ºÝºÝߣshows by User: mprerad / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: mprerad / Thu, 22 Oct 2020 17:49:51 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: mprerad Remote Work Productivity /slideshow/remote-work-productivity/238943956 time-informer-201022174951
Employee productivity monitoring is not a new discipline. For example, supervisors in 19th-century factories monitored workers to ensure they were keeping pace. And employee productivity monitoring continues today, albeit in a much different fashion. The digitalization of work has enabled a much greater scale for monitoring the productivity of many kinds of workers who use technology to communicate and to get work done. Add to this a stark increase in employees working remotely, and the interest in scaling employee productivity monitoring technology follows. The context of the global COVID-19 pandemic pushed substantially more employees to work remotely at very short notice. They did not have the chance to redesign their work tasks to better fit remote work. This leads to renewed interest in monitoring workers. Employee productivity monitoring technologies use data to answer one or more of the following key questions: * What amount of time is being spent on which tasks? * What percentage of time is being detected as idle time? * Are there any trends in time spent on different tasks? * Are employees working efficiently and productively, per established work standards and procedures (when applicable)? * What technology, process or physical workspace issues may be making work less efficient? * What skills could help an individual worker or team be more productive? * Is the person hired to do the work actually the one completing that task? * Is the person performing the task doing so in a manner that does not raise undue safety risks or concerns over corporate security?]]>

Employee productivity monitoring is not a new discipline. For example, supervisors in 19th-century factories monitored workers to ensure they were keeping pace. And employee productivity monitoring continues today, albeit in a much different fashion. The digitalization of work has enabled a much greater scale for monitoring the productivity of many kinds of workers who use technology to communicate and to get work done. Add to this a stark increase in employees working remotely, and the interest in scaling employee productivity monitoring technology follows. The context of the global COVID-19 pandemic pushed substantially more employees to work remotely at very short notice. They did not have the chance to redesign their work tasks to better fit remote work. This leads to renewed interest in monitoring workers. Employee productivity monitoring technologies use data to answer one or more of the following key questions: * What amount of time is being spent on which tasks? * What percentage of time is being detected as idle time? * Are there any trends in time spent on different tasks? * Are employees working efficiently and productively, per established work standards and procedures (when applicable)? * What technology, process or physical workspace issues may be making work less efficient? * What skills could help an individual worker or team be more productive? * Is the person hired to do the work actually the one completing that task? * Is the person performing the task doing so in a manner that does not raise undue safety risks or concerns over corporate security?]]>
Thu, 22 Oct 2020 17:49:51 GMT /slideshow/remote-work-productivity/238943956 mprerad@slideshare.net(mprerad) Remote Work Productivity mprerad Employee productivity monitoring is not a new discipline. For example, supervisors in 19th-century factories monitored workers to ensure they were keeping pace. And employee productivity monitoring continues today, albeit in a much different fashion. The digitalization of work has enabled a much greater scale for monitoring the productivity of many kinds of workers who use technology to communicate and to get work done. Add to this a stark increase in employees working remotely, and the interest in scaling employee productivity monitoring technology follows. The context of the global COVID-19 pandemic pushed substantially more employees to work remotely at very short notice. They did not have the chance to redesign their work tasks to better fit remote work. This leads to renewed interest in monitoring workers. Employee productivity monitoring technologies use data to answer one or more of the following key questions: * What amount of time is being spent on which tasks? * What percentage of time is being detected as idle time? * Are there any trends in time spent on different tasks? * Are employees working efficiently and productively, per established work standards and procedures (when applicable)? * What technology, process or physical workspace issues may be making work less efficient? * What skills could help an individual worker or team be more productive? * Is the person hired to do the work actually the one completing that task? * Is the person performing the task doing so in a manner that does not raise undue safety risks or concerns over corporate security? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/time-informer-201022174951-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Employee productivity monitoring is not a new discipline. For example, supervisors in 19th-century factories monitored workers to ensure they were keeping pace. And employee productivity monitoring continues today, albeit in a much different fashion. The digitalization of work has enabled a much greater scale for monitoring the productivity of many kinds of workers who use technology to communicate and to get work done. Add to this a stark increase in employees working remotely, and the interest in scaling employee productivity monitoring technology follows. The context of the global COVID-19 pandemic pushed substantially more employees to work remotely at very short notice. They did not have the chance to redesign their work tasks to better fit remote work. This leads to renewed interest in monitoring workers. Employee productivity monitoring technologies use data to answer one or more of the following key questions: * What amount of time is being spent on which tasks? * What percentage of time is being detected as idle time? * Are there any trends in time spent on different tasks? * Are employees working efficiently and productively, per established work standards and procedures (when applicable)? * What technology, process or physical workspace issues may be making work less efficient? * What skills could help an individual worker or team be more productive? * Is the person hired to do the work actually the one completing that task? * Is the person performing the task doing so in a manner that does not raise undue safety risks or concerns over corporate security?
