This document discusses cyber bullying and provides tips for how to recognize, avoid, and handle it. It defines cyber bullying as using the internet to intentionally harm others. Common tactics of cyber bullies include sending mean emails, posts on message boards, and creating websites to embarrass others. The document encourages telling a trusted adult if being bullied and provides advice on internet safety, such as not sharing private information online and using polite etiquette. It also discusses the importance of empowerment and how students can help address this issue in their community.
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
A talk for middle school and high school students by ConnectSafely.org's Larry Magid about digital literacy, digital citizenship, cyberbullying, sexting and how to thrive online.
A great document by On Guard On-Line about the conversation parents need to have with their kids about being online.
http://get.mindmake.com/parentalcontrols/
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
A talk for middle school and high school students by ConnectSafely.org's Larry Magid about digital literacy, digital citizenship, cyberbullying, sexting and how to thrive online.
A great document by On Guard On-Line about the conversation parents need to have with their kids about being online.
http://get.mindmake.com/parentalcontrols/
Presentation: K12 Teacher Empowerment and Professional DevelopmentIntelCAG
Teacher Professional Development
The following slides have been created by Intel for public use. Share or use the presentation in its entirety or as individual slides, as desired.
Media and Information Literacy (MIL) - 6. Media and Information Languages (Pa...Arniel Ping
Media and Information Literacy (MIL)
Topic:
I- Video Project
A. Camera Techniques
B. Treatment
C. Storyboard
Objectives
At the end of the lesson, learners should be able to:
a. discuss the different camera techniques in film making;
b. produce a video treatment and a storyboard for a 30-50 seconds story applying the different camera techniques;
c. shoot and edit the video using a smartphone (mobile applications);
d. share their video in the class; and
e. value the importance of video treatment and storyboard in video project.
ReadySetPresent (Empowerment PowerPoint Presentation Content): 100+ PowerPoint presentation content slides. Increasing empowerment in the workplace increases self-confidence, courage, and strength in each employee. Empowerment PowerPoint Presentation Content slides include topics such as: slides on a leader's role, 7 benefits of empowerment, empowerment in practice, various guidelines, 6 slides on empowered teams, 20+ tips for empowering employees, 9 rules of empowerment, 4 empowerment dimensions, building contracts with employees, 4 keys to assisting integration, 5 slides on building employee contracts, five types of empowerment, skills needed to empower, 7 slides on empowered decision making, 5 types of managerial control, 4 slides on when to empower, how to’s and more!
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
Content
8. Opportunities, Challenges, and Power of Media and Information
a. Economic, Educational,
Social, and Political
b. Threats, Risks, Abuse, and
Misuse
Learning Competencies
The students will be able to…
1. realize opportunities and challenges in media and information (MIL11/12OCP-IIIh-24);
2. create infographics showing opportunities and challenges in media and information (SSHS); and
3. research and cite recent examples of the power of media and information to affect change (MIL11/12OCP-IIIh-25)
Whether you are a student, parent, an educator, or a concerned friend of the family, there are ten steps you can take to stop and prevent bullying:
1. Pay attention. There are many warning signs that may point to a bullying problem, such as unexplained injuries, lost or destroyed personal items, changes in eating habits, and avoidance of school or other social situations. However, every student may not exhibit warning signs, or may go to great lengths to hide it. This is where paying attention is most valuable. Engage students on a daily basis and ask open-ended questions that encourage conversation
Dwe m4 cyber bullying and conflict resolutionData-Set
You will understand the difference between online and offline cyberbullying and digital drama
You will learn how cyberbullying can occur in education and what a cyberbullying educational policy should include
You will learn the different types of cyberbullying and how to react to cyberbullying and negativity online
You will be able to address countering hate speech online
In today’s connected world it’s critical that our children understand how to be safe and responsible online.
To help you teach them the basics, the Family Online Safety Institute (FOSI) designed this flashcard deck which covers the key principles of digital citizenship. Each card provides a simple definition and conversation-starter question to help your child learn and talk about digital citizenship.
