The CyberSAFE Ambassador Program aims to educate students to become responsible digital citizens and improve their cyber safety skills. The program trains student ambassadors over three stages: 1) securing computer labs and promoting their school, 2) completing school projects and community engagement, and 3) developing individual presentations. The timeline involves introductory lessons over three days on topics like secure internet searching, social media use, and networking security. Upon completion, ambassadors will help educate other students on cyber safety best practices.
The document outlines a CyberSAFE Ambassador Program run by CyberSecurity Malaysia that trains students on cybersecurity topics like using Google search safely, securing computers and networks, and protecting privacy on Facebook. It discusses lessons the students have learned in topics like introduction to the CyberSAFE website, power searching on Google, computer security, human security, WiFi network security, and Facebook security. It then describes the next stages for ambassador students which include securing their school's computer lab, promoting their school, and community engagement projects.
Instagram is a photo and video sharing application founded in 2010 in San Francisco, California by Kevin Systrom and Mike Krieger. The company offers digital filters for photos and videos that can be shared on other social networks. While originally independent, Instagram is now owned by Facebook, Inc and has over 13,000 employees under CEO Kevin Systrom.
Instagram is a photo and video sharing application founded in 2010 in San Francisco, California by Kevin Systrom and Mike Krieger. It offers users the ability to take photos, apply filters to them, and share them on social networks. Instagram has grown significantly since its founding and is now owned by Facebook, employing over 13,000 people.
The document is about CyberSecurity Malaysia's CyberSAFE program, which aims to educate the general public on internet safety and the dangers of being online. The CyberSAFE program provides internet safety awareness talks, materials on their portal, and a community for discussing internet safety issues. It also includes multimedia content, games, and quizzes targeted at different groups like kids, parents, youth, and organizations.
This document discusses the Heartbleed bug, a severe vulnerability in OpenSSL cryptographic software that allowed theft of sensitive data. It provides details on the bug, proof of concept exploits, detection and mitigation tools from CyberSecurity Malaysia, lessons learned, and information on getting technical assistance. The bug affected OpenSSL versions 1.0.1 through 1.0.1f and enabled stealing information like session IDs, private keys, and passwords protected by SSL/TLS encryption.
Dr. Nor Hafizah Adnan is an Assistant Dean and lecturer in Malaysia with research interests in technology enhanced learning. She has a Bachelor's in Computer Science, a Master's in Software Engineering, and a PhD in Educational Technology. Her career includes roles in networking, project management, and educational technology consulting. She is currently leading a project on a digital learning environment for autism using robotics.
2022 Foreign Technical Training Program SIMP 1 (2).pdfveer982728
This 2-week program at Swinburne University of Technology Sarawak Campus teaches participants how to utilize digital technology. Participants can choose from projects in sectors like tourism, smart cities, biotechnology, and manufacturing. The program provides accommodation, transportation, and teaches participants to identify opportunities for digital technology, create digital systems using open source tools, and appreciate Malaysian culture and customs. A minimum of 20 participants is required for a fee of RM5,280, which covers tuition, accommodation, and local transportation, but not international flights.
The document outlines a CyberSAFE Ambassador Program run by CyberSecurity Malaysia that trains students on cybersecurity topics like using Google search safely, securing computers and networks, and protecting privacy on Facebook. It discusses lessons the students have learned in topics like introduction to the CyberSAFE website, power searching on Google, computer security, human security, WiFi network security, and Facebook security. It then describes the next stages for ambassador students which include securing their school's computer lab, promoting their school, and community engagement projects.
Instagram is a photo and video sharing application founded in 2010 in San Francisco, California by Kevin Systrom and Mike Krieger. The company offers digital filters for photos and videos that can be shared on other social networks. While originally independent, Instagram is now owned by Facebook, Inc and has over 13,000 employees under CEO Kevin Systrom.
Instagram is a photo and video sharing application founded in 2010 in San Francisco, California by Kevin Systrom and Mike Krieger. It offers users the ability to take photos, apply filters to them, and share them on social networks. Instagram has grown significantly since its founding and is now owned by Facebook, employing over 13,000 people.
The document is about CyberSecurity Malaysia's CyberSAFE program, which aims to educate the general public on internet safety and the dangers of being online. The CyberSAFE program provides internet safety awareness talks, materials on their portal, and a community for discussing internet safety issues. It also includes multimedia content, games, and quizzes targeted at different groups like kids, parents, youth, and organizations.