Remote Work Productivity from Mihajlo Prerad
]]>
265 0 https://cdn.slidesharecdn.com/ss_thumbnails/time-informer-201022174951-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Security Delivery Platform: Best practices /slideshow/security-delivery-platform-best-practices-76525515/76525515 securitydeliveryplatform-ngsec-170531140255
Security Delivery Platform: Best practices The traditional Security model was one that operated under simple assumptions. Those assumptions led to deployment models which in todays’ world of cyber security have been proven to be quite vulnerable and inadequate to growing amount and diversity of threats. A Security Delivery Platform addresses the above considerations and provides a powerful solution for deploying a diverse set of security solutions, as well as scaling each security solution beyond traditional deployments. Such platform delivers visibility into the lateral movement of malware, accelerate the detection of ex-filtration activity, and could significantly reduce the overhead, complexity and costs associated with such security deployments. In today’s world of industrialized and well-organized cyber threats, it is no longer sufficient to focus on the security applications exclusively. Focusing on how those solutions get deployed together and how they get consistent access to relevant data is a critical piece of the solution. A Security Delivery Platform in this sense is a foundational building block of any cyber security strategy.]]>

Security Delivery Platform: Best practices The traditional Security model was one that operated under simple assumptions. Those assumptions led to deployment models which in todays’ world of cyber security have been proven to be quite vulnerable and inadequate to growing amount and diversity of threats. A Security Delivery Platform addresses the above considerations and provides a powerful solution for deploying a diverse set of security solutions, as well as scaling each security solution beyond traditional deployments. Such platform delivers visibility into the lateral movement of malware, accelerate the detection of ex-filtration activity, and could significantly reduce the overhead, complexity and costs associated with such security deployments. In today’s world of industrialized and well-organized cyber threats, it is no longer sufficient to focus on the security applications exclusively. Focusing on how those solutions get deployed together and how they get consistent access to relevant data is a critical piece of the solution. A Security Delivery Platform in this sense is a foundational building block of any cyber security strategy.]]>
Wed, 31 May 2017 14:02:55 GMT /slideshow/security-delivery-platform-best-practices-76525515/76525515 mprerad@slideshare.net(mprerad) Security Delivery Platform: Best practices mprerad Security Delivery Platform: Best practices The traditional Security model was one that operated under simple assumptions. Those assumptions led to deployment models which in todays’ world of cyber security have been proven to be quite vulnerable and inadequate to growing amount and diversity of threats. A Security Delivery Platform addresses the above considerations and provides a powerful solution for deploying a diverse set of security solutions, as well as scaling each security solution beyond traditional deployments. Such platform delivers visibility into the lateral movement of malware, accelerate the detection of ex-filtration activity, and could significantly reduce the overhead, complexity and costs associated with such security deployments. In today’s world of industrialized and well-organized cyber threats, it is no longer sufficient to focus on the security applications exclusively. Focusing on how those solutions get deployed together and how they get consistent access to relevant data is a critical piece of the solution. A Security Delivery Platform in this sense is a foundational building block of any cyber security strategy. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securitydeliveryplatform-ngsec-170531140255-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Security Delivery Platform: Best practices The traditional Security model was one that operated under simple assumptions. Those assumptions led to deployment models which in todays’ world of cyber security have been proven to be quite vulnerable and inadequate to growing amount and diversity of threats. A Security Delivery Platform addresses the above considerations and provides a powerful solution for deploying a diverse set of security solutions, as well as scaling each security solution beyond traditional deployments. Such platform delivers visibility into the lateral movement of malware, accelerate the detection of ex-filtration activity, and could significantly reduce the overhead, complexity and costs associated with such security deployments. In today’s world of industrialized and well-organized cyber threats, it is no longer sufficient to focus on the security applications exclusively. Focusing on how those solutions get deployed together and how they get consistent access to relevant data is a critical piece of the solution. A Security Delivery Platform in this sense is a foundational building block of any cyber security strategy.
