SlideShare a Scribd company logo
Managing Technology in the Home
Our kids are teaching us technology!
Do you think an adult
could be addicted to a
phone or social media
APP?
Question…
Do you think a CHILD
could be addicted to a
phone or social media
APP?
Question…
Current Statistics
• The AVERAGE teen spends about 4 hours a day online
• 25% have met up in person somebody they met online
• 30% of teens have cheated on a test with a phone
• 35% have hacked into a friends social media account or email
• 40% have accessed pornography online
• 75% admit to hiding their online behavior from parents
• 30% of kids have parental controls on their computers
Key Terms
Filtering
programs that BLOCK content
specifically, adult content
Monitoring
programs the
record computer
and cell phone
activities
What in the world
are my kids doing
online?
Current trends in
Tech!
Social networking parents =
Social networking for kids…
Rules for social media use…
• Know the platform
• Know the password
• Know their friends / followers
INTERNET SAFETY RISKS
Rules for social media use…
• Always use privacy settings
• Post respectfully - positively
• No Bullying!
• Select photos carefully
INTERNET SAFETY RISKS
Current Trend: Fan Following
• Collect followers and likes
• Instagram is the #1
• Kids can get obsessed with these!
Pornography
• 1 in 9 websites
online are
pornographic
• Put a filter
program on ANY
computer that your
child will use.
Pornography
• The average child stumbles onto a
pornographic website by age 12.
• The first time a child sees pornography
online it is most often accidental and
potentially devastating.
• A private location vs. public location is the
difference between a one time accident and
a new found routine or habit.
Pornography
• Family Computer
• Laptop
• Cell phone
• iPad / Tablet
• Game console
• Friends house
• Put a filter program on ANY device that your
child will use, especially when they are
young.
Anonymous Apps
Secret
Whisper
YikYak
Sober
Cyber Bullying
Cyber Bullying
Rebecca Ann Sedwick
12 Years old.
Died from suicide
Cyber Bullying
Danger! Beware!
Completely Anonymous
Cyber Bullying
Sexting
Definition…
Sending of sexually explicit photos
or text through one’s mobile phone
to friends or suitors.
Sexting
Feb, 2016
Oct, 2014
10,000 images
Mostly 13-17 year olds
Over 1000 videos
Posted and reposted to 10
sites in less than 24 hours
Hook up Apps
Tinder, Blendr, Grindr, Skout, and
Swoon
We are the first
generation of
parents that
have had to deal
with the new
phenomenon!
Colleges and
employers are
looking!
How do I keep my kids
safe from the ever
changing world of
technology!?!
Virus – Malware - Phishing
The most common problem
Location….Location….Location…
Cell phones at night…
Scott’s low
cost budget
version…..
The iBasket
Cell phones at night…
Contracts!
• Cell phone contract
• www.iccguru.com/cellphonecontract.doc
Passwords
Google and YouTube
• Google’s “Safe Search”
Google and YouTube
• YouTube’s “Safety Mode”
www.safesearchkids.com
www.kiddle.co
WebFilter
Web Filter for Mac and PC
Monitoring for the computer
• Email
• Instant Messaging
• Keystrokes
• Screenshots
• Website history
• Searches
• Facebook
• YouTube
SetupiOSrestrictions
SAFEONLINE
TO KEEP YOUR FAMILY
iPhone – iPad – iTouch CONTROL
iPhone – iPad – iTouch CONTROL
CellPhonelocation
TextMessageMonitoring
Scott’s Final Tips
1) Don't get left behind! LEARN
2) Know the PW's of your kid's accounts
3) Remove technology at night
4) Talk about consequences of social
media
5) Put a filter on all internet devices
6) Consider some monitoring software
Connect with your KIDS
Internet Safety for Parents

More Related Content

What's hot

Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
Scott Burnett
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
Brad McAllister
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
lisluandaprimary
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
Marian Merritt
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?
TeenSafe
 
