SlideShare uma empresa Scribd logo
1 de 72
Technology Safety for Families
Do you think an adult could
be addicted to a phone or
social media APP?
Question

VIRUSES
KRYPTO-LOCKER
KRYPTO-LOCKER
EMAIL PHISHING
EMAIL PHISHING
PHONE CALL PHISHING
EMAIL SCAMS
Nigerian 419 scam
EMAIL SCAMS
Pre-Approved Scam
EMAIL SCAMS
Lottery Scam
EMAIL SCAMS
Disaster Relief
GOOGLE SEARCH SCAM
How can I protect myself
and my family from

Viruses
Malware
Phishing
Scams
Virus – Malware – Phishing
COMPUTER UPDATES
COMPUTER UPDATES
COMPUTER UPDATES
Apple
COMPUTER BACKUP
COMPUTER BACKUP
AppleApple
COMPUTER BACKUP
Apple
IPHONE BACKUP
SYNCING DEVICES
Syncing devices
‱ Strong passwords
‱ Device passwords
Rules for Passwords
‱ Don’t use just ONE password
‱ 8 characters or more
‱ Letters, numbers, capitals and symbols
‱ Protect your passwords
‱ Don’t use passwords on PUBLIC Wi-Fi
‱ No passwords on PUBLIC computers
‱ Use words or phrases
Passwords
‱ Use a word and a number
‱ kitty and your zip code, 92882
‱ kitty92882
‱ k9i2t8t8y2
‱ K9i2t8t8y2
‱ K9i2t8t8y2!
LIFELOCK
LIFELOCK
Social networkingused to =
Social networkingnow =
Social networkingfor kids

TOP 7 SOCIAL NETWORKS
Rules for social media use

‱ Make sure you choose age
appropriate social media platforms
‱ Always use privacy settings
‱ Passwords... Long and Strong
‱ Don’t let social networks
“access” your address book
Rules for social media use

‱ Type the address in directly
‱ Don’t post PERSONAL info
‱ Don’t “friend” strangers
‱ Think before you post!
We are the first
generation of
parents that
have had to deal
with the new
phenomenon!
Colleges and
employers are
looking!
SOCIAL MEDIA RISKS
YOUR DIGITAL FOOTPRINT
Cleaning up

‱ Delete old profiles /
accounts
‱ Search yourself
‱ Change privacy settings
‱ Use secondary email
‱ Unsubscribe!
Pornography
‱ The average child accidentally stumbles onto
pornographic websites by age 12
‱ By age 18, 9 out of 10 boys will have had
exposure to porn
‱ Among young adults, age 18-30

60% of young men and 20% of young women
view porn weekly
Pornography
‱ 1 in 9 websites
online are
pornographic
‱ Put a filter program
on ALL computers.
Pornography
Internet Accountability monitors the websites visited, the
search terms used, and the YouTube videos watched, and
lists them in an easy-to-read Report that is designed to
start a conversation about healthy online habits.
Parents, see where your kids go online. Adults, reduce
Internet temptations and protect the relationships you
value most.
Pornography
‱ Family Computer
‱ Laptop
‱ Cell phone
‱ iPad / Tablet
Filtering for the iPhone-iPad-iTouch
‱ Restrictions feature
‱ App restrictions
‱ Web content
‱ In-app purchases
‱ Age appropriate
‱ Lock accounts
‱ Lock GPS
The Most Common Problem
Location
.Location
.Location

Cell phones at night

The iBasket
Cell Phones at Night

Contracts!
‱ Cell phone contract
‱ www.iccguru.com/cellphonecontract.doc
Filtering for Google and YouTube
Filtering for Google and YouTube
Filtering for Google and YouTube
Filtering for Google and YouTube
Filtering for Google and YouTube
Monitoring for the computer
‱ Email
‱ Instant Messaging
‱ Keystrokes
‱ Screenshots
‱ Website history
‱ Searches
‱ Facebook
‱ YouTube
Monitoring for the iPhone-iPad-iTouch
Location Monitoring
iPhone – iPad – iTouch CONTROL
Got a new driver in the family?
Gives parents speed alerts
Notifies parents if phones UNLOCKS while traveling over 12mph
Got a new driver in the family?
Apps to be aware of
..
‱ Hook up apps
‱ Anonymous apps
‱ Jail-Breaking
‱ Sexting Apps
‱ Cyberbullying Apps
Scott’s Final Tips
1) Know the passwords to all of your
children's accounts
2) Remove technology at night
(bedtime rule)
3) Talk about consequences of social media
4) Put a filter on internet connected device
(K9, iOS restrictions, OurPact)
5) Consider monitoring software
(WebWatcher, TeenSafe, Life360)
Questions?

