SlideShare a Scribd company logo
CYBER ETIQUETTE ShairaLayugan RolynPlaza KorinaYsabella Feliciano ElysaSakurai
   WHAT IS CYBER ETIQUETTE?     The form or manner established by convention as acceptable or required in social relations, in a profession, or in official life.              www.yourdictionary.com/cyberetiquette
CYBER ETIQUETTE TIPS
1. EXERCISE THE GOLDEN RULE.
2. REMEMBER! EVERYTHING YOU POST ONLINE IS PUBLIC.
3. don’t use all caps when posting something.
4. SPEAK KINDLY.
5. Don’t post things when you’re angry.
6. USE  different  usernames  and  passwords
7. don’t  make  up silly  email  addresses
8. don’t  post  pictures  of  yourself  or  others  unless you  mind  them being  shared  by  everyone
9.  don’t  talk  to  strangers
10.  don’t  give  out  personal  and  confidential  information  online
11.  Use  emoticons  to show  expression.
12.  Turn  off  your  ringer  in  public  places.
13.  don’t  take  pictures  or  video  of  someone  without  permission.
14.  Remember :  the way  you  text  is  not  the  way  you  write  an  academic  paper.
Bonus  tip!!  Set  time  parameters  on  how  long  you’re  on  the  computer.
SOURCES: http://www.psychologytoday.com/blog/teen-angst/201012/cyber-etiquette-teens http://www.psychologytoday.com/blog/teen-angst/201011/cellular-etiquette-teens

More Related Content

What's hot

Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
Lisa Turner
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
Sarah K Miller
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
Mahershi ACT
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Social Media Etiquette Presentation
Social Media Etiquette PresentationSocial Media Etiquette Presentation
Social Media Etiquette Presentation
tkay1017
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
Del Belcher
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
Erdo Deshiant Garnaby
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
MOHAMMADZAINULABIDEE3
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
Muneendra Rasamsetty
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
Niti Arora
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
 
Smart phone public speaking presentation
Smart phone public speaking presentationSmart phone public speaking presentation
Smart phone public speaking presentation
Dieu Dang
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
Mukarram Dhorajiwala
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
josbor61
 
Netiquette
NetiquetteNetiquette
Netiquette
annekish
 

What's hot (20)

Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Media Etiquette Presentation
Social Media Etiquette PresentationSocial Media Etiquette Presentation
Social Media Etiquette Presentation
 
Staying Safe Online For Kids
Staying Safe Online For KidsStaying Safe Online For Kids
Staying Safe Online For Kids
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Social media etiquette
Social media etiquetteSocial media etiquette
Social media etiquette
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Smart phone public speaking presentation
Smart phone public speaking presentationSmart phone public speaking presentation
Smart phone public speaking presentation
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 
Netiquette - Basic Guidelines
Netiquette - Basic GuidelinesNetiquette - Basic Guidelines
Netiquette - Basic Guidelines
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Netiquette
NetiquetteNetiquette
Netiquette
 

Similar to Cyber Etiquette

Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
kgilliard13
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Space
kirahlee
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
MsCCostello
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
MsCCostello
 
Stand out of the crowd | How to effectively use the web for marketing yoursel...
Stand out of the crowd | How to effectively use the web for marketing yoursel...Stand out of the crowd | How to effectively use the web for marketing yoursel...
Stand out of the crowd | How to effectively use the web for marketing yoursel...
Sachin Bhatnagar
 
Film 260
Film 260Film 260
Film 260
madelaine8979
 
Internet safety
Internet safetyInternet safety
Internet safetykohlerj
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slidesguest7e2cdf
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]
putnamca
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
Sonal Bharal
 
Role of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internetRole of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internet
sujinaganga
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
densio123
 
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
greenleaf
 
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid ThemThe 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
tanyajhall
 
The 10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing and How to Avoid ThemThe 10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
cgreenleaf
 
Netiquette hci
Netiquette hciNetiquette hci
Netiquette hciLeonardYam
 
Castro and de Vera 3.0.pdf
Castro and de Vera 3.0.pdfCastro and de Vera 3.0.pdf
Castro and de Vera 3.0.pdf
AngelicaCastro689319
 

Similar to Cyber Etiquette (20)

Digital citizenship for Elementary Students
Digital citizenship for Elementary StudentsDigital citizenship for Elementary Students
Digital citizenship for Elementary Students
 
Being Smart In Cyber Space
Being Smart In Cyber SpaceBeing Smart In Cyber Space
Being Smart In Cyber Space
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 
Stand out of the crowd | How to effectively use the web for marketing yoursel...
Stand out of the crowd | How to effectively use the web for marketing yoursel...Stand out of the crowd | How to effectively use the web for marketing yoursel...
Stand out of the crowd | How to effectively use the web for marketing yoursel...
 
