This presentation's supplementary materials are at http://pinterest.com/sexwonk/kink-for-all-sf-2012-06-16/. Meta: June 16, 2012 at Kink for All Unconference (Noisebridge, San Francisco).
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
This talk (hopefully) provides some new pentesters tools and tricks. Basically a continuation of last year’s Dirty Little Secrets they didn’t teach you in Pentest class. Topics include; OSINT and APIs, certificate stealing, F**king with Incident Response Teams, 10 ways to psexec, and more. Yes, mostly using metasploit.
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
This talk (hopefully) provides some new pentesters tools and tricks. Basically a continuation of last year’s Dirty Little Secrets they didn’t teach you in Pentest class. Topics include; OSINT and APIs, certificate stealing, F**king with Incident Response Teams, 10 ways to psexec, and more. Yes, mostly using metasploit.
OMSI Science Pub - Sex, Relationships, and TechnologyOMSI Science Pub
"Sex, Relationships, and Technology"
This Science Pub took place on Tuesday, March 30, 2010, at the Mission Theater in Portland, Oregon. It was presented by Dr L. Kris Gowen from Portland State University. You can check her blog here: http://healthysexedu.blogspot.com/
Spoiler alert! Dr. Taylor will giving this same talk at the Science Pub-Mission Theater in Portland on Tuesday, February 16, 2010.
Beyond measuring buzz at WARC Next Generation ResearchInSites on Stage
Beyond measuring buzz: Drawing Deeper Insights through social media research (by Simon McDonald - InSites Consulting and Krista Cornelis - RTL Nederland), presented at the WARC Next Generation Research on Thursday January 17, 2013.
A very informative presentation by the FBI about Internet crimes against children. This presentation is intended for teachers and administrators who wish to know more about cybersafety. The presentation should be reviewed before sharing with K-12 students.
E safety training ~ what ofsted are looking for by stephen carrick-daviesStephen Carrick-Davies
A presentation given by Stephen Carrick-Davies to staff on what the UK OFTED school's inspection team are looking for when it comes to E-safety. Please note that these slides should not be used in issolation from the training and re not a subsitute for full face to face training.
Everything evolves, including how human beings relate to one another in intimate relationships. Norms which have been relatively stable in this space have been mutating and changing rapidly over the past ten years - and will continue along this trajectory into the foreseeable future.
In this report we will be sharing with you a snapshot of some of the forces and waves of change which are shaping the future of relationships. And while many of these data points may seem alien or downright strange, they do point to a possible future of acceptance, openness and increased happiness through relationships that really work.
The Future of Relationships was created by the cultural strategy team at sparks & honey, in partnership with the Museum of Sex in NYC.
A primer in shifting values. As the world becomes more connected, many values we currently enjoy are either finding themselves threatened by the new reality or simply no longer relevant to today’s society.
In this presentation, we explore some of these value-system shifts, providing insights and discussion-points that we hope will help you come to terms with changes that may be taking place in your own business. or life.Enjoy!
Biometrics are widely regarded by the public, and many developers, as heightened security. Their actual track record tells a very different story. Biometric technologies are systematically making the world a less safe place. We have an obligation to do something about that. And we can.
In this talk, you'll learn about the breathtaking range of biometrics being tracked and assessed. You'll learn about dangerously wrong conclusions being drawn. You'll learn about spurious underlying premises and untrustworthy training data, and widespread misuses that are determining life and death decisions in government, policing, and health monitoring.
Most importantly, you'll learn how to assess these technologies, and avoid contributing ito their development, misuse, and proliferation.
NOTE: Content Warnings.
==== META ====
Keynote Address at: DjangoCon Europe (Sept 4, 2020)
Session Talk at: PyconAU (Sept 18, 2020)
Author: Carina C. Zona
Email: cczona@gmail.com
Twitter: @cczona
We have ethical responsibilities when coding. We’re able to extract remarkably precise intuitions about an individual. But do we have a right to know what they didn’t consent to share, even when they willingly shared the data that leads us there? A major retailer’s data-driven marketing accidentially revealed to a teen’s family that she was pregnant. Eek.
What are our obligations to people who did not expect themselves to be so intimately known without sharing directly? How do we mitigate against unintended outcomes? For instance, an activity tracker carelessly revealed users’ sexual activity data to search engines. A social network’s algorithm accidentally triggered painful memories for grieving families who’d recently experienced death of their child and other loved ones.
