SlideShare a Scribd company logo
SLIDESMANIA.COM
Empowerment
Technology
SLIDESMANIA.COM
“How Safe Are
You?”
SLIDESMANIA.COM
Types of Information Shared Not Shared
1. First Name
2. Last name
3. Middle Name
4. Current and Previous School
5. Your cellphone Number
6. The name of your Mother and
Father
7. The name of your siblings
8. Your address
9. Your home phone number
10. Your birthday
SLIDESMANIA.COM
RULES OF
NETIQUETTE
think. type. post. share
SLIDESMANIA.COM
Online Safety
and Security
The Internet, truly, is a powerful
tool. It can be used to promote
your business, gain new friends,
and stay in touch with the old
ones. It is also a source of
entertainment.
SLIDESMANIA.COM
SLIDESMANIA.COM
Tips to Stay Safe Online
Be mindful of what you share online.
Do not just accept terms and conditions.
Check out the privacy policy page of a website.
Know the security features of the social
networking site you use..
SLIDESMANIA.COM
Do not share your password
Avoid logging in to public networks/ WI-FI
Do not talk to strangers.
Never post anything about a future
vacation
Avoid visiting untrusted sites
Do not reply or click from suspicious emails
SLIDESMANIA.COM
Internet Threats
SLIDESMANIA.COM
Here are some of the threats you should be
aware of when using the Internet
1. Malware – stands for malicious software
Types: Virus, Worm, Trojan, Spyware, Adware
2. Spam – unwanted email mostly from bots or advertisers.
3. Phishing – Its goal is to acquire sensitive personal
information like passwords and credit card details.
SLIDESMANIA.COM
SLIDESMANIA.COM
SLIDESMANIA.COM
SLIDESMANIA.COM
SLIDESMANIA.COM
SLIDESMANIA.COM
SLIDESMANIA.COM
Think Before You Click
Before you post something on the web, ask these questions to yourself: Would
you want your parents or grandparents to see it? Would you want your
future boss to see it?
Set your post to “private.”
Your friends depend on you to protect their reputation
online.
SLIDESMANIA.COM
Think Before You Click
Avoid using names.
If you feel that a post can affect you or other’s reputation,
ask the one who posted it to pull it down or report it as
inappropriate.
SLIDESMANIA.COM
BENEFITS OF NETIQUETTE
The rules of netiquette offers a great guideline for online
communication.
Using netiquette helps us make sure that our online footprint
reflects well on us.
It promotes communication skills, prevent
miscommunication and help understand what is socially
acceptable when working and collaborating online.
SLIDESMANIA.COM
Copyright
Infringement
● If you create something—an idea,
an invention, a form of literary
work, or a research, you have the
right of how it should be used by
others. This is called intellectual
property.
SLIDESMANIA.COM
Here are some tips that could help you
avoid copyright infringement:
1. Understand – Copyright protects literary works, photographs,
paintings, drawings, films, music, but generally does NOT
protect underlying ideas and facts.
2. Be responsible – Even material does not say that it is
copyrighted, it is not a valid defense against copyright.
SLIDESMANIA.COM
3. Be Creative – Ask yourself whether what you are making is
something that came from you or something made from
somebody else’s creativity.
4. Know the Law – There are some limitations to copyright laws.
Here are some tips that could help you
avoid copyright infringement:
SLIDESMANIA.COM
Online
Research
Have you ever
search the internet
for certain
information where
the search engine
returned a
different result?
SLIDESMANIA.COM
Here are some tips
in conducting
online research:
Narrow it down
Have a question in mind
Look for a credible source
Give Credit
SLIDESMANIA.COM
“Your Turn To
Shine”
Self- Directed Learning
SLIDESMANIA.COM
1. Do you agree or disagree with the
provisions of the copyright law?
Defend your answer.
2. How would you feel if someone posted
something embarrassing about you?
What would you do?
SLIDESMANIA.COM
Thank you
for Listening!