After the conversation, we encourage you to visit www.aplatformforgood.org to learn more about everyday digital citizens using their power for good, and to find resources and tools to help everyone continue
building skills.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
2. Hey It’s Me Again!
I’m Tek – your i-SAFE guide.
I’m a part of i-SAFE America.
i-SAFE is concerned with
teaching you how to be safe
online.
We want you to recognize and
avoid dangerous, destructive or
unlawful online behavior.
Also, we hope to empower you to
communicate what you learn
from i-SAFE with others.
3. All right – Let’s talk Empowerment
Remember -
Empowerment means
you own what you
learn and can use it to
teach others and make
a difference.
4. i-SAFE includes an empowerment activity in
every lesson. By completing the activity you
may be eligible for neat incentives and prizes.
Check it out at www.isafe.org – Click
on the link to contests and Incentives.
So not only are you learning and
sharing, you are getting rewarded for
doing so!
Empowerment is the Key to Learning!
5. The Plan
In this lesson, you will be learning
about cyber bullying and
netiquette. You will be
developing articles or brochures
on the concepts of being
considerate online, etc.
6. All Right – Let’s Get Started
Make sure you have a copy of the activity
page called The Cyber Bullying Fact Sheet
We will be using it to learn more about Cyber
Bullying.
7. Time to Brainstorm
1. What is bullying?
3. Why do people act as bullies?
5. What are some things that a bully might do?
7. What are examples of things a cyber bully might do?
9. Have any of you had incidents in which you were
bullied?
11. Have you had experiences with a cyber bully?
8. Let’s Take a Closer Look at
the Cyber Bullying Fact Sheet
9. "All cruelty springs from weakness.” (Seneca, 4BC-
AD65)
Bullying has become an online event as well as a
physical one. Intimidation online can be just as bad,
and in some cases worse, than when bullying occurs
in the physical community.
10. Bullying
Bullies are those people who gain
gratification (a sense of happiness) when
they have provoked or tormented others.
They feel better by making others feel worse.
Cyber bullies are those bullies who use the
Internet to be mean to others.
11. Bullying
E-mail provides one method of communication for
these bullies.
Flame mail – mail designed to make another
person mad – is used along with hate mail – mail
that shows racism, sexism, or other prejudices.
Another way bullies use the Internet is through
bulletin boards and chat sites to make their
comments public.
Finally, some cyber bullies build websites devoted
to making a person or persons feel bad.
12. Think About It!
Do you think it’s a sign of strength
or weakness to use the Internet
for bullying? Why?
13. Tell someone. Don’t keep this to yourself. Tell a trusted adult
about the bullying.
Don’t open or read messages by Cyber bullies.
Tell the police if threatened.
Tell your Internet Service Provider.
Tell your school if it is school related. Schools have a bullying plan
in place.
Don’t erase the messages – they may be needed to take action.
Instead, put them in a folder unread.
Protect yourself – never agree to meet with the person or with
anyone you meet online.
If bullied through chat or instant messaging, the “bully” can often
be blocked. Tell someone!
14. Don’t give out private information such as
passwords, pins, name, address, phone number,
school name, or family and friends names. This
information can be used by bullies and other
harmful people on the Internet.
Use Netiquette. Be polite online and others will
tend to do the same. If someone does get angry
or bullies you, ignore them – online Cyber bullies
want a reaction just like other bullies.
Don’t send a message when you are angry – it is
hard to undo things that are said in anger.
Delete messages from people you don’t know or
from people who seem angry or mean.
When something doesn’t seem right, it probably
isn’t. Get out of the site, chat, etc.
15. The best defense to keep
from being a bully online:
Use Netiquette.
Be polite online and others will tend to do the same.
If someone does get angry or bullies, ignore them –
online bullies want a reaction.
Think about ways to apply E-mail netiquette to the
following:
Subject lineS AttAchmentS
ForwArded meSSAgeS SpAm
chAin letterS hoAxeS
Your originAl meSSAgeS
16. Chatroom Netiquette
Many of the same conventions that
apply to newsgroups and e-mail are
also relevant in chatrooms. You're still
just typing your thoughts and sending
them to people, but in a chatroom
they're just a little quicker to respond.