Security Delivery Platform: Best practices from Mihajlo Prerad
]]>
954 3 https://cdn.slidesharecdn.com/ss_thumbnails/securitydeliveryplatform-ngsec-170531140255-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Biggest Data Breaches of 2013 /slideshow/biggest-data-breaches-of-2013/31537245 the-year-of-breach-140223085110-phpapp01
Year 2013. will definitely be remembered as year with largest number of data breach incidents. Some incidents are already recognized as synonyms for word breach: 1. Edward Snowden vs. NSA 2. Adobe - 150 million records exposed 3. Target - 110 million records exposed Moreover, year 2013. had almost double the number of breaches from 2011., totaling amount of 822 million data breaches. In my presentation, I tried to illustrate and point out most important facts about those breaches. Hope you'll like it - feel free to share! Mihajlo Prerad]]>

Year 2013. will definitely be remembered as year with largest number of data breach incidents. Some incidents are already recognized as synonyms for word breach: 1. Edward Snowden vs. NSA 2. Adobe - 150 million records exposed 3. Target - 110 million records exposed Moreover, year 2013. had almost double the number of breaches from 2011., totaling amount of 822 million data breaches. In my presentation, I tried to illustrate and point out most important facts about those breaches. Hope you'll like it - feel free to share! Mihajlo Prerad]]>
Sun, 23 Feb 2014 08:51:10 GMT /slideshow/biggest-data-breaches-of-2013/31537245 mprerad@slideshare.net(mprerad) Biggest Data Breaches of 2013 mprerad Year 2013. will definitely be remembered as year with largest number of data breach incidents. Some incidents are already recognized as synonyms for word breach: 1. Edward Snowden vs. NSA 2. Adobe - 150 million records exposed 3. Target - 110 million records exposed Moreover, year 2013. had almost double the number of breaches from 2011., totaling amount of 822 million data breaches. In my presentation, I tried to illustrate and point out most important facts about those breaches. Hope you'll like it - feel free to share! Mihajlo Prerad <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/the-year-of-breach-140223085110-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Year 2013. will definitely be remembered as year with largest number of data breach incidents. Some incidents are already recognized as synonyms for word breach: 1. Edward Snowden vs. NSA 2. Adobe - 150 million records exposed 3. Target - 110 million records exposed Moreover, year 2013. had almost double the number of breaches from 2011., totaling amount of 822 million data breaches. In my presentation, I tried to illustrate and point out most important facts about those breaches. Hope you&#39;ll like it - feel free to share! Mihajlo Prerad
Biggest Data Breaches of 2013 from Mihajlo Prerad
]]>
9424 13 https://cdn.slidesharecdn.com/ss_thumbnails/the-year-of-breach-140223085110-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Generation Mobile /slideshow/generation-mobile-31007545/31007545 generationmobile2014-140209151531-phpapp01
I would like to start the new series of presentations about Mobile with one informative one - mostly with facts and mobile data statistics. It is a story of how mobile data is growing and how mobile is changing our life, affecting our every day habits and even the way we think! This presentation should get you enough interested for what is coming - security and risks, concerns, malware growth, hacking increased... Mobile Security !! First part is a presentation called "GENERATION MOBILE", which contains interesting facts about: - Number of Mobile Subscribers - Number of Mobile Subscriptions - Smartphone shipments - Mobile traffic share - Mobile vs PC - Mobile Data Traffic per Month - Mobile Data Traffic per Year - Social Media: Facebook, Youtube, Twitter, Instagram and mobile - Mobile search statistics - Mobile shopping Data is collected from world leading players like Cisco, Ericsson, Facebook, Google, etc. Connect with me via: LinkedIn: linkedin.com/mprerad (Mihajlo Prerad) Twitter: @appnetsecurity Facebook: facebook.com/mihaylo (Mihajlo Kimo Prerad) Keywords: generation mobile, mobile data traffic, mobile data statistics 2014, mobile data usage, mobile growth, smartphone shipments, mobile vs PC]]>