This document discusses the Heartbleed bug, a severe vulnerability in OpenSSL cryptographic software that allowed theft of sensitive data. It provides details on the bug, proof of concept exploits, detection and mitigation tools from CyberSecurity Malaysia, lessons learned, and information on getting technical assistance. The bug affected OpenSSL versions 1.0.1 through 1.0.1f and enabled stealing information like session IDs, private keys, and passwords protected by SSL/TLS encryption.
Dr. Nor Hafizah Adnan is an Assistant Dean and lecturer in Malaysia with research interests in technology enhanced learning. She has a Bachelor's in Computer Science, a Master's in Software Engineering, and a PhD in Educational Technology. Her career includes roles in networking, project management, and educational technology consulting. She is currently leading a project on a digital learning environment for autism using robotics.
2022 Foreign Technical Training Program SIMP 1 (2).pdfveer982728
This 2-week program at Swinburne University of Technology Sarawak Campus teaches participants how to utilize digital technology. Participants can choose from projects in sectors like tourism, smart cities, biotechnology, and manufacturing. The program provides accommodation, transportation, and teaches participants to identify opportunities for digital technology, create digital systems using open source tools, and appreciate Malaysian culture and customs. A minimum of 20 participants is required for a fee of RM5,280, which covers tuition, accommodation, and local transportation, but not international flights.
Transforming education starts when we empower teachers, letting them focus on what they do best: make students thrive.
http://tools.cisco.com/gems/cust/customerSite.do?METHOD=W&LANGUAGE_ID=E&PRIORITY_CODE=&SEMINAR_CODE=S22004
Nasr Nabil Nasr Zayed is seeking a full-time position as a Software Engineer. He has a Postgraduate Training Program in Software Engineering from the Information Technology Institute and a Bachelor's degree in Computer Science from Mansoura University. His technical skills include C++, C#, ASP.NET, SQL, Visual Studio, and SharePoint. He is proficient in English and Arabic and has strong presentation, creative thinking, and teamwork skills.
This document provides information about Aventis School of Management's Graduate Diploma in Digital Forensic & Cyber Security program. The key points are:
1) The graduate diploma provides a focused curriculum to develop skills in digital forensics and cyber security for working professionals.
2) Demand for digital forensics and cyber security experts is growing with the increasing role of technology in society and business.
3) Aventis is a trusted provider of business education in Singapore, with over 2,000 alumni and accreditation from various professional bodies. The program is eligible for SkillsFuture funding and grants.
Meruvian Seamless Education Program Overview v1.0The World Bank
The document discusses Meruvian's "Seamless Education" model which aims to provide a continuous education path from middle school (SMP) through vocational high school (SMK) to polytechnics. The model emphasizes developing job and entrepreneurship skills through extracurricular programs at each level and integrating vocational high school curricula with industry needs. It also facilitates students starting their own companies after vocational high school graduation if they complete a one-year internship.
This document discusses incorporating 21st century skills to engage learners. It describes how digital technologies like mobile devices, social media, cloud computing and open educational resources can be harnessed to rethink learning and education. These trends are influencing education through mobile learning apps, social learning networks, access to information anywhere through the cloud, and sharing of open resources online. New technologies like augmented and virtual reality also provide new ways to enhance learning.
The document outlines the history of e-learning through different eras:
- The instructor-led training era pre-1983 when training was done in-person with high costs.
- The multimedia era from 1984-1993 brought CD-ROM and multimedia to make training portable but still lacked interaction.
- The web infancy era from 1994-1999 began exploring online training using new technologies like email and streaming.
- Wireless technology from 2000-2005 enabled mobile learning through devices like PDAs and phones.
- The 21st century saw learning management systems and e-classrooms which allowed schools to offer online courses and track student progress.
The document provides a summary of Christopher Ovo Avbenake's career profile, including his objective, qualifications, professional courses, work experience, skills, and references. He has a B.Sc. in Petroleum & Gas Engineering and over 10 years of experience in projects involving offshore inspections, maintenance, and safety compliance for oil and gas companies in Nigeria. His most recent role was as an Assistant Project Engineer and Safety Officer for Second Adams International Limited.
