SlideShare a Scribd company logo
Technology Safety for Families
Do you think an adult could
be addicted to a phone or
social media APP?
Question…
VIRUSES
KRYPTO-LOCKER
KRYPTO-LOCKER
EMAIL PHISHING
EMAIL PHISHING
PHONE CALL PHISHING
EMAIL SCAMS
Nigerian 419 scam
EMAIL SCAMS
Pre-Approved Scam
EMAIL SCAMS
Lottery Scam
EMAIL SCAMS
Disaster Relief
GOOGLE SEARCH SCAM
How can I protect myself
and my family from…
Viruses
Malware
Phishing
Scams
Virus – Malware – Phishing
COMPUTER UPDATES
COMPUTER UPDATES
COMPUTER UPDATES
Apple
COMPUTER BACKUP
COMPUTER BACKUP
AppleApple
COMPUTER BACKUP
Apple
IPHONE BACKUP
SYNCING DEVICES
Syncing devices
• Strong passwords
• Device passwords
Rules for Passwords
• Don’t use just ONE password
• 8 characters or more
• Letters, numbers, capitals and symbols
• Protect your passwords
• Don’t use passwords on PUBLIC Wi-Fi
• No passwords on PUBLIC computers
• Use words or phrases
Passwords
• Use a word and a number
• kitty and your zip code, 92882
• kitty92882
• k9i2t8t8y2
• K9i2t8t8y2
• K9i2t8t8y2!
LIFELOCK
LIFELOCK
Social networkingused to =
Social networkingnow =
Social networkingfor kids…
TOP 7 SOCIAL NETWORKS
Rules for social media use…
• Make sure you choose age
appropriate social media platforms
• Always use privacy settings
• Passwords... Long and Strong
• Don’t let social networks
“access” your address book
Rules for social media use…
• Type the address in directly
• Don’t post PERSONAL info
• Don’t “friend” strangers
• Think before you post!
We are the first
generation of
parents that
have had to deal
with the new
phenomenon!
Colleges and
employers are
looking!
SOCIAL MEDIA RISKS
YOUR DIGITAL FOOTPRINT
Cleaning up…
• Delete old profiles /
accounts
• Search yourself
• Change privacy settings
• Use secondary email
• Unsubscribe!
Pornography
• The average child accidentally stumbles onto
pornographic websites by age 12
• By age 18, 9 out of 10 boys will have had
exposure to porn
• Among young adults, age 18-30…
60% of young men and 20% of young women
view porn weekly
Pornography
• 1 in 9 websites
online are
pornographic
• Put a filter program
on ALL computers.
Pornography
Internet Accountability monitors the websites visited, the
search terms used, and the YouTube videos watched, and
lists them in an easy-to-read Report that is designed to
start a conversation about healthy online habits.
Parents, see where your kids go online. Adults, reduce
Internet temptations and protect the relationships you
value most.
Pornography
• Family Computer
• Laptop
• Cell phone
• iPad / Tablet
Filtering for the iPhone-iPad-iTouch
• Restrictions feature
• App restrictions
• Web content
• In-app purchases
• Age appropriate
• Lock accounts
• Lock GPS
The Most Common Problem
Location….Location….Location…
Cell phones at night…
The iBasket
Cell Phones at Night…
Contracts!
• Cell phone contract
• www.iccguru.com/cellphonecontract.doc
Filtering for Google and YouTube
Filtering for Google and YouTube
Filtering for Google and YouTube
Filtering for Google and YouTube
Filtering for Google and YouTube
Monitoring for the computer
• Email
• Instant Messaging
• Keystrokes
• Screenshots
• Website history
• Searches
• Facebook
• YouTube
Monitoring for the iPhone-iPad-iTouch
Location Monitoring
iPhone – iPad – iTouch CONTROL
Got a new driver in the family?
Gives parents speed alerts
Notifies parents if phones UNLOCKS while traveling over 12mph
Got a new driver in the family?
Apps to be aware of…..
• Hook up apps
• Anonymous apps
• Jail-Breaking
• Sexting Apps
• Cyberbullying Apps
Scott’s Final Tips
1) Know the passwords to all of your
children's accounts
2) Remove technology at night
(bedtime rule)
3) Talk about consequences of social media
4) Put a filter on internet connected device
(K9, iOS restrictions, OurPact)
5) Consider monitoring software
(WebWatcher, TeenSafe, Life360)
Questions?

More Related Content

What's hot

Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
Quick Heal Technologies Ltd.
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
Arjun Chetry
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
Vince Verbeke
 
Smart phone security ios system
Smart phone security ios systemSmart phone security ios system
Smart phone security ios system
Jamil S. Alagha
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
NowSecure
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A Review
Umang Singh
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
Symantec
 
Small is beautiful: Smart publishing for smart phones
Small is beautiful: Smart publishing for smart phonesSmall is beautiful: Smart publishing for smart phones
Small is beautiful: Smart publishing for smart phones
Marc Hartog
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
Lookout
 
Internet safety
Internet safetyInternet safety
Internet safety
myasinpak
 
Ipad
IpadIpad
Get smart - Smartphones and Applications for Real Estate
Get smart - Smartphones and Applications for Real EstateGet smart - Smartphones and Applications for Real Estate
Get smart - Smartphones and Applications for Real Estate
Damien Smith
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
Quick Heal Technologies Ltd.
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
Guneet Pahwa
 
Hacking Airwaves with Pineapples
Hacking Airwaves with PineapplesHacking Airwaves with Pineapples
Hacking Airwaves with Pineapples
Hostway|HOSTING
 
Spy Software
Spy SoftwareSpy Software
Spy Software
spyindia01
 
Presentation1
Presentation1Presentation1
Presentation1
llndl1
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
Santosh Satam
 