I would like to start the new series of presentations about Mobile with one informative one - mostly with facts and mobile data statistics. It is a story of how mobile data is growing and how mobile is changing our life, affecting our every day habits and even the way we think! This presentation should get you enough interested for what is coming - security and risks, concerns, malware growth, hacking increased... Mobile Security !! First part is a presentation called "GENERATION MOBILE", which contains interesting facts about: - Number of Mobile Subscribers - Number of Mobile Subscriptions - Smartphone shipments - Mobile traffic share - Mobile vs PC - Mobile Data Traffic per Month - Mobile Data Traffic per Year - Social Media: Facebook, Youtube, Twitter, Instagram and mobile - Mobile search statistics - Mobile shopping Data is collected from world leading players like Cisco, Ericsson, Facebook, Google, etc. Connect with me via: LinkedIn: linkedin.com/mprerad (Mihajlo Prerad) Twitter: @appnetsecurity Facebook: facebook.com/mihaylo (Mihajlo Kimo Prerad) Keywords: generation mobile, mobile data traffic, mobile data statistics 2014, mobile data usage, mobile growth, smartphone shipments, mobile vs PC]]>
Sun, 09 Feb 2014 15:15:30 GMT /slideshow/generation-mobile-31007545/31007545 mprerad@slideshare.net(mprerad) Generation Mobile mprerad I would like to start the new series of presentations about Mobile with one informative one - mostly with facts and mobile data statistics. It is a story of how mobile data is growing and how mobile is changing our life, affecting our every day habits and even the way we think! This presentation should get you enough interested for what is coming - security and risks, concerns, malware growth, hacking increased... Mobile Security !! First part is a presentation called "GENERATION MOBILE", which contains interesting facts about: - Number of Mobile Subscribers - Number of Mobile Subscriptions - Smartphone shipments - Mobile traffic share - Mobile vs PC - Mobile Data Traffic per Month - Mobile Data Traffic per Year - Social Media: Facebook, Youtube, Twitter, Instagram and mobile - Mobile search statistics - Mobile shopping Data is collected from world leading players like Cisco, Ericsson, Facebook, Google, etc. Connect with me via: LinkedIn: linkedin.com/mprerad (Mihajlo Prerad) Twitter: @appnetsecurity Facebook: facebook.com/mihaylo (Mihajlo Kimo Prerad) Keywords: generation mobile, mobile data traffic, mobile data statistics 2014, mobile data usage, mobile growth, smartphone shipments, mobile vs PC <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/generationmobile2014-140209151531-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> I would like to start the new series of presentations about Mobile with one informative one - mostly with facts and mobile data statistics. It is a story of how mobile data is growing and how mobile is changing our life, affecting our every day habits and even the way we think! This presentation should get you enough interested for what is coming - security and risks, concerns, malware growth, hacking increased... Mobile Security !! First part is a presentation called &quot;GENERATION MOBILE&quot;, which contains interesting facts about: - Number of Mobile Subscribers - Number of Mobile Subscriptions - Smartphone shipments - Mobile traffic share - Mobile vs PC - Mobile Data Traffic per Month - Mobile Data Traffic per Year - Social Media: Facebook, Youtube, Twitter, Instagram and mobile - Mobile search statistics - Mobile shopping Data is collected from world leading players like Cisco, Ericsson, Facebook, Google, etc. Connect with me via: LinkedIn: linkedin.com/mprerad (Mihajlo Prerad) Twitter: @appnetsecurity Facebook: facebook.com/mihaylo (Mihajlo Kimo Prerad) Keywords: generation mobile, mobile data traffic, mobile data statistics 2014, mobile data usage, mobile growth, smartphone shipments, mobile vs PC
