Teachers, parents, and students need to be aware that any information posted online can have permanent consequences. They should understand the concept of a "digital footprint" and that future opportunities like jobs or college could be affected. Goals for digital citizenship education include helping all parties develop safe online habits, using privacy settings, avoiding posting private details, and properly utilizing technology and social media.
Hello folks,this was my seminar topic in 2nd year polytechnic (ETC).I hope you all like this,references are shown which helped me complete this presentation.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
Hello folks,this was my seminar topic in 2nd year polytechnic (ETC).I hope you all like this,references are shown which helped me complete this presentation.
Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village
This presentation was made by my 8 year old son, Shounak Ray Chaudhuri for his class sharing activity. It shows what is cyber security and how to protect data flowing around in the internet.
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
One in three internet users globally is a child. This proportion is likely to be even higher in the global South.
Organizations working to advance children’s rights and promote well-being need to understand how to reduce the risk of harm children face online while maximizing their opportunities for learning, participation and creativity.
The PPT covers digital safety for children.
This presentation was made by my 8 year old son, Shounak Ray Chaudhuri for his class sharing activity. It shows what is cyber security and how to protect data flowing around in the internet.
Technology has progressed so fast that life and technology are now intertwined. Kids are now introduced to technology as early as a year old or maybe even younger. Soon they will come to know about social media websites and it is the duty of their parents to teach them about privacy, security, and what information to show on the internet.
One in three internet users globally is a child. This proportion is likely to be even higher in the global South.
Organizations working to advance children’s rights and promote well-being need to understand how to reduce the risk of harm children face online while maximizing their opportunities for learning, participation and creativity.
The PPT covers digital safety for children.
I facilitated a half day workshop for social workers, youth workers and other social service agency employees around teens today. The presentation focused on understanding teens today in order to engage them in a positive relationship or program. Note: some slides were videos or question starters for dialogue and may be hard to understand outside of the context of the workshop.
How do we protect the privacy of learners in the digital age? Who owns student information? What rights should students have to control their academic digital footprint?
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Digital footprint presentation
1.
2. Digital Citizenship: helps
students, teachers, technology
facilitators, and parents develop
an understanding of how
students and other technology
users should be using
technology appropriately. In
addition, digital citizenship
prepares students and
technology users for a “society
full of technology” as well as the
appropriate and inappropriate
ways to use technology in the
classroom and at home” (Ribble,
2012).
3. Currently, there are millions of
teenagers that are posting
personal information online
and on social networking
websites all over the world.
These teenagers do not
realize that they are leaving a
“digital footprint” which can
subject them to serious
consequences in their futures.
Many teens do not know that
future employers and college
recruiters are tracking their
every move before they are
even called for an interview or
consultation (Oxley, 2010)
4. • Goal 1:
• Parents, Teachers, and Students
• Develop an understanding of what a “digital
footprint” is.
• Goal 2:
• Parents
• Set-up parental controls on your computer at
home to ensure that your child is safe from
predators and explicit websites.
• Goal 3:
• Teachers
• Educate students on the importance of
appropriate language, content, and pictures
when posting personal information online.
• Explain to students that whatever information is
put online is permanent and accessible to
everyone.
• Goal 4
• Students
• Use appropriate language, do not post personal
information, and do not post inappropriate
pictures of yourself online.
5. Goal 1:
Parents, teachers, and
students will Google their first
and last name to see what
information populates about
them. After parents, teachers,
and students realize what
information is available about
them they will then visit:
http://www.squidoo.com/perso
nalInformation to learn how to
delete their information online.
6. Goal 2:
Parents will watch How to Set Up
Parental Controls in Windows 7. By
doing this, parents will be able to
control what their child is viewing as
well as block out times that the child is
not permitted on the computer. Parents
have full control over what their child
has access to including games,
websites, and programs that are
installed on the computer. Parents will
also discuss with their child the setting
that they have created so the child is
aware of their boundaries. In addition,
parents are encouraged to watch Your
Digital Footprint to face the reality of
how quickly a person can find private
information.
7. Goal 3:
The teacher will begin by creating a
KWL chart with the class. The students
will describe what they know about
digital footprints and what they want to
learn about digital footprints. Next, the
teacher will present Be Cool by
Mountfield School – Netiquette Winner
and Hoven School District
Superintendent’s Blog What Digital
Footprint Will You Leave Behind?
videos to the class. Once they have
watched the videos they will then finish
the KWL chart by explaining what they
learned from the videos. Then, the
teacher will use the resources found at
http://www.commonnsensemedia.org/e
ducators/lesson/trillion-dollar-footprint-
6-8 to wrap up the lesson.
8. Goal 4:
Students will get into small groups
to discuss what a digital citizen and
digital footprint is how to use
netiquette, and how to keep
personal information private. The
students will then work with their
group to create a PowerPoint,
SlideShare, Prezi, or Google
presentation about digital
citizenship and the digital footprint
as well as how to use proper
netiquette at home and in school.
Encourage students to use
commonsensemedia.org for more
information about digital citizenship
and footprints.
9. Teachers, parents, and
teachers need to be aware
of the permanent
information that they
choose to put online and
realize that it is there
forever. Also, students
need to understand that
whatever they put on
Facebook, Twitter, etc. will
and can be seen by
anyone on the web.
10. Be Cool by Mountfield School - Netiquette Winner. (2008, October
30). Retrieved February 19, 2012, from youtube.com:
http://www.youtube.com/watch?v=xVMq3G-JP04&feature=related
Hoven School District Superintendent's Blog What Digital Footprint
Will You Leave Behind2.flv. (2011, June 13). Retrieved February 19,
2012 , from youtube.com:
http://www.youtube.com/watch?v=N2eRQN9zjxk
How to Set Up Parental Controls in Windows 7 For Dummies. (2011,
February 9). Retrieved February 19, 2012, from youtube.com:
http://www.youtube.com/watch?v=Qbpncl81GEg
(2012). Retrieved February 19, 2012, from commonsensemedia.org:
commonsensemedia.org
Common Sense Media Inc. (2011). Trillion Dollar Footprint (6-8).
Retrieved February 19, 2012, from commonsensemedia.org:
http://www.commonsensemedia.org/educators/lesson/trillion-dollar-
footprint-6-8
Oxley, C. (2010). Digital citizenship: Developing an ethical and
responsible online culture. Brisbane.
Ribble, M. (2012). Digital Citizenship Using Technology
Appropriately. Retrieved February 19, 2012, from Digital Citizenship:
http://digitalcitizenship.net/
WEWSTV. (2010, November 18). Your digital footprint. Retrieved
February 19, 2012, from youtube.com:
http://www.youtube.com/watch?v=Aydi5JjsjMU
http://www.safesurfer.org/websafe.html
http://www.squidoo.com/personalInformation