I created these slides to help facilitate training on the Moodle E-learning platform I implemented for AAUA. I delivered the training over four days and I finally handed over the project to the University Webmaster and the ICT Director on Friday 22nd of May 2015.
Connecting, Engaging and Motivating Learners with Mobile DevicesJamesDiffin
In this 45 minute session, Sarah Williams from Coleg Cambria discusses some of the ways in which her college has embedded the use of mobile technology into teaching and learning.
Managing multiple project priorities can be challenging. Some tips for effectively managing projects include addressing issues early, starting with the end goal in mind, thinking win-win, being consistent, never compromising quality, being transparent, playing to your strengths, and providing closure. The summary document also advertises the upcoming Digital Rural Futures Conference hosted by the University of Southern Queensland in June 2014, which will focus on regional futures, agricultural futures, and digital futures.
Navigating a Connected Future: eLearning @ Sydney Institutestephan Ridgway
eLearning at Sydney Institute has evolved over four generations since 1998 from basic HTML resources and email to using mobile/tablet devices, apps, augmented reality, and educational technologies like learning analytics. The document discusses Sydney Institute's strategic priorities for eLearning, which include investing in ICT infrastructure, developing workforce capabilities, creating high-quality resources, and fostering knowledge sharing. It also examines challenges like applying new technologies, upskilling teachers, and conceptual mismatches between pedagogy and technology. Future trends discussed include MOOCs, tablets, games/gamification, learning analytics, 3D printing, and wearable technologies.
1) The document discusses the development of online learning and MOOCs in Malaysia, including the establishment of a national e-learning policy and initiatives to support globalized online learning.
2) It outlines Malaysia's higher education landscape and the launch of MOOC@Malaysia in 2014, a program that offered four compulsory MOOC courses to first-year students across 20 public universities.
3) The roadmap to establishing MOOC@Malaysia is summarized, involving coordination between various technical committees and training of course developers.
The document outlines an agenda for an event at Mahidol University including presentations on Imagine Cup 2009, Install Fest, and Silverlight 2.0. It also includes statistics on audience demographics and evaluations criteria for presentations including validity, comprehensiveness, clarity, interactivity, motivation, time allocation, flow, images, video, sound, and graphics.
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...Leanne Isaacson
Final Presentation from my Flexible Learning Leaders Scholarship. Details of trials of Video Conferencing, Online Learning, Flexible Learning in Rural Regions.
EdTech - Integrating Technology in Classroom ProjectHazril Hafiz
Throughout the 8 weeks of the National Sustainability Challenge, participants designed and executed innovative sustainability projects for the respective agencies – adding value to the state of Melaka and its various communities. The key criteria given to participants were for the projects: to leave a positive impact to the communities targeted; to be sustainable, creative, and implementable even after it has been handed over to the communities to manage; on top of being inclusive to Melaka’s various communities and cost effective.
The document discusses globalized online learning and Malaysia's national e-learning policy. It provides background on higher education institutions in Malaysia and outlines the goals of the national e-learning policy to build momentum, accelerate improvements, and move towards excellence. Key initiatives discussed include establishing a national e-learning center, joining an open education consortium, creating an e-content repository, and launching MOOC@Malaysia, a program offering massive open online courses through a blended model. The goals of MOOC@Malaysia are to enhance teaching and learning quality, increase visibility and branding, bring niche areas to a global audience, and expand lifelong learning opportunities.
Future of Education (E-Learning with Mobile Technology)Rodney Toh
The document discusses the Universal Education Deployment Platform (UEDP), an online learning platform that aims to empower teachers and facilitate eLearning through various technological tools. The UEDP allows educators to create course materials, interact with students, assess performance, and host fully online courses through features like video lectures, online exams, forums and ePublishing capabilities. It is a flexible platform that can be customized for different needs and scaled from small classes to large institutions.
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...Abbas Shahid Baqir
Student Shelter In Computers provides technical education and training. It offers a variety of IT certification courses and exam preparation through partnerships with Microsoft, Cisco, EC-Council, and Juniper. The organization aims to promote IT education, especially for women and underserved groups in Pakistan. It provides hands-on training, career counseling, job placement assistance, and internship opportunities to help students build skills and find employment in the technology industry.