Tips to use social networks safely
Tips to use social networks safelyTips to use social networks safely
Tips to use social networks safely
 
Film 260
Film 260Film 260
Film 260
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
Digital etiquette 2[1]
Digital etiquette 2[1]Digital etiquette 2[1]
Digital etiquette 2[1]
 
10 commandments
10 commandments10 commandments
10 commandments
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
Role of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internetRole of teacher in giving guidelines for the proper use of internet
Role of teacher in giving guidelines for the proper use of internet
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
 
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
 
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid ThemThe 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing - and How to Avoid Them
 
The 10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing and How to Avoid ThemThe 10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
The 10 Most Common Mistakes in Social Media Marketing and How to Avoid Them
 
Netiquette hci
Netiquette hciNetiquette hci
Netiquette hci
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Castro and de Vera 3.0.pdf
Castro and de Vera 3.0.pdfCastro and de Vera 3.0.pdf
Castro and de Vera 3.0.pdf
 

More from Miriam Pananaliksik

Ladi's Metaphors of Research
Ladi's Metaphors of ResearchLadi's Metaphors of Research
Ladi's Metaphors of Research
Miriam Pananaliksik
 
Belle's metaphor of research
Belle's metaphor of researchBelle's metaphor of research
Belle's metaphor of research
Miriam Pananaliksik
 
Abby's metaphors of research
Abby's metaphors of researchAbby's metaphors of research
Abby's metaphors of research
Miriam Pananaliksik
 
Jasmin's metaphors
Jasmin's metaphorsJasmin's metaphors
Jasmin's metaphors
Miriam Pananaliksik
 
Abi's metaphors of research
Abi's  metaphors of researchAbi's  metaphors of research
Abi's metaphors of research
Miriam Pananaliksik
 
Ruby's metaphors of research
Ruby's metaphors of researchRuby's metaphors of research
Ruby's metaphors of research
Miriam Pananaliksik
 
Kim's research metaphors
Kim's research metaphorsKim's research metaphors
Kim's research metaphors
Miriam Pananaliksik
 
Kayla's research metaphor
Kayla's research metaphorKayla's research metaphor
Kayla's research metaphor
Miriam Pananaliksik
 
My own metaphor of research
My own metaphor of researchMy own metaphor of research
My own metaphor of research
Miriam Pananaliksik
 
Pat's metaphor of research
Pat's metaphor of researchPat's metaphor of research
Pat's metaphor of research
Miriam Pananaliksik
 
Monna's metaphor of research
Monna's metaphor of researchMonna's metaphor of research
Monna's metaphor of research
Miriam Pananaliksik
 
Jerri's Metaphor of research
Jerri's Metaphor of research Jerri's Metaphor of research
Jerri's Metaphor of research
Miriam Pananaliksik
 
Trixie's metaphor of research
Trixie's metaphor of researchTrixie's metaphor of research
Trixie's metaphor of research
Miriam Pananaliksik
 
Ria's metaphor of research, part i
Ria's metaphor of research, part iRia's metaphor of research, part i
Ria's metaphor of research, part i
Miriam Pananaliksik
 
Ria's metaphor of research, part ii
Ria's metaphor of research, part iiRia's metaphor of research, part ii
Ria's metaphor of research, part ii
Miriam Pananaliksik
 
Sophia's metaphor of research
Sophia's metaphor of researchSophia's metaphor of research
Sophia's metaphor of research
Miriam Pananaliksik
 
Ivy's research metaphor
Ivy's research metaphorIvy's research metaphor
Ivy's research metaphor
Miriam Pananaliksik
 
Maye's metaphor of research
Maye's metaphor of researchMaye's metaphor of research
Maye's metaphor of research
Miriam Pananaliksik
 
Kim's metaphor research
Kim's metaphor researchKim's metaphor research
Kim's metaphor research
Miriam Pananaliksik
 
Shannen's metaphor of research
Shannen's metaphor of researchShannen's metaphor of research
Shannen's metaphor of research
Miriam Pananaliksik
 

More from Miriam Pananaliksik (20)

Ladi's Metaphors of Research
Ladi's Metaphors of ResearchLadi's Metaphors of Research
Ladi's Metaphors of Research
 
Belle's metaphor of research
Belle's metaphor of researchBelle's metaphor of research
Belle's metaphor of research
 
Abby's metaphors of research
Abby's metaphors of researchAbby's metaphors of research
Abby's metaphors of research
 
Jasmin's metaphors
Jasmin's metaphorsJasmin's metaphors
Jasmin's metaphors
 
Abi's metaphors of research
Abi's  metaphors of researchAbi's  metaphors of research
Abi's metaphors of research
 
Ruby's metaphors of research
Ruby's metaphors of researchRuby's metaphors of research
Ruby's metaphors of research
 
Kim's research metaphors
Kim's research metaphorsKim's research metaphors
Kim's research metaphors
 
Kayla's research metaphor
Kayla's research metaphorKayla's research metaphor
Kayla's research metaphor
 
My own metaphor of research
My own metaphor of researchMy own metaphor of research
My own metaphor of research
 
Pat's metaphor of research
Pat's metaphor of researchPat's metaphor of research
Pat's metaphor of research
 
Monna's metaphor of research
Monna's metaphor of researchMonna's metaphor of research
Monna's metaphor of research
 
Jerri's Metaphor of research
Jerri's Metaphor of research Jerri's Metaphor of research
Jerri's Metaphor of research
 
Trixie's metaphor of research
Trixie's metaphor of researchTrixie's metaphor of research
Trixie's metaphor of research
 
Ria's metaphor of research, part i
Ria's metaphor of research, part iRia's metaphor of research, part i
Ria's metaphor of research, part i
 
Ria's metaphor of research, part ii
Ria's metaphor of research, part iiRia's metaphor of research, part ii
Ria's metaphor of research, part ii
 
Sophia's metaphor of research
Sophia's metaphor of researchSophia's metaphor of research
Sophia's metaphor of research
 
Ivy's research metaphor
Ivy's research metaphorIvy's research metaphor
Ivy's research metaphor
 
Maye's metaphor of research
Maye's metaphor of researchMaye's metaphor of research
Maye's metaphor of research
 
Kim's metaphor research
Kim's metaphor researchKim's metaphor research
Kim's metaphor research
 
Shannen's metaphor of research
Shannen's metaphor of researchShannen's metaphor of research
Shannen's metaphor of research
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Cyber Etiquette