More Related Content

Similar to Rules of Netiquette.pptx

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
SheejamolMathew
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
MelchorTolentino2
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
iceman1953
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
CedLinc
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
Sonal Bharal
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
Joy Dugayo
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
sabrinacotta
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
Osaid To'meh
 
Netizenship and Netiquette in Online Communities
Netizenship and Netiquette in Online CommunitiesNetizenship and Netiquette in Online Communities
Netizenship and Netiquette in Online Communities
carolynearagones
 
Heads up!
Heads up!Heads up!
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
SheenaAFuentes
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
sheena711714
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
Leah Condina
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
densio123
 

Similar to Rules of Netiquette.pptx (20)

ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdfW3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
W3_ONLINE_SAFETY_SECURITY_NETIQUETTE.pdf
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Netiquettes
NetiquettesNetiquettes
Netiquettes
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Cybersafety Version1
Cybersafety Version1Cybersafety Version1
Cybersafety Version1
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
Netizenship and Netiquette in Online Communities
Netizenship and Netiquette in Online CommunitiesNetizenship and Netiquette in Online Communities
Netizenship and Netiquette in Online Communities
 
Heads up!
Heads up!Heads up!
Heads up!
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
E-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptxE-Tech L2 Rules of Netiquette.pptx
E-Tech L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Lesson 2 jerry dennis
Lesson 2 jerry dennisLesson 2 jerry dennis
Lesson 2 jerry dennis
 

More from PaulineMae5

Lesson 5_Ang mga Organisasyon at Alyansa sa Daigdig .pptx
Lesson 5_Ang mga Organisasyon at Alyansa sa Daigdig .pptxLesson 5_Ang mga Organisasyon at Alyansa sa Daigdig .pptx
Lesson 5_Ang mga Organisasyon at Alyansa sa Daigdig .pptx
PaulineMae5
 
Lesson 2_Food Safety Principles, Consumer Health and Foodborne Diseases.pdf
Lesson 2_Food Safety Principles, Consumer Health and Foodborne Diseases.pdfLesson 2_Food Safety Principles, Consumer Health and Foodborne Diseases.pdf
Lesson 2_Food Safety Principles, Consumer Health and Foodborne Diseases.pdf
PaulineMae5
 
Lesson 5.............................pptx
Lesson 5.............................pptxLesson 5.............................pptx
Lesson 5.............................pptx
PaulineMae5
 
Lesson 1.............................pdf
Lesson 1.............................pdfLesson 1.............................pdf
Lesson 1.............................pdf
PaulineMae5
 
Chapter 10.1 Interfaith Dialogue....pptx
Chapter 10.1 Interfaith Dialogue....pptxChapter 10.1 Interfaith Dialogue....pptx
Chapter 10.1 Interfaith Dialogue....pptx
PaulineMae5
 
Lesson 3_............................pptx
Lesson 3_............................pptxLesson 3_............................pptx
Lesson 3_............................pptx
PaulineMae5
 
Lesson 4............................pptx
Lesson 4............................pptxLesson 4............................pptx
Lesson 4............................pptx
PaulineMae5
 
Lesson 7_Confucianism and Daoism....pptx
Lesson 7_Confucianism and Daoism....pptxLesson 7_Confucianism and Daoism....pptx
Lesson 7_Confucianism and Daoism....pptx
PaulineMae5
 
Lesson 8_Shinto..........................pptx
Lesson 8_Shinto..........................pptxLesson 8_Shinto..........................pptx
Lesson 8_Shinto..........................pptx
PaulineMae5
 
Q3 - AP 7 Reviewer...................pdf
Q3 - AP 7 Reviewer...................pdfQ3 - AP 7 Reviewer...................pdf
Q3 - AP 7 Reviewer...................pdf
PaulineMae5
 
SIBIKA 5 Balik-Aral..................pdf
SIBIKA 5 Balik-Aral..................pdfSIBIKA 5 Balik-Aral..................pdf
SIBIKA 5 Balik-Aral..................pdf
PaulineMae5
 