Google Education on Air Keynote: Dave Ryan BuaronRyan Buaron
1. The document discusses how Cempaka Schools Malaysia has empowered its community through seamlessly integrating the learning management system Schoology with Google Apps.
2. Schoology allows for easy collaboration and communication between students, teachers, parents and staff through its social media-like interface and compatibility across devices.
3. By connecting productivity tools like Google Drive through Schoology, Cempaka has optimized group workspaces and ensured the community remains continually engaged in learning.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Transforming education starts when we empower teachers, letting them focus on what they do best: make students thrive.
http://tools.cisco.com/gems/cust/customerSite.do?METHOD=W&LANGUAGE_ID=E&PRIORITY_CODE=&SEMINAR_CODE=S22004
Nasr Nabil Nasr Zayed is seeking a full-time position as a Software Engineer. He has a Postgraduate Training Program in Software Engineering from the Information Technology Institute and a Bachelor's degree in Computer Science from Mansoura University. His technical skills include C++, C#, ASP.NET, SQL, Visual Studio, and SharePoint. He is proficient in English and Arabic and has strong presentation, creative thinking, and teamwork skills.
This document provides information about Aventis School of Management's Graduate Diploma in Digital Forensic & Cyber Security program. The key points are:
1) The graduate diploma provides a focused curriculum to develop skills in digital forensics and cyber security for working professionals.
2) Demand for digital forensics and cyber security experts is growing with the increasing role of technology in society and business.
3) Aventis is a trusted provider of business education in Singapore, with over 2,000 alumni and accreditation from various professional bodies. The program is eligible for SkillsFuture funding and grants.
Meruvian Seamless Education Program Overview v1.0The World Bank
The document discusses Meruvian's "Seamless Education" model which aims to provide a continuous education path from middle school (SMP) through vocational high school (SMK) to polytechnics. The model emphasizes developing job and entrepreneurship skills through extracurricular programs at each level and integrating vocational high school curricula with industry needs. It also facilitates students starting their own companies after vocational high school graduation if they complete a one-year internship.
This document discusses incorporating 21st century skills to engage learners. It describes how digital technologies like mobile devices, social media, cloud computing and open educational resources can be harnessed to rethink learning and education. These trends are influencing education through mobile learning apps, social learning networks, access to information anywhere through the cloud, and sharing of open resources online. New technologies like augmented and virtual reality also provide new ways to enhance learning.
The document outlines the history of e-learning through different eras:
- The instructor-led training era pre-1983 when training was done in-person with high costs.
- The multimedia era from 1984-1993 brought CD-ROM and multimedia to make training portable but still lacked interaction.
- The web infancy era from 1994-1999 began exploring online training using new technologies like email and streaming.
- Wireless technology from 2000-2005 enabled mobile learning through devices like PDAs and phones.
- The 21st century saw learning management systems and e-classrooms which allowed schools to offer online courses and track student progress.
The document provides a summary of Christopher Ovo Avbenake's career profile, including his objective, qualifications, professional courses, work experience, skills, and references. He has a B.Sc. in Petroleum & Gas Engineering and over 10 years of experience in projects involving offshore inspections, maintenance, and safety compliance for oil and gas companies in Nigeria. His most recent role was as an Assistant Project Engineer and Safety Officer for Second Adams International Limited.
I created these slides to help facilitate training on the Moodle E-learning platform I implemented for AAUA. I delivered the training over four days and I finally handed over the project to the University Webmaster and the ICT Director on Friday 22nd of May 2015.
Connecting, Engaging and Motivating Learners with Mobile DevicesJamesDiffin
In this 45 minute session, Sarah Williams from Coleg Cambria discusses some of the ways in which her college has embedded the use of mobile technology into teaching and learning.
Managing multiple project priorities can be challenging. Some tips for effectively managing projects include addressing issues early, starting with the end goal in mind, thinking win-win, being consistent, never compromising quality, being transparent, playing to your strengths, and providing closure. The summary document also advertises the upcoming Digital Rural Futures Conference hosted by the University of Southern Queensland in June 2014, which will focus on regional futures, agricultural futures, and digital futures.