We design software for humans. Balancing human needs and business specs can be tough. It’s crucial that we learn how to build in systematic empathy.
In this talk, we'll delve into specific examples of uncritical programming, and painful results from using insightful data in ways that were benignly intended. You’ll learn ways we can integrate practices for examining how our code might harm individuals. We’ll look at how to flip the paradigm, netting consequences that can be better for everyone.
SLIDES: http://www.slideshare.net/cczona/consequences-of-an-insightful-algorithm
VIDEO: http://confreaks.tv/videos/rubyconf2015-keynote-consequences-of-an-insightful-algorithm
REVIEWS: https://wakelet.com/wake/5758ef98-8e71-4854-9ea2-683e0b5c98a3
KEYNOTE: RubyConf, JSConfEU, PyConAU, GOTO Berlin, Lean Agile Scotland, CUSEC, Open Source Bridge
ADDITIONAL: ArrrrCamp, EuRuKo, DjangoCon, WDCNZ, SCNA
OMSI Science Pub - Sex, Relationships, and TechnologyOMSI Science Pub
"Sex, Relationships, and Technology"
This Science Pub took place on Tuesday, March 30, 2010, at the Mission Theater in Portland, Oregon. It was presented by Dr L. Kris Gowen from Portland State University. You can check her blog here: http://healthysexedu.blogspot.com/
Spoiler alert! Dr. Taylor will giving this same talk at the Science Pub-Mission Theater in Portland on Tuesday, February 16, 2010.
Beyond measuring buzz at WARC Next Generation ResearchInSites on Stage
Beyond measuring buzz: Drawing Deeper Insights through social media research (by Simon McDonald - InSites Consulting and Krista Cornelis - RTL Nederland), presented at the WARC Next Generation Research on Thursday January 17, 2013.
A very informative presentation by the FBI about Internet crimes against children. This presentation is intended for teachers and administrators who wish to know more about cybersafety. The presentation should be reviewed before sharing with K-12 students.
E safety training ~ what ofsted are looking for by stephen carrick-daviesStephen Carrick-Davies
A presentation given by Stephen Carrick-Davies to staff on what the UK OFTED school's inspection team are looking for when it comes to E-safety. Please note that these slides should not be used in issolation from the training and re not a subsitute for full face to face training.
Everything evolves, including how human beings relate to one another in intimate relationships. Norms which have been relatively stable in this space have been mutating and changing rapidly over the past ten years - and will continue along this trajectory into the foreseeable future.
In this report we will be sharing with you a snapshot of some of the forces and waves of change which are shaping the future of relationships. And while many of these data points may seem alien or downright strange, they do point to a possible future of acceptance, openness and increased happiness through relationships that really work.
The Future of Relationships was created by the cultural strategy team at sparks & honey, in partnership with the Museum of Sex in NYC.
A primer in shifting values. As the world becomes more connected, many values we currently enjoy are either finding themselves threatened by the new reality or simply no longer relevant to today’s society.
In this presentation, we explore some of these value-system shifts, providing insights and discussion-points that we hope will help you come to terms with changes that may be taking place in your own business. or life.Enjoy!
Biometrics are widely regarded by the public, and many developers, as heightened security. Their actual track record tells a very different story. Biometric technologies are systematically making the world a less safe place. We have an obligation to do something about that. And we can.
In this talk, you'll learn about the breathtaking range of biometrics being tracked and assessed. You'll learn about dangerously wrong conclusions being drawn. You'll learn about spurious underlying premises and untrustworthy training data, and widespread misuses that are determining life and death decisions in government, policing, and health monitoring.
Most importantly, you'll learn how to assess these technologies, and avoid contributing ito their development, misuse, and proliferation.
NOTE: Content Warnings.
==== META ====
Keynote Address at: DjangoCon Europe (Sept 4, 2020)
Session Talk at: PyconAU (Sept 18, 2020)
Author: Carina C. Zona
Email: cczona@gmail.com
Twitter: @cczona
We have ethical responsibilities when coding. We’re able to extract remarkably precise intuitions about an individual. But do we have a right to know what they didn’t consent to share, even when they willingly shared the data that leads us there? A major retailer’s data-driven marketing accidentially revealed to a teen’s family that she was pregnant. Eek.
What are our obligations to people who did not expect themselves to be so intimately known without sharing directly? How do we mitigate against unintended outcomes? For instance, an activity tracker carelessly revealed users’ sexual activity data to search engines. A social network’s algorithm accidentally triggered painful memories for grieving families who’d recently experienced death of their child and other loved ones.