Mais conteĂșdo relacionado

Mais procurados

Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesQuick Heal Technologies Ltd.
 
Cyber safety
Cyber safetyCyber safety
Cyber safetyArjun Chetry
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)Vince Verbeke
 
Smart phone security ios system
Smart phone security ios systemSmart phone security ios system
Smart phone security ios systemJamil S. Alagha
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseNowSecure
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A ReviewUmang Singh
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Small is beautiful: Smart publishing for smart phones
Small is beautiful: Smart publishing for smart phonesSmall is beautiful: Smart publishing for smart phones
Small is beautiful: Smart publishing for smart phonesMarc Hartog
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingLookout
 
Internet safety
Internet safetyInternet safety
Internet safetymyasinpak
 
Get smart - Smartphones and Applications for Real Estate
Get smart - Smartphones and Applications for Real EstateGet smart - Smartphones and Applications for Real Estate
Get smart - Smartphones and Applications for Real EstateDamien Smith
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone SecurityGuneet Pahwa
 
Hacking Airwaves with Pineapples
Hacking Airwaves with PineapplesHacking Airwaves with Pineapples
Hacking Airwaves with PineapplesHostway|HOSTING
 
Spy Software
Spy SoftwareSpy Software
Spy Softwarespyindia01
 
Presentation1
Presentation1Presentation1
Presentation1llndl1
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...Alan Quayle
 

Mais procurados (20)

Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 
Smart phone security ios system
Smart phone security ios systemSmart phone security ios system
Smart phone security ios system
 
Five mobile security challenges facing the enterprise
Five mobile security challenges facing the enterpriseFive mobile security challenges facing the enterprise
Five mobile security challenges facing the enterprise
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A Review
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Small is beautiful: Smart publishing for smart phones
Small is beautiful: Smart publishing for smart phonesSmall is beautiful: Smart publishing for smart phones
Small is beautiful: Smart publishing for smart phones
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Ipad
IpadIpad
Ipad
 
Get smart - Smartphones and Applications for Real Estate
Get smart - Smartphones and Applications for Real EstateGet smart - Smartphones and Applications for Real Estate
Get smart - Smartphones and Applications for Real Estate
 
Security risks with fake apps
Security risks with fake appsSecurity risks with fake apps
Security risks with fake apps
 
Smart Phone Security
Smart Phone SecuritySmart Phone Security
Smart Phone Security
 
Hacking Airwaves with Pineapples
Hacking Airwaves with PineapplesHacking Airwaves with Pineapples
Hacking Airwaves with Pineapples
 
Spy Software
Spy SoftwareSpy Software
Spy Software
 
Presentation1
Presentation1Presentation1
Presentation1
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Atrix
AtrixAtrix
Atrix
 
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
TADSummit, Apifonica Keynote: What programmable telecom has to do with the im...
 

Destaque

Computer Operating System
Computer Operating System Computer Operating System
Computer Operating System Liton Ahmed
 
Computer Operating system
Computer Operating systemComputer Operating system
Computer Operating systemMis bah
 
Operating System Overview.
Operating System Overview.Operating System Overview.
Operating System Overview.akash726788
 
Operating Systems 1: Introduction
Operating Systems 1: IntroductionOperating Systems 1: Introduction
Operating Systems 1: IntroductionDamian T. Gordon
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)Vaibhav Bajaj
 
Business Studies (Principles of Management) Project Class 12th CBSE
Business Studies (Principles of Management) Project Class 12th CBSE Business Studies (Principles of Management) Project Class 12th CBSE
Business Studies (Principles of Management) Project Class 12th CBSE Dheeraj Kumar
 

Destaque (7)

Computer Operating System
Computer Operating SystemComputer Operating System
Computer Operating System
 
Computer Operating System
Computer Operating System Computer Operating System
Computer Operating System
 
Computer Operating system
Computer Operating systemComputer Operating system
Computer Operating system
 
Operating System Overview.
Operating System Overview.Operating System Overview.
Operating System Overview.
 