Navigating a Connected Future: eLearning @ Sydney Institutestephan Ridgway
eLearning at Sydney Institute has evolved over four generations since 1998 from basic HTML resources and email to using mobile/tablet devices, apps, augmented reality, and educational technologies like learning analytics. The document discusses Sydney Institute's strategic priorities for eLearning, which include investing in ICT infrastructure, developing workforce capabilities, creating high-quality resources, and fostering knowledge sharing. It also examines challenges like applying new technologies, upskilling teachers, and conceptual mismatches between pedagogy and technology. Future trends discussed include MOOCs, tablets, games/gamification, learning analytics, 3D printing, and wearable technologies.
1) The document discusses the development of online learning and MOOCs in Malaysia, including the establishment of a national e-learning policy and initiatives to support globalized online learning.
2) It outlines Malaysia's higher education landscape and the launch of MOOC@Malaysia in 2014, a program that offered four compulsory MOOC courses to first-year students across 20 public universities.
3) The roadmap to establishing MOOC@Malaysia is summarized, involving coordination between various technical committees and training of course developers.
The document outlines an agenda for an event at Mahidol University including presentations on Imagine Cup 2009, Install Fest, and Silverlight 2.0. It also includes statistics on audience demographics and evaluations criteria for presentations including validity, comprehensiveness, clarity, interactivity, motivation, time allocation, flow, images, video, sound, and graphics.
Limber up & become flexible! Tales from my Australian Flexible Learning Leade...Leanne Isaacson
Final Presentation from my Flexible Learning Leaders Scholarship. Details of trials of Video Conferencing, Online Learning, Flexible Learning in Rural Regions.
EdTech - Integrating Technology in Classroom ProjectHazril Hafiz
Throughout the 8 weeks of the National Sustainability Challenge, participants designed and executed innovative sustainability projects for the respective agencies – adding value to the state of Melaka and its various communities. The key criteria given to participants were for the projects: to leave a positive impact to the communities targeted; to be sustainable, creative, and implementable even after it has been handed over to the communities to manage; on top of being inclusive to Melaka’s various communities and cost effective.
The document discusses globalized online learning and Malaysia's national e-learning policy. It provides background on higher education institutions in Malaysia and outlines the goals of the national e-learning policy to build momentum, accelerate improvements, and move towards excellence. Key initiatives discussed include establishing a national e-learning center, joining an open education consortium, creating an e-content repository, and launching MOOC@Malaysia, a program offering massive open online courses through a blended model. The goals of MOOC@Malaysia are to enhance teaching and learning quality, increase visibility and branding, bring niche areas to a global audience, and expand lifelong learning opportunities.
Future of Education (E-Learning with Mobile Technology)Rodney Toh
The document discusses the Universal Education Deployment Platform (UEDP), an online learning platform that aims to empower teachers and facilitate eLearning through various technological tools. The UEDP allows educators to create course materials, interact with students, assess performance, and host fully online courses through features like video lectures, online exams, forums and ePublishing capabilities. It is a flexible platform that can be customized for different needs and scaled from small classes to large institutions.
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...Abbas Shahid Baqir
Student Shelter In Computers provides technical education and training. It offers a variety of IT certification courses and exam preparation through partnerships with Microsoft, Cisco, EC-Council, and Juniper. The organization aims to promote IT education, especially for women and underserved groups in Pakistan. It provides hands-on training, career counseling, job placement assistance, and internship opportunities to help students build skills and find employment in the technology industry.
Google Education on Air Keynote: Dave Ryan BuaronRyan Buaron
1. The document discusses how Cempaka Schools Malaysia has empowered its community through seamlessly integrating the learning management system Schoology with Google Apps.
2. Schoology allows for easy collaboration and communication between students, teachers, parents and staff through its social media-like interface and compatibility across devices.
3. By connecting productivity tools like Google Drive through Schoology, Cempaka has optimized group workspaces and ensured the community remains continually engaged in learning.
Similar to 00 introduction to cyber safe ambassador program (20)
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document provides instructions for creating a Scratch program that allows a user to guess a randomly selected number between 1 and 8. It describes:
1) Creating sprites like a title, buttons 1-8, and instructions to guide the user. Variables are created to track the actual number, user's guess, and number of guesses.
2) Picking a random number between 1-8 and storing it in the "Actual" variable. The "Guess" and "Count" variables are also initialized.
3) Having the buttons update the "Guess" variable and costume when clicked. A broadcast message is sent to allow other sprites to check the guess.