We design software for humans. Balancing human needs and business specs can be tough. It’s crucial that we learn how to build in systematic empathy.
In this talk, we'll delve into specific examples of uncritical programming, and painful results from using insightful data in ways that were benignly intended. You’ll learn ways we can integrate practices for examining how our code might harm individuals. We’ll look at how to flip the paradigm, netting consequences that can be better for everyone.
SLIDES: http://www.slideshare.net/cczona/consequences-of-an-insightful-algorithm
VIDEO: http://confreaks.tv/videos/rubyconf2015-keynote-consequences-of-an-insightful-algorithm
REVIEWS: https://wakelet.com/wake/5758ef98-8e71-4854-9ea2-683e0b5c98a3
KEYNOTE: RubyConf, JSConfEU, PyConAU, GOTO Berlin, Lean Agile Scotland, CUSEC, Open Source Bridge
ADDITIONAL: ArrrrCamp, EuRuKo, DjangoCon, WDCNZ, SCNA
Converged Cloud Computing That's Secure, Fast, or Cheap: Pick ThreeCarina C. Zona
Abstract:
Containers are driving down the overhead that has been necessary for traditional virtualization. But there have been serious tradeoffs made with their adoption. Containerization's resource sharing approach is exposing more of the host system. We're choosing to compromise the isolation of executables from kernel, accepting it as an inevitable price for low overhead. In multi-tenant environments, that's a heck of a gamble.
Tightrope acts like that do not need to happen.
ZeroVM has taken an entirely distincive approach to lightweight virtualization: strong security, from the beginning. Processes are kept on lockdown, jobs are horizontally scalable, and they execute with such fine-grained accuracy that metering by the second is no problem. End the cost-inefficiencies of metering by minutes and hours.
ZeroVM provides a secure execution environment for untrusted code, by applying the Chromium project's proven Native Client (NaCl) technology for validation and sandboxing. Moreover, when paired with OpenStack Swift, the two become a unique platform for executing arbitrary queries within a datastore, using any language of one's choosing.
We'll walk through the basics of the ZeroVM open source project, compelling use cases, and opportunities to take advantage of ZeroVM + Swift -- for solving problems at scale without compromising on either security, speed, or affordability.
Author: Carina C. Zona
Video: https://www.youtube.com/watch?v=c5MblI28Oec
Conference: OpenStack Summit Paris
Date: November 4, 2014
Doctor, Lawyer, Poker Player, Physicist: The Best Engineers We're Not Competi...Carina C. Zona
"The team needs more engineers and we need them today."_
We talk about the engineer shortage. But the problem is not what we think it is. We'll explore how hiring for only CS degrees misses exceptional opportunities. Unconventional backgrounds breed great developers.
Homogeneity boxes us in. Diverse teams are more productive, more profitable, and more excited about what they're accomplishing. Diversity isn't just demographics. It's about benefitting from distinctly varied perspectives. Who better than the former philosopher, marine biologist, stage hand, or anthropologist? In this talk, we'll walk through why it's worth competing for them.
Forget the rock star; hire the opera singer.
Debugging Tech’s Socioeconomic Class Issues [Madison+ Ruby Conf 2014]Carina C. Zona
As developers, we have power to be constructors of social justice. If we are members of tech community, then we inherit a chain of responsibility for addressing intersections between our work and its sometimes profoundly local effects on communities.
We can choose to engage in debugging and fixes.
We start by engaging in introspection about the inequities that our industry imposes on groups who have fewer privileges than we have access to. We’re going to walk through some of these issues, and review methods for implementing change.
Date: August 22, 2014
Author: Carina C. Zona
Video: https://youtu.be/aRf9w0UJPTM
Conference: Madison+ Ruby
Location: Madison, WI
ZeroVM is a secure execution environment for untrusted code in multi-tenant cloud. It's lightweight, fast, horizontally scalable, and can run arbitrary applications inside a datastore. More info about this open source project is available at http://zerovm.org
Schemas for the Real World [Software Craftsmanship North America 2013]Carina C. Zona
Social app development challenges us how to code for users’ personal world. Users are giving push-back to ill-fitted assumptions about their identity — including name, gender, sexual orientation, important relationships, and other attributes they value.
How can we balance users’ realities with an app’s business requirements?
