This document provides a primer on online privacy. It discusses being careful about what personal information is posted online, as anything posted can be copied and shared. Strong passwords and up-to-date security software should be used to protect accounts from hackers. Tracking cookies can be used by advertisers to track browsing habits across sites, but they can be deleted or blocked. Mobile apps may access location data unless privacy settings are checked, and public conversations and device screens should be mindful of potential eavesdroppers. Facebook provides privacy settings to control what is shared and with whom.
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
This is not your tired old Internet Safety lecture, but a presentation by ConnectSafely.org CEO Larry Magid that emphasizes youth rights as well as responsibliities and the importance of media literacy
[PPT] Webinar on Cyber Safety Training for Young StudentsShubham Gupta
Key Learning:
-How to protect against social media crimes, cyber bullying, stalking & defamation?
- Top To-Dos for a Young Student: To protect oneself against cyber crime & threats
- What parents can do to help kids in cyber awareness & safety?
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
This is not your tired old Internet Safety lecture, but a presentation by ConnectSafely.org CEO Larry Magid that emphasizes youth rights as well as responsibliities and the importance of media literacy
[PPT] Webinar on Cyber Safety Training for Young StudentsShubham Gupta
Key Learning:
-How to protect against social media crimes, cyber bullying, stalking & defamation?
- Top To-Dos for a Young Student: To protect oneself against cyber crime & threats
- What parents can do to help kids in cyber awareness & safety?
When it comes to social media, most of us expect that we are in control of what we share about ourselves, and who we share with. In this hands-on workshop, we will dispel common myths and misconception about social media privacy as well as discuss step-by-step instructions for securing out social media selves.
We live in an increasingly technology-based society. Children need to be prepared to navigate a world and a workforce in which computers are an essential part of daily life. The Internet can be used as a learning tool or a weapon. Social networking sites, like Facebook and Twitter, are popular Internet destinations for millions of children nationwide. Unfortunately, these sites are also popular with sexual predators, cyber bullies, and con artists. Attend this informative workshop to gain a clearer understanding of the issues children are facing, and what message to communicate to your child about making safer decisions.
Presentation to young people at Highland Youth Voice Conference 2009. The slideshow included discussion break outs and the video clip of Joe can be found here..we also had guests from Sardinia.
http://www.digizen.org/cyberbullying/film.aspx
Short PowerPoint created by Massachusetts Aggression Reduction Center (MARC) designed to give parents some tools to use in helping children avoid and handle issues around cyberbullying
“criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity”
categorize based on computer’s role:
as target
as storage device
as communications tool
more comprehensive categorization seen in Cybercrime Convention, Computer Crime Surveys
Freedom comes with reponsibility. So before we introduce our children to the world of internet and mobile phones, we must make them aware of how to be safe, and most importantly why to be safe.
When it comes to social media, most of us expect that we are in control of what we share about ourselves, and who we share with. In this hands-on workshop, we will dispel common myths and misconception about social media privacy as well as discuss step-by-step instructions for securing out social media selves.
We live in an increasingly technology-based society. Children need to be prepared to navigate a world and a workforce in which computers are an essential part of daily life. The Internet can be used as a learning tool or a weapon. Social networking sites, like Facebook and Twitter, are popular Internet destinations for millions of children nationwide. Unfortunately, these sites are also popular with sexual predators, cyber bullies, and con artists. Attend this informative workshop to gain a clearer understanding of the issues children are facing, and what message to communicate to your child about making safer decisions.
Presentation to young people at Highland Youth Voice Conference 2009. The slideshow included discussion break outs and the video clip of Joe can be found here..we also had guests from Sardinia.
http://www.digizen.org/cyberbullying/film.aspx
Short PowerPoint created by Massachusetts Aggression Reduction Center (MARC) designed to give parents some tools to use in helping children avoid and handle issues around cyberbullying
“criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity”
categorize based on computer’s role:
as target
as storage device
as communications tool
more comprehensive categorization seen in Cybercrime Convention, Computer Crime Surveys
Freedom comes with reponsibility. So before we introduce our children to the world of internet and mobile phones, we must make them aware of how to be safe, and most importantly why to be safe.
Webinar: 12 Tips to Stay Safer Online - 2018-10-16TechSoup
Proper digital security is an essential piece of building a trustworthy organization. Nonprofits and charities rely on the goodwill of their donors and constituents to support them and their missions, so it’s crucial that they have access to tools that will protect their data and infrastructure. In this webinar, Michael Enos, Senior Director of Community and Platforms at TechSoup, will teach you practical tools that your organization can use to ensure online security. We’ll cover several major areas of digital security, including:
Social Media Safety
Maintaining Security In and Out Of the Office
Safety on the Cloud
Data Privacy and Protection
We are surrounding with technology. The more we surround and integrate with technology the more we will be in risk our privacy data/online/internet/cyber. Not only you are in risk, your family and friend alos in risk. If we think I am not important person then that would be your great mistake. You are important to someone in somewhere in this world.