Generation Mobile from Mihajlo Prerad
]]>
15080 7 https://cdn.slidesharecdn.com/ss_thumbnails/generationmobile2014-140209151531-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Cyber Crime in Numbers /slideshow/cyber-crime-in-numbers/27360306 cybercrimeinnumbers-131019094524-phpapp01
Cyber crime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cyber crime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. Debarati Halder and Dr. K. Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. Spam, Phishing, Threats, Malware, Viruses, Data Breaches, Identity theft.... Cyber crime]]>

Cyber crime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cyber crime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. Debarati Halder and Dr. K. Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. Spam, Phishing, Threats, Malware, Viruses, Data Breaches, Identity theft.... Cyber crime]]>
Sat, 19 Oct 2013 09:45:24 GMT /slideshow/cyber-crime-in-numbers/27360306 mprerad@slideshare.net(mprerad) Cyber Crime in Numbers mprerad Cyber crime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cyber crime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. Debarati Halder and Dr. K. Jaishankar (2011) defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. Spam, Phishing, Threats, Malware, Viruses, Data Breaches, Identity theft.... Cyber crime <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybercrimeinnumbers-131019094524-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cyber crime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cyber crime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. Debarati Halder and Dr. K. Jaishankar (2011) defines Cybercrimes as: &quot;Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)&quot;. Such crimes may threaten a nation’s security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. Spam, Phishing, Threats, Malware, Viruses, Data Breaches, Identity theft.... Cyber crime
Cyber Crime in Numbers from Mihajlo Prerad
]]>
3103 4 https://cdn.slidesharecdn.com/ss_thumbnails/cybercrimeinnumbers-131019094524-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Music through ages /slideshow/music-through-ages/15767504 preradmihajlos13music-121226133638-phpapp01
Short presentation about music timeline.]]>

Short presentation about music timeline.]]>
Wed, 26 Dec 2012 13:36:38 GMT /slideshow/music-through-ages/15767504 mprerad@slideshare.net(mprerad) Music through ages mprerad Short presentation about music timeline. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/preradmihajlos13music-121226133638-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Short presentation about music timeline.
Music through ages from Mihajlo Prerad
]]>
607 2 https://cdn.slidesharecdn.com/ss_thumbnails/preradmihajlos13music-121226133638-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
FTTx and TriplePlay basic facts /mprerad/fttx-and-tripleplay-basic-facts fttxitripleplaymihajlopreradmicomtm-withoutproducts-121122144716-phpapp02
Presentation about basics of FTTx and deployments, why it is important. Presented at Panduit RoadShow @ Belgrade, Serbia.]]>

Presentation about basics of FTTx and deployments, why it is important. Presented at Panduit RoadShow @ Belgrade, Serbia.]]>
Thu, 22 Nov 2012 14:47:14 GMT /mprerad/fttx-and-tripleplay-basic-facts mprerad@slideshare.net(mprerad) FTTx and TriplePlay basic facts mprerad Presentation about basics of FTTx and deployments, why it is important. Presented at Panduit RoadShow @ Belgrade, Serbia. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fttxitripleplaymihajlopreradmicomtm-withoutproducts-121122144716-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation about basics of FTTx and deployments, why it is important. Presented at Panduit RoadShow @ Belgrade, Serbia.