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pdf
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pdfQ4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pdf
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pdf
PaulineMae5
 
Q3 AP 7 - pt.2 Karanasan ng mga Kababaihan.pdf
Q3 AP 7 - pt.2  Karanasan ng mga Kababaihan.pdfQ3 AP 7 - pt.2  Karanasan ng mga Kababaihan.pdf
Q3 AP 7 - pt.2 Karanasan ng mga Kababaihan.pdf
PaulineMae5
 
Q4 AP 8 - Kapayapaang Pandaigdig.....pdf
Q4 AP 8 - Kapayapaang Pandaigdig.....pdfQ4 AP 8 - Kapayapaang Pandaigdig.....pdf
Q4 AP 8 - Kapayapaang Pandaigdig.....pdf
PaulineMae5
 
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pptx
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pptxQ4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pptx
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pptx
PaulineMae5
 
Q4 AP7- Karanasan at Implikasyon ng Digmaang Pandaigdig.pdf
Q4 AP7- Karanasan at Implikasyon ng Digmaang Pandaigdig.pdfQ4 AP7- Karanasan at Implikasyon ng Digmaang Pandaigdig.pdf
Q4 AP7- Karanasan at Implikasyon ng Digmaang Pandaigdig.pdf
PaulineMae5
 
Q3 AP5 - Katutubong Pilipino.........pdf
Q3 AP5 - Katutubong Pilipino.........pdfQ3 AP5 - Katutubong Pilipino.........pdf
Q3 AP5 - Katutubong Pilipino.........pdf
PaulineMae5
 
Q3 AP5 - Tradisyunal at Di-tradisyunal.pdf
Q3 AP5 - Tradisyunal at Di-tradisyunal.pdfQ3 AP5 - Tradisyunal at Di-tradisyunal.pdf
Q3 AP5 - Tradisyunal at Di-tradisyunal.pdf
PaulineMae5
 
Q4 AP5 - Pagpapahalaga sa Partisipasyon ng Iba't-ibang Rehiyon at Sektor sa P...
Q4 AP5 - Pagpapahalaga sa Partisipasyon ng Iba't-ibang Rehiyon at Sektor sa P...Q4 AP5 - Pagpapahalaga sa Partisipasyon ng Iba't-ibang Rehiyon at Sektor sa P...
Q4 AP5 - Pagpapahalaga sa Partisipasyon ng Iba't-ibang Rehiyon at Sektor sa P...
PaulineMae5
 
Q4 AP 5 - Responsibilidad...........pptx
Q4 AP 5 - Responsibilidad...........pptxQ4 AP 5 - Responsibilidad...........pptx
Q4 AP 5 - Responsibilidad...........pptx
PaulineMae5
 

More from PaulineMae5 (20)

Lesson 5_Ang mga Organisasyon at Alyansa sa Daigdig .pptx
Lesson 5_Ang mga Organisasyon at Alyansa sa Daigdig .pptxLesson 5_Ang mga Organisasyon at Alyansa sa Daigdig .pptx
Lesson 5_Ang mga Organisasyon at Alyansa sa Daigdig .pptx
 
Lesson 2_Food Safety Principles, Consumer Health and Foodborne Diseases.pdf
Lesson 2_Food Safety Principles, Consumer Health and Foodborne Diseases.pdfLesson 2_Food Safety Principles, Consumer Health and Foodborne Diseases.pdf
Lesson 2_Food Safety Principles, Consumer Health and Foodborne Diseases.pdf
 
Lesson 5.............................pptx
Lesson 5.............................pptxLesson 5.............................pptx
Lesson 5.............................pptx
 
Lesson 1.............................pdf
Lesson 1.............................pdfLesson 1.............................pdf
Lesson 1.............................pdf
 
