SlideShare a Scribd company logo
What do our children get up to online? [and how to cope with that]
It’s a brave new world out there
We need to understand ,[object Object],[object Object],[object Object]
THE NEW LANDSCAPE
DIGITAL NATIVES NETWORKS SPEED
In the “real” world …
Immigrants arrive
 
With little understanding of native cultures and tongues (often if not always)
 
Their children become “scouts”
 
“ They add bangers and mash and fish and chips to sag gosht and parathas, not noticing the joins” [  Ziauddin   Sardar   ]
 
The same is true of the ‘digital’ world
If you were born before 1980, you’re a digital immigrant (however smart your mobile phone is)
If not, you’re a digital native [developed world]
 
Problem 1 :  You will never be as fluent as your kids
Problem 2: Your children don’t see the on/offline divide
DIGITAL NATIVES NETWORKS SPEED
Family communications used to be ‘decentralised’
Now, they’re distributed.  Communication is Peer to Peer.
Problem 3: You have little control over how or with whom children communicate
DIGITAL NATIVES NETWORKS SPEED
More bad news (sorry)
The tools children use are changing quickly, continually and globally
Problem 4: there’s no catching up
WHAT CHILDREN DO ONLINE
Here’s a small set of popular tools that your children might play with
 
Trying to understand all of them is a mug’s game
Broad brush categories + Core principles = Begin to understand threats
3 broad brush categories Connections Content Co-creation
CONNECTIONS   CONTENT  CO-CREATION
There are 2 types of connection: immediate and over time
Immediate connections
Can be 1 to 1 (like a phone call)
Can be 1 to many (like a group chat)
Can be done in lots of ways (phone, IM, Skype, Yahoo, Google, chat rooms, jargoncity, confusetheparents.com)
All share some basic  grammar
IDENTITY PRESENCE OPENNESS
Point 1 : Presence whenever you’re online, you can see who else is online
Point 2 : Openness anyone can connect to you, but you can listen to or ignore anyone you like
Point 3 : Identity When everyone can wear a mask,  trust becomes critical
Connections over time
Social Networks Last.fm ,  Bebo ,  Facebook
Shaping their “country” ,[object Object]
Point 4 : Trails As you move round online, you leave trails, and you personalise these.
Point 5 : Communities Online communities are quick to set up & quick to join
Point 6 : Trust Trust is found through network proximity & friend of a friend approaches [FOAF].
CONNECTIONS   CONTENT  CO-CREATION
 
Walt Disney “ripped, mixed, and burnt” the Brothers Grimm
What’s new? ,[object Object],[object Object],[object Object],[object Object]
Point 7 : Creativity Natives have more ways of making and publishing more than ever before.  Not all of it ‘legal’
CONNECTIONS  CONTENT   CO-CREATION
Think Playstation or Gamecube. Think vapid expressions.
Think again.
Second Life ,[object Object],[object Object],[object Object],[object Object]
 
 
 
 
 
Comedians have done gigs in Second Life
People have become real world millionaires selling virtual real estate
Point 8 : Virtual is dead Online and offline are so intertwined for natives that the distinction is basically not there.
HOW TO KEEP THEM SAFE
3 possible approaches (and just like the real world none, sadly, are guaranteed)
Total Lockdown   Stop your children from communicating online.
Filter   build  some prevention measure  into the software you use
Trust   build some prevention measures into the software  and  focus on the parent-child bond
Possible approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Piers Young http://www.monkeymagic.net

More Related Content

What's hot

Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14
Bex Lewis
 
Power point 2 p
Power point 2 pPower point 2 p
Power point 2 p
lavoriscuola
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
Amanda lee
 
The world at your fingertips mindmap
The world at your fingertips mindmapThe world at your fingertips mindmap
The world at your fingertips mindmapWei Xiang Ong
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
Apostolos Syropoulos
 
Technology and Human Communication, Social Interaction
Technology and Human Communication, Social InteractionTechnology and Human Communication, Social Interaction
Technology and Human Communication, Social Interaction
hsudduth
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2mj_jamal
 
The Light and Dark of the Internet
The Light and Dark of the InternetThe Light and Dark of the Internet
The Light and Dark of the Internet
Michael Coghlan
 
Media Literacy and Personal Identity
Media Literacy and Personal IdentityMedia Literacy and Personal Identity
Media Literacy and Personal Identity
Jamie Cohen
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
markgernale24
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
Andy Smith
 