The CyberSAFE Ambassador Program aims to educate students to become responsible digital citizens and improve their cyber safety skills. The program trains student ambassadors over three stages: 1) securing their school's computer lab, 2) promoting their school online, and 3) completing a community engagement project. During training, ambassadors learn about secure internet use, social media security, and more over three days of lessons, presentations, and assignments. The goal is for ambassadors to then teach these skills to other students and roll out cyber safety programs and activities in their schools.
1. To become CSM CyberSAFE Ambassador and roll out CyberSAFE programs and activities in schools
2. To educate school students to be become responsible digital citizen and cyber safety savvy
The awareness session aims to educate computer and internet users about common misconceptions regarding online security and how hackers exploit vulnerabilities. It covers topics like understanding the mind of hackers, their malicious techniques, and how to secure personal information both on computers and online through social media and applications. The presentation demonstrates common hacking methods like exploiting weak passwords, installing malware via emails or websites, and social engineering scams. It emphasizes maintaining privacy on platforms like Facebook and raising awareness of phishing attempts to prevent theft of personal data.
This document discusses various security issues related to using Facebook including privacy settings, potential scams, and tools to enhance security. It provides information on common scams like fake antivirus software, surveys asking for personal information, messages pretending to be from friends containing malicious links, and hoaxes about features that don't exist. It also gives details on keylogging software used to steal Facebook passwords and viruses that can spread through Facebook messages. Finally, it lists some Facebook pages and tools for reporting issues and staying safe online.
This document discusses wireless network security and threats. It begins with an introduction to wireless networks and their benefits over wired networks. It then outlines the objectives of learning about wireless threats and hacks. Several sections describe wireless network fundamentals, configurations, vulnerabilities and common attacks like man-in-the-middle attacks, denial of service attacks, decrypting traffic and discovering passwords. The document emphasizes that wireless networks extend the attack surface and invisible hackers can exploit weak security. It concludes with recommendations like using strong encryption, updating systems and educating users.
The document discusses various ways that cybercriminals exploit computer and internet users. It details real-life cases such as malvertising that embeds malicious ads on websites, clickjacking that tricks users into revealing information, oversharing of personal information on social media, internet addiction, data collection addiction, credit card theft scams, and parcel delivery scams where criminals gain users' trust and steal money. The goal is to educate users on how to secure themselves from such threats by changing their mindsets and increasing education on technology security practices.
This document outlines common computer security mistakes and how hackers exploit them. It discusses 10 key areas: 1) Windows logon security like passwords and screen savers, 2) using strong, unique passwords and managing accounts carefully, 3) keeping antivirus software up to date, 4) ensuring the operating system and applications are patched, 5) avoiding cracked or malicious applications, 6) timely installation of updates, 7) securing internet access on wired and wireless networks, 8) protecting networking devices like keyboards and webcams, 9) handling external devices safely, and 10) practicing safe online surfing habits like avoiding suspicious websites. The goal is to examine vulnerabilities and think like hackers in order to strengthen computer security.
The document discusses techniques for improving internet search skills using Google search. It provides 10 techniques: 1) searching within a specific website, 2) searching by file type, 3) searching within the title of a web page, 4) searching within the text of a web page, 5) searching within the URL of a web page, 6) searching for an exact phrase, 7) letting Google fill in the blank, 8) finding related web pages, 9) searching for numbers within a range, and 10) searching for similar terms. Examples are given for each technique to demonstrate how more precise searches can save time and narrow billions of search results down to only the most relevant information.
Panduan ini memberikan gambaran keseluruhan tentang Persekitaran Pembelajaran Maya Frog (Frog VLE) yang akan digunakan dalam Projek 1BestariNet. Ia menerangkan fungsi-fungsi utama Frog VLE seperti antara muka pengguna, menu, ruangan dan aplikasi yang terdapat dalam sistem untuk memudahkan proses pengajaran dan pembelajaran secara maya.
This document lists 5 group members from various Chinese primary schools in Sarawak and their assigned numbers. The group members are: Kueh Ken Hii from SJKC Chung Hua Betong with number 1, Pau Kat Ong from SJKC Chung Hua Spaoh with number 2, Ngieng Siew Lee from SJKC Chung Hua Pusa with number 3, Ling Nyuk King from SJKC Chung Hua Meludam with number 4, and Tay Kai Hui from SJKC Chung Hua Debak with number 5.