Chapter 10.1 Interfaith Dialogue....pptx
Chapter 10.1 Interfaith Dialogue....pptxChapter 10.1 Interfaith Dialogue....pptx
Chapter 10.1 Interfaith Dialogue....pptx
 
Lesson 3_............................pptx
Lesson 3_............................pptxLesson 3_............................pptx
Lesson 3_............................pptx
 
Lesson 4............................pptx
Lesson 4............................pptxLesson 4............................pptx
Lesson 4............................pptx
 
Lesson 7_Confucianism and Daoism....pptx
Lesson 7_Confucianism and Daoism....pptxLesson 7_Confucianism and Daoism....pptx
Lesson 7_Confucianism and Daoism....pptx
 
Lesson 8_Shinto..........................pptx
Lesson 8_Shinto..........................pptxLesson 8_Shinto..........................pptx
Lesson 8_Shinto..........................pptx
 
Q3 - AP 7 Reviewer...................pdf
Q3 - AP 7 Reviewer...................pdfQ3 - AP 7 Reviewer...................pdf
Q3 - AP 7 Reviewer...................pdf
 
SIBIKA 5 Balik-Aral..................pdf
SIBIKA 5 Balik-Aral..................pdfSIBIKA 5 Balik-Aral..................pdf
SIBIKA 5 Balik-Aral..................pdf
 
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pdf
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pdfQ4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pdf
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pdf
 
Q3 AP 7 - pt.2 Karanasan ng mga Kababaihan.pdf
Q3 AP 7 - pt.2  Karanasan ng mga Kababaihan.pdfQ3 AP 7 - pt.2  Karanasan ng mga Kababaihan.pdf
Q3 AP 7 - pt.2 Karanasan ng mga Kababaihan.pdf
 
Q4 AP 8 - Kapayapaang Pandaigdig.....pdf
Q4 AP 8 - Kapayapaang Pandaigdig.....pdfQ4 AP 8 - Kapayapaang Pandaigdig.....pdf
Q4 AP 8 - Kapayapaang Pandaigdig.....pdf
 
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pptx
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pptxQ4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pptx
Q4 AP5 - Pananaw at Paniniwala ng mga Sultanato.pptx
 
Q4 AP7- Karanasan at Implikasyon ng Digmaang Pandaigdig.pdf
Q4 AP7- Karanasan at Implikasyon ng Digmaang Pandaigdig.pdfQ4 AP7- Karanasan at Implikasyon ng Digmaang Pandaigdig.pdf
Q4 AP7- Karanasan at Implikasyon ng Digmaang Pandaigdig.pdf
 
Q3 AP5 - Katutubong Pilipino.........pdf
Q3 AP5 - Katutubong Pilipino.........pdfQ3 AP5 - Katutubong Pilipino.........pdf
Q3 AP5 - Katutubong Pilipino.........pdf
 
Q3 AP5 - Tradisyunal at Di-tradisyunal.pdf
Q3 AP5 - Tradisyunal at Di-tradisyunal.pdfQ3 AP5 - Tradisyunal at Di-tradisyunal.pdf
Q3 AP5 - Tradisyunal at Di-tradisyunal.pdf
 
Q4 AP5 - Pagpapahalaga sa Partisipasyon ng Iba't-ibang Rehiyon at Sektor sa P...
Q4 AP5 - Pagpapahalaga sa Partisipasyon ng Iba't-ibang Rehiyon at Sektor sa P...Q4 AP5 - Pagpapahalaga sa Partisipasyon ng Iba't-ibang Rehiyon at Sektor sa P...
Q4 AP5 - Pagpapahalaga sa Partisipasyon ng Iba't-ibang Rehiyon at Sektor sa P...
 
Q4 AP 5 - Responsibilidad...........pptx
Q4 AP 5 - Responsibilidad...........pptxQ4 AP 5 - Responsibilidad...........pptx
Q4 AP 5 - Responsibilidad...........pptx
 

Recently uploaded

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Rules of Netiquette.pptx