FTTx and TriplePlay basic facts from Mihajlo Prerad
]]>
583 2 https://cdn.slidesharecdn.com/ss_thumbnails/fttxitripleplaymihajlopreradmicomtm-withoutproducts-121122144716-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
WiFi: saveti za poboljsanje home mreze /slideshow/wifi-saveti-za-poboljsanje-home-mreze/14362101 savetizapoboljanjekvalitetakunewifimree-120920131655-phpapp01
Nekoliko osnovnih saveta za poboljsanje WiFi mreze u kucnom okruzenju.]]>

Nekoliko osnovnih saveta za poboljsanje WiFi mreze u kucnom okruzenju.]]>
Thu, 20 Sep 2012 13:16:52 GMT /slideshow/wifi-saveti-za-poboljsanje-home-mreze/14362101 mprerad@slideshare.net(mprerad) WiFi: saveti za poboljsanje home mreze mprerad Nekoliko osnovnih saveta za poboljsanje WiFi mreze u kucnom okruzenju. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/savetizapoboljanjekvalitetakunewifimree-120920131655-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Nekoliko osnovnih saveta za poboljsanje WiFi mreze u kucnom okruzenju.
WiFi: saveti za poboljsanje home mreze from Mihajlo Prerad
]]>
515 2 https://cdn.slidesharecdn.com/ss_thumbnails/savetizapoboljanjekvalitetakunewifimree-120920131655-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
Merenja u telekomunikacijama /slideshow/merenja-u-telekomunikacijama/14361882 merenja-ppt-120920125333-phpapp01
Kratak pregled ]]>

Kratak pregled ]]>
Thu, 20 Sep 2012 12:53:32 GMT /slideshow/merenja-u-telekomunikacijama/14361882 mprerad@slideshare.net(mprerad) Merenja u telekomunikacijama mprerad Kratak pregled <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/merenja-ppt-120920125333-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Kratak pregled
Merenja u telekomunikacijama from Mihajlo Prerad
]]>
3827 4 https://cdn.slidesharecdn.com/ss_thumbnails/merenja-ppt-120920125333-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
CRM menadzment /slideshow/crm-menadzment/13423967 mihajlopreradcrmppt-120622171548-phpapp02
Prezentacija CRM i zasto je bitan CRM]]>

Prezentacija CRM i zasto je bitan CRM]]>
Fri, 22 Jun 2012 17:15:47 GMT /slideshow/crm-menadzment/13423967 mprerad@slideshare.net(mprerad) CRM menadzment mprerad Prezentacija CRM i zasto je bitan CRM <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mihajlopreradcrmppt-120622171548-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Prezentacija CRM i zasto je bitan CRM
CRM menadzment from Mihajlo Prerad
]]>
881 2 https://cdn.slidesharecdn.com/ss_thumbnails/mihajlopreradcrmppt-120622171548-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 1
https://cdn.slidesharecdn.com/profile-photo-mprerad-48x48.jpg?cb=1652342534 I am a young, passionate and visionary yet skilled International Sales professional, with more than 5 years of Sales, Business Development and Channel management experience in IT & Telco industry. My profile is best described as a mixture of strong business acumen and solid technical expertise in field of networking, security, performance and monitoring industry. For the last several years, I am working as a Regional Sales, Channel and Business Development Director responsible for several countries across EMEA market, focused on Network Visibility solutions that help improving network's performance and security. â–º Presenting, Writing and Speaking (Top 5% of Most Viewed on ºÝºÝߣShare in ... https://www.linkedin.com/influencer/67886711-Mihajlo-Prerad https://cdn.slidesharecdn.com/ss_thumbnails/time-informer-201022174951-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/remote-work-productivity/238943956 Remote Work Productivity https://cdn.slidesharecdn.com/ss_thumbnails/securitydeliveryplatform-ngsec-170531140255-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/security-delivery-platform-best-practices-76525515/76525515 Security Delivery Plat... https://cdn.slidesharecdn.com/ss_thumbnails/the-year-of-breach-140223085110-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/biggest-data-breaches-of-2013/31537245 Biggest Data Breaches ...