Atrix
AtrixAtrix
Atrix
Denis Gelrud
 
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
Alan Quayle
 

What's hot (20)

Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Smart phone security ios system
Smart phone security ios systemSmart phone security ios system
Smart phone security ios system
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A Review
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Small is beautiful: Smart publishing for smart phones
Small is beautiful: Smart publishing for smart phonesSmall is beautiful: Smart publishing for smart phones
Small is beautiful: Smart publishing for smart phones
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Ipad
IpadIpad
Ipad
 
Get smart - Smartphones and Applications for Real Estate
Get smart - Smartphones and Applications for Real EstateGet smart - Smartphones and Applications for Real Estate
Get smart - Smartphones and Applications for Real Estate
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Hacking Airwaves with Pineapples
Hacking Airwaves with PineapplesHacking Airwaves with Pineapples
Hacking Airwaves with Pineapples
 
Spy Software
Spy SoftwareSpy Software
Spy Software
 
Presentation1
Presentation1Presentation1
Presentation1
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Atrix
AtrixAtrix
Atrix
 
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
 

Viewers also liked

Computer Operating System
Computer Operating SystemComputer Operating System
Computer Operating System
Christine May Petajen-Brillantes
 
Computer Operating System
Computer Operating System Computer Operating System
Computer Operating System
Liton Ahmed
 
Computer Operating system
Computer Operating systemComputer Operating system
Computer Operating system
Mis bah
 
Operating System Overview.
Operating System Overview.Operating System Overview.
Operating System Overview.
akash726788
 
Operating Systems 1: Introduction
Operating Systems 1: IntroductionOperating Systems 1: Introduction
Operating Systems 1: Introduction
Damian T. Gordon
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
Vaibhav Bajaj
 
Business Studies (Principles of Management) Project Class 12th CBSE
Business Studies (Principles of Management) Project Class 12th CBSE Business Studies (Principles of Management) Project Class 12th CBSE
Business Studies (Principles of Management) Project Class 12th CBSE
Dheeraj Kumar
 

Viewers also liked (7)

Computer Operating System
Computer Operating SystemComputer Operating System
Computer Operating System
 
Computer Operating System
Computer Operating System Computer Operating System
Computer Operating System
 
Computer Operating system
Computer Operating systemComputer Operating system
Computer Operating system
 
Operating System Overview.
Operating System Overview.Operating System Overview.
Operating System Overview.
 
Operating Systems 1: Introduction
Operating Systems 1: IntroductionOperating Systems 1: Introduction
Operating Systems 1: Introduction
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
 
Business Studies (Principles of Management) Project Class 12th CBSE
Business Studies (Principles of Management) Project Class 12th CBSE Business Studies (Principles of Management) Project Class 12th CBSE
Business Studies (Principles of Management) Project Class 12th CBSE
 

Similar to Hume Lake Spring Marriage Retreat tech safety presentation

Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
Scott Burnett
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary
Scott Burnett
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017
Scott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Olive Branch 2017
Olive Branch 2017Olive Branch 2017
Olive Branch 2017
Scott Burnett
 
2023 Presentation.pptx
2023 Presentation.pptx2023 Presentation.pptx
2023 Presentation.pptx
Scott Burnett
 
Protect your family
Protect your familyProtect your family
Protect your family
neodad1
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!
Scott Burnett
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
Scott Burnett
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
Greater Cleveland PC Users Group
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
Scott Burnett
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015
Scott Burnett
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
Jason Weaver
 
Moochies presentation
Moochies presentationMoochies presentation
Moochies presentation
kauepgarcia
 
Internet Safety For Parents v3
Internet Safety For Parents v3Internet Safety For Parents v3
Internet Safety For Parents v3
MrAColley
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
SheryldeVilla2
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Lo1 405 moochies_presentation
Lo1 405 moochies_presentationLo1 405 moochies_presentation
Lo1 405 moochies_presentation
kauepgarcia
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 

Similar to Hume Lake Spring Marriage Retreat tech safety presentation (20)

Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Olive Branch 2017
Olive Branch 2017Olive Branch 2017
Olive Branch 2017
 
2023 Presentation.pptx
2023 Presentation.pptx2023 Presentation.pptx
2023 Presentation.pptx
 
Protect your family
Protect your familyProtect your family
Protect your family
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
Moochies presentation
Moochies presentationMoochies presentation
Moochies presentation
 
Internet Safety For Parents v3
Internet Safety For Parents v3Internet Safety For Parents v3
Internet Safety For Parents v3
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Lo1 405 moochies_presentation
Lo1 405 moochies_presentationLo1 405 moochies_presentation
Lo1 405 moochies_presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 

More from Scott Burnett

Fall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott BurnettFall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott Burnett
Scott Burnett
 
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer ConceptsManaging Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
Scott Burnett
 
Managing Screen Time
Managing Screen TimeManaging Screen Time
Managing Screen Time
Scott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
Scott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Internet safety for parents slide share
Internet safety for parents slide shareInternet safety for parents slide share
Internet safety for parents slide share
Scott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
Scott Burnett
 
Internet Safety for families
Internet Safety for familiesInternet Safety for families
Internet Safety for families
Scott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
Scott Burnett
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
Scott Burnett
 

More from Scott Burnett (14)

Fall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott BurnettFall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott Burnett
 
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer ConceptsManaging Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
 
Managing Screen Time
Managing Screen TimeManaging Screen Time
Managing Screen Time
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet safety for parents slide share
Internet safety for parents slide shareInternet safety for parents slide share
Internet safety for parents slide share
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet Safety for families
Internet Safety for familiesInternet Safety for families
Internet Safety for families
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 

Recently uploaded

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Hume Lake Spring Marriage Retreat tech safety presentation