The document lists the names of 8 groups and their members. Each group has between 5-7 members. The groups are named Geng Mountain Dew, Kumpulan 3, Geng Arip, Geng Bahagi 4, Kumpulan 5, Kumpulan 6, Kumpulan 7, and Kumpulan 8. The name of each group member is provided along with their group and leader.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
10. 10
We now accept the fact that learning is a lifelong process of keeping abreast of
change. And the most pressing task is to teach people how to learn - Peter Drucker
Welcome!
This program is a collaboration between Bahagian Teknologi Pendidikan (BTP), Kementerian Pendidikan Malaysia and CyberSecurity Malaysia (CSM) to raise security awareness among students. The program was officiated by Tan Sri Dato’ Muhyiddin Yassin, Minister of Kementerian Pendidikan Malaysia during the launching of CyberSAFE in School program in 2010 at Kota Marudu Sabah.
CyberSAFE ambassador program comprises of six lessons on security awareness and one presentation session in order to develop competencies to become CyberSAFE ambassador.
Lets begin our lessons!
The objectives of this program are
1) To become BTP CSM CyberSAFE Ambassador and roll out CyberSAFE programs and activities in
schools
In order to increase security awareness among students , the role of CyberSAFE ambassador is critical to roll out CyberSAFE programs and activities in schools. This program will train the participants on various aspect of security awareness so that the participants will have sufficient knowledge to become CyberSAFE ambassador.
2) To educate school students to become responsible digital citizen and cyber safety savvy
Upon completion of this program, the trained participant will assume the role of CyberSAFE ambassador to impart the CyberSAFE messages to students so that they will become responsible digital citizen and cyber safety savvy.
This program comprises of three stages:
Stage 1 - CyberSAFE Ambassador Development
The participants will be trained to be CyberSAFE Ambassador which responsible to conduct CyberSAFE Program in their respective schools. This program will disseminate sufficient knowledge, skillset and toolset in cyber safety to the future CyberSAFE Ambassador.
Stage 2 - CyberSAFE in Schools
The trained participants will relay CyberSAFE message to their students at schools in various format such as speaking engagement (seminar, workshop, talks ) and interactive (treasure hunt, quiz, competition). The main objective is to educate our young generation to be cyber safety savvy.
Stage 3 - School Project & Community Engagement
There are many potential activities can be organised in order to get active participation from students such as
securing the computer lab - to ensure the safe environment in computer lab
promoting my school to the world - to positively use of internet
Lesson 1 - Introduction to CyberSAFE Website
This lesson will introduce the cyber safety resources website i.e. CyberSAFE website which contains guideline, tips and tricks, video, games and many more.
Lesson 2 - Power Search Using Google
Participants will learn the internet searching skills to find information on the internet. This lesson teaches the interesting search techniques by using Google search engine. Information is power!
Lesson 3 - Secure the Computer
It is important for us to secure our computer from malicious attacks. This lesson highlights 10 common mistakes made by computer users in securing their computers. Take notes on how to mitigate the potential threats so that we can protect our computers.
Lesson 4 - Secure the Human
This lesson exposes the most vulnerable parameter in the security defenses i.e. the computer users. Learn how cyber criminals take advantage of users’ ignorance, interests and trust to compromise our online accounts and computers.
Lesson 5 - WiFi Network Security
The lesson highlights the flaws in WiFi networks so that we understand the potential threats at WiFi hotspots.
Lesson 6 - Facebook Security
Learn on how to secure our Facebook account so that our personal info can be protected. We will discuss clickjacking, survey scam and privacy setting.
This program timeline can be adjusted based on case-by-case situation. Our main objective is to has very conducive learning environment in this program.
The trainer will seek the common ground on the realistic schedule before commencing the lessons.
The program requirements are as follows
1) Venue
classroom setup for maximum of 30 participants
classroom is expected for learning environment i.e. cool temperature, sufficient numbers of desks
and chairs, electrical power points, microphone, external audio speaker, high resolution projector
and white screen)
classroom person-in-charge for setting up the class based on requirement
2) Computer
there are two options - organiser provides the computer or participants bring own laptop.
Windows operating systems - Win XP, Win Vista or Win 7
admin user rights is expected - to install, remove application and to change the configuration
Google Chrome as the standard web browser
3) Internet
high speed internet connection is highly anticipated for this program
bring own wireless broadband is most welcome in order to avoid disappointment
if possible – no content filtering mechanism.