What is digital citizenship and its components
What is digital citizenship and its componentsWhat is digital citizenship and its components
What is digital citizenship and its components
RolandLeonillo1
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
Lutz Schmitt
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
KanelandSvihlik
 
How technology has changed the way we communicate
How technology has changed the way we communicateHow technology has changed the way we communicate
How technology has changed the way we communicate
CRISTINA DOMENE BEVIÁ
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
ShSgh4
 
J. Social Interaction in 10 years
J. Social Interaction in 10 yearsJ. Social Interaction in 10 years
J. Social Interaction in 10 years
Tanvigarg89
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
KanelandSvihlik
 
Patrick's powerpoint
Patrick's powerpointPatrick's powerpoint
Patrick's powerpointPatrick706
 

What's hot (20)

Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14Raising Children in a Digital Age #YC14
Raising Children in a Digital Age #YC14
 
Power point 2 p
Power point 2 pPower point 2 p
Power point 2 p
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Technology and troop morale slide
Technology and troop morale slideTechnology and troop morale slide
Technology and troop morale slide
 
The world at your fingertips mindmap
The world at your fingertips mindmapThe world at your fingertips mindmap
The world at your fingertips mindmap
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Technology and Human Communication, Social Interaction
Technology and Human Communication, Social InteractionTechnology and Human Communication, Social Interaction
Technology and Human Communication, Social Interaction
 
Digital literacy 2
Digital literacy 2Digital literacy 2
Digital literacy 2
 
The Light and Dark of the Internet
The Light and Dark of the InternetThe Light and Dark of the Internet
The Light and Dark of the Internet
 
Media Literacy and Personal Identity
Media Literacy and Personal IdentityMedia Literacy and Personal Identity
Media Literacy and Personal Identity
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
What is digital citizenship and its components
What is digital citizenship and its componentsWhat is digital citizenship and its components
What is digital citizenship and its components
 
Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017Privacy by Default - IA Summit 2017
Privacy by Default - IA Summit 2017
 
Internet safety presentation 2016
Internet safety presentation 2016Internet safety presentation 2016
Internet safety presentation 2016
 
How technology has changed the way we communicate
How technology has changed the way we communicateHow technology has changed the way we communicate
How technology has changed the way we communicate
 
Digital Literacy
Digital LiteracyDigital Literacy
Digital Literacy
 
J. Social Interaction in 10 years
J. Social Interaction in 10 yearsJ. Social Interaction in 10 years
J. Social Interaction in 10 years
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Patrick's powerpoint
Patrick's powerpointPatrick's powerpoint
Patrick's powerpoint
 

Viewers also liked

Engaging Digital Natives - Their devices, their world, their content. Our ICT...
Engaging Digital Natives - Their devices, their world, their content. Our ICT...Engaging Digital Natives - Their devices, their world, their content. Our ICT...
Engaging Digital Natives - Their devices, their world, their content. Our ICT...Schoolbox
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Donna Murray
 
Digital Literacy by Simon Power
Digital Literacy by Simon PowerDigital Literacy by Simon Power
Digital Literacy by Simon Power
Simon Power
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
Nick Skytland
 
Myth or fact? The skillful tech-savvy Digital Native
Myth or fact? The skillful tech-savvy Digital NativeMyth or fact? The skillful tech-savvy Digital Native
Myth or fact? The skillful tech-savvy Digital Native
User Intelligence
 
Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"
r71navy
 
Digital natives or digital victims: children and the online world
Digital natives or digital victims: children and the online worldDigital natives or digital victims: children and the online world
Digital natives or digital victims: children and the online world
Deborah Lupton
 
Digital Natives, Digital Immigrants
Digital Natives, Digital ImmigrantsDigital Natives, Digital Immigrants
Digital Natives, Digital ImmigrantsFabiano Ramos
 
Digital natives, digital immigrants marc prensky
Digital natives, digital immigrants marc prenskyDigital natives, digital immigrants marc prensky
Digital natives, digital immigrants marc prensky
anagabic
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
ISACA
 
Digital Natives Presentation
Digital Natives PresentationDigital Natives Presentation
Digital Natives Presentation
avarry
 
Food and-beverage-service-management
Food and-beverage-service-managementFood and-beverage-service-management
Food and-beverage-service-management
AMARESH JHA
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
Natasha Murashev
 

Viewers also liked (13)