17. While chatting:
1. Avoid Using ALL CAPS - It’s considered yelling.
3. Decide What Tone the Conversation Has
Before Posting - Don't use offensive language or
nicknames. Always avoid making personal
attacks and calling names.
5. Don't "Flood" the Chatroom - Flooding is
repeating messages over and over, or filling the
screen with gibberish, in order to impede
communication in the chatroom.
7. Be Nice to Newbies - Remember your first chats?
If someone stumbles into your chat, who is
obviously new to this medium, show some
patience and help him or her get the hang of it.
18. Resources for your
Community
What resources are available at your
school level?
What is your school’s anti-bullying plan?
What are resources in your community?
19. Time for Group Work
Your teacher will divide you into groups for the
next activity.
In your small groups, read the activity page and
follow the directions to complete it.
1st - Read the letters you received. Some will be
from bullies and some from victims.
2nd - Each group should then draft a response
letter advising one of the letter writers.
Incorporate information on local resources,
help, advice, etc.
3rd - Once the responses are drafted, design an
advice article or informational brochure about
how to recognize and handle Cyber bullying.
20. Presentation Time
Present your advice letters and brochure/article to
the class.
Then Discuss:
How could you make a difference in other peoples lives
and help both cyber bullies and victims.
Refer to the Point to Ponder at the end of the Activity
page:
If the problem of online bullying grows, what might be
some consequences to freedom on the Internet?
How would those consequences affect you personally?
21. So How Do you Know When
You’re Done???
Have you:
1. Covered all the reference sheets?
2. Discussed with your class what you
have learned?
3. Completed the Online And Helpless
worksheet?
4. Completed and shared your article or
brochure?
23. Take Action
It’s Easy with the i-Mentor Training Network!
Visit the Kids and Teens section at www.isafe.org
to learn about the i-Mentor Training Network.
It’s all online!
The i-Mentor Training Network has short
informative videos that will take you step by step
through the process of accomplishing any of the
i-SAFE Outreach activities you can do in your
school and community.
To watch the videos go to the i-Mentor Network
located in the Kids and Teens section of the
i-SAFE website at www.isafe.org.
24. Take Action
It’s Easy with the i-Mentor Training Network!
The i-Mentor Training Network videos were
produced for students like you, who care about
online safety and want to DRiVE the message to
other students, parents, and community
members.
By watching the training videos you will become
a Certified i-Mentor and will be able to teach
students, conduct the i-SAFE assembly
experience, or be that important link to parents
and community leaders by presenting the i-
Parent Programs and Community Leaders
Meetings.
25. Get the recognition you deserve
as an i-SAFE Mentor
• Enroll online at www.isafe.org by clicking on
Create an Account.
• Go to the Kids and Teens Section and Submit
the Online Mentor Menu.
• Receive your own Student Toolkit and
materials to get started.
Take Action
www.isafe.org
Editor's Notes
The i-Mentor Training Network has short informative videos that will take you step by step through the process of accomplishing any of the i-SAFE Outreach activities. To watch the videos go to the i-Mentor Network located in the Kids and Teens section of the i-SAFE website at www.isafe.org.
The i-Mentor Training Network videos were produced for students like you, who care about online safety and want to DRiVE the message to other students, parents, and community members. By watching the training videos you will become a Certified i-Mentor and will be able to teach students, conduct the i-SAFE assembly experience, or be that important link to parents and community leaders by presenting the i-Parent Programs and Community Leaders Meetings.
Get recognized as a Student Mentor? Sign up online at www.isafe.org in the Kids and Teens section of the website Fill out the Online Mentor Menu located in the Kids and Teens Section of the i-SAFE website. Student Tool kits complete with a DVD and CD will be sent to you with the information you need to get started. If a mentor group has not been established at your school, consider starting one yourself. Contact i-SAFE at www.isafe.org and an i-SAFE Representative will help you get one started. You now have the keys for success. It’s your turn to DR i VE . Join the DRiVE Campaign today.