Mind it your daily life is watched by someone. So be conscious… remember Prevention is Better than cure.
This month, Community IT presents basic IT security training for end users. Learn about common threats and the best techniques for dealing with them. This webinar is intended for a broad audience of both technical and non-technical staff.
What's in your personal threat model? What assets are you trying to protect? Learn how to improve your personal security and privacy online through best practices and security tips. This talk is for everyone, whether your a seasoned security professional or complete novice hopefully you will take away a few areas where you can better protect your personal information.
Video Link: https://www.youtube.com/watch?v=PIwvxSZj5e8
How paranoid should you really be about online security safety? Read Security Engineer Geoff Vaughan's advice on security best practices for regular users.
These are from the National Cyber Security Alliance (NCSA) for National Cyber Security Awareness Month (NCSAM) and are free to use. See https://staysafeonline.org/ for more info.
Digital Safety, Data Privacy, and Online NetiquetteGab Billones
Here are my slides on digital safety, data privacy, and online netiquette during the Human Traffickick program of Millennials PH Cavite Chapter last January 29, 2022.
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
Our security practices need to evolve in order to address the new challenges propped up by the rapid adoption of technologies and products to enable the world to WFH. The mantra of the attacker remains consistent -- attack that which yields maximum result -- and that is usually something used by a very very large number of users. This webinar will discuss the Top 10 Security Gaps that CISOs should be aware of as they brace for long WFH periods.
What will you learn :
-New Attack techniques hackers are using targeting WFH
-How to handle decentralisation of IT and technology decisions?
-Application risks as enterprises pivot to online/new business model(s)
-New risks in the Cloud and due to Shadow IT
-Security risks due to uninformed employees & their home infrastructure
-How to handle Misconfigurations & Third party risks
-How to build a robust breach response and recovery program?
Full video - https://youtu.be/bQLfnmhDnQs
The presentation prepares the caregivers to select the digital tools which could help the person being cared in improving his/her quality of life, well-being and living safety. They will be able to develop his/her personal digital strategy, including digital tools for his/her work, keep contact and communicate with the older adult, and also the practical digital tools and applications she/he can offer and teach the older adult to help them keeping mental and physical health.
2020 is not same for kids/teachers/college students and job goers, COVID-19 changed the things that we do from day to day life. Here, am discussing about the back to school safety for teachers, parents and kids to be safe and clean online.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Privacy Primer
1. PRIVACY PRIMER
A short course on online privacy by
Larry Magid
Co-director, ConnectSafely.org
Founder, SafeKids.com
larry@ConnectSafely.org
2. Watch what you post
• The biggest risk to our privacy is what we post ourselves
• Be aware that anything you post online can be copied and
pasted
• If it’s really embarrassing or really a secret, don’t post it
online, even if you have the tightest possible privacy
settings
3. Keep hackers at bay
• All privacy bets are off if hackers get user names and passwords
or break into one of your accounts
• Even if you practice great security, there is always a chance of a
data breach at some company or agency with access to your
data
4. Security tips
• Use strong passwords, change them periodically and don’t use
the same password for multiple accounts
• Check your online credit and bank accounts
• Use security software and keep it and your operating system
and applications up-to-date
• Use WiFi security
• Use the privacy tools associated with your social networks
• Only provide personal or financial information to websites you
know and trust
• Be aware of the mobile and social networking apps you’re
using
• Know how to use your browser’s private or “ingonito” mode and
how to erase the history from your browser.
5. How tracking cookies work
1. You visit a website that has an ad on it that’s placed by
one of the advertising networks. The ad is delivered
from a server owned by the advertising network
2. The network puts a cookie on your machine that
records the ad that was shown and the site you visited
3. When you visit another site that displays ads from the
same network, the cookie is updated
with information about the current ad and current site.
4. Over a period of time the network can get a pretty good
idea of sites in its network that you’ve visited
6. How to delete & block tracking cookies
• Many security products can be used to remove tracking
cookies and the major browsers also have tools to
remove them
• DoubleClick, which is owned by
Google, offers instructions on how to opt out of cookies
• All the browser companies have agreed to include a “do
not track” feature in future browsers, but tracking will be
the default setting unless you change it. Mozilla
Firefox, the first to implement this feature
7. Control mobile location sharing
• Some mobile apps are designed to share your
location: Use them thoughtfully and only share
with those you trust.
• Review setting periodically. A “friend” could
become an ex-friend.
• Pay attention to the permissions on all mobile
apps. Only use location-aware apps that you
trust
8. Don’t overlook the “obvious”
• Watch what you say on your phone while you’re in
public — people around you might be listening
• Be aware of others viewing your screen. Consider
getting a privacy screen for your laptop
• Shred your old financial records and other confidential
documents before throwing them in the trash
or recycling bin
9. Facebook privacy settings
Access general privacy settings by clicking down arrow in upper
right corner
And then clicking on “Privacy Settings”
10. Facebook inline privacy controls
• Whenever you add content, you can select the audience
• Be aware that whatever audience you last
selected remains for subsequent posts until you
change it