Operating Systems 1: Introduction
Operating Systems 1: IntroductionOperating Systems 1: Introduction
Operating Systems 1: Introduction
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
 
Business Studies (Principles of Management) Project Class 12th CBSE
Business Studies (Principles of Management) Project Class 12th CBSE Business Studies (Principles of Management) Project Class 12th CBSE
Business Studies (Principles of Management) Project Class 12th CBSE
 

Semelhante a Hume Lake Spring Marriage Retreat tech safety presentation

Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Scott Burnett
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Scott Burnett
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017Scott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Olive Branch 2017
Olive Branch 2017Olive Branch 2017
Olive Branch 2017Scott Burnett
 
2023 Presentation.pptx
2023 Presentation.pptx2023 Presentation.pptx
2023 Presentation.pptxScott Burnett
 
Protect your family
Protect your familyProtect your family
Protect your familyneodad1
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Scott Burnett
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldScott Burnett
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationGreater Cleveland PC Users Group
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Scott Burnett
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Matt Forney
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Scott Burnett
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetupJason Weaver
 
Moochies presentation
Moochies presentationMoochies presentation
Moochies presentationkauepgarcia
 
Internet Safety For Parents v3
Internet Safety For Parents v3Internet Safety For Parents v3
Internet Safety For Parents v3MrAColley
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Lo1 405 moochies_presentation
Lo1 405 moochies_presentationLo1 405 moochies_presentation
Lo1 405 moochies_presentationkauepgarcia
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 

Semelhante a Hume Lake Spring Marriage Retreat tech safety presentation (20)

Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking Salem Lutheran 2017 Tech Speaking
Salem Lutheran 2017 Tech Speaking
 
Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary Technology Safety - Mariners Elementary
Technology Safety - Mariners Elementary
 
Westpark Elementary 2017
Westpark Elementary 2017Westpark Elementary 2017
Westpark Elementary 2017
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Olive Branch 2017
Olive Branch 2017Olive Branch 2017
Olive Branch 2017
 
2023 Presentation.pptx
2023 Presentation.pptx2023 Presentation.pptx
2023 Presentation.pptx
 
Protect your family
Protect your familyProtect your family
Protect your family
 
Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!Help! I'm the parent of a tech saavy child!
Help! I'm the parent of a tech saavy child!
 
Feb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber worldFeb 2014. Parenting in a cyber world
Feb 2014. Parenting in a cyber world
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015Pegasus Presentation Feb. 12, 2015
Pegasus Presentation Feb. 12, 2015
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015Andersen Elementary Tech Safety 2015
Andersen Elementary Tech Safety 2015
 
Presentation internet safety & security by idaho web marketing meetup
Presentation   internet safety & security by idaho web marketing meetupPresentation   internet safety & security by idaho web marketing meetup
Presentation internet safety & security by idaho web marketing meetup
 
Moochies presentation
Moochies presentationMoochies presentation
Moochies presentation
 
Internet Safety For Parents v3
Internet Safety For Parents v3Internet Safety For Parents v3
Internet Safety For Parents v3
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Lo1 405 moochies_presentation
Lo1 405 moochies_presentationLo1 405 moochies_presentation
Lo1 405 moochies_presentation
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 

Mais de Scott Burnett

Fall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott BurnettFall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott BurnettScott Burnett
 
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer ConceptsManaging Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer ConceptsScott Burnett
 
Managing Screen Time
Managing Screen TimeManaging Screen Time
Managing Screen TimeScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Internet safety for parents slide share
Internet safety for parents slide shareInternet safety for parents slide share
Internet safety for parents slide shareScott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Internet Safety for families
Internet Safety for familiesInternet Safety for families
Internet Safety for familiesScott Burnett
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the HomeScott Burnett
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupScott Burnett
 

Mais de Scott Burnett (14)

Fall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott BurnettFall 2019 Internet Safety presentation by Scott Burnett
Fall 2019 Internet Safety presentation by Scott Burnett
 
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer ConceptsManaging Screen Time - Scott Burnett, Integrity Computer Concepts
Managing Screen Time - Scott Burnett, Integrity Computer Concepts
 
Managing Screen Time
Managing Screen TimeManaging Screen Time
Managing Screen Time
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Internet safety for parents slide share
Internet safety for parents slide shareInternet safety for parents slide share
Internet safety for parents slide share
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet Safety for families
Internet Safety for familiesInternet Safety for families
Internet Safety for families
 
Managing Technology in the Home
Managing Technology in the HomeManaging Technology in the Home
Managing Technology in the Home
 
Internet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life groupInternet safety for parents St. Johns Moms Life group
Internet safety for parents St. Johns Moms Life group
 

Último

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Último (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Hume Lake Spring Marriage Retreat tech safety presentation