How Online Predators Threaten Our Children
How Online Predators Threaten Our ChildrenHow Online Predators Threaten Our Children
How Online Predators Threaten Our Children
TeenSafe
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
TeenSafe
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From Cyberbullying
TeenSafe
 
Smartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in TeensSmartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in Teens
TeenSafe
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
Scott Burnett
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
Rodolfo Salazar
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
jaenjenny
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
Patrick Laverty
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
Scott Burnett
 
Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2Tamasine Preece
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
Chris Burrows
 
Brochure
BrochureBrochure
Brochurejrj6819
 

What's hot (19)

Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
 
Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents Cyber Awareness presentation for Parents
Cyber Awareness presentation for Parents
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?When Should I Buy My Child A Smartphone (Or Tablet)?
When Should I Buy My Child A Smartphone (Or Tablet)?
 
How Online Predators Threaten Our Children
How Online Predators Threaten Our ChildrenHow Online Predators Threaten Our Children
How Online Predators Threaten Our Children
 
Teen safe2017appblacklist slideshare
Teen safe2017appblacklist   slideshareTeen safe2017appblacklist   slideshare
Teen safe2017appblacklist slideshare
 
Teens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From CyberbullyingTeens Online: Keeping Your Child Safe From Cyberbullying
Teens Online: Keeping Your Child Safe From Cyberbullying
 
Smartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in TeensSmartphones & Sleep Deprivation in Teens
Smartphones & Sleep Deprivation in Teens
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
 
Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2Social_Suicide_A_Psychoanalysis_of_Adole-2
Social_Suicide_A_Psychoanalysis_of_Adole-2
 
Cyber security for kids
Cyber security for kidsCyber security for kids
Cyber security for kids
 
Brochure
BrochureBrochure
Brochure
 

Similar to Internet Safety for Parents

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
Scott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
Scott Burnett
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
Rohit Srivastwa
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!
Scott Burnett
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Donna Murray
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary
Scott Burnett
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
SimonBalle
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
danriles
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
LIFARS
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
Dan Bowen
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
stevewrightco
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentationfkompar
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.
Your eKavach
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
Pat Sine
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
Larry Magid
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
Fred Miller
 

Similar to Internet Safety for Parents (20)

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
Parenting in digital world
Parenting in digital worldParenting in digital world
Parenting in digital world
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Internet safetypresentation
Internet safetypresentationInternet safetypresentation
Internet safetypresentation
 
Slisn Pres1
Slisn Pres1Slisn Pres1
Slisn Pres1
 
5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.5 facts about the digital worldthat every parent should know.
5 facts about the digital worldthat every parent should know.
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 

More from Scott Burnett

2023 Presentation.pptx
2023 Presentation.pptx2023 Presentation.pptx
2023 Presentation.pptx
Scott Burnett
 
Fall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott BurnettFall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott Burnett
Scott Burnett
 
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer ConceptsManaging Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
Scott Burnett
 
Managing Screen Time
Managing Screen TimeManaging Screen Time
Managing Screen Time
Scott Burnett
 
Olive Branch 2017
Olive Branch 2017Olive Branch 2017
Olive Branch 2017
Scott Burnett
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017
Scott Burnett
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentation
Scott Burnett
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015
Scott Burnett
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
Scott Burnett
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
Scott Burnett
 

More from Scott Burnett (10)

2023 Presentation.pptx
2023 Presentation.pptx2023 Presentation.pptx
2023 Presentation.pptx
 
Fall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott BurnettFall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott Burnett
 
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer ConceptsManaging Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
 
Managing Screen Time
Managing Screen TimeManaging Screen Time
Managing Screen Time
 
Olive Branch 2017
Olive Branch 2017Olive Branch 2017
Olive Branch 2017
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017
 
Hume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentationHume Lake Spring Marriage Retreat tech safety presentation
Hume Lake Spring Marriage Retreat tech safety presentation
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Internet Safety for Parents