Engaging Digital Natives - Their devices, their world, their content. Our ICT...
Engaging Digital Natives - Their devices, their world, their content. Our ICT...Engaging Digital Natives - Their devices, their world, their content. Our ICT...
Engaging Digital Natives - Their devices, their world, their content. Our ICT...
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Digital Literacy by Simon Power
Digital Literacy by Simon PowerDigital Literacy by Simon Power
Digital Literacy by Simon Power
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
Myth or fact? The skillful tech-savvy Digital Native
Myth or fact? The skillful tech-savvy Digital NativeMyth or fact? The skillful tech-savvy Digital Native
Myth or fact? The skillful tech-savvy Digital Native
 
Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"Are you ready to raise, educate and protect "Digital Natives"
Are you ready to raise, educate and protect "Digital Natives"
 
Digital natives or digital victims: children and the online world
Digital natives or digital victims: children and the online worldDigital natives or digital victims: children and the online world
Digital natives or digital victims: children and the online world
 
Digital Natives, Digital Immigrants
Digital Natives, Digital ImmigrantsDigital Natives, Digital Immigrants
Digital Natives, Digital Immigrants
 
Digital natives, digital immigrants marc prensky
Digital natives, digital immigrants marc prenskyDigital natives, digital immigrants marc prensky
Digital natives, digital immigrants marc prensky
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Digital Natives Presentation
Digital Natives PresentationDigital Natives Presentation
Digital Natives Presentation
 
Food and-beverage-service-management
Food and-beverage-service-managementFood and-beverage-service-management
Food and-beverage-service-management
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to What Children Get Up To Online (and how we can try to keep them safe)

East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks SlideshareOllie Bray
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
Ollie Bray
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
Ollie Bray
 
Playing safe
Playing safePlaying safe
Playing safe
hutchison
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPSmicaja
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
 
E safety Presentation for foster carers by stephen carrick-davies
E  safety Presentation for foster carers by stephen carrick-daviesE  safety Presentation for foster carers by stephen carrick-davies
E safety Presentation for foster carers by stephen carrick-davies
Stevecd
 
understanding the self Digital-self.pptx
understanding the self Digital-self.pptxunderstanding the self Digital-self.pptx
understanding the self Digital-self.pptx
ShinyaMochizuki
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminartholman77
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online SafetyDonna Murray
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Kermit Agbas
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
NMSU - Family Resource Management
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
What is a global digital
What is a global digital What is a global digital
What is a global digital
judesplace
 
AmazingICT_eSafety_2018
AmazingICT_eSafety_2018AmazingICT_eSafety_2018
AmazingICT_eSafety_2018
Richard Fitzwarine-Smith
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
Kim Cofino
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Simon McKenzie
 

Similar to What Children Get Up To Online (and how we can try to keep them safe) (20)

East Lothian June Internet Safety Talks Slideshare
East Lothian June Internet Safety Talks   SlideshareEast Lothian June Internet Safety Talks   Slideshare
East Lothian June Internet Safety Talks Slideshare
 
Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009Internet Safety and Responsible Use: NQT Presentation - August 2009
Internet Safety and Responsible Use: NQT Presentation - August 2009
 
Glow Internet Safety Talk
Glow Internet Safety TalkGlow Internet Safety Talk
Glow Internet Safety Talk
 
Playing safe
Playing safePlaying safe
Playing safe
 
Social Media SSPS
Social Media SSPSSocial Media SSPS
Social Media SSPS
 
E safety training for foster carers by stephen carrick-davies jan 2013
E  safety training for foster carers by stephen carrick-davies jan 2013E  safety training for foster carers by stephen carrick-davies jan 2013
E safety training for foster carers by stephen carrick-davies jan 2013
 
E safety Presentation for foster carers by stephen carrick-davies
E  safety Presentation for foster carers by stephen carrick-daviesE  safety Presentation for foster carers by stephen carrick-davies
E safety Presentation for foster carers by stephen carrick-davies
 
understanding the self Digital-self.pptx
understanding the self Digital-self.pptxunderstanding the self Digital-self.pptx
understanding the self Digital-self.pptx
 
Kidsmart Seminar
Kidsmart SeminarKidsmart Seminar
Kidsmart Seminar
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Information Literacy and Online Safety
Information Literacy and Online SafetyInformation Literacy and Online Safety
Information Literacy and Online Safety
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
What is a global digital
What is a global digital What is a global digital
What is a global digital
 
AmazingICT_eSafety_2018
AmazingICT_eSafety_2018AmazingICT_eSafety_2018
AmazingICT_eSafety_2018
 
The Digital Playground
The Digital  PlaygroundThe Digital  Playground
The Digital Playground
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

What Children Get Up To Online (and how we can try to keep them safe)