In order to have a conducive learning environment for this program, there are roles and responsibility to be assumed by the organiser, trainer(s) and participants. Without clear understanding of our roles and responsibilities, the program will end up with unpleasant circumstances.
1) The roles and responsibilities for the ORGANISER
coordinate the program - schedule, trainers, participants, venues
program requirements
- for TRAINERS (microphones, high resolution projector, white screen, 3-points power extension)
- for PARTICIPANT (computer, wireless broadband/wireless card, program materials)
- for venue ( classroom setup, power points, high speed WiFi network)
resourceful and dedicated person-in-charge to ensure the smooth coordination
2) The roles and responsibilities for the TRAINER(S)
communicate with the organiser - coordination (travelling, venue, material, participants)
verify all requirements are met with organiser
facilitate the participants to digest the materials
evaluate the participants achievement
3) The roles and responsibilities for the PARTICIPANTS
be serious to learn this material in this program - try not to be a joker in the class
no disruption during this program - turn off mobile phone or put in silent mode
be on time for every lesson - class will commence as scheduled
get ready with program materials, your laptop is ON and internet access is working
refer to USEFUL RESOURCES slide for references - terminology , foundation knowledge
be proactive and think before you ask - be independent learner
In this program, the participants are expected to conduct 5-minutes presentation before the class at the end of program. The presentation will be evaluated by the trainer(s) in terms of
core message development and delivery
creativity in slide design and slideware literacy
oral communication and presentation competency
effort to complete the activity
1) Select Presentation Topic
Please consult with the trainer(s) for selection of presentation topic. The nature of this program, we welcome any topics within the following domains
how to use antivirus, antispyware and antirootkit software
how to use social media , clouds application , online tools
how to use Windows-based utility tools , built-in Windows tools
how to use web browsers, add-on for web browser
2) Select Slide Design
Presentation slide must contains title slide, objectives slide, table of contents slide, intro to tool / application / software slide, features slide, benefit slide, how-to-use slide and conclusion slide. No limit on the number of slides.
3) Presentation Delivery
This is a short presentation session. Therefore, the participant is expected to present the presentation content only. No welcome speech and question and answer session. We are not expected entertainment but the slide contents and presentation delivery.
In this program, we are expected to be independent learners. Therefore, spoon-feed type of learners are not welcome in this program. Be proactive!
The following are the useful resources :
1) General Resources
Wikipedia - http://en.wikipedia.org/
eHow - http://www.ehow.com/
2) Information Technology Resources
Computer Glossary - http://whatis.techtarget.com/
HowStuffWorks (Computer) - http://computer.howstuffworks.com/
Microsoft Windows - http://windows.microsoft.com/en-US/windows/home
Microsoft Safety & Security Center - http://www.microsoft.com/security/default.aspx
Security Glossary - http://www.sans.org/security-resources/glossary-of-terms/
3) Language Resources
Local Language Translation Tool - http://www.citcat.com/
Dictionary.com - http://dictionary.reference.com/
Merriam-Webster - http://www.merriam-webster.com/dictionary.htm
Please refer to this slide for
terms and terminology
networking and security concept
Microsoft products
Crucial Advice
The world has dramatically moving in tremendous speed. New innovation and technological advancement require us to unlearn everything we knew. There is no such things as timeless knowledge in information technology domain. Some of our knowledge may be considered as outdated due to it can not be applied in today's reality.
However, some of us may think otherwise. The following are three common dogma among us
“I have PHD in IT!”
In information technology, those who spend their time, attention and energy in specific
technology are those who are adept in that technology. Paper qualification is not the parameter
to address the specialization in technology. There is a case when the individual who do not
possess any paper qualification is the expert of certain specific knowledge domain .
“I’m to old for these stuffs”
We are not product of circumstances but we are the product of our own choices. We have the
choice to choose to learn new stuffs or the choice to be ignorance person. Therefore, we had
to choose wisely.
“It’s not related to my job scope”
If we are exercise creative muscles in our brain, we will find how to make it relevant to our
daily life routine. Think – make it relevant or make it irrelevant!
Learning is a lifelong journey regardless who we are, what we have and how busy we are. Now lets start our journey to understand about cyber safety.