktion til cybersikkerhed - Cybertruslen og…
-
What is AI really, and broadly, how does it work? What role does machine learning play and are there limitations to its capabilities? In fact, why do we even have AI?…
When Machines Learn. A How and Why of AI
-
Microsoft Copilot og de nyeste AI-drevne værktøjer i Office gør det muligt at automatisere rutineopgaver, forbedre produktiviteten og skabe mere…
Automatisering Office med Copilot-agenter og…
-
Gagik Amaryan, MongoDBMCPs are meant to be these magical tools that let you integrate the latest and greatest AI models into any service. But when you’re dealing…
Secure MCP Servers in Production: It’s all…
-
Rune Kaagaard, Prescriba Claude Code is surprisingly good at handling large codebases, but only if you teach it properly. This talk covers practical lessons from working…
Claude Code in Practice: Making It Work on Real…
-
Ivan Sanchéz Valencia, CrateDB People often joke that there are more developers building MCP servers than developers using them, and there is some truth in that,…
The model context protocol (MCP). How is it made?
-
At this event, you will get three different perspectives on how the Model Context Protocol is changing the way we build and run AI-integrated systems. From understanding…
MCP in Practice: Building, Using, and Securing…
-
Få inspiration til at få Excel til noget, som ikke umiddelbart er muligt. Derudover gives der også en introduktion til nogle af de nye smarte…
Excel hacks med fokus på nye faciliteter og…
-
Management is the last step in implementing the AI Risk Management Framwork. We will take through the areas, topics and questions that are relevant to address, when…
AI Risk Management – kort og konkret, part…
-
This webinar is a cooperation between The Danish Society of Engineers (IDA), Connected Women in AI (CWAI) and the Tuborg Foundation. The discussion will address the…
“That’s Not Real Tech” :…
-
Få gode tricks til at automatisere og tilpasse dataimport af data, som typisk ikke importeres som ønsket. Tempoet er højt, men du vil have mulighed…
Tips og tricks til dataimport med Power Query i…
-
Taylor Banks, a cybersecurity strategist, educator, and builderIn fact, when taken to their extremes, such goals can work against each other. Strong security controls…
Security vs. Privacy: Striking the Balance Before…
-
David Heinemeier Hansson og IDA ITs formand Sidsel Jensen på scenen graver ud live, hvad der skal til for at blive digitalt suværen på den…
Digital suverænitet. En hot samtale
-
Asger Christensen, IT&Oplægget undersøger hvordan ledelse og digital suverænitet bør sammentænkes, og hvilke tiltag man kan…
Digital suverænitet kræver ledelse
-
Oplæg ved Poul-Henning KampWelcome to the Driving-IT DIY channel.Today in Some Assembly Required, we will go through the list of parts required, and how to…
Some Assembly Required: Digital Self Determination
-
Peer Heinlein, Heinlein Support GmbHEurope needs solid answers—and tools people want to use. For years, teams have tried to create credible alternatives to…
We Need Real Answers — Building the…
Søg efter ""