Facebook, Google+, and others are grappling with these questions. Resilient approaches arise from an app’s own foundation. Discover schemas’ influence over codebase, UX, and development itself. Learn how we can use schemas to both inspire users and generate data we need as developers.
--
META
Where: Software Craftsmanship North America 2013 (Chicago, Illinois, USA)
Date: November 8, 2013
Author: Carina C. Zona
Schemas for the Real World [Madison RubyConf 2013]Carina C. Zona
Social app development challenges us how to code for users’ personal world. Users are giving push-back to ill-fitted assumptions about their identity — including name, gender, sexual orientation, important relationships, and other attributes they value.
How can we balance users’ realities with an app’s business requirements?
Facebook, Google+, and others are grappling with these questions. Resilient approaches arise from an app’s own foundation. Discover schemas’ influence over codebase, UX, and development itself. Learn how we can use schemas to both inspire users and generate data we need as developers.
--
META
Where: Madison Ruby Conference 2013 (Madison, Wisconsin, USA)
Date: August 23, 2013
Video: http://www.confreaks.com/videos/2627-madisonruby2013-schemas-for-the-real-world
Schemas for the Real World [RubyConf AU 2013]Carina C. Zona
VIDEO: https://vimeo.com/61172068
Social app development challenges us how to code for users’ personal world. Users are giving push-back to ill-fitted assumptions about their identity — including name, gender, sexual orientation, important relationships, and other attributes they value.
How can we balance users’ realities with an app’s business requirements?
Facebook, Google+, and others are grappling with these questions. Resilient approaches arise from an app’s own foundation. Discover schemas’ influence over codebase, UX, and development itself. Learn how we can use schemas to both inspire users and generate data we need as developers.
[NOTE: links to Resources are on slide 112. Cheers!]
---
META:
Conference: RubyConf AU
Date: February 21, 2013
Location: Jasper Hotel
Session length: 45 minutes
Video: https://vimeo.com/61172068
Full Stack & Full Circle: What the Heck Happens In an HTTP Request-Response C...Carina C. Zona
Presented at Confident Coding III, San Francisco, CA. October 20, 2012.
Flying in from 10,000 foot view (“Hey, browser, show me this”, “Okay, here it is”), we’ll take thoughtful overview of the HTTP request/response cycle. Its essence is simply a series of questions & answers, accumulating portions of content to be gracefully assembled for the user.
We’ll hone in on some key players amidst the “full stack” of communications, with special attention to how an understanding of the HTTP lifecycle endows any developer or designer with the power to optimize for performance, cost, and UX
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
6. Pleasure
Public Policy
Gender Gap
Kink Menopause
Commitment
Race
Diversity
Abstinence L/G/B
Communication Aging Affection
Religion
Cancers
Anatomy Transgender
Body Image
Birth Control Love
Parenthood Health Puberty
Identity Abuse
Law Fertility STDs
Porn Abuse
Assault Discrimination
Consent Fantasy
Body Image Abortion Dating
Censorship Self-Expression
Bullying
Disability Breastfeeding
Censorship
8. SMS
Accessibility
Electronic Payments
User Experience Databases
Software
Hardware Programming
Startups Law
User Interface Operating Systems
Mobile Gaming
Security APIs
Software as a Service
Testing
Content Management
Web
Social Networking
Open Source Digital Divide
Crowdsourcing
Scaling
Intellectual Property
9.
10.
11.
12. WHAT WE CAN DO
✓Model reality
• ...the
one experienced from
prospective users’ POVs
✓ “What are we assuming?”
✓ “Do we reallllllly need to ask for
that?”
✓ “Dowe need to provide for
other responses?”
...for instance..
25. Public restroom visits are a
minefield for some people.
If anyone thinks you’re a man
in the ladies room or woman
in the men’s room, trouble.
FILL A NICHE
Pee in Peace helps transgender & gender non-conforming
people find single-stall or gender-neutral bathrooms (Ithaca, NY)
30. In Case You Were
Curious (ICYC)
• Text “ICYC” to 66746
• Text questions, whenever
• Get response within 24 hours
TEXTING
Q&As, but you’ve got to wait.
31. OPPORTUNITIES,
AHOY
TECHsex USA
http://www.isis-inc.org/techsex_usa.php
White paper which is
"...a deep dive into how youth, particularly youth of color,
use technology for their sexual and reproductive health.
It also identifies